S 4.429 Secure configuration of Lotus Notes/Domino

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

Immediately after the installation, upgrade or migration, the installed, upgraded or migrated components must be configured. This is the only way to ensure that weaknesses of the default configuration cannot be used for attack within the period of time between the installation and configuration.

Secure basic configuration

The secure basic configuration of the Lotus Domino server includes correcting default insecure system parameters:

In addition to this, the access security settings being effective at the level of the Lotus Notes/Domino-Servers (and not at the level of the Domino services) must be made within the framework of the secure basic configuration:

Secure configuration of server settings for communication

Adequate communication security can be ensured via a SSL-encrypted connection with a communication partner authorised by a certificate.

A Domino server can be configured for the SSL use by means of the server certificate administration tool (certsrv.nsf). The prerequisite is the implementation of the concept for the domain and certificate hierarchies in S 2.207 Security concept for Lotus Notes/Domino. Afterwards, it is possible to configure individually at the log level (e.g. email logs IMAP, POP3, SMTP) for which logs SSL must be activated. The activation should be carried out depending on the protection requirements of the services used.

Forcing SSL connections can also be set for web access at the database level (web: Prompt for SSL connection). If possible, the SSL connection configuration should not be configured to the setting Only-server-authentication, but to Client certificate authentication as authentication method (not all logs support the client certificate authentication).

The following server-side parameters must be configured in compliance with the encryption policies of the organisation:

Secure service configuration

Among other things, Domino offers the following services:

A secure service configuration must take into consideration both the common standards regarding the secure parameterisation of the services and the context within the framework of the security architecture in which this service is run. Thus, the configuration of an email or Instant Messaging service used only within the company and run on a Domino server without external connections can differ significantly from the configuration of the same service run on a server in the DMZ (demilitarised zone) for handling the email traffic and for instant messaging connection to the Internet.

It is therefore necessary to perform a security analysis for each service taking into account not only the protection requirements of the service, but also the protection requirements of the Domino server (and thus the other services running on the same Domino server). For this purpose, the recommendations described in S 2.207 Security concept for Lotus Notes/Domino must be implemented, especially the concept for the protection of the used Domino services contained in this safeguard.

For each service, both an authorisation concept for the access to the service (access concept) must be developed in the corresponding security concept and the service-specific parameters must be configured securely. Here, especially insecure default settings of the software must be corrected. This concept must be implemented for each Domino service directly after the installation of the service.

Services not in use should, if possible, not be installed by selecting an appropriate basic installation. If this is not possible, the corresponding server tasks must be deactivated.

Secure client configuration

For the Lotus Notes/Domino platform, different clients can be used. In this respect, a distinction must be made between the following types depending on the application scenario:

From a technological perspective, a distinction must be made between the following clients:

In general, all client types used must be protected according to the organisation-specific hardening concept and configuration requirements referred to in S 2.207 Security concept for Lotus Notes/Domino. For clients operated in connection with push services, the client-side parameters of the concept for the use of push services in S 2.207 Security concept for Lotus Notes/Domino must also be taken into consideration during configuration.

When planning the architecture, it must already be defined which client types are to be used. In this respect, it must be taken into account that different configurations might be required depending on the application scenario and protection requirements of the clients. In general, administrative and other clients with high protection requirements must be protected more restrictively.

In the client configuration, weaknesses arising from insecure default settings must be remedied. In addition to this, the parameters for the establishment of a secure connection, the replication parameters and the parameters for the Notes-based encryption of all client-side data must be taken into account. Here, the requirements of planning the communication security in S 2.206 Planning the use of Lotus Notes/Domino, the concept regarding the protection of the Domino services in S 2.207 Security concept for Lotus Notes/Domino and the concept regarding the use of the own security mechanisms of Notes/Domino in S 2.207 Security concept for Lotus Notes/Domino (among other things, for the encryption of the client-side data) must be taken into consideration.

If the Full client is used for the first time, the new complexity must be taken into account and detailed configuration requirements (ideally together with an adequate training offer for the users) must be prepared for the rollout.

Review questions: