HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.92 Secure operation of a system management system

S 4.92 Secure operation of a system management system

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrators

To ensure the secure operation of a system management system, which may consist of a number of different management tools (see S 2.171 Selection of a suitable system management product), the configuration of all components involved must be examined to ascertain that it is secure (see also S 4.91 Secure installation of a system management system). To do this it is necessary to provide appropriate security for the operating systems of the components which are administered by the system management system and which therefore have installed parts of the system in the form of software and/or data. The provision of security also includes the secure siting of the computers that perform central tasks for the management system (management servers or computers with management databases). In addition, provision must be made for secure data transmission (see S 5.68 Use of encryption procedures for network communications).

Particular attention should be paid to the following points during operation of a management system:

.
© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home