S 4.312 Monitoring directory services

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Auditor, Head of IT, Administrator

In order to be able to determine the security status of a system, it is necessary to monitor the system continuously. Among other things, it is necessary to regularly monitor the security settings and the log files of a server. The goal of such a monitoring function is to detect violations of the applicable security regulations, to detect any security gaps, and to detect misconfigurations that may open up security gaps. A corresponding monitoring concept should be considered part of the security concept for this reason.

It is generally impossible for the administrators to monitor complex systems such as directory services manually nowadays, but monitoring must be performed automatically by corresponding system components or products obtained from third party vendors. The configuration of the system monitors must also be adapted regularly to reflect the changes made to a system.

Suitable tools should be used to monitor a directory service system. If the connection is a client/server connection, then the tools must provide suitable authentication mechanisms for access. The user accessing the data must only be allowed to access the data available according to the rights configured for the user after successful authentication. Access to all administration tools should be prohibited for normal users. These types of accesses should only be operated using a communication connection with adequate encryption.

Depending on directory service and the tools available for use, it may be possible to store all directory service events in a separate log file. This makes it easier to find and evaluate specific events, for example when the directory service events are written to the global log file of the operating system.

In general, the following aspects need to be taken into account in the context of monitoring:

When monitoring the system functions, it is also recommended to regularly check the directory service replication used to deploy configuration changes on other systems. Errors during replication usually mean that the configuration changes are not performed everywhere and therefore that some users have too many rights, for example.

Review questions: