HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual Chapter 7.7 Lotus Notes

7.7 Lotus Notes

Description

Lotus Notes is a product used to support workgroups. It provides facilities enabling office work routines that occur within an organisation to be supported and organised. All the communications, data transmission and data keeping that are necessary for this can be processed using Lotus Notes. The Notes concept is based on a client/server architecture whereby users connect themselves to the Domino server from a Notes client or browser and work in this mode.

In earlier versions of Lotus Domino/Notes, proprietary communications protocols were used. By contrast, the latest version (currently 5.0.5) incorporates standard Internet protocols. Since Version 4.5 it has also been possible to gain access to the data in a Lotus Domino server over the Internet from any browser, using a new Web interface. Access here is not restricted to read access, but write access and Administrator access to the server are also possible. From a security viewpoint, the most important change in the release update from version 5.0.3 to version 5.0.4 is the fact that, as a result of a change in US export policy, there is now a single, global version supplied with strong encryption mechanisms, as opposed to separate versions for the North American and international markets.

A brief summary is provided below of the current (as of November 2000) product designations of Lotus Domino/Notes components, as in the course of the last release update Lotus renamed some of the components. In the descriptions of the threats and security safeguards which follow, the terms Lotus Domino Server and Lotus Notes Server should be viewed as synonyms.

Server products:

Client products:

From the point of view of security, the following aspects are relevant to Lotus Notes:

  1. Access security. Only authorised users should be able to access the data held on a Notes server. To ensure that this is the case, access to a Notes server is controlled by the server itself. This means it is possible to control which users may in principle access which Notes server.
  1. Access control. As well as control of server access, control of access to databases constitutes another important security mechanism. The methods provided by Lotus Notes permit in-depth control as to which users (or which user groups) are allowed to execute what actions on a particular database.
  1. Communications security. When a client accesses a database on a server, the data retrieved is transmitted over a network connection. To ensure the confidentiality and integrity of the data, Lotus Notes provides encryption algorithms.
  1. Availability. Use of a Notes system as an office communication medium by business units within an organisation imposes certain requirements as to availability. On the one hand there is a need to minimise the damage that could be caused by a failure through redundant data keeping or physical redundancy of computers, while on the other hand there is a requirement for a contingency plan which provides guidance and directions enabling rapid recovery of the system in the event of failure.

Threat Scenario

The following typical threats are assumed for the IT baseline protection of a Notes system:

Force Majeure:

  • T 1.1 Loss of personnel
  • T 1.2 Failure of the IT system
  • Organisational Shortcomings:

  • T 2.1 Lack of, or insufficient, rules
  • T 2.2 Insufficient knowledge of requirements documents
  • T 2.4 Insufficient monitoring of IT security measures
  • T 2.7 Unauthorised use of rights
  • T 2.16 Non-regulated change of users in the case of laptop PCs
  • T 2.18 Improper delivery of data media
  • T 2.19 Inadequate key management for encryption
  • T 2.37 Uncontrolled usage of communications lines
  • T 2.40 Complexity of database access
  • T 2.49 Lack of, or inadequate, training of teleworkers
  • Human Error:

  • T 3.9 Improper IT system administration
  • T 3.43 Inappropriate handling of passwords
  • T 3.44 Carelessness in handling information
  • T 3.46 Error in the configuration of a Lotus Notes server
  • T 3.47 Error in the configuration of browser access to Lotus Notes
  • Technical Failures:

  • T 4.26 Failure of a database
  • T 4.28 Loss of data in a database
  • T 4.35 Insecure cryptographic algorithms
  • Deliberate Acts:

  • T 5.7 Line tapping
  • T 5.8 Manipulation of lines
  • T 5.22 Theft of a mobile IT system
  • T 5.71 Loss of confidentiality of classified information
  • T 5.77 Unauthorised monitoring of E mails
  • T 5.83 Compromising cryptographic keys
  • T 5.84 Forged certificates
  • T 5.85 Loss of integrity of information that should be protected
  • T 5.100 Abuse of active contents on access to Lotus Notes
  • T 5.101 Hacking Lotus Notes
  • Recommended Countermeasures

    To implement IT baseline protection, selection of the required packages of safeguards ("modules") is recommended, as described in Sections 2.3 and 2.4.

    As well as protecting the Lotus Notes , however, it is also necessary to draw up a specific security policy which must be integrated into the existing security policy. the Notes system must implement existing security requirements while at the same time necessitating the creation of new, Notes-specific security provisions.

