22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

150 Lotus Security Handbook<br />

Channel security<br />

When we say channel security, we mean that the session communication either<br />

between a client and a server or between two servers is encrypted. This<br />

generally means that SSL is required, although we have alternatives for securing<br />

Notes client-to-Domino server and Domino server-to-Domino server using<br />

Domino port encryption.<br />

Data classification and access models<br />

We briefly discussed data classification in Chapter 1, “Fundamentals of IT<br />

security” on page 3. A key part of our interzone communication model is<br />

dependent on using three different data classifications tied to different user<br />

authentication types.<br />

World-readable data access<br />

The first data access model is for data which has been identified as public or<br />

world-readable. A large portion of data falls into this category. The majority of the<br />

data within your external sites does not require any formal authentication or<br />

encryption based upon the “public” classification of the data. It does not mean we<br />

need to allow anonymous access; however, without authentication, we do not<br />

have a means to verify the identity of a user. We might want to note the IP<br />

address the client appears to connect from, but it is for tracking purposes only.<br />

There should be designated data access paths for each application. Data access<br />

controls are consistent with those in the second and third data access models<br />

except that no authentication is required and encryption is not used.<br />

Simple authentication<br />

The second model is to provide a method for the application to authenticate the<br />

user using single-factor authentication. If the client is on the intranet network, no<br />

encryption will be required. If the client is in any other zone, encrypt all follow-on<br />

transactions for a session with Secure Sockets Layer (SSL). This capability is<br />

required by applications which process sensitive data. In addition to simple<br />

authentication and encryption, subsequent access to the application data is<br />

provided through proxy servers and application-level access controls.<br />

Strong authentication, encrypted data<br />

The third, and most secure model, is to provide a method for the application to<br />

authenticate the user and then to encrypt all follow-on transactions for a session<br />

with Secure Sockets Layer (SSL). This capability is required by applications<br />

which process customer’s sensitive or internal confidential data on the Internet.<br />

In addition to strong authentication and encryption, subsequent access to the<br />

application data is provided through proxy servers and application-level access<br />

controls. Regardless of zone location, all confidential data will be stored on disk<br />

using encryption at the highest key strength supported by the application.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!