S 4.159 Secure operation of Novell eDirectory

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator, Head of IT

The security of a complex system must be permanently maintained during operation because it will be necessary to make changes during ongoing operations. Therefore, it is not sufficient to set a secure initial configuration (see S 4.153 Secure installation of Novell eDirectory, S 4.155 Secure configuration of Novell eDirectory and the corresponding safeguards S 4.154 Secure installation of the Novell eDirectory client software and S 4.156 Secure configuration of the Novell eDirectory client software).

After installation and initial configuration according to the eDirectory concepts and security policies defined in advance, the eDirectory servers are generally operated in a network. The security of such a network depends on the initial configuration specified, on the one hand. On the other hand, though, another factor which significantly affects network security is the way configuration changes must be performed during live operation. The side-effects of such changes also must be taken into consideration in particular that may unintentionally open up security gaps under some circumstances.

The following aspects must be considered from the perspective of information security during the operation of an eDirectory directory system:

From a security perspective, it is also important to document all policies, rules, and processes affecting the operation of an eDirectory system. Operation manuals should be created for this purpose and they should be updated when changes are made to the system. Since the operation manuals contain security-relevant information, they must be stored in such a way that unauthorised access is prevented. Authorised administrators should have easy access to the manuals, however.

The recommendations provided here can only be of a general nature, since the maintenance of system security also depends on the local circumstances. For this reason, corresponding policies for secure operation of an eDirectory directory tree, which take local requirements into consideration, must be created right from the network planning phase. Under some circumstances, it may be impossible to securely configure certain mechanisms optimally. For example, this is the case if "old" applications that are only designed to use weak authentication or no authentication at all must be operated continuously. In this case, alternative countermeasures must be implemented at another location, for example at the organisational level, to reach an adequate level of security.

Potential security gaps can only be detected and/or avoided by competent administrators. For this reason, the training and continued education of the system administrators is an important safeguard (see also S 3.29 Training on the administration of Novell eDirectory). In addition, normal users must also be trained on security aspects (see also S 3.30 Training on the use of Novell eDirectory client software) so that they know the potential risks involved and are able to properly use the security mechanisms available.

The security settings and the log files of a server should be examined regularly. This may be performed manually or supported by tools. Otherwise, there is the risk that deviations from the security policies and security problems are not detected prematurely and therefore not eliminated in due time either (see also S 4.160 Monitoring of Novell eDirectory).

Example: group-based access concept

An employee switches departments, and so the access rights must be adapted. If user-related access control lists (ACLs) are used, every directory must be verified in order to remove and/or enter the user from and/or to the ACL, if required. On the other hand, if group-based ACLs are used, the user must only be removed and/or entered from and/or to the relevant groups in the user administration. The change may be performed centrally on the user object.

Review questions: