S 5 Safeguard catalogues Communication
S 5.1 Removal or deactivation of unneeded lines
S 5.2 Selection of an appropriate network topology
S 5.3 Selection of cable types appropriate in terms of communications technology
S 5.4 Documentation and labelling of cables
S 5.5 Damage-minimising routing of cables
S 5.6 Mandatory use of a network password - not to apply
S 5.8 Regular security checks of the network
S 5.10 Restrictive granting of access rights
S 5.11 Blocking the server console - not to apply
S 5.12 Setting up an additional network administrator - not to apply
S 5.13 Appropriate use of equipment for network coupling
S 5.14 Shielding of internal remote accesses of PBX systems
S 5.15 Shielding of external remote accesses of PBX systems
S 5.16 Survey of network services
S 5.17 Use of the NFS security mechanisms
S 5.18 Use of the NIS security mechanisms
S 5.19 Use of the sendmail security mechanisms
S 5.20 Use of the security mechanisms of rlogin, rsh, and rcp
S 5.21 Secure use of the telnet, ftp, tftp, and rexec
S 5.22 Compatibility check of the transmission and reception systems
S 5.23 Selecting suitable types of dispatch for data media
S 5.24 Use of a suitable fax cover sheet
S 5.25 Using transmission and reception logs
S 5.26 Announcing fax messages via telephone
S 5.27 Acknowledging successful fax reception via telephone
S 5.28 Acknowledging correct fax origin via telephone
S 5.29 Periodic checks of destination addresses and logs
S 5.30 Activating an existing call-back option
S 5.31 Suitable modem configuration
S 5.32 Secure use of communications software
S 5.33 Secure remote maintenance
S 5.34 Use of one-time passwords
S 5.35 Use of the security mechanisms of UUCP
S 5.36 Encryption under Unix and Windows NT - not to apply
S 5.37 Restricting Peer-to-Peer functions in a server-supported network - not to apply
S 5.38 Secure integration of DOS PCs into a Unix network - not to apply
S 5.39 Secure use of protocols and services
S 5.40 Secure integration of DOS PCs into a Windows NT network - not to apply
S 5.41 Secure configuration of remote access under Windows NT - not to apply
S 5.42 Secure configuration of TCP/IP network administration under Window NT - not to apply
S 5.43 Secure configuration of TCP/IP network services under Window NT - not to apply
S 5.44 One-way connection setup
S 5.46 Installing stand-alone-systems for Internet use
S 5.47 Configuration of a Closed User Group
S 5.48 Authentication via CLIP/COLP
S 5.49 Callback based on CLIP/COLP
S 5.50 Authentication via PAP/CHAP
S 5.52 Security-related requirements for communications computers
S 5.53 Protection against mail bombs - not to apply
S 5.54 Dealing with unwanted e-mails
S 5.55 Checking of alias files and distribution lists - not to apply
S 5.56 Secure operation of a mail server
S 5.57 Secure configuration of the groupware/mail clients
S 5.58 Selection and installation of database interface drivers
S 5.59 Protection against DNS spoofing in authentication mechanisms
S 5.60 Selection of a suitable backbone technology
S 5.61 Suitable physical segmentation
S 5.62 Suitable logical segmentation
S 5.65 Use of S-HTTP - not to apply
S 5.67 Use of a time stamp service
S 5.68 Use of encryption procedures for network communications
S 5.69 Protection against active content
S 5.70 Network address translation (NAT)
S 5.71 Intrusion detection and intrusion response systems
S 5.72 Deactivation of unnecessary network services
S 5.73 Secure operation of a fax server
S 5.74 Maintenance of fax server address books and distribution lists
S 5.75 Protecting against overloading the fax server
S 5.76 Use of suitable tunnel protocols for VPN communication
S 5.77 Establishment of subnetworks
S 5.78 Protection against mobile phone usage data being used to create movement profiles
S 5.79 Protection against call number identification during use of mobile phones
S 5.80 Protection against bugging of indoor conversations using mobile phones
S 5.81 Secure transmission of data over mobile phones
S 5.82 Secure use of SAMBA - not to apply
S 5.83 Secure connection of an external network with Linux FreeS/WAN
S 5.84 Use of encryption procedures for Lotus Notes communication - not to apply
S 5.85 Use of encryption procedures for Lotus Notes e-mail - not to apply
S 5.86 Use of encryption procedures with browser access to Lotus Notes - not to apply
