Secure and protect domino environment
1 - Secure data exchange between servers
Data integrity?
Secure data exchange
Secure access to data (Rights, encryption)
Secure access to applications (Access Rights)
Secure access to servers (Authentication)
Secure access to materials (Engine Room)
DOMINO data are critical for:

> Directories
> Business Applications whose data are sensitive
> ...
The data manipulation
Deletion of data / Append Data (Copy / Paste)
Manual or Scheduled Agents
Changing properties of replication applications
Restoration of an old replica
Data modification (Admins, Power Users) manually
Example of deleting 1000 user accounts in the directory
DOMINO replicated throughout the Domino domain:
> Loss of mail access
> Loss of messages
> Loss of data access business applications
> Access lost to third-party applications: Lotus Sametime, Quickr
Intervention of senior administrators:
         > Replacement of directory data
         > Replacing the directory on all servers
         > Time is of several hours to several days for a full update on a DOMINO infrastructure of over 500 servers located around the world
         > Complex analysis of the origin of the error
           

=>>> Loss of Business

Why monitoring and control of data updates?
> Avoid the loss of service (Directory, Domino bases sensitive)
> Avoid loss of data (messages, sensitive information ...)
> Avoid data corruption (Amendment unwanted)
Monitoring and control of updated data
How to prevent this type of incident?
> Follow the update data
> Detection of input on the affected server
> Blocking the spread of the incident on the affected server
> Preventing administrators about the incident
Monitoring needs to get
         > one or more daily report(s) on the status of application data
         > A weekly report of incidents detected
         > A message is sent to administrators in case of incident
Control need to master the updating of directory data and
sensitive applications in a process based on security rules
Data updated if thresholds are met:
> On the number and type of change
> On the number of addition
> On the number of deletion
Updated data
Updated data
Domino servers
Safety rules block the spread of erroneous data changes
Mail and application servers

Block of data because UNSUPPORTED with the safety rules

Updated data because consistent with safety rules
Changing data on a server
Intervention of administrators:
         > Replacing the directory on a single server
         > Analysis of the incident quickly to rapidly determine the origin

=>>> Business Continuity

2 - Secured access to servers and applications
Access to servers and applications is very often associated with groups in the Domino Directory
Adding an entry to a group has an important consequence on the security of data:
The data manipulation
Addition of unwanted input in groups
Manual or Scheduled Agents
Changing properties of replication applications
Restoration of an old replica
- Security Audit can be defeated due to the content of the groups in the Domino Directory
- Control groups requires a recurrent analysis of these to prevent security breaches
- Valid inputs in groups can be identified through:
     > The main directory
     > The secondary directories
     > The LDAP directories
The groups entry control is realized through
         > The detection of entries belonging no more to corporate directories
         > Adding entries in groups refusing to Domino servers
         > Deleting entries in the members, owners and administrators groups
         > A restoration of accidentally deleted entrie


    =>>> Secure the Business
Display the page with the software SED directory.
Display the page with the software SED monitoring.
Information about secure and protection of domino environment
ConfigurationSite\Bandeau_Image.jpg
Contact us
Image of the French flag
Image of American flag (United States)
Image of the English flag
Software Solutions for Lotus Notes Domino
Display Contents
Your cart is empty