S 4.307 Secure configuration of directory services

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

A directory service should be in a secure state after installation has been completed (see S 4.308 Secure installation of directory services) so that only authorised administrators are able to access the directory service during the subsequent configuration phase.

Depending on the operational scenario, the following directory service configuration can be expanded by adding any number of functions not normally available in a pure directory service. In such cases, it is necessary to guarantee the security of the various functions by specifying suitable parameters in the configuration.

Typical configuration tasks for directory services include the following:

All these tasks apply to directory service software. However, it must not be forgotten that it is also necessary to securely configure the underlying operating system, and especially the configurations of the server access, network connections, and file system.

Any number of modules for adding functionality not normally available in a pure directory service could be added to the configuration procedure for a directory service. This includes the following:

Depending on the operational scenario and the range of functions offered by the directory service server, it will be necessary to examine which additional modules are needed to operate the directory service and should therefore be installed. Unused modules should not be installed, because every module installed can cause security problems when configured incorrectly.

A corresponding security plan must be drawn up for every module activated. This plan must then be implemented by specifying suitable configuration parameters (see also S 2.405 Drawing up a security policy for the use of directory services).

The security of a directory service system also depends on the security of the client software used to access it. For this reason, the client computers and client programs also need to be included in the planning of a secure directory service system configuration. Special safeguards need to be implemented for administrative accesses to the directory service.

The following general information should be considered in any case:

An organisation can also develop its own client software that communicates with the directory service using the standardised LDAP interface (or some other interface designed for this purpose).

In general, a directory service system will not only consist of just one directory service server, and will instead consist of a cluster of servers (see also S 2.403 Planning the use of directory services). In this case, the directory database can be distributed between the various servers in the form of individual partitions. Furthermore, the individual servers can mutually replicate the directory databases. Since this means there are several copies of a database partition available on different servers, it is possible to distribute the load. The servers will need to exchange information on all changes in this case to ensure the copies of the directories are up to date at all times. It is therefore necessary to draw up a replication concept. The following aspects, amongst other things, must be taken into account in this:

Since a system is generally subject to constant change during ongoing operations, it is also necessary to permanently monitor the security and reconfigure it when necessary. More information can be found in S 4.311 Secure operation of directory services.

Review questions: