HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.111 Secure configuration of the RAS system

S 4.111 Secure configuration of the RAS system

Initiation responsibility: Head of IT Section, IT Security Management Team

Implementation responsibility: Administrator

The functioning and security of a RAS system are essentially determined by the configuration parameter settings. However, since a RAS system does not consist of only one component which has to be configured, the overall configuration is naturally a lot more complex. Due to this complexity, configuration errors which could reduce the security of the system as a whole can easily occur. Uncoordinated changes of one configuration parameter on a component can thus interact with the other components in such a way as to prevent error-free operation. In extreme cases the security of the LAN could even be impaired.

Since the configuration of a RAS system is generally subject to changes over time (e.g. due to changes in personnel, new operational scenarios, system enhancements etc.), it cannot be assumed that there is only one secure (and static) configuration which is defined once and never changed afterwards. On the contrary, the configuration is likely to undergo a series of version changes. It is the job of the administrators who are responsible for the RAS system to ensure that only secure versions of the system configuration are defined and that when the system configuration settings are changed, the new configuration is also secure.

In general, the following configuration categories may be distinguished:

To ensure that the configuration is secure, the following points should be noted when making the configuration settings.

Although the task performed by RAS systems is quite simple, their configuration and operation are as complex as, for example, those of a firewall system. The topics listed here should therefore always be elaborated, expanded and modified as part of RAS system planning and RAS operation.

Examples

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home