S 2.223 Security objectives for the use of standard software

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: User

In most office environments standard software is used for typical office tasks. This includes word processing programs, spreadsheets, office communication systems, e-mail programs and databases. As these are often purchased from one supplier, reference will be made here to office packages. Because the same kind of software is widely distributed, it is possible for security weaknesses in these programs to have large effects as they can be used on many IT systems so that any malicious programs can spread very quickly. A typical example here is macro viruses (see T 5.43 Macro viruses).

In order to be able to avoid or reduce such problems, security guidelines should be specified regarding the use of standard software.

To secure the use of standard software such as office packages the following points must be taken into account in the context of IT operation and security management:

Security safeguards during live operation

Office software and other standard software should never be started with administrator rights. Only data whose origin is considered trustworthy should be opened directly in the applications. Before opening files from external sources they must be scanned with a fully updated anti-virus program.

When exchanging documents these should be digitally signed and/or encrypted wherever possible.

Standard software is generally not designed to deliver a high level of security. All employees should therefore be informed that information requiring particular protection should not be handled on a standard office workstation without additional security measures. Some standard products nevertheless offer a number of security functions which, however, generally provide significantly less security than specialist security products. Users should be informed of these security functions and their effectiveness (see also S 4.30 Utilisation of the security functions offered in application programs). It is especially important here that users should not be lulled into a false sense of security and that the use of these security functions does not open up any security gaps. Users should be informed that office products are not suitable for every purpose.

Moreover, office packages often offer functions intended to facilitate the exchange of information, but which often by their very design bring with them major security problems.

Examples:

Active content in PDFs opens up security risks, but is rarely actually needed. For this reason, JavaScript should be disabled in the PDF display programs.

The most commonly used PDF viewers are Adobe Reader and Acrobat. Malware developers also orientate themselves toward market leaders. It may therefore also make sense to use less commonly used PDF viewers or at least have them available in order to be able to switch in the event of an acute warning.

In order to be able to take action in good time against design weaknesses and security gaps that have become known, the administrator or IT security management should keep themselves informed about such problems (see also S 2.35 Obtaining information on security weaknesses of the system).

Review questions: