22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

104 Lotus Security Handbook<br />

Once your IT infrastructure serves users outside your organization, the situation<br />

changes. The internet allows your organization to do business with people that<br />

you do not know. Your organization has to answer difficult questions:<br />

► How can people's identities be confirmed?<br />

► When you collect and store information about people, how is the information<br />

kept private?<br />

► When you collect information about people, how is the information used?<br />

Data confidentiality or data integrity mechanisms, or both, must be used to<br />

protect important data that flows through the Internet, including information that<br />

identifies people, their credit card information, order or contractual information,<br />

and so forth. Therefore, our recommendation is to treat all user identities and<br />

credentials (such as passwords, challenge question responses, certificates) as<br />

confidential information. This includes both your internal users as well as your<br />

external users. Privacy laws vary in different countries, and often dictate specific<br />

requirements for storage and safeguarding of employee, contractor, business<br />

partner, customer, and supplier information. It is your responsibility to ensure<br />

compliance with all applicable privacy laws; legal advice is well outside the scope<br />

of this book.<br />

Once a party is identified, the second half of the equation is to determine what<br />

systems and data that user is permitted to access and what functions may be<br />

performed. Access controls are governed by three major security principles:<br />

1. Accountability: The ability to trace all system activities to the person who<br />

initiated the action. This has the proactive result of ensuring that users know<br />

anonymous activity is not possible (greatly reducing the temptation to browse<br />

or misuse the system), and enables the reconstruction of the activities leading<br />

to a security incident.<br />

2. Least privilege: The goal of providing users with only that set of privileges<br />

necessary to the performance of each user's authorized duties. This helps<br />

reduce the not uncommon chain of: curiosity, browsing, dis<strong>cover</strong>y, fascination,<br />

temptation, and ultimately improper action. “Need to know” is an aspect of<br />

least privilege.<br />

3. Separation of duties: The goal of ensuring that no single person is in a<br />

position to perform, approve, and account for any security-critical action. The<br />

primary goal is not to allow the actions of a single individual to introduce a<br />

single point of failure.<br />

Utilize proxy systems<br />

Utilizing “proxy systems” can provide protection to back-end applications and<br />

Web servers. Think of a proxy as a type of firewall that goes beyond the TCPIP<br />

level. They are sometimes referred to as “application gateways,” although this

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!