S 4.311 Secure operation of directory services

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Head of IT, Administrator

The security of a complex system must be permanently maintained during operation because it will be necessary to make changes during ongoing operations. For this reason, there is more to maintaining security than specifying a secure initial configuration (see S 4.308 Secure installation of directory services and S 4.307 Secure configuration of directory services).

After installation and initial configuration according to the directory service concepts and security policies defined in advance, the directory service servers are generally operated in a network. The security of such a network depends on the initial configuration specified, on the one hand. On the other hand, though, another factor significantly affecting network security is the way configuration changes must be performed during live operation. The side-effects of such changes also must be taken into consideration in particular that may unintentionally open up security gaps under some circumstances.

The following aspects must be considered from the perspective of information security during the operation of a directory service system:

From a security perspective, it is also important to document all policies, rules, and processes that affect the operation of a directory service system. Operation manuals should be created for this purpose and they should be updated when changes are made to the system. Since the operation manuals contain security-relevant information, they must be stored in such a way that unauthorised access is prevented. Authorised administrators should have easy access to the manuals, however.

The recommendations provided here can only have a general nature, since the maintenance of system security also depends on the local circumstances. For this reason, corresponding policies for secure operation of a directory tree must be created as early as during the network planning phase, taking into consideration the local requirements. Under some circumstances, it may be impossible to securely configure certain mechanisms optimally. For example, this is the case if "old" applications must be operated continuously that are only designed to use weak authentication or no authentication at all. In this case, alternative countermeasures must be implemented at another location, for example at the organisational level, to reach an adequate level of security.

Potential security gaps may only be detected and/or avoided by competent administrators. For this reason, the training and continued education of the system administrators is an important safeguard (see also S 3.62 Training on the administration of directory services).

In addition, normal users so need to be trained on security aspects (see also S 3.63 Training users on authentication with the help of directory services) so that they know the potential risks involved and can use the security mechanisms available correctly.

Review questions: