309
1. About this Administrator’s Guide
Security policies for administrators
Administrators need to adhere to the following policies in order to securely
manage the machine:
•
The administrator should place the machine in a secure place where the
machine can be protected by the physical contact or modulation,
•
The administrator should be fully aware of the security policies the
organization has and follow them to manage the machine.
•
The administrator should give the right to use the machine to users
according to the security policies and procedures.
•
The administrator should not use the authority one has over the machine
with ill intention.
•
The administrator should manage the machine in a trusted network
supported environment.
•
The administrator should guarantee that the certifying service via
certification server is through a safe channel and is safely managed.
•
The administrator should provide a Time Stamp feature to keep an accurate
system log history.
•
The administrator should provide a safe secure network channel with SSL.
•
The administrator should save the system log files exported by the
Exporting feature in a safe place and protected.
•
The administrator should protect the machine from any unauthorized
contact with external interfaces.