HostedDB - Dedicated UNIX Servers

-->
ITBPM S 4.105 Initial measures after a Unix standard installation

S 4.105 Initial measures after a Unix standard installation

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrator

Most Unix systems do not satisfy the system security requirements after a standard installation. Often too many sensitive services and configurations are activated by the vendors or else these are provided with access rights which are not sufficiently restrictive.

This section is intended to show by way of example how to make the system secure following a standard installation.

All changes carried out should be carefully documented and be agreed among all the system administrators. This documentation can be in paper form or in a file that is maintained on the system concerned. However, it must be possible for the documentation to be inspected and updated at any time (see also S 2.34 Documentation on changes made to an existing IT system).

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
Januar 2000
home