Computer Security Control Objectives.docx

上传人:b****5 文档编号:28740140 上传时间:2023-07-19 格式:DOCX 页数:17 大小:21.29KB
下载 相关 举报
Computer Security Control Objectives.docx_第1页
第1页 / 共17页
Computer Security Control Objectives.docx_第2页
第2页 / 共17页
Computer Security Control Objectives.docx_第3页
第3页 / 共17页
Computer Security Control Objectives.docx_第4页
第4页 / 共17页
Computer Security Control Objectives.docx_第5页
第5页 / 共17页
点击查看更多>>
下载资源
资源描述

Computer Security Control Objectives.docx

《Computer Security Control Objectives.docx》由会员分享,可在线阅读,更多相关《Computer Security Control Objectives.docx(17页珍藏版)》请在冰豆网上搜索。

Computer Security Control Objectives.docx

ComputerSecurityControlObjectives

ComputerSecurityandControlObjectives

ListofControlObjectives

Pleasefindenclosedseveralcontrolobjectivesthatshouldhelpmeettheminimumlevelofsecurityandcontrolofacomputernetwork.

A.Desktop

∙Theusershouldberequiredtosignontotheircomputerwithauseridandpassword.

∙Thepasswordforanyserverotherthanthepersonalcomputershouldnotbestoredonthepersonalcomputerinanyfileinanyformat

∙Directoryandfilesonthepersonalcomputershouldberestrictedtoauthorizedusersonly.

∙Alegalnoticeshouldbedisplayedtoinformtheuserofthesensitivenatureoftheinformationandtheirresponsibilitytokeepitsafe.

∙Thelastauthenticatedusershouldnotbedisplayedonthesignonscreen

∙AsystempolicyshouldbeinplacethatpreventsthesharingofresourcesonthelocalWindows95workstation.

∙AuserpolicyshouldbeappliedtotheDomainUsersgroup,whichremovesanycommonicongroupsfromtheStartMenu.

∙Astandardsecurityandcontrolconfigurationshouldbeestablishedandapprovedbymanagement.Theenforcementofthestandardconfigurationshouldbecontrolledbyanetworkmanagementproductthroughperiodicinventorycontrol.

∙Standardapplicationsshouldbeestablishedtoreducetheerrorsandomissionsthatoccurwhensupportingmultipleenduserconfigurations.Inaddition,theestablishmentofastandardapplicationenvironmentonthedesktopshouldreducethesupportandmaintenanceeffortrequired.

∙ForthebestoverallsecuritytheWindowsNT4.0workstationoperatingsystemshouldbetherecommendedstandard.

B.FileServers

∙Shouldbephysicallysecured

∙Corporateauthenticationstandardsshouldbemet

∙ChallengeHandshakeAuthenticationProtocol(CHAP)

∙Passwordlengthofatleast8characters

∙Passwordagingof30days

∙Passwordminimumageof1day

∙Passwordconstructionofamixtureofalphaandnumericcharacters

∙Passwordhistoryfileisestablished

∙Invalidsignonattemptsof3withtheuseraccountbeinglockedafterreachingthisthreshold

∙Resetinvalidsignonattemptsafter1440(oneday)

∙Lockoutduration3days

∙Lockoutofuseraccountsforinactivity

∙Re-evaluationofauser'sprivilegeswhenauser'sjobstatuschanges

∙Corporateauthorizationstandardsshouldbemet

∙Guestaccountshouldbedisabled

∙Administrationuseraccountshouldbeprotectedbypassprop(resourcekit)whichwillforcetheAdministratoraccounttolockupafterthesamenumberofinvalidattemptsasanynormaluser.ThedifferenceisthateveninthiscasetheAdministratoraccountcanstillsignonatthesystemconsole.

∙Everyonegroupshouldhaverestricteddirectoryaccess

∙Allotherusersandgroupsshouldonlyhavethedirectoryandfilepermissionsrequiredbytheirjobresponsibilities

∙NTFSshouldbeinstalled

∙Allgroupaccountsshouldonlyhavevalidusersastheirmembers

∙Alluserrightsshouldberestrictedtousersthatrequirethislevelofresponsibilityfortheirjobfunction.

∙TrustedDomainsshouldbeusedsparingly

∙Allservicesshouldberemovedunlessrequiredtooperatetheserver

∙ConfiguretheprotocolbindingsbetweenTCP/IP,NetBIOS,ServerandWorkstationservices.ByremovingthebindingsbetweenNetBIOSandTCP/IP,thenativefilesharingserviceswillnotbeaccessibleviaTCP/IPandhencetheInternet.TheseandotherNetBIOSserviceswillstillbeaccessibleviaalocalLAN-specific,non-routableprotocol(ex:

NetBEUI).

∙Corporateaccountabilitystandardsshouldbemet

∙Adequateaudittrailsshouldbeestablishedfor:

∙Logonandlogoffs

∙Fileandobjectaccess

∙Userandgroupmanagement

∙Securitypolicychanges

∙Changecontrol

∙Allchangestotheoperatingenvironmentshouldbeproperlytestedanddocumented

∙Backup

∙Anadequatebackupscheduleshouldbeestablished

∙Backupfilesshouldbestoredinasecuredoff-sitelocation

∙Contingencyplanning

∙Anadequatecontingencyplanthatallowsthefileserverandtheassociatedapplicationscanberestoredwithinareasonabletimeframe(determinedbyariskanalysisandmanagementapproval).

∙ServicePacks

∙EnsurethatthereisamechanismtoensurethatalldevicesincludingtheFileServerhavethelatestpatches/servicepack.

C.LAN&WAN

∙Informationthattravelsoverthenetworkshouldbeclassifiedastoalevelofsensitivity.Basedonthisclassificationthenetworktransmissionshouldnotpermitthetransferofcleartextsensitivedata.Thiswouldinclude:

∙Passwords

∙Legaldocuments

∙Datathatisprotectedbystateorfederallaw

∙Wherepossiblesensitivedatatransfershouldbeprotectedbyusingoneofthefollowing:

∙CHAP-foruseridandpasswordauthentication

∙Securedhubs

∙Encryption

∙Cisco'sIPSectechnology

∙Redundancyshouldbebuiltintothenetworktoallowfortheuninterruptednetworkservices.

∙Vendoraccessshouldbeclearlydefinedandcontrolled.

∙Securedsignon

∙Audittrailofactivity

∙Noadministrationrightsontheproductionserver

∙Nogenericpasswords(individualaccountability)

∙Controlsshouldbeinplacetopreventsessionhi-jacking.

D.NetworkComponents

∙Allnetworkcomponentsshouldmetthefollowingcontrolobjectives:

∙Securedauthentication(CHAP)forremoteadministration

∙Propersecurityconfiguration

∙SNMPalarms

∙AccessControlList(ACLs)ifappropriate

∙Audittrailofconfigurationchanges

∙Changecontrolforconfigurationchanges

∙Testing

∙Backupcopy

∙Secureddialupaccess(CHAP)ifpresent

∙Physicallysecuredtopreventtheftorunauthorizedaccess

E.Firewall

∙Theinstalledfirewall(s)shouldmetthefollowingcontrolobjectives:

∙Securedauthentication(CHAP)forremoteadministration

∙Restrictedlistofusersthatcanadministratethefirewall

∙Propersecurityconfiguration

∙Rules

∙SelfsecuritycheckssuchasTripwire

∙Audittrailsofconfigurationchanges

∙Changecontrolforconfigurationchanges

∙Testing

∙Backupcopy

∙Operationalconfiguration

∙Connectiontracking

∙PreventionofIPSpoofinganddenialofserviceattacks

∙PreventionofaccesstohostcomputersbyIPaddress

∙Restrictiontoonlyrequiredservices

∙Singlepointofnetworkentry

∙Violationreportingofunauthorizedusers

∙Realtimealertsofsecuritybreaches

F.Proxy

∙Theinstalledproxy(ies)shouldmetthefollowingcontrolobjectives:

∙Securedauthentication(CHAP)forremoteadministration

∙Restrictedlistofusersthatadministratetheproxy

∙Propersecurityconfiguration

∙Rules

∙SelfsecuritycheckssuchasTripwire

∙Audittrailsofconfigurationchanges

∙Changecontrolforconfigurationchanges

∙Testing

∙Backupcopy

∙Operationalconfiguration

∙Connectiontracking

∙PreventionofIPSpoofing

∙PreventionofaccesstohostcomputersbyIPaddress

∙Restrictiontoonlyrequiredservices

∙Blockingunwantedsites

F.RemoteCommunicationServer

∙Securedadministrationauthenticationprocess(CHAP)

∙Secureduserauthenticationprocess(CHAP)

∙Shouldmettheauthenticationstandardsoftheorganization

∙Shouldbephysicallysecured

∙Shouldcontainaudittrailsofchangestoconfiguration

∙Changecontrolforconfigurationchanges

 

G.SingleSignOn

∙Thebankshouldimplement,ifatallpossible,asinglesignonsolutionforendusers

∙CiscoSecuremayhavethecapabilitytomeetthisobjective

H.HostAccess

∙Allhostaccessshoulduseasecureauthenticationprocess(CHAP)

∙AllhostaccessshouldmeettheauthenticationstandardsoftheBank

∙Onlyauthorizedusersshouldhaveaccesstohostapplications

∙Allhostaccessshouldcontainanadequateaudittrailbyuseroftheiractivitiesonthehost.

I.ChangeControl

∙Thebankshouldestablishanadequatechangecontrolpolicyforthecompleteproductionenvironment.

∙Thiswouldincludetheseparationofthefollowingenvironments:

∙Development

∙Test(QualityAssurance)

∙Production

∙Testingstandardsshouldbedevelopedtoensurethatanychangeisadequatelytestedandthatpropertestcoverageiscompletedpriortothemovementtotheproductionenvironment.

J.IncidentReporting

∙Anincidentreportingsystemshouldbeestablishedforallproduction:

∙Outages

∙Problems

∙Theincidentreportingsystemshouldtractboththeproblemandtheresolutionoftheproblem.

K.PhysicalSecurity

∙Allcomputersandcomponentsshouldhaveaninventorycontrolnumber

∙Adatabaseofeachcomponentslocationshouldbeestablished

∙Anycriticalcomponentshouldbephysicallysecured

L.ContingencyPlanning

∙Ariskanalysistodeterminethefollowingriskfactorsshouldbecompleted:

∙SensitivityRisk

∙Sensitivedata

∙Dataprotectedbylaws

∙CriticalityRisk

∙AvailabilityofdataandtheimpacttotheBank

M.DynamicAlarms

∙Alarmsshouldbeestablishedtodeterminethefollowing:

∙Changestoanysecurityconfigurationforanydevice

∙Attacks

∙Insider

∙Outsider

∙Trendanalysisshouldbeusedbycollectingtheauditfilesandlookingforsuspiciousactivity

∙REALSecureisaproductthatcanbeconfiguredtocheckforcertaintypeofattacks.

N.AuditReporting

∙Adequateauditreportsneedtobedesignedintoeachdevicetoallowforthecompleteandproperreviewofthecurrentconfigurationevolutionprocess.

∙Auditreportingshouldbedynamiconsensitivedevicesandmanualonothers.

∙Tailoredreportsmayberequiredtomeetauditobjectiveswhichincludebutarenotlimitedto:

∙Accesscontrolreports

∙Whoaccesswhat,whenincludingInternetaccess

∙Integrityreportsthatdemonstratethatanyprocessorchangetoaprocesswhatproperlytestedtoensurethatitonlyperformstheactivityrequiredbyitsfunction.

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 高等教育 > 其它

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1