S 5.87 Agreement regarding connection to third party networks
S 5.88 Agreement regarding the exchange of data with third parties
S 5.89 Configuration of the Secure Channel under Windows
S 5.90 Use of IPSec under Windows
S 5.91 Use of personal firewalls for clients
S 5.92 Secure connection to the Internet of Internet PCs
S 5.93 Security issues relating to the use of web browsers by Internet PCs
S 5.94 Security issues relating to the use of e-mail clients by Internet PCs
S 5.95 Secure e-commerce using Internet PCs
S 5.96 The secure use of webmail
S 5.97 Protection of communications with Novell eDirectory
S 5.98 Protection from misuse of chargeable dial-in numbers
S 5.99 SSL/TLS protection for Exchange 2000 - not to apply
S 5.100 Protection of communications from and to Exchange systems
S 5.101 Deletion of unnecessary ODBC drivers where IIS is used - not to apply
S 5.102 Installation of URL filters with IIS - not to apply
S 5.103 Removal of all network shares with IIS - not to apply
S 5.104 Configuration of TCP/IP filtering with IIS - not to apply
S 5.105 Prevention of SYN attacks on the IIS - not to apply
S 5.106 Removal of non-trusted root certificates with IIS - not to apply
S 5.107 Use of SSL in the Apache web server - not to apply
S 5.108 Cryptographic protection of groupware and/or e-mail
S 5.109 Use of an e-mail scanner on the mail server
S 5.110 Protection of e-mail with SPHINX (S/MIME)
S 5.111 Configuration of access control lists on routers
S 5.112 Security aspects of routing protocols
S 5.113 Use of the VTAM Session Management Exit under z/OS
S 5.114 Protection of the z/OS trace functions
S 5.115 Integration of a web server into a security gateway
S 5.116 Integration of an email server into a security gateway
S 5.117 Integration of a database server into a security gateway
S 5.118 Integration of a DNS server into a security gateway
S 5.120 Handling of ICMP on the security gateway
S 5.121 Secure communication when travelling
S 5.122 Secure connection of laptops to local networks
S 5.123 Securing network communication in Windows
S 5.124 Network connections in meeting, event and training rooms
S 5.125 Protection of communication with SAP systems
S 5.126 Protection of the SAP RFC interface
S 5.127 Protection of the SAP Internet Connection Framework (ICF)
S 5.128 Protection of the SAP ALE (IDoc/BAPI) interface
S 5.129 Secure configuration of HTTP-based services on SAP systems
S 5.130 Protection of SANs by segmentation
S 5.131 Protection of IP protocols under Windows Server 2003
S 5.132 Secure use of WebDAV under Windows Server 2003
S 5.133 Selection of a signalling protocol for VoIP
S 5.134 Secure VoIP signalisation
S 5.135 Secure media transport using SRTP
S 5.136 Quality of service and network management for VoIP
S 5.138 Usage of RADIUS servers
S 5.139 Secure WLAN-LAN connection
S 5.140 Setting up a distribution system
S 5.141 Regular security checks of WLANs
S 5.142 Technical approval of IT cabling
S 5.143 Ongoing update and review of network documentation
S 5.146 Network separation when using all-in-one devices
S 5.147 Protection of communications with directory services
S 5.148 Secure connection of an external network with OpenVPN
S 5.149 Secure connection of an external network with IPSec
S 5.150 Performing penetration tests
S 5.151 Secure configuration of the Samba Web Administration Tool
S 5.152 Exchange of information and resources using peer-to-peer services.
S 5.153 Planning the network for virtual infrastructures
S 5.154 Secure configuration of a network for virtual infrastructures
S 5.155 Data protection aspects when using the Internet
S 5.157 Secure use of social networks
S 5.159 Overview of protocols and communication standards for web servers
S 5.160 Authentication to web servers
S 5.161 Creating dynamic websites
S 5.162 Planning the bandwidth when using terminal servers
S 5.163 Restrictive granting of access rights on terminal servers
S 5.164 Secure use of a terminal server from a remote network
S 5.165 Deactivation of unnecessary Mac OS X network services
S 5.166 Configuration of the Mac OS X Personal Firewall
S 5.167 Secure remote access under Mac OS X
S 5.168 Secure connection of background systems to web applications
S 5.169 System architecture of a web application
S 5.170 Secure communication connections when using OpenLDAP
S 5.171 Secure communication with a centralised logging server