S 4.116 Secure installation of Lotus Notes/Domino

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

The prerequisite for the secure installation of Lotus Notes/Domino is the planning of the general conditions for its use, described in S 2.206 Planning the use of Lotus Notes/Domino. After that, the Lotus Notes/Domino components are installed on the relevant servers and clients. For this purpose, secure installation procedures as well as the protection of the installation environment and the installation media taking the respective protection requirements into account must be specified and complied with.

It is useful to distinguish between installation procedures for the new installation of the entire Lotus Notes/Domino platform and installation procedures for adaptations (software upgrades, patches) and migrations.

New installation

For a new installation of Lotus Notes/Domino, the following aspects must be taken into account from a security perspective:

Upgrades and migrations

Upgrade refers to a mere software adaptation, i.e. a change of the releases of the Lotus Notes/Domino software or individual components of the software in use including the components which were bought in addition or developed individually for the Lotus Notes/Domino platform.

Migration is considered to be both a software adaptation with changes of the user data inventories (for example for format changes of the databases, changes to the databases used, data cleansing and consolidations) and changing from another platform for email and collaboration to the Lotus Notes/Domino platform.

For upgrades and migrations of Lotus Notes/Domino, the following aspects must be taken into account from a security perspective:

Protection of the installation environment and installation media

In general, the installation environments and installation media must be protected against manipulation prior to or during the installation process (see S 4.177 Assuring the integrity and authenticity of software packages). This also applies in particular to the installation of Lotus Notes/Domino components.

Commonly used procedures are for example the separation of the servers on which the installations are performed from the network and the universal use of original media of the manufacturer secured in terms of security for the installation. Since this, however, is related to increased administrative effort and since this is often not the established practice in large organisations and with the providers in particular, alternative security safeguards can be used. For software which is not obtained on original media, but via electronic channels from the manufacturer (e.g. download, automatic software update by the manufacturer, email etc.), an installation procedure containing an adequate integrity check of the software must be established in each case. The quality of the mechanisms used, for example the hashes used for the protection of integrity, must take the protection requirements of the component to be installed into account.

For Lotus Notes/Domino, the manufacturer offers the possibility of obtaining the software electronically via http download by using a special download applet (Download Director). The latter option offers a higher level of security and meets the requirements of the common criteria for software downloads according to the manufacturer's specifications. Since there is no transparent mechanism offered by the manufacturer for the integrity check of individual components, safeguards to ensure that the download cannot be compromised should be taken if Lotus Notes/Domino has high or very high protection requirements. It must be ensured that there is no other access (no administrative access either) to the target directory/target drive during the download and that the integrity is protected using corresponding hashes after the download has been completely successfully.

If central storage locations for installation media are used within the organisation (installation drives, installation servers), adequate protection corresponding to the protection requirements of the media must be provided for them. Among other things, this includes corresponding safeguards for access protection, protection of integrity and ensuring availability. If technically feasible and possible from an administration point of view, the installation drives and installation servers must only be released for a limited period of time for installation processes.

Critical processes during installation, upgrades and migrations

For the installation of the Lotus Domino server, the processes for the generation of essential technical elements of the domain and certificate hierarchy are critical, since the compromising of these elements might result in the compromising of all Domino/Notes security mechanisms. The following aspects must be taken into account from a security perspective:

Use of the extended access control (xACL)

In version 6 and higher, Lotus Notes/Domino offers the possibility to install extended ACLs (xACLs) for a Domino Directory or an Extended Directory Catalogue. The additional access protection options implemented using the xACLs allow, for example, the delegation of administrative tasks, restricted to organisational units and further protection on the field level for NRPC, HTTP, LDAP, POP3 and IMAP accesses. Thus, the reading of password hashes via HTTP access to personal documents in the names.nsf, for instance, can be avoided. The Technote 1244808 of the manufacturer describes the required steps.

For all Lotus Notes/Domino systems with high or very high protection requirements regarding confidentiality or integrity, the use of the xACLs must be planned and implemented. Activating the xACLs, the entry of the ANONYMOUS group in the ACLs is automatically set to NO ACCESS.

If no xACLs are used, the ANONYMOUS group must be set to NO ACCESS by default for the Domino installation. If anonymous access is permitted for individual databases, this must be released explicitly on the database level.

Review questions: