HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.187 Definition of a set of RAS security guidelines

S 2.187 Definition of a set of RAS security guidelines

Initiation responsibility: IT Security Management Team

Implementation responsibility: IT Security Management Team, Administrator

As part of the process of planning RAS access to a LAN, it is also necessary to define a set of security guidelines for remote access. The organisation-wide IT security guidelines must be modified and expanded accordingly. The RAS-specific rules must be documented and updated in the event of any changes.

The security rules governing remote access to the local network must be distributed to all users who will be allowed remote access (see also S 2.184 Development of a RAS concept). The rules contained in the security guidelines should cover the following subject matter:

This list of questions must be expanded, modified and made specific so as to take local circumstances into account. This process should entail consideration of the existing security guidelines. The general security requirements must not be undermined by the RAS security guidelines.

Within the framework of the IT security concept, the rules provided in the RAS security guidelines should also specify possible responses to breaches of the rules. Every RAS user must be aware of these.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home