S 5 Safeguard catalogues Communication

S 5.1 Removal or deactivation of unneeded lines

S 5.2 Selection of an appropriate network topology

S 5.3 Selection of cable types appropriate in terms of communications technology

S 5.4 Documentation and labelling of cables

S 5.5 Damage-minimising routing of cables

S 5.6 Mandatory use of a network password - not to apply

S 5.7 Network management

S 5.8 Regular security checks of the network

S 5.9 Logging on the server

S 5.10 Restrictive granting of access rights

S 5.11 Blocking the server console - not to apply

S 5.12 Setting up an additional network administrator - not to apply

S 5.13 Appropriate use of equipment for network coupling

S 5.14 Shielding of internal remote accesses of PBX systems

S 5.15 Shielding of external remote accesses of PBX systems

S 5.16 Survey of network services

S 5.17 Use of the NFS security mechanisms

S 5.18 Use of the NIS security mechanisms

S 5.19 Use of the sendmail security mechanisms

S 5.20 Use of the security mechanisms of rlogin, rsh, and rcp

S 5.21 Secure use of the telnet, ftp, tftp, and rexec

S 5.22 Compatibility check of the transmission and reception systems

S 5.23 Selecting suitable types of dispatch for data media

S 5.24 Use of a suitable fax cover sheet

S 5.25 Using transmission and reception logs

S 5.26 Announcing fax messages via telephone

S 5.27 Acknowledging successful fax reception via telephone

S 5.28 Acknowledging correct fax origin via telephone

S 5.29 Periodic checks of destination addresses and logs

S 5.30 Activating an existing call-back option

S 5.31 Suitable modem configuration

S 5.32 Secure use of communications software

S 5.33 Secure remote maintenance

S 5.34 Use of one-time passwords

S 5.35 Use of the security mechanisms of UUCP

S 5.36 Encryption under Unix and Windows NT - not to apply

S 5.37 Restricting Peer-to-Peer functions in a server-supported network - not to apply

S 5.38 Secure integration of DOS PCs into a Unix network - not to apply

S 5.39 Secure use of protocols and services

S 5.40 Secure integration of DOS PCs into a Windows NT network - not to apply

S 5.41 Secure configuration of remote access under Windows NT - not to apply

S 5.42 Secure configuration of TCP/IP network administration under Window NT - not to apply

S 5.43 Secure configuration of TCP/IP network services under Window NT - not to apply

S 5.44 One-way connection setup

S 5.45 Secure use of browsers

S 5.46 Installing stand-alone-systems for Internet use

S 5.47 Configuration of a Closed User Group

S 5.48 Authentication via CLIP/COLP

S 5.49 Callback based on CLIP/COLP

S 5.50 Authentication via PAP/CHAP

S 5.51 Security-related requirements for communications links between telecommuting workstations and the institution

S 5.52 Security-related requirements for communications computers

S 5.53 Protection against mail bombs - not to apply

S 5.54 Dealing with unwanted e-mails

S 5.55 Checking of alias files and distribution lists - not to apply

S 5.56 Secure operation of a mail server

S 5.57 Secure configuration of the groupware/mail clients

S 5.58 Selection and installation of database interface drivers

S 5.59 Protection against DNS spoofing in authentication mechanisms

S 5.60 Selection of a suitable backbone technology

S 5.61 Suitable physical segmentation

S 5.62 Suitable logical segmentation

S 5.63 Use of GnuPG or PGP

S 5.64 Secure Shell

S 5.65 Use of S-HTTP - not to apply

S 5.66 Use of TSL/SSL

S 5.67 Use of a time stamp service

S 5.68 Use of encryption procedures for network communications

S 5.69 Protection against active content

S 5.70 Network address translation (NAT)

S 5.71 Intrusion detection and intrusion response systems

S 5.72 Deactivation of unnecessary network services

S 5.73 Secure operation of a fax server

S 5.74 Maintenance of fax server address books and distribution lists

S 5.75 Protecting against overloading the fax server

S 5.76 Use of suitable tunnel protocols for VPN communication

S 5.77 Establishment of subnetworks

S 5.78 Protection against mobile phone usage data being used to create movement profiles

S 5.79 Protection against call number identification during use of mobile phones

S 5.80 Protection against bugging of indoor conversations using mobile phones

S 5.81 Secure transmission of data over mobile phones

S 5.82 Secure use of SAMBA - not to apply

S 5.83 Secure connection of an external network with Linux FreeS/WAN

S 5.84 Use of encryption procedures for Lotus Notes communication - not to apply

S 5.85 Use of encryption procedures for Lotus Notes e-mail - not to apply

S 5.86 Use of encryption procedures with browser access to Lotus Notes - not to apply

