S 4.381 Encryption of Exchange system databases

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: User

Microsoft Exchange information memories are databases managing user mailboxes and further relevant data on the server side in a centralised manner. Microsoft Outlook uses so-called Personal Store (PST) Container files structured similarly to a database and locally storing a user-related image of the information memories to the client. The memory location of a PST file on the server or locally on the client has a decisive influence on the encryption options.

File level encryption, e.g. using Encrypted File System (EFS), is not recommendable for information memory files of the Exchange server; the effort required for such an online encryption is not suitable for executing a Microsoft Exchange server.

The following aspects must be taken into consideration for local PST-files in Microsoft Outlook:

Depending on the type of information stored in a database and the resulting requirements for the confidentiality and integrity of this information, it may be necessary to encrypt this data. The boundary conditions in so doing should be specified, e.g. in the security policy for Microsoft Exchange systems (see S 2.248 Definition of security guidelines for Exchange/Outlook 2000). The users must have received information about the mode of operation and the protection mechanisms when encrypting PST files.

The requirements from this safeguard can be implemented specifically as follows for version 2010:

Review questions: