HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.207 Defining security guidelines for Lotus Notes

S 2.207 Defining security guidelines for Lotus Notes

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT Security Management

Just as it is necessary to define appropriate security guidelines for every software product used within an organisation, the same applies to the use of Lotus Domino servers. Lotus Domino can be viewed as a separate network communication system which uses the underlying operating system only as a runtime environment and has independent mechanisms at the administrative level. Hence, when determining a set of security guidelines, the range of subjects that need to be covered will be similar to those applicable for a network operating system.

The security guidelines should consider the following aspects:

The security guidelines for the use of Lotus Notes must be agreed across the organisation and all users must be informed of them. It is recommended here that a brief quick reference guide that contains the most important information is prepared for the end users, e.g. in the form of a leaflet or website. Whenever the security procedures change, all users must be informed.

The situation can arise that particular security requirements contained in the existing security guidelines cannot be implemented with the mechanisms of Lotus Notes. In this case a decision must be made as to whether the existing security guidelines need to be modified or whether such severe restrictions should be applied to operation of Lotus Notes that the guidelines can be implemented.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home