SlideShare a Scribd company logo
Joel Oleson
Managing Director of S6
@joeloleson
http://sharepointjoel.com
Christian Buckley
Evangelist at Axceler Now
Metalogix
@Buckleyplanet
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
NSA Recap
Real World SharePoint Permissions & Auditing
Time for an Audit
SharePoint Lockdown & Hardening
Time to Review Data Policies
Tools to Automate Enforce & Report
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
"This leaker was a sysadmin who was trusted with
moving the information to actually make sure that the
right information was on the SharePoint servers that
NSA Hawaii needed," NSA Chief Alexander
The leaks represented "a huge break in trust and
confidence“
… They still don’t know what was taken…
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
 Users CAN NOT tell what permissions/RIGHTS are on the site they are uploading documents to.
 Search EXPOSES documents from EVERYWHERE
 DATA is not ENCYPTED by default
 30% or more Site Owners have left or moved jobs
 More than half of sites after 3 years are Abandoned
 No cleanup of permissions, easier to add groups and authenticated users
 Most sensitive sites are in the site directory and in enterprise search
 All data is stored in the same databases
 Result: People didn’t TRUST SharePoint. Sensitive data is exposed to search and users have rights
to content they shouldn’t. INFOSEC says “SHUT IT DOWN!”
Permissions
Troubleshooting why users cannot see the content they should
Reporting for different types of compliance
Auditing who has access to sensitive content
Usage/Activity
Finding what content is, or is not, being used
Planning for future growth
Understanding hardware requirements
Storage
Monitoring growth for performance reasons
Understanding hardware requirements
Reorganizing taxonomy based on Storage needs
Audit
Needing to show who accessed what and when, to adhere to internal or external compliance
requirements
Performance
Monitoring page load times to uncover problems
Planning for increased usage
• Auditing
• User access records
• Troubleshooting functionality problems that most commonly
stem from end users trying to perform a task without having
the correct permissions.
 Perform regular security checks across your farm,
down to the document level
 Proactively review, delete, and reassign user
permissions as needed
 Clean up users who are no longer in
Active Directory but are in SharePoint
 Review SharePoint groups
 Have a process to backup and restore permissions
 Document site permissions (roles) so that its easier to
duplicate them for new employees
 Monitor SharePoint licensing
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
 GlobalWorkforce (LOW)– Open to all Authenticated users. Listed in directories,
boosted in search when relevant, cheap storage, flexible archiving policies.
Published and Mobile Accessible.
 Team/Group Sensitive (MEDIUM) – Secured to a team or group. No permitted
use of Authenticated users at top site collection level, not listed in global site
directory. Security trimmed and included in enterprise search. Cheap storage.
Published and Mobile Accessible.
 Classified/Business Confidential (HIGH) – Stored in separate encrypted
databases in separate data center as policy permits. Limited security to sysadmins,
regularly audited and restricted to named accounts, no security groups, only
reliable and trusted. Regular permissions audit report sent to site administrators,
Not included in Enterprise search, Not included in any directories. No use of Auth
Users at any level.VPN Only No external publishing. Auditing activated. Any
changes to permissions or auditing reported immediately.
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
 Who has Admin rights to your SharePoint & SQL or External Storage servers?
 What sites have open access anonymous or authenticated users?
 How are you tracking who has access?
 What File was leaked how will you find it, and determined who moved, deleted,
copied, etc…
 What are you using for Auditing? SharePoint Usage Logs and IIS logs are NOT
AUDIT LOGS!!!
 Default Settings Are NOT Designed for Highly Sensitive Data – MUST CONFIGURE!
 Not Encrypted
 No Auditing
 No Reporting
 Use Reverse Proxy with Content Inspection
 Don’t expose SharePoint to the Internet Directly
 Lock down Web Services
 Use Lockdown Mode (Automatic for Publishing site,
but needs activated through STSADM or Powershell
for all other site templates)
 Penn Testing and Lockdown of unneeded services
(SMTP?) and communication Ports
 Restrict Firewall to only required ports
 Follow SharePointVulnerabilities
 http://www.cvedetails.com/vulnerability-list/vendor_id-
26/product_id-11116/Microsoft-Sharepoint-Server.html
 Least Priv across the board!
 Keep up to date with Service Packs and Significant
CUs Patches (N-2 on CUs)
Kudos to Liam Cleary SharePoint MVP
 http://www.slideshare.net/helloitsliam/think-you-
can-hack-sharepoint-sharepoint-fest-
dc?from_search=3
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Process
Technology to Simplify
the Process
People to Enforce
Policies
Site Archiving
 Ensure Sites are Still being
used every 6 months. Backup
and Delete unused sites. Fix
ownership.
 Archiving Process. Invalid
Ownership Detection process.
 SharePoint Team with regular
audits from Infosec.
 1. SharePoint Server & SQL Hardening & Penetration Testing and Intrusion Detection
 2. Managing permissions, Site and Library ownership?
 3. Data Retention Policy? Site Archiving or Data lifecycle policies?
 4. Databases/Sites/Files Encrypted
 5. Rights Managed
 6. Admins have rights to data?
 7. Audit process and tool?
 8. Search Exposure? PII
 9. Authentication - Just because it's over SSL doesn't mean it's secure. Amazing what can happen
inside an SSL Tunnel. Content inspection!
 10. Is SharePoint out of the box security and auditing good enough? Should you consider building
extra governance around your sites and data for policies or a third party tool?
 - See more at:
http://www.sharepointjoel.com/Lists/Posts/Post.aspx?List=0cd1a63d%2D183c%2D4fc2%2D8320%
2Dba5369008acb&ID=688#sthash.YTq35lto.dpuf
It’s time to stop hoping something won’t happen… Prepare
for it.
Governance = putting those plans in place and building
trust.
SharePoint Out of Box Does NOT address all your auditing
and compliance needs for any business critical
environment
 Consider Third Party or Custom Development
 Axceler/Metalogix ControlPoint & Salient6 are here to help
Don’t be surprised when you find centralized permissions
management a nightmare.You must have policies and
cleanup processes.
Joel Oleson @joeloleson
SharePointJoel.com
Salient6 http://www.salient6.com
Christian Buckley @buckleyplanet
BuckleyPlanet.com
Metalogix.com

More Related Content

What's hot (20)

PPTX
Secure Your REST API (The Right Way)
Stormpath
 
PPTX
Share point development 101
Becky Bertram
 
PPTX
So you’re building an intranet
Becky Bertram
 
PDF
Exploring the New Search in SharePoint 2013 - What can you do now?
Benjamin Niaulin
 
PPTX
SPSNL17 - Implementing SharePoint hybrid search, start to finish - Thomas Voc...
DIWUG
 
PPTX
Introduction to the Office Dev PnP Core Libraries
Eric Shupps
 
PDF
O365Con18 - Reach for the Cloud Build Solutions with the Power of Microsoft G...
NCCOMMS
 
PPTX
Get Some Rest - Taking Advantage of the SharePoint 2013 REST API
Eric Shupps
 
PPTX
SPCAdriatics - Search Administration and Troubleshooting in SharePoint 2013
Agnes Molnar
 
PPT
Starwest 2008
Caleb Sima
 
PDF
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
NCCOMMS
 
PPTX
Spring Boot Authentication...and More!
Stormpath
 
PPTX
A Deep-Dive into Real-World SharePoint App Development
SPC Adriatics
 
PPTX
Making sense of Microsoft Identities in a Hybrid world
Jason Himmelstein
 
PPTX
Enterprise Content Management in SharePoint 2010 inplace autotagging with ter...
Ivan Sanders
 
PPTX
PowerShell for the Anxious ITPro
Jason Himmelstein
 
PPTX
SharePoint 2013 apps overview
Elie Kash
 
PDF
Surviving the Zombie Apocalypse of Connected devices - Jfokus 2013
Gustaf Nilsson Kotte
 
PPTX
Are you getting Sleepy. REST in SharePoint Apps
Liam Cleary [MVP]
 
PDF
O365Con18 - Innovate, Connecting Bleeding Edge Technologies - Sjoukje Zaal & ...
NCCOMMS
 
Secure Your REST API (The Right Way)
Stormpath
 
Share point development 101
Becky Bertram
 
So you’re building an intranet
Becky Bertram
 
Exploring the New Search in SharePoint 2013 - What can you do now?
Benjamin Niaulin
 
SPSNL17 - Implementing SharePoint hybrid search, start to finish - Thomas Voc...
DIWUG
 
Introduction to the Office Dev PnP Core Libraries
Eric Shupps
 
O365Con18 - Reach for the Cloud Build Solutions with the Power of Microsoft G...
NCCOMMS
 
Get Some Rest - Taking Advantage of the SharePoint 2013 REST API
Eric Shupps
 
SPCAdriatics - Search Administration and Troubleshooting in SharePoint 2013
Agnes Molnar
 
Starwest 2008
Caleb Sima
 
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
NCCOMMS
 
Spring Boot Authentication...and More!
Stormpath
 
A Deep-Dive into Real-World SharePoint App Development
SPC Adriatics
 
Making sense of Microsoft Identities in a Hybrid world
Jason Himmelstein
 
Enterprise Content Management in SharePoint 2010 inplace autotagging with ter...
Ivan Sanders
 
PowerShell for the Anxious ITPro
Jason Himmelstein
 
SharePoint 2013 apps overview
Elie Kash
 
Surviving the Zombie Apocalypse of Connected devices - Jfokus 2013
Gustaf Nilsson Kotte
 
Are you getting Sleepy. REST in SharePoint Apps
Liam Cleary [MVP]
 
O365Con18 - Innovate, Connecting Bleeding Edge Technologies - Sjoukje Zaal & ...
NCCOMMS
 

Similar to Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley (20)

PPTX
Securing SharePoint -- 5 SharePoint Security Essentials You Cannot Afford to ...
Christian Buckley
 
PPTX
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Christian Buckley
 
PPTX
Securing the SharePoint Platform
Bert Johnson
 
PPT
D Cornell Securing Share Point
Art Upton
 
PPTX
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
AntonioMaio2
 
PPTX
SPSRI - Sharing the Point in an A/D World
Jared Matfess
 
PPTX
ESDDC - Making Secured Content Discoverable in SharePoint
Jonathan Ralton
 
PPTX
Best Practices for Security in Microsoft SharePoint 2013
AntonioMaio2
 
PDF
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
Bishop Fox
 
PPTX
Give Your SharePoint Site a Physical
Ascendum Solutions
 
DOCX
Governance of Data in SharePoint: Tools, Policies, and Best Practices
Sharepoint Designs
 
PPTX
Best practices for security and governance in share point 2013 published
AntonioMaio2
 
PPTX
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
Don Donais
 
PPTX
SIKM Boston - Making Secured Content Discoverable in SharePoint
Jonathan Ralton
 
PPT
Tech Ed 2006 South East Asia Security And Compliance by Joel Oleson
Joel Oleson
 
PPTX
Hacking_SharePoint_FINAL
Ian Naumenko, CISSP, CRISC
 
PDF
4 Security Guidelines for SharePoint Governance
Imperva
 
PDF
6 Most Surprising SharePoint Security Risks
Imperva
 
PPTX
SharePoint Governance: Impacts of Moving to the Cloud
Christian Buckley
 
PPTX
SharePoint Governance: Impacts of Moving to the Cloud
AntonioMaio2
 
Securing SharePoint -- 5 SharePoint Security Essentials You Cannot Afford to ...
Christian Buckley
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Christian Buckley
 
Securing the SharePoint Platform
Bert Johnson
 
D Cornell Securing Share Point
Art Upton
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
AntonioMaio2
 
SPSRI - Sharing the Point in an A/D World
Jared Matfess
 
ESDDC - Making Secured Content Discoverable in SharePoint
Jonathan Ralton
 
Best Practices for Security in Microsoft SharePoint 2013
AntonioMaio2
 
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
Bishop Fox
 
Give Your SharePoint Site a Physical
Ascendum Solutions
 
Governance of Data in SharePoint: Tools, Policies, and Best Practices
Sharepoint Designs
 
Best practices for security and governance in share point 2013 published
AntonioMaio2
 
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
Don Donais
 
SIKM Boston - Making Secured Content Discoverable in SharePoint
Jonathan Ralton
 
Tech Ed 2006 South East Asia Security And Compliance by Joel Oleson
Joel Oleson
 
Hacking_SharePoint_FINAL
Ian Naumenko, CISSP, CRISC
 
4 Security Guidelines for SharePoint Governance
Imperva
 
6 Most Surprising SharePoint Security Risks
Imperva
 
SharePoint Governance: Impacts of Moving to the Cloud
Christian Buckley
 
SharePoint Governance: Impacts of Moving to the Cloud
AntonioMaio2
 
Ad

More from Joel Oleson (20)

PPTX
Introduction to Microsoft Viva and the Employee Experience Platform with Joel...
Joel Oleson
 
PPTX
Vivafy your SharePoint intranet in Microsoft Teams with Viva Connections
Joel Oleson
 
PPTX
Viva Enhanced Teams as a Platform
Joel Oleson
 
PPTX
Microsoft Teams Webinars - PowerPoint Live Presentation Mode and More
Joel Oleson
 
PPTX
Microsoft Teams Governance and Security Best Practices - Joel Oleson
Joel Oleson
 
PDF
Intelligent Content Enrichment using Microsoft SharePoint Syntex and Viva Top...
Joel Oleson
 
PPTX
SharePoint Syntex 5 Practical Uses
Joel Oleson
 
PDF
Slice up your Microsoft 365 Tenant with Administrative Units
Joel Oleson
 
PDF
Microsoft 365 Tenant Administration: Understanding Microsoft 365 Administrati...
Joel Oleson
 
PPTX
Microsoft Teams as a Platform - Microsoft 365 Application Platform Maturity M...
Joel Oleson
 
PPTX
Microsoft Teams Governance Quickstart - The Experts Conference
Joel Oleson
 
PPTX
Securely Harden Microsoft 365 with Secure Score
Joel Oleson
 
PDF
Security Hardening Microsoft 365 Tools and Techniques
Joel Oleson
 
PPTX
TeamsFest - Microsoft Teams as an Event Platform: Case Study for Large Scale ...
Joel Oleson
 
PPTX
Microsoft Teams Governance and Automation
Joel Oleson
 
PPTX
Travel Trivia - World Travelers - Hosted by Joel Oleson
Joel Oleson
 
PPTX
Decisions: SharePoint 2010 Workflows to SharePoint Online to Power Automate D...
Joel Oleson
 
PPTX
Microsoft Teams Live Events - Producing Large Scale Events Case Study
Joel Oleson
 
PPTX
Microsoft Groups Demystified: 5 Keys to Successful Group Management
Joel Oleson
 
PPTX
7 Innovative Ways Project Cortex Delivers Business Value
Joel Oleson
 
Introduction to Microsoft Viva and the Employee Experience Platform with Joel...
Joel Oleson
 
Vivafy your SharePoint intranet in Microsoft Teams with Viva Connections
Joel Oleson
 
Viva Enhanced Teams as a Platform
Joel Oleson
 
Microsoft Teams Webinars - PowerPoint Live Presentation Mode and More
Joel Oleson
 
Microsoft Teams Governance and Security Best Practices - Joel Oleson
Joel Oleson
 
Intelligent Content Enrichment using Microsoft SharePoint Syntex and Viva Top...
Joel Oleson
 
SharePoint Syntex 5 Practical Uses
Joel Oleson
 
Slice up your Microsoft 365 Tenant with Administrative Units
Joel Oleson
 
Microsoft 365 Tenant Administration: Understanding Microsoft 365 Administrati...
Joel Oleson
 
Microsoft Teams as a Platform - Microsoft 365 Application Platform Maturity M...
Joel Oleson
 
Microsoft Teams Governance Quickstart - The Experts Conference
Joel Oleson
 
Securely Harden Microsoft 365 with Secure Score
Joel Oleson
 
Security Hardening Microsoft 365 Tools and Techniques
Joel Oleson
 
TeamsFest - Microsoft Teams as an Event Platform: Case Study for Large Scale ...
Joel Oleson
 
Microsoft Teams Governance and Automation
Joel Oleson
 
Travel Trivia - World Travelers - Hosted by Joel Oleson
Joel Oleson
 
Decisions: SharePoint 2010 Workflows to SharePoint Online to Power Automate D...
Joel Oleson
 
Microsoft Teams Live Events - Producing Large Scale Events Case Study
Joel Oleson
 
Microsoft Groups Demystified: 5 Keys to Successful Group Management
Joel Oleson
 
7 Innovative Ways Project Cortex Delivers Business Value
Joel Oleson
 
Ad

Recently uploaded (20)

PPTX
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
PDF
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Per Axbom: The spectacular lies of maps
Nexer Digital
 
PDF
Market Insight : ETH Dominance Returns
CIFDAQ
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
The Future of Artificial Intelligence (AI)
Mukul
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Per Axbom: The spectacular lies of maps
Nexer Digital
 
Market Insight : ETH Dominance Returns
CIFDAQ
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 

Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley

  • 1. Joel Oleson Managing Director of S6 @joeloleson http://sharepointjoel.com Christian Buckley Evangelist at Axceler Now Metalogix @Buckleyplanet
  • 3. NSA Recap Real World SharePoint Permissions & Auditing Time for an Audit SharePoint Lockdown & Hardening Time to Review Data Policies Tools to Automate Enforce & Report
  • 6. "This leaker was a sysadmin who was trusted with moving the information to actually make sure that the right information was on the SharePoint servers that NSA Hawaii needed," NSA Chief Alexander The leaks represented "a huge break in trust and confidence“ … They still don’t know what was taken…
  • 9.  Users CAN NOT tell what permissions/RIGHTS are on the site they are uploading documents to.  Search EXPOSES documents from EVERYWHERE  DATA is not ENCYPTED by default  30% or more Site Owners have left or moved jobs  More than half of sites after 3 years are Abandoned  No cleanup of permissions, easier to add groups and authenticated users  Most sensitive sites are in the site directory and in enterprise search  All data is stored in the same databases  Result: People didn’t TRUST SharePoint. Sensitive data is exposed to search and users have rights to content they shouldn’t. INFOSEC says “SHUT IT DOWN!”
  • 10. Permissions Troubleshooting why users cannot see the content they should Reporting for different types of compliance Auditing who has access to sensitive content Usage/Activity Finding what content is, or is not, being used Planning for future growth Understanding hardware requirements Storage Monitoring growth for performance reasons Understanding hardware requirements Reorganizing taxonomy based on Storage needs Audit Needing to show who accessed what and when, to adhere to internal or external compliance requirements Performance Monitoring page load times to uncover problems Planning for increased usage
  • 11. • Auditing • User access records • Troubleshooting functionality problems that most commonly stem from end users trying to perform a task without having the correct permissions.
  • 12.  Perform regular security checks across your farm, down to the document level  Proactively review, delete, and reassign user permissions as needed  Clean up users who are no longer in Active Directory but are in SharePoint  Review SharePoint groups  Have a process to backup and restore permissions  Document site permissions (roles) so that its easier to duplicate them for new employees  Monitor SharePoint licensing
  • 26.  GlobalWorkforce (LOW)– Open to all Authenticated users. Listed in directories, boosted in search when relevant, cheap storage, flexible archiving policies. Published and Mobile Accessible.  Team/Group Sensitive (MEDIUM) – Secured to a team or group. No permitted use of Authenticated users at top site collection level, not listed in global site directory. Security trimmed and included in enterprise search. Cheap storage. Published and Mobile Accessible.  Classified/Business Confidential (HIGH) – Stored in separate encrypted databases in separate data center as policy permits. Limited security to sysadmins, regularly audited and restricted to named accounts, no security groups, only reliable and trusted. Regular permissions audit report sent to site administrators, Not included in Enterprise search, Not included in any directories. No use of Auth Users at any level.VPN Only No external publishing. Auditing activated. Any changes to permissions or auditing reported immediately.
  • 30.  Who has Admin rights to your SharePoint & SQL or External Storage servers?  What sites have open access anonymous or authenticated users?  How are you tracking who has access?  What File was leaked how will you find it, and determined who moved, deleted, copied, etc…  What are you using for Auditing? SharePoint Usage Logs and IIS logs are NOT AUDIT LOGS!!!  Default Settings Are NOT Designed for Highly Sensitive Data – MUST CONFIGURE!  Not Encrypted  No Auditing  No Reporting
  • 31.  Use Reverse Proxy with Content Inspection  Don’t expose SharePoint to the Internet Directly  Lock down Web Services  Use Lockdown Mode (Automatic for Publishing site, but needs activated through STSADM or Powershell for all other site templates)  Penn Testing and Lockdown of unneeded services (SMTP?) and communication Ports  Restrict Firewall to only required ports  Follow SharePointVulnerabilities  http://www.cvedetails.com/vulnerability-list/vendor_id- 26/product_id-11116/Microsoft-Sharepoint-Server.html  Least Priv across the board!  Keep up to date with Service Packs and Significant CUs Patches (N-2 on CUs) Kudos to Liam Cleary SharePoint MVP  http://www.slideshare.net/helloitsliam/think-you- can-hack-sharepoint-sharepoint-fest- dc?from_search=3
  • 41. Process Technology to Simplify the Process People to Enforce Policies Site Archiving  Ensure Sites are Still being used every 6 months. Backup and Delete unused sites. Fix ownership.  Archiving Process. Invalid Ownership Detection process.  SharePoint Team with regular audits from Infosec.
  • 42.  1. SharePoint Server & SQL Hardening & Penetration Testing and Intrusion Detection  2. Managing permissions, Site and Library ownership?  3. Data Retention Policy? Site Archiving or Data lifecycle policies?  4. Databases/Sites/Files Encrypted  5. Rights Managed  6. Admins have rights to data?  7. Audit process and tool?  8. Search Exposure? PII  9. Authentication - Just because it's over SSL doesn't mean it's secure. Amazing what can happen inside an SSL Tunnel. Content inspection!  10. Is SharePoint out of the box security and auditing good enough? Should you consider building extra governance around your sites and data for policies or a third party tool?  - See more at: http://www.sharepointjoel.com/Lists/Posts/Post.aspx?List=0cd1a63d%2D183c%2D4fc2%2D8320% 2Dba5369008acb&ID=688#sthash.YTq35lto.dpuf
  • 43. It’s time to stop hoping something won’t happen… Prepare for it. Governance = putting those plans in place and building trust. SharePoint Out of Box Does NOT address all your auditing and compliance needs for any business critical environment  Consider Third Party or Custom Development  Axceler/Metalogix ControlPoint & Salient6 are here to help Don’t be surprised when you find centralized permissions management a nightmare.You must have policies and cleanup processes.
  • 44. Joel Oleson @joeloleson SharePointJoel.com Salient6 http://www.salient6.com Christian Buckley @buckleyplanet BuckleyPlanet.com Metalogix.com