HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.112 Secure operation of the RAS system

S 4.112 Secure operation of the RAS system

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrator

For the secure operation of a RAS system it is essential that the hardware and software components of the system have been securely installed and configured. Safeguards S 4.110 Secure installation of the RAS system and S 4.111 Secure configuration of the RAS system must therefore have been performed before the RAS system goes live. In addition, all the organisational processes must have been defined and implemented (e.g. reporting channels and responsibilities). It should also be noted that the desired level of system security can only be assured if the physical security of the hardware components which make up the RAS system is also assured (see also S 4.110 Secure installation of the RAS system).

The security of a RAS system can be roughly broken down into three areas:

  1. the security of the RAS server,
  1. the security of the RAS client and
  1. the security of data transmission.

Whereas the desired level of security of the RAS server can be controlled through implementation of local security guidelines, the RAS client is typically not under the complete control of the IT personnel who are responsible for the LAN. The security of data transmission media is generally completely out of their control. For this reason, protection of communications between client and server must be secured by additional means.

In the environment of the RAS server the following recommendations for secure operation should be considered:

As RAS clients are generally operated in environments that are not under full control, special mechanisms, procedures and safeguards must be employed to ensure protection of the client. In particular, mobile RAS clients are exposed to a special danger here in that their physical design makes them especially easy to attack (e.g. theft, vandalism). Once a RAS client is compromised, there is a danger that the security of the LAN could also be impaired as a result.

For the secure operation of RAS clients, the following aspects must therefore be considered:

The communications link between RAS client and RAS server is generally established over third-party networks. The network components used here are generally not under the control of the operator of the LAN with which the connection is to be established. It must also be assumed that the data will not only be transmitted over the telecommunications network of a provider but that the networks will also be used by partners of the telecommunications provider. This applies especially where a LAN is accessed from abroad. To satisfy the protection requirements of the data thus transmitted, security measures must be taken which, for example, assure the confidentiality of data. The following therefore applies to data transmission:

A number of security mechanisms can be used for RAS connections in order to satisfy these data protection requirements. These include the following:

Security with remote access over a RAS connection can only be assured if all the components of the RAS system are correctly and consistently configured. However, it should be noted that, depending on the access procedure, a large proportion of the components used are not under the direct control of the local RAS administration. Therefore RAS access to a LAN must be monitored especially carefully and thoroughly.

Example

As Windows NT comes with RAS support as standard, the Remote Access Service of Windows NT will be used as an example. The functionality offered and the available security mechanisms are, however, generally only suitable for a small number of RAS users and for data which has a low protection requirement. Where there are large numbers of users and the protection requirement is high, additional RAS products should be considered as well.

The following applies to RAS clients running under Windows NT:

The following applies to RAS servers running under Windows NT:

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home