SlideShare uma empresa Scribd logo
1 de 34
Baixar para ler offline
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
ANTONIO MAIO
PROTIVITI SENIOR MANAGER
MICROSOFT SHAREPOINT MVP
Email: antonio.maio@protiviti.com
Twitter: @AntonioMaio2
Blog: www.TrustSharePoint.com
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
3,300
professionals
Over 20 countries
in the Americas, Europe, the
Middle East and Asia-Pacific
70+
offices
Our revenue:
More than
$743 million
in 2015
Protiviti (www.protiviti.com) is a global consulting firm that helps
companies solve problems in finance, technology, operations,
governance, risk and internal audit, and has served more than 40
percent of FORTUNE 1000® and FORTUNE Global 500®
companies.
Protiviti serve clients through a network of more than 70
locations in over 20 countries. Protiviti is a wholly owned
subsidiary of Robert Half (NYSE: RHI). Founded in 1948, Robert
Half is a member of the S&P 500 index.
WHO ARE WE
AGENDA
Where is the Exposure?
SharePoint On Premise vs Office 365
Online: Security Strategy and Features
On Premise: Security Configuration & Hardening
Information Governance
Final Thoughts & Recommendations
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
WHERE IS THE EXPOSURE?
The Disorganized
The Lazy The Overcautious
The StressedThe Inexperienced
The Home Worker
The Newcomer
The Industrious
The Partisan
The Spy
The CarelessThe Malicious
Malware
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
WHY SECURE SHAREPOINT?
• Represents our intranet, collaboration portal, extranet, public facing web site,
line of business, process automation, business analytics…
• SharePoint is our Repository for Corporate Data
• Sensitive Corporate Data
• Many Aspects of our Business Run on SharePoint
• Users Rely on it to Accomplish Day to Day Work
• Critical Business Infrastructure
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
SHAREPOINT ON PREMISE VS OFFICE 365
SharePoint On Premise
Hosted within corporate network (data center, Azure, AWS).
Office 365 - SharePoint Online
SharePoint infrastructure hosted in Microsoft Data Centers.
• All data and systems is fully within corporate control
• Corporate IT is responsible for:
• All servers/infrastructure – security hardening,
firewall, network security, anti-malware, intrusion
detection, etc
• Regular patching & updates
• System uptime
• TLS (data in motion) & SQL encryption (data at rest)
• Corporate IT & Business responsible for Compliance
• New Services/Solutions – Corporate Dev team responsible
for security design & privacy
• User security controls/Administrative security controls
• You are responsible for security configuration within sites
and information governance policies/procedures
• World class physical data center security (included)
• Microsoft manages:
• Security hardening & network level security
• Regular patching & updates
• SLA ensuring 99.9% uptime
• DR through global network of data centers
• Encryption for data at rest and in motion
• Complies with data privacy standards: HIPAA, HITECH,
CSA Star Registry, EU Model Clauses, ISO27001,
SOC1, SOC2 (included)
• New Services/Solutions – Privacy by Design
• User security controls/Administrative security controls
• You are responsible for security configuration within
sites and information governance policies/procedures
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
OFFICE 365 DEFENSE IN DEPTH STRATEGY
Facility and Network Security
Automated Operations
Control Admin Access to Data
Security Development Life Cycle
Anti-Malware, Patching, and Config. Management
Data Isolation
Data Integrity
Physical Layer
Logical Layer
Data Layer
Security Features
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
• Information Rights Management
• Retention Policies
• Activity Monitoring
• Data Loss Prevention
• External Sharing Controls
• SharePoint Permissions
• Audit Reports
• (built in) TLS 1.2 Communication
• (built in) Encrypted Data at Rest
OFFICE 365 SECURITY FEATURES
• Customer Lockbox
• Azure AD Multi-Factor Auth.
• Azure AD Identity Protection
• Bring your Own Key
• Office 365 Trust Center
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Question
& Answer
DEMONSTRATION
DATA LOSS PREVENTION IN OFFICE 365
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Question
& AnswerSHAREPOINT ON PREMISE
SECURITY CONFIGURATION & SECURITY HARDENING
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
SECURITY STARTS WITH DEPLOYMENT
• Before deploying, plan and document your service accounts
• SQL Server Service Account
• Setup Account
• Farm Service Account
• SharePoint Web Application Pool Account
• SharePoint Service Account (Service App Pool Identity)
• Search Crawl Account
• User Profile Synchronization Account
• Cache Accounts (superreader, superuser)
• SQL Service Analytics & Excel Services Accounts
• Using a Least Privileged Model
• Determine which account farm admin use to login to Central Admin
• Determine which users will have Shell Access (PowerShell)
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
WEB APPLICATION AND SITE COLLECTION
Farm & Web Application Configuration
• Authentication
• Web Application Policies (user & permission policies)
• TLS/SSL Communication
• Anonymous Access
• File Types Permitted
• Web Part Security
• Anti-Virus Configuration
• Thresholds (unique security scopes, list view threshold)
• Establish a strategy for patching and security updates
Site Collection Configuration
• Site Collection Administrators
• Site Collection Auditing
• Permission Levels
• Anonymous Access
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
AUTHENTICATION MODELS
Important to Understand the Options Available
• SharePoint 2010 Options
 Classic Mode (Integrated Authentication, NTLM, Kerberos)
 Claims Based Authentication
 Forms Based Authentication - through Claims Based Auth.
• SharePoint 2013 & 2016 Options
 Claims Based Authentication - Default
 Forms Based Authentication
 Classic Mode Authentication Deprecated!
