HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.211 Planning the use of Lotus Notes in a demilitarised zone

S 2.211 Planning the use of Lotus Notes in a demilitarised zone

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT Security Management, Administrator

The data stored in the databases of the Notes server can also be made available for public access from the Internet. This imposes special requirements on the security of the Notes server used for this purpose.

Where a Notes server is to be directly accessed from the Internet, in general the following points should be noted:

Connection to the Internet can create security problems with serious consequences (see T 5.100 Hacking Lotus Notes). Therefore opening Notes servers up to access from the Internet should be avoided. If nevertheless a Notes server is used in a DMZ, special care must be taken over configuration of the security settings. Particular note must be made of the following points here:

In addition to the aspects listed here, use of a Notes system in an exposed location can produce other problems as well. It is recommended carefully considering the specific risks applicable, bearing in mind the protection requirements of the IT applications and information.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home