HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.63 Security-related requirements for telecommuting computers

S 4.63 Security-related requirements for telecommuting computers

Initiation responsibility: Agency/company management; IT Security Management

Implementation responsibility: Head of IT Section, Administrator

The security-related requirements for telecommuting computers depend on the degree of protection needed for data at remote workstations and the nature of the data which telecommuters can access from the telecommuting computer of the institution. The higher the required degree of protection, the greater the number of security measures entailed. General security objectives for telecommuting computers include the following:

The following functions are useful for remote workstations:

- For access control: user ID, data and time, success, type of access, what was changed, read, written, ... - Occurrence of operational errors. The evaluation function must be capable of generating transparent, readable reports so that no critical security-related activities can be overlooked.

From the above-mentioned functions, those which fulfil the security requirements applicable in each case to telecommuting computers should be selected. A suitable operating system must then be chosen as a platform for these functions. If the operating system does not support all the functions, additional products need to be installed. If possible, all the telecommuting computers of an institution should be equipped identically in order to facilitate their care and maintenance. For security-related compatibility checks, refer to Chapter 9.1.

The whole system is to be configured by administrators such that a maximum level of security is achieved.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home