    A Notes system will generally be used in the environment of other systems which serve to control access to the internal network from outside. Examples of other systems with which a Notes system has to work are firewall systems and remote maintenance systems. For this reason, when implementing the Notes-specific safeguards, the safeguards from the relevant modules of the affected systems must also be considered. In addition to the relevant modules from Chapters 5 and 6, the following modules should also be mentioned:

    The safeguards listed in module 9.2 "Databases" are not 100% applicable to Lotus Notes, as Notes is a proprietary database system.

    In order to successfully set up a Notes system, a series of measures should be taken, starting with the design, then going on to installation and operation. The steps involved here and the safeguards which should be considered at each of the steps are listed below.

    1. Following the decision to use Lotus Notes as an internal communications system, it is necessary to purchase the software and any additional hardware required. As Lotus Notes is available in a number of different configuration variants (see above) the software to be purchased will depend also on the planned operational scenarios. The following safeguards should therefore be implemented:
    2. After the organisational and planning preliminary work has been completed, the Notes system can be installed. The following measures should be noted here:
    3. Following the initial installation and a test operation phase, normal operation commences. From a security point of view the following aspects should be taken into account here:

    The safeguards package for the "Lotus Notes" module is presented below.

    Infrastructure:

  • S 1.29 (1) Adequate siting of an IT system (server)
  • Organisation:

  • S 2.2 (2) Resource management
  • S 2.25 (1) Documentation of the System Configuration
  • S 2.40 (2) Timely involvement of the staff/factory council
  • S 2.206 (1) Planning the use of Lotus Notes
  • S 2.207 (1) Defining security guidelines for Lotus Notes
  • S 2.208 (1) Planning of the domains and certificate hierarchy of Lotus Notes
  • S 2.209 (1) Planning the use of Lotus Notes in an intranet
  • S 2.210 (2) Planning the use of Lotus Notes in an intranet with browser access
  • S 2.211 (2) Planning the use of Lotus Notes in a demilitarised zone
  • Personnel:

  • S 3.4 (1) Training before actual use of a program
  • S 3.5 (1) Education on IT security measures
  • S 3.10 (1) Selection of a trustworthy administrator and his substitute
  • S 3.11 (1) Training of maintenance and administration staff
  • S 3.24 (1) Training on the Lotus Notes system architecture for Administrators
  • S 3.25 (1) Training on Lotus Notes security mechanisms for users
  • Hardware and Software:

  • S 4.116 (1) Secure installation of Lotus Notes
  • S 4.117 (1) Secure configuration of a Lotus Notes server
  • S 4.118 (1) Configuration as a Lotus Notes server
  • S 4.119 (1) Instituting restrictions on access to Lotus Notes servers
  • S 4.120 (1) Configuration of access control lists for Lotus Notes databases
  • S 4.121 (1) Configuration of rights of access to the Lotus Notes Name and Address Book
  • S 4.122 (2) Configuration for browser access to Lotus Notes
  • S 4.123 (2) Configuration of SSL-protected browser access to Lotus Notes
  • S 4.124 (2) Configuration of authentication mechanisms with browser access to Lotus Notes
  • S 4.125 (2) Instituting restrictions on access to Lotus Notes databases with browser access
  • S 4.126 (1) Secure configuration of a Lotus Notes client
  • S 4.127 (2) Secure configuration of browser access to Lotus Notes
  • S 4.128 (1) Secure operation of Lotus Notes
  • S 4.129 (1) Secure handling of Notes ID files
  • S 4.130 (1) Security measures following the creation of a new Lotus Notes database
  • S 4.131 (2) Encryption of Lotus Notes databases
  • S 4.132 (1) Monitoring of a Lotus Notes system
  • Communications:

  • S 5.68 (2) Use of encryption procedures for network communications
  • S 5.84 (2) Use of encryption procedures for Lotus Notes communication
  • S 5.85 (2) Use of encryption procedures for Lotus Notes e-mail
  • S 5.86 (1) Use of encryption procedures with browser access to Lotus Notes
  • Contingency Planning:

  • S 6.71 (2) Data backup for a mobile IT system
  • S 6.49 (1) Data backup in a database, in this case Lotus Notes databases
  • S 6.73 (1) Creation of a contingency plan for failure of the Lotus Notes system

  • © Copyright by
    Bundesamt für Sicherheit in der Informationstechnik
    last update:
    July 2001
    home