S 4.135 Restrictive granting of access rights to system files
Initiation responsibility: Head of IT, IT Security Officer
Implementation responsibility: Administrator
System files and directories are files and directories for which the administrator is responsible. These are either important to all users or else they are used solely for administrative purposes.
If possible, only system administrators should have access to system files. The group of administrators with the authorisations required to access these files should be kept as small as possible. Directories too should provide no more than the required privileges for users. In general, careful control should be exercised over the restrictive granting of access rights to system files, and granting of these rights must comply with the in-house security policies (see also S 2.220 Guidelines for access control).
System files should be kept in a separate place from application data and user files (see also S 2.138 Structured data storage). This makes it easier to obtain an overview, simplifies data backups and ensures proper access protection.
Access to system files should always be logged. Redundant, i.e. unnecessary, system files should be deleted from the system to prevent them from being misused for attacks and eliminate the need to keep checking their integrity.
With regard to the restrictive granting of access rights, it is not sufficient to check only the rights of a program. The granting of rights to all programs which can be accessed from within this program must also be checked.
The integrity of all system files and directories and the properness of access rights should if possible be verified at regular intervals. For many operating systems, there are tools for this, by means of which such checks can be carried out rapidly and reliably.
Review questions:
- Is the access to system files restricted to as small a group of administrators as possible?
- Are the system directories created in such a manner that they provide the users only with the required privileges?
- Are the access rights granted restrictively and in compliance with the organisation's own security policies?
- Is the granting of rights of all programs, including the other programs which can be accessed from within them, verified?
- Is the access to system files always logged?