HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.116 Secure installation of Lotus Notes

S 4.116 Secure installation of Lotus Notes

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrator

Already during the process of installing a Lotus Domino system, some security-relevant aspects must be considered. Usually a standard installation will not be sufficient for the security requirements, so that the installation process cannot be regarded as complete until directly after the software installation the software is securely configured. The following steps must be carried out during or directly after installation.

During installation:

After installation:

  1. The password-protected copy of the server ID should be held with the associated password in a secure location. If Domino Server is automatically booted up, the password of the server ID must be removed (password length needs to be set to "0"). The "server.id" file, which is generally stored in the "data" directory of the server, must be protected with appropriate file access rights against unauthorised access. The file must not be held in a directory with a network share.

For every Domino Server module used steps must be taken to ensure that no unauthorised access is possible during or after installation until the configuration work has been finished and secure operation can be guaranteed (on this point see also S 4.117 Secure configuration of a Lotus Notes server).

The installation of all Domino Server modules must be documented, especially the configuration of the databases and system files.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home