S 4.241 Secure operation of clients

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

The secure operation of clients depends on a number of factors. With clients it is also especially important that administration be performed with great care and via a secure access.

In the following, several general points are described that should be observed to securely operate clients regardless of the operating system. More specific information for individual operating systems is given in the corresponding safeguards of the applicable modules.

Administration accesses

There are different ways to access clients for administration purposes. Depending on the type of access used, a number of security precautions must be taken. With larger networks, it is recommended, and often absolutely necessary, to also integrate the clients in a central network management system, because otherwise secure and efficient administration cannot be ensured. The methods applied for administration should be specified in the security policy, and administration may only be performed in accordance with the security policy.

It is advisable to draw up an overview for the different types of administrative tasks and which ones can be performed in which way. It is especially important to specify whether certain tasks may normally not be performed in a certain manner.

Unprotected remote administration via external (unprotected) networks must never be performed. This must be taken into consideration when defining the security policy. No insecure protocols should be used in the internal network either.

Routine administrative activities

It is advisable to draw up notes on the administrators' usual routine activities in accordance with the security policy. This includes activities such as:

Testing configuration changes

If possible, configuration changes to clients should be tested on a reference system before being distributed to the individual computers (see also S 4.242 Setting up a reference installation for clients). If (e.g. in the framework of error search) changes are made locally to individual clients, whether the changes have an impact on the client's other functions must be checked.

Documentation of work performed on the systems

Changes to the system configuration of the clients or to the configuration of applications must be documented. With clients, the documentation should also be drawn up in such a way that, if problems occur, the reconstruction of the last change and of when and by whom it was made is possible. With clients not subject to high

security requirements, the documentation of individual functioning configuration states (e.g. at certain points in time) can suffice, without the necessity of having to be able to reconstruct each individual step. But it is still advisable to draw up the documentation in such a way that all changes can be reconstructed.

Logs

Security-relevant events occurring with clients should be logged for many reasons. On the one hand, when logging is activated it can be used for early detection and elimination of potential weaknesses. On the other hand, logging can be used to promptly detect violations against security specifications or to obtain more information about a security incident. Logging of clients should be integrated into the logging concept (see S 2.500 Logging IT systems).

Review questions: