Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Inventory of Authorized and Unauthorized Devices
    • responsibility for information asset, assets clearly identified and documented
  • Secure Configurations for Software on Workstations and Servers
    • documentation available for the IdP configuration, documentation available with commands for starting and stopping the IdP together with test procedures to verify that the service started correctly, database behind firewall, documentation for software configuration changes, use of unsecure protocols prevented, configuration assessment programs executed regularly
  • Boundary Defense & Secure Configurations for Network Devices
    • firewall rules defined to allow only traffic defined in configuration documentation, IdP in DMZ, internal and external zones, IDS, IPS, automated ports scans executed regularly, management interfaces seperated
  • Maintenance, Monitoring, and Analysis of Security Audit Logs
    • monitoring system + logs, automated alterting messages, reports, checks that no personal data is logged to avoid privacy issues, automation
  • Application Software Security
    • assertion lifetime, singature check of metadata, private keys only readable by necessary services needed by IdP, new key pair at least every three year, application firewall, anti-malware protection, help desk
  • Controlled Use of Administrative Privileges
    • remote root or admin logins forbidden, default passwords changed
  • Controlled Access Based on the Need to Know
    • description of IM of IdP, unique identities, verification, shared secrets, password policy, minimum password length, password complexity enforcement, password lifetime, passwords by secure channels, strong authentication
  • Continous Vulnerability Assessment and Remediation
    • vulnerabilitiy scanning tools, critical updates, up-to-date metadata
  • Account Monitoring and Control
    • statistics on authentications, accounts disabled, statistics on SPs, regularity of statistics
  • Privacy
    • legal & contractual compliance, User acceptance, consent of end users, due notification in changes of the service are in place, privacy policy service
  • Data Recovery & Incident Response Capability
    • backup copies, restore procedure tested, backups in secure location, incident response procedures, known what should be done in the case of a compromize of the certificate private key
  • Security Skills Assessment and Appropriate Training
    • procedure defined to educate the IdP administrators and trained staff

Recommendations

SWAMID - eduID

...