22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

160 Lotus Security Handbook<br />

The last step in our design model process is to analyze the design’s possible<br />

data flows and data access to ensure the design meets our security policy. The<br />

primary focus of the design validation review is to ensure:<br />

1. Adherence to our flow control policy tables in the previous section. This<br />

means that we need to examine all client-server and server-to-server network<br />

data flows.<br />

2. Data access methods used match the data classification assigned to the<br />

data.<br />

Next we will walk through an example of an application data flow review.<br />

4.3.1 Data flow example<br />

In this section we describe a fictitious infrastructure design that incorporates our<br />

different security architecture concepts. The Acme company is designing a Web<br />

portal for external suppliers. One part of the portal content is being served by a<br />

Lotus Domino application. Other content will be provided by WebSphere<br />

Application Server. The suppliers will be issued user IDs, and the credentials<br />

(passwords) will be stored in an LDAP directory. Tivoli Access Manager will be<br />

used for access controls to different portal content back-end URLs.<br />

Based on the data classification policies at Acme, any data deemed “sensitive”<br />

that is accessed from any network other than the internal network (Intranet) must<br />

provide minimal access control of simple authentication with encryption. Data<br />

deemed “confidential” that is accessed from any network other than the internal<br />

network (Intranet) must provide minimal access control of strong authentication<br />

with encryption. We have classified the supplier directory information as<br />

“confidential,” and the portal content as “sensitive.”<br />

Figure 4-11 depicts our logical architecture.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!