HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.126 Secure configuration of a Lotus Notes client

S 4.126 Secure configuration of a Lotus Notes client

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrator

Usually access to the Notes server is from a Lotus Notes client. To access the server, authentication is performed through the Notes ID. The Notes ID must therefore be kept so that it is protected against third party access. The client configuration must of course be altered so that working with the Notes client can be as secure as possible.

As well as physical security and the secure operating system configuration of the client (see also the relevant modules in Chapters 4 and 6), the Notes-specific security aspects listed below require special consideration.

To enforce secure communication between server and client, port encryption can be used (see S 5.84 Use of encryption procedures for Lotus Notes communication).

Example:

The ECL settings shown in the table below can be used as the starting point for your own ECLs. Depending on the application scenario, the ECLs may have to be extended to include authorisations for active content which carry appropriate signatures. denotes an Administrator and a testing body internal to the organisation which checks active content and releases it for use.

Flag -Default- -No signature- <admin> Lotus Notes Template development/Lotus Notes <QA>
Allow user to modify ECL -- -- -- -- --
Access to the file system     X X X
Access to the current database     X X X
Access to environment variables     X X X
Access to non-Notes databases     X X X


Flag -Default- -No signature- <admin> Lotus Notes Template development/Lotus Notes <QA>
Access to external code     X X X
Access to external programs     X X X
Ability to send mail     X X X
Ability to read other databases     X X X
Ability to modify other databases     X X X
Ability to export data     X X X
Access to the Workstation Security ECL     X    

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home