HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.223 Security objectives for the use of standard software

S 2.223 Security objectives for the use of standard software

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrators, employees

In most office environments standard software is used for typical office tasks. This includes word processing programs (Word, WordPerfect, StarOffice), spreadsheets, office communication systems, e-mail programs and databases. As these separate modules are often purchased as a single package from one supplier reference will be made here to "office packages". Because the same kind of software is widely distributed, it is possible for security weaknesses in these programs to have large effects as they can be used on many IT systems so that any malicious programs can spread very quickly. A typical example here is macro viruses (see T 5.43 Macro viruses).

In order to be able to avoid or reduce such problems, security guidelines should be specified regarding the use of standard software.

Standard software is generally not designed to deliver a high level of IT security. All staff should therefore be informed that information requiring particular protection should not be handled on a standard office workstation without additional IT security measures. Some standard products nevertheless offer a number of IT security functions which, however, generally provide significantly less security than specialist security products. Users should be informed of these security functions and their effectiveness (see also S 4.30 Utilisation of the security functions offered in application programs). It is especially important here that users should not be lulled into a false sense of security and that the use of these security functions does not open up any security loopholes. Users should be informed that office products are not suitable for every purpose.

Moreover, office packages often offer functions intended to facilitate the exchange of information, but which often by their very design bring with them major security problems.

Examples

To facilitate co-ordination within teams of workers, most electronic diaries can be networked. As well as many advantages, however, this can bring certain problems with it. For example, not everyone will want colleagues to be able to see all their appointments. The vendors have responded to this kind of objection by offering an option of only displaying to other people which time is free and which time is already booked. Many people feel on the one hand that it will create a bad impression if a lot of free time is visible while on the other hand they are afraid that every free minute will be booked by colleagues with appointments. This can then result in large periods of time being blocked in reserve. All the more recent Windows operating systems allow CD-ROMs to be automatically detected and started. This can result in malicious programs such as viruses or Trojan horses gaining access to the computer. Automatic CD-ROM detection should therefore be disabled (see S 4.57 Deactivating automatic CD-ROM recognition). With OLE functions objects can be embedded in files. These are used in many office products as a means of making information available to other programs. For example, this makes it possible for a table created in Excel to be embedded in a Word document. However, the result is that not only the information visible in the spreadsheet extract is transferred to the Word file but possibly all the other information contained in the Excel file. If the Word file is then passed to someone else, the recipient will also be able to view and even alter the Excel file, even if this is read- or write-protected with a password. In PostScript files problems similar to those encountered with macro viruses can occur. In PostScript display programs there are interpreters which process the PostScript language. From level 2.0 of the PostScript specification there are also PostScript commands for writing files. As a result it is possible to generate PostScript files which, during processing by an interpreter, can modify, delete or rename other files as soon as they are displayed on the screen. Similar problems can occur with PDF files if older versions of Acrobat Reader are used to display these files. Functions such as program calls can be embedded in PDF files, and can pose a security risk to the files of the local IT system. A viewer should therefore be used to display PDF files which In Word there is an option allowing fast saving of text that has been written. This has the result that only modifications made to a document in the present session are saved into the document. This type of save takes less time compared with a full save, in which Word saves the entire modified file. However, a full save requires less storage space on the hard disk than a fast save. The critical disadvantage of fast saving, however, is the fact that a file can contain fragments of text which the author would not want to be passed on.

In order to be able to take action in good time against design weaknesses and security weaknesses that have come to light, the Administrator or IT Security Management should keep themselves informed about such problems (see also S 2.35 Obtaining information on security weaknesses of the system).

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home