(only configurable through PowerShell)
• SharePoint Online
 Only Claims Based Authentication Available
• Other Considerations
 Trusted Identity Providers
 Multi-Factor Authentication
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
AUTHORIZATION
• SharePoint Permissions - Hierarchical model
• Permissions are inherited from level above
• Break inheritance to apply unique permissions
• Manual process
• Permissive Model
• SharePoint’s “Share” Interface allows easy fine
grained permissions
SharePoint Farm
Web Application
Site Collection Site Collection
Site Site
Library List
Document
Web Application
Item
Site
Document
Document
Item
Demo Members SharePoint Group Edit
Demo Owners SharePoint Group Full Control
Demo Visitors SharePoint Group Read
Finance Team Domain Group Edit
Senior Mgmt Domain Group Full Control
Research Team Domain Group Full Control
Senior Mgmt Domain Group Full Control
Research Team Domain Group Full Control
Senior Mgmt Domain Group Full Control
Antonio.Maio Domain User Full Control
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
SHAREPOINT PERMISSIONS
• Every time permission inheritance is broken a
new security scope is created
• Security Scope is made up of principles:
• Domain users/groups
• SharePoint users/groups
• Claims
• Be aware of “Limited Access”
• Limitations
• Security Scopes (50K per list)
• Size of Scope (5K principals per scope)
Microsoft SharePoint Boundaries and Limits:
http://technet.microsoft.com/en-us/library/cc262787.aspx
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
SECURITY HARDENING
• System Updates
• Web Server and Application Server Roles
• Services
• Ports and Protocols
• Database Server Role
• Blocking standard ports; Listening on non-standard ports
• Permissions on SQL Service Accounts
• Service Application Communication
• User Profile Synchronization Service
• Connection to External Servers
• Web.Config
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
DATA IN MOTION & DATA AT REST
• Protect Data in Motion with TLS/SSL
• Even for Intranets
• IIS Configuration and SharePoint Central Admin
• Protect Data at Rest with SQL TDE Encryption
• Separate keys for Test & Prod
• Understand who you are protecting
system from (DB level access only)
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Question
& Answer
INFORMATION GOVERNANCE
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Goals
ROLES & RESPONSIBILITIES
Establish and document key administrative roles & responsibilities
• Document each role related to SharePoint and owners
• Each role has a primary and secondary owner
• Define/educate each role on responsibilities & access
requirements
• Include administrative, development and management
roles
• Keep documentation up to date and centrally located
Goal…
Document and educate admins
on the division of duties related to
managing the environment and
who is responsible for each
system.
Enable other users to easily
determine who to go to for
specific tasks/questions/issues.
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
GoalsGoal…
DATA OWNERSHIP
Establish data owners for each site collection, subsite or collection of subsites
• Typically business users; can be different from site
owners
• Define data owner responsibilities
• Understand sensitivity & regulatory compliance
requirements for the data in areas they own
• Approve/Deny requests for access to data
• Responsible for permission remediation and
certification for their area
• Define & document data owners – ensure they accept
• In all cases, assign a primary & secondary data
owners
Define on a site basis the users
responsible for the compliance
and security requirements of all
types of data.
Facilitate implementation of other
security policies.
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Goals
PERMISSION MANAGEMENT
Establish a standard permission management policy
• Determine who manages permissions on sites:
• Delegate to business OR centralize in IT
• IT must support data owners & site owners
• Site Collection Admins are different from Site Owners
• Consider if Full Control is right, even to site owners
• Customize permission levels
• Assist and provide training where necessary
• Create training videos
• Provide one-on-one where necessary
Standardize the method by which
permissions are assigned &
managed.
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Goals
PERMISSION REMEDIATION PROCESS
Establish standard process requiring data owners to review
and certify permissions are correct
• Establish regular cadence
• Perform every 6 months or 12 months
• More frequently in areas with sensitive data
• Automate reminders & reports
• Scripts, reports or third party tools
• Provide data owners with reports of current permissions
• Allow data owners to remediate and IT provides support
• Require data owners to provide written certification
On a periodic basis validate that
content is correctly shared and
users are only permitted to access
content necessary to perform their
role.
Facilitate data owners resolving
permission issues.
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Goals
PRIVILEGED ACCESS REVIEWS
Establish standard process for access reviews of privileged accounts
• Include IT administrators, Site Collection Admins,
Vendors/Contractors with privileged access
• Establish regular cadence - Recommend Quarterly
• Document and Include Executive Oversight
• Automate where possible (notifications, data
gathering, reports)
• Scripts, BI reports or third party tools
On a periodic basis ensure that
privileged users are permitted to
only access necessary systems.
Facilitate resolution of permission
issues.
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Goals
REQUESTING ACCESS TO INFORMATION
Establish standard process for end users to request access
to information
• Create a standard form with fields that must be
provided for all site requests:
• name, purpose, if access must expire?
• Include approvals by IT, data owners and/or
requestor's manager
• Make use of workflows for notifications & approval
requests
• Log all access - don't rely on SharePoint logs
Provide approval process for all
access requests.
Maintain historical record.
Avoid oversharing data internally..
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Goals
REQUESTING & CREATING SITES
Establish standard process for end users to request new sites
• Create a standard form with fields that must be
provided for all site requests
• name, purpose, primary & secondary data owners, site
owners (if different), will contain sensitive data?
• Consider centralize site creation process with IT
• Include approval process by IT, data owners, and/or
requestor's manager
• Make use of workflows for notifications & approval
requests
• Log all requests - don't rely on SharePoint logs
Prevent site sprawl.
Help users to use existing sites
instead of always creating new
ones.
Maintain historical record
Provide oversight and centralized
review.
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Goals
SITE LIFECYCLE & DECOMMISSIONING
Establish standard processes for site review, archiving & deletion
• Consider:
• Scenario 1: site is requested - site is created - site
never gets used
• Scenario 2: site is requested & created - site is used -
all employees having access leave company - site is
forgotten
• Scenario 3