S 5.145 Secure use of CUPS

Initiation responsibility: Head of IT, Administrator

Implementation responsibility: Administrator

On Unix systems, the network-enabled Common Unix Printing System (CUPS) is often used. CUPS is compatible with many different printing systems that permit sharing of files and printers under Windows such as CIFS/SMB (Common Internet File System/Server Message Block).

The following aspects specified for the planning (see S 2.397 Planning of the use of printers, copiers, and all-in-one devices) or selection (see S 4.304 Administration of printers) must be taken into account for the secure use of CUPS:

General aspects

Access to printers

Administration

CUPS may only be administered by persons authorized for administration. These persons can be specified in the "/admin" section of the cupsd.conf configuration file.

Numerous configuration settings can be specified over the web server supplied with CUPS. The access capabilities to the web server over the network should be restricted to the minimum required. The computers permitted access to the web server can be entered in the cupsd.conf configuration file in the "/admin" section. Alternatively, a local packet filter can be used to restrict access to the web server.

Logs

CUPS provides a wide variety of ways to log events. Many aspects explained in safeguard S 4.302 Logging for printers, copiers and all-in-one devices can be implemented by making the corresponding entries in the cupsd.conf configuration file. The level of detail of the logs can be specified using the "LogLevel" entry, for example.

Archiving

CUPS offers functions for the electronic archiving of printed documents in the file system of the print server. The "PreserveJobs" configuration entry in the cupsd.conf file can be used for this purpose. The maximum number of archived documents can also be specified as an option here. In this case, older entries are overwritten by new documents. If you want to create an archive, then the archived documents must be protected against unauthorised access and against data losses using appropriate mechanisms. You will find more information in module 1.12 Archiving.

Review questions: