T 3.9 Improper IT system administration

Improper IT system administration can place the security of an IT system at risk when it results in the disregarding or bypassing of security safeguards.

An example of improper administration is when network access capabilities are created (or not disabled) that are not necessary for the proper operation of the IT systems or that represent a particularly serious threat due to their tendency to contain errors.

A problem frequently encountered is that the user names used to work on the IT system are granted more privileges than are absolutely necessary for the tasks at hand. If a computer becomes infected with a computer virus or a Trojan horse in this case and the user works with administrator rights, there may be wide-ranging consequences since the malware will also run with administrator rights.

Incorrectly installing new or existing software can create security problems. It is very uncommon for standard installations of operating systems or system programs to offer all the features required for a secure configuration. Improper modifications to meet the actual security requirements can pose a considerable risk in this case. The danger of configuration errors is especially serious in complex security systems such as RACF under z/OS. Many system functions have a mutual influence on each other.

Special attention must be paid to systems that, when poorly administrated, could affect the protection of other systems (e.g. routers and security gateways).

Every modification to the security settings and every extension of access rights constitutes a potential threat to the overall security.

Examples: