S 2.464 Drawing up a security policy for the use of terminal servers

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

When using terminal server systems, suitable security policies must be drawn up. The rules and objectives documented in writing therein must reflect the individual conditions and requirements of a secure terminal server environment. The general security concept, the security policy, as well as the security policies derived thereof constitute the framework, within which the terminal server-specific extensions should integrate consistently. The policies must be checked regularly to ensure they are up to date and modified, if necessary. The terminal server-specific rules can be added to the existing policies or can be collected in a separate document.

The policies should contain the following items, amongst other things:

User guidelines for terminal server environments

In order to prevent overloading users with too many details, it may make sense to create separate user guidelines for terminal server environments. These user guideline should briefly describe particularities of using terminal servers, for example:

It is also important to clearly describe how to handle security solutions on the clients. This includes, for example, rules stating the following:

When accessing terminal servers using a remote network, it must be ensured that

Terminal server sessions can be disconnected during use deliberately or by the connection being interrupted. Applications that have already started normally continue to run and the session can be continued at a later point in time. In order to not impair maintenance work on the servers and to avoid losses of data due to regular restart cycles, behaviour for secure handling of the user guidelines must therefore be defined.

Furthermore, the guidelines should contain specifications, especially regarding the use of classified information such as classified materials, of which data may be used via terminal server systems and is permitted to be transmitted to the client. The users' awareness for terminal server threats and for the contents and consequences of the terminal server policy should be raised.

Guidelines for administrators

In addition, terminal server-specific guidelines for administrators should be drawn up which can be used as the basis for administrator training. It should specify who is responsible for administrating the different terminal server components, which interfaces are available between the responsible administrators, and when which information must be exchanged between the persons in charge. It is quite common that one organisational unit is responsible for operating the terminal server farm, while a different organisational unit is responsible for supporting the clients or for identity and authorisation management or perimeter protection.

The terminal server guidelines for administrators should also contain the essential core aspects of the operation of a terminal server infrastructure, for example:

When terminal servers are used, administrators are often provided with the option of mirroring sessions (shadowing). Data protection-related requirements must be taken into account in this case. For example, when sessions are monitored without express consent this is a violation of the personal rights of the user. Therefore, the use of this function must be regulated in the administrator guidelines.

All terminal server users, regardless of whether general users or administrators, should confirm with their signature that they have read the content of the security policy and will follow the instructions defined in it. No one should be allowed to use these systems without this written confirmation. The signed declarations should be kept in a suitable location, for example in the personnel file.

Review questions: