LDAP over SSL/TLS (LDAPS): 636

Security Weaknesses:

  • Outdated SSL/TLS configurations may expose communication to MITM attacks.

  • Improper certificate management can lead to security vulnerabilities.

  • Susceptible to brute-force attacks without account lockout policies.

Security Defense and Mitigation Measures:

  • Use TLS 1.2 or higher for encrypted LDAP communication.

  • Require client-side certificates for additional security.

  • Implement strong authentication mechanisms and rate limiting.

  • Regularly monitor and audit LDAP traffic for anomalies.

Indicators of Compromise or Attack:

  • Repeated failed login attempts against LDAP accounts.

  • Unauthorized access to directory entries or modification of permissions.

  • Expired, mismatched, or self-signed SSL/TLS certificates in use.

Last updated