S 4.237 Secure basic configuration of IT systems

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

The basic settings implemented by the manufacturer or distributor of an operating system are usually not optimised for security, but for easy installation and start-up, as well as often for every user being able to access the highest possible number of features of the operating system as easily as possible. When using IT systems (regardless of whether as client or server) in government agencies or companies, this is often undesirable.

For this reason, the first step when specifying the basic configuration must be to examine the basic settings and if necessary adapt these to reflect the corresponding specifications in the security policy. The basic configuration naturally depends quite a lot on the operating system used. Therefore, the operating system-specific modules contain corresponding, detailed safeguards.

The goals of secure basic configuration should include the following

The settings that should be checked and adapted within the framework of the basic configuration particularly refer to the following areas:

The settings checked within the framework of the basic configuration process should be documented, as well as whether they were changed, and if so, how they were changed. The documentation must be drawn up in such a way that someone other than the actual administrator, who does not have any previous knowledge of the system, will be able to understand what has been done based on the documentation. Ideally, it should be possible to restore the system with the help of the system documentation only.

Review questions: