22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

100 Lotus Security Handbook<br />

Encrypt confidential and sensitive information<br />

First, we assume you have a basic understanding of cryptography and<br />

encryption models using symmetrical and asymmetrical keys (shared secrets<br />

and public/private keys). For now, we’ll keep the discussion at a high level and<br />

just say that encrypted data cannot be deciphered by a person or system that<br />

does not posses the correct decryption key. An overview of cryptography is<br />

included in 1.4, “Cryptographic techniques” on page 22, and an in-depth<br />

discussion of asymmetrical key cryptography can be found in Chapter 6, “Public<br />

key infrastructures”.<br />

Second, let us point out that we are not saying that all data needs to be<br />

encrypted in all places. Earlier in this book, we discussed a process of<br />

classification of data. An additional dimension of data classification is<br />

determining the level of protection required depending on where the data is at<br />

any given time. For example, your security policy may require a Notes mail file to<br />

be stored encrypted on an internal Domino server. Remember, when you encrypt<br />

a Domino database on a Domino server, it is encrypted with the server’s public<br />

key. But if a replica of the mail file is kept on a laptop that can potentially be<br />

carried outside of your facilities, your policy might require the local replica to be<br />

encrypted. Encrypting a local replica on a Notes client encrypts the mail<br />

database with the user’s public key. But keep in mind that the Notes Domino<br />

replication process involves transmitting the data across a network link of some<br />

sort. Notes replication (initiated by a Domino server or a Notes client) will present<br />

the data unencrypted to the network port, because database encryption<br />

essentially becomes transparent to the server or client replication task.<br />

Remember, the replication task is running under the ID that encrypted the<br />

database. By default, port encryption is not enabled on the Domino server, so<br />

you end up with the scenario depicted in Figure 3-1.<br />

mymail.nsf<br />

(server encrypted)<br />

Domino<br />

Server<br />

Figure 3-1 Unencrypted replication<br />

CONFIDENTIAL!<br />

Bill, we just closed<br />

the Acme deal for<br />

one billion dollars.<br />

Press release will<br />

be next week.<br />

laptop<br />

packet<br />

sniffer<br />

mymail.nsf<br />

(locally encrypted)<br />

If the data requires cryptographic protection at some (or all) storage points, it<br />

generally requires cryptographic protection across all the network paths it can

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!