T 3.87 Improper configuration of directory services
A faulty software configuration is one of the most common reasons for the success of an attack. In the case of directory services, the high level of complexity and the large number of parameters available can lead to additional security problems due to overlooked side-effects. Faulty configurations can have a particularly serious impact in the following areas:
- certificate server,
- creation and definition of the tree structure itself,
- configuration of the objects to be represented,
- access mechanisms,
- assignment of access rights,
- LDAP access to the directory service,
- partitioning of the directory database,
- replication of the directory service,
- intranet client access to the directory service,
- real-time alert mechanism,
- specification of the events to be recorded,
- data access rights of the administrator tool,
- configuration of an automatic backup mechanism.
In general, the configuration of a system needs to be based on its security policy. If there is a faulty configuration, then there is a risk that the security policy will be implemented inadequately or incorrectly, which means it will be impossible to achieve the objectives of the security policy.
The configuration of a role-based administration for the directory system as well as a delegation of administration rights are generally primary features of a directory service. Incorrect configuration of these features can, under certain circumstances, lead to significant problems due to unauthorised system access. Furthermore, there is a risk that proper administration will be impossible if this feature is configured incorrectly.
The following list shows possible security-related consequences resulting from an incorrect configuration of the directory service:
- incorrectly assigned rights granting access to the objects of the directory service,
- selection of cryptographic authentication mechanisms that are too weak,
- unauthorised system accesses over the administration interfaces,
- blocking of the administration capabilities of the system,
- inadequate protection against attacks to the system,
- incorrect or low-performance storage of the data in multiple directory databases (replication) as well as
- discrepancies in the implementation of the security policy.