S 5.87 Agreement regarding connection to third party networks

S 5.88 Agreement regarding the exchange of data with third parties

S 5.89 Configuration of the Secure Channel under Windows

S 5.90 Use of IPSec under Windows

S 5.91 Use of personal firewalls for clients

S 5.92 Secure connection to the Internet of Internet PCs

S 5.93 Security issues relating to the use of web browsers by Internet PCs

S 5.94 Security issues relating to the use of e-mail clients by Internet PCs

S 5.95 Secure e-commerce using Internet PCs

S 5.96 The secure use of webmail

S 5.97 Protection of communications with Novell eDirectory

S 5.98 Protection from misuse of chargeable dial-in numbers

S 5.99 SSL/TLS protection for Exchange 2000 - not to apply

S 5.100 Protection of communications from and to Exchange systems

S 5.101 Deletion of unnecessary ODBC drivers where IIS is used - not to apply

S 5.102 Installation of URL filters with IIS - not to apply

S 5.103 Removal of all network shares with IIS - not to apply

S 5.104 Configuration of TCP/IP filtering with IIS - not to apply

S 5.105 Prevention of SYN attacks on the IIS - not to apply

S 5.106 Removal of non-trusted root certificates with IIS - not to apply

S 5.107 Use of SSL in the Apache web server - not to apply

S 5.108 Cryptographic protection of groupware and/or e-mail

S 5.109 Use of an e-mail scanner on the mail server

S 5.110 Protection of e-mail with SPHINX (S/MIME)

S 5.111 Configuration of access control lists on routers

S 5.112 Security aspects of routing protocols

S 5.113 Use of the VTAM Session Management Exit under z/OS

S 5.114 Protection of the z/OS trace functions

S 5.115 Integration of a web server into a security gateway

S 5.116 Integration of an email server into a security gateway

S 5.117 Integration of a database server into a security gateway

S 5.118 Integration of a DNS server into a security gateway

S 5.119 Integration of a web application with web, application, and database servers into a security gateway

S 5.120 Handling of ICMP on the security gateway

S 5.121 Secure communication when travelling

S 5.122 Secure connection of laptops to local networks

S 5.123 Securing network communication in Windows

S 5.124 Network connections in meeting, event and training rooms

S 5.125 Protection of communication with SAP systems

S 5.126 Protection of the SAP RFC interface

S 5.127 Protection of the SAP Internet Connection Framework (ICF)

S 5.128 Protection of the SAP ALE (IDoc/BAPI) interface

S 5.129 Secure configuration of HTTP-based services on SAP systems

S 5.130 Protection of SANs by segmentation

S 5.131 Protection of IP protocols under Windows Server 2003

S 5.132 Secure use of WebDAV under Windows Server 2003

S 5.133 Selection of a signalling protocol for VoIP

S 5.134 Secure VoIP signalisation

S 5.135 Secure media transport using SRTP

S 5.136 Quality of service and network management for VoIP

S 5.137 Use of NAT for VoIP

S 5.138 Usage of RADIUS servers

S 5.139 Secure WLAN-LAN connection

S 5.140 Setting up a distribution system

S 5.141 Regular security checks of WLANs

S 5.142 Technical approval of IT cabling

S 5.143 Ongoing update and review of network documentation

S 5.144 Removal of IT cabling

S 5.145 Secure use of CUPS

S 5.146 Network separation when using all-in-one devices

S 5.147 Protection of communications with directory services

S 5.148 Secure connection of an external network with OpenVPN

S 5.149 Secure connection of an external network with IPSec

S 5.150 Performing penetration tests

S 5.151 Secure configuration of the Samba Web Administration Tool

S 5.152 Exchange of information and resources using peer-to-peer services.

S 5.153 Planning the network for virtual infrastructures

S 5.154 Secure configuration of a network for virtual infrastructures

S 5.155 Data protection aspects when using the Internet

S 5.156 Secure use of Twitter

S 5.157 Secure use of social networks

S 5.158 Use of web disk space

S 5.159 Overview of protocols and communication standards for web servers

S 5.160 Authentication to web servers

S 5.161 Creating dynamic websites

S 5.162 Planning the bandwidth when using terminal servers

S 5.163 Restrictive granting of access rights on terminal servers

S 5.164 Secure use of a terminal server from a remote network

S 5.165 Deactivation of unnecessary Mac OS X network services

S 5.166 Configuration of the Mac OS X Personal Firewall

S 5.167 Secure remote access under Mac OS X

S 5.168 Secure connection of background systems to web applications

S 5.169 System architecture of a web application

S 5.170 Secure communication connections when using OpenLDAP

S 5.171 Secure communication with a centralised logging server

S 5.172 Secure time synchronisation for centralised logging

S 5.173 Use of short URLs and QR codes