Back

Remove backup files after initializing and hardening is complete.


CONTROL ID
01602
CONTROL TYPE
Configuration
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Establish, implement, and maintain system hardening procedures., CC ID: 12001

There are no implementation support Controls.


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • The organization should remove all of the temporary installation files and logs after the installation of the Database Management System software. (Control: 1245, Australian Government Information Security Manual: Controls)
  • When the system is upgraded to eDirectory (8.x), old migration files that could be used to crack old passwords and accounts may be left behind. These back-up files are not needed and should be removed. These files are: SYS:\SYSTEM\BACKUP.DS, SYS:\SYSTEM\BACKUP.NDS, and SYS:\SYSTEM\DSREPAIR.DIB. (§ 1.4, The Center for Internet Security Open Enterprise Server: NetWare (v1) Consensus Baseline Security Settings Benchmark, 1)
  • Remove backup files after initialization and hardening is complete. (§ 11, The Center for Internet Security Red Hat Enterprise Linux Benchmark, 1.0.5)
  • Remove backup files after initialization and hardening is complete. (§ 11, The Center for Internet Security Red Hat Enterprise Linux Benchmark, 1.1.1)
  • Remove backup files after initialization and hardening is complete. (§ 11, The Center for Internet Security Slackware Linux Benchmark, 1.1)
  • Remove backup files after initialization and hardening is complete. (§ 11, The Center for Internet Security SuSE Linux Enterprise Server Benchmark, 2)