S 2.322 Defining a security policy for a client/server network

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: IT Security Officer, Administrator, Head of IT

The security specifications for all clients result from the organisation-wide security policy. Based on this general policy, the requirements must be specified for the given context and summarised in a security policy for the respective group of clients. In this context, it must be checked whether further, generic stipulations such as IT policies, password policies or Internet usage policies must be taken into consideration, in addition to the organisation-wide security policy.

The security policy must be known to all users and other persons involved in the procurement and operation of the clients, and must form the foundation of their work. Like all policies, its contents and its implementation should be examined regularly within the framework of a general audit.

The security policy should specify the overall security level to be achieved and establish fundamental definitions. In order to improve the clarity, it may make sense to draw up separate security policies for different fields of application.

First of all, the general configuration and administration strategy ("liberal" or "restrictive") should be specified, as the other decisions will mainly depend on this specification.

For clients with normal protection requirements, a relatively liberal strategy can be selected making the configuration and administration much easier in many cases. However, it is generally also recommendable in these cases to design the strategy only "as liberal as required".

For clients with high protection requirements, a restrictive strategy is generally recommended. For clients with special protection requirements regarding one of the three basic values, a restrictive configuration and administration strategy should be implemented.

Some points which should be taken into account are listed below:

Based on the items mentioned above, a checklist that may be helpful during audits can be drawn up.

Security management is responsible for the security policy. Changes and deviations to this policy may only be made in agreement with security management.

When drawing up a security policy, it is recommended to proceed in such a way that the maximum requirements and specifications for the security of the systems are stated initially. These may then be adapted to the actual circumstances. Ideally, it will be possible to take into account all aspects necessary. Reasons should be documented for each specification that was rejected or weakened in the second step.

With regard to rules applying to the users, it should be noted that they are only appropriate if they can be applied to normal everyday work and can be monitored and enforced. For example, it doesn't make sense to forbid users access to certain directories according to the security policy, but to then not actually protect these directories from being accessed by assigning the corresponding access rights. Therefore, access restrictions defined by the security policy should always be implemented, as far as possible, by means of corresponding specifications made in regard to the installation and configuration of the computers.

When formulating the security policy for the clients, it is important that a balance is kept between security (through restrictions of functionality and the restrictive assignment of user rights) and user-friendliness. If users feel they are too restricted by regulations which are not transparent for them and which they may even deem as harassment, they could be tempted, in turn, to creatively bypass these restrictions.

This distinguishes the security policy for clients from the corresponding policies for servers and active network components, which usually only address technologically experienced users and administrators who tend to show understanding for many restrictions.

Review questions: