S 6.31 Procedural patterns following a loss of system integrity

Initiation responsibility: Information Security Management, Head of IT

Implementation responsibility: User, Administrator

In case of unaccountable behaviour of a Unix system (for instance, undefined system behaviour, untraceable data, modified file contents, continuous reduction of storage space although no data have been saved), a loss of integrity may have occurred due to misuse of the system (e.g. modified system settings, introduction of a Trojan Horse or a virus).

In this case, users should note the following points:

The administrator should take the following steps:

After all passwords have been changed they must be communicated to the affected users. Passwords or derivation schemas known to all users or should not be used. It is better to create random passwords and to send them to the users over a reliable communication path, for example using sealed envelopes. The password should be changed immediately the next time the user logs in.

If there is any indication of a deliberate attack on a Unix system, then immediate action must be taken to minimise the resulting damages and prevent any further damage from occurring. To accomplish this, it is necessary to create an alarm plan containing a list of the steps to take and that specifies who needs to be informed of the incident (see also S 6.60 Specification of reporting paths for security incidents). If necessary, the alarm plan should also contain information on if and how the Data Protection Officer and the legal department should become involved.

If any problems arise, you can use the BSI hotline, tel. +49 (0)228-9582-5222 or e-mail certbund@bsi.bund.de.

If data was deleted or undesired changes were made to it, then this data can be restored from the data backups.

Review questions: