HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.128 Secure operation of Lotus Notes

S 4.128 Secure operation of Lotus Notes

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrator

The security of a complex system must be permanently maintained in operation, especially as system changes become necessary during ongoing operations. It is therefore not sufficient to create a secure initial configuration (see S 4.116 Secure installation of Lotus Notes and S 4.117 Secure configuration of a Lotus Notes server). The security aspects outlined below must be considered during ongoing operation of a Lotus Notes system.

Examples:

An employee moves to a different department, with the result that his access rights need to be amended. An employee leaves the company. By mistake his account is not removed from a Notes group. Through this group membership, moreover, the former employee has rights enabling him to access the Notes server. However, since his Notes account has been added to the Termination Group, he cannot access the server. The reason is that the Termination Group is explicitly denied access to the server (and its databases) and denials take priority over concessions of access rights.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home