{"id":258,"date":"2007-09-07T23:06:30","date_gmt":"2007-09-07T21:06:30","guid":{"rendered":"http:\/\/www.mitternachtshacking.de\/blog\/258-security-guides"},"modified":"2025-04-06T17:04:33","modified_gmt":"2025-04-06T15:04:33","slug":"security-guides","status":"publish","type":"post","link":"https:\/\/www.mitternachtshacking.de\/blog\/258-security-guides","title":{"rendered":"Security Guides"},"content":{"rendered":"<p>Immer wieder interessant, wer sich alles berufen f\u00fchlt Sicherheitsanleitungen zur Verf\u00fcgung zu stellen. Ich fange hier mal eine kurze Zusammenstellung an, vielleicht w\u00e4chst die im Laufe der Zeit noch etwas. W\u00e4re jedenfalls nicht schlecht. Kommentare sind selbstverst\u00e4ndlich erw\u00fcnscht.<\/p>\n<p><strong>Unix<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/www.linuxsecurity.com\/\">Linux Security<\/a><\/li>\n<li><a href=\"http:\/\/www.sun.com\/security\/index.jsp\">Sun Solaris Security<\/a><\/li>\n<\/ul>\n<p><strong>Microsoft Windows<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/www.microsoft.com\/technet\/security\/guidance\/default.mspx\">Security Guidance<\/a><\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/technet\/security\/prodtech\/windows2000.mspx\">Security Guidance for Windows 2000 Server<\/a><\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/technet\/security\/prodtech\/windowsxp.mspx\">Security Guidance for Windows XP<\/a><\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/technet\/security\/prodtech\/windowsserver2003.mspx\">Security Guidance for Windows Server 2003<\/a><\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/technet\/windowsvista\/security\/guide.mspx\">Windows Vista Security Guide<\/a><\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/technet\/security\/prodtech\/Office.mspx\">Security Guidance for Office<\/a><\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/technet\/security\/prodtech\/ISA.mspx\">Security Guidance for ISA Server<\/a><\/li>\n<\/ul>\n<p><strong>Deutsche Beh\u00f6rden<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/www.bsi.de\/gshb\/index.htm\">BSI IT-Grundschutz<\/a><\/li>\n<li><a href=\"http:\/\/www.bsi.de\/fachthem\/kritis\/index.htm\">BSI Schutz kritischer Infrastrukturen<\/a><\/li>\n<li><a href=\"http:\/\/www.bmi.bund.de\/cln_012\/nn_708198\/Internet\/Content\/Themen\/Informationsgesellschaft\/Sicherheit\/NPSI.html\">BMI Nationaler Plan zum Schutz der Informationsinfrastrukturen<\/a><\/li>\n<\/ul>\n<p><strong>Europ\u00e4ische Union<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/www.enisa.europa.eu\/pages\/05_01.htm\">ENISA Publikationen<\/a><\/li>\n<\/ul>\n<p><strong>US-Administration<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/csrc.nist.gov\/publications\/nistpubs\/\">NIST Computer Security Special Publications<\/a>\n<ul>\n<li>800-113 Guide to SSL VPNs<\/li>\n<li>800-98 Guidelines for Securing Radio Frequency Identification (RFID) Systems<\/li>\n<li>800-83 Guide to Malware Incident Prevention and Handling<\/li>\n<li>800-61 Computer Security Incident Handling Guide<\/li>\n<li>800-58 Security Considerations for Voice Over IP Systems<\/li>\n<li>800-42 Guideline on Network Security Testing<\/li>\n<li>800-41 Guidelines on Firewalls and Firewall Policy<\/li>\n<li>800-40 Creating a Patch and Vulnerability Management Program<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.nsa.gov\/snac\/\">NSA Security Configuration Guides<\/a>\n<ul>\n<li>Applications<\/li>\n<li>Database Servers<\/li>\n<li>Operating Systems<\/li>\n<li>Routers<\/li>\n<li>Supporting Documents<\/li>\n<li>Switches<\/li>\n<li>VoIP and IP Telephony<\/li>\n<li>Vulnerability Technical Reports<\/li>\n<li>Web Servers and Browsers<\/li>\n<li>Wireless<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Gibt es weitere wichtige Ver\u00f6ffentlichungen?<\/p>\n<p><strong>Update:<\/strong> Aus den Kommentaren<\/p>\n<ul>\n<li>Berghels &#8222;Better-than-Nothing Security Practices\u2122 for Securing Windows XP Professional&#8220;:<br \/>\n<a href=\"http:\/\/berghel.net\/btnsp\/XP\/index.php\" rel=\"nofollow\">http:\/\/berghel.net\/btnsp\/XP\/index.php<\/a><\/li>\n<li>Auch noch einige n\u00fctzliche Registry-Tweaks:<br \/>\n<a href=\"http:\/\/www.microsoft.com\/germany\/technet\/sicherheit\/topics\/serversecurity\/tcg\/tcgch00.mspx\" rel=\"nofollow\">http:\/\/www.microsoft.com\/germany\/technet\/sicherheit\/topics\/serversecurity\/tcg\/tcgch00.mspx<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Immer wieder interessant, wer sich alles berufen f\u00fchlt Sicherheitsanleitungen zur Verf\u00fcgung zu stellen. Ich fange hier mal eine kurze Zusammenstellung an, vielleicht w\u00e4chst die im Laufe der Zeit noch etwas. W\u00e4re jedenfalls nicht schlecht. Kommentare sind selbstverst\u00e4ndlich erw\u00fcnscht. Unix Linux Security Sun Solaris Security Microsoft Windows Security Guidance Security Guidance for Windows 2000 Server Security [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts\/258"}],"collection":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/comments?post=258"}],"version-history":[{"count":0,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts\/258\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/media?parent=258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/categories?post=258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/tags?post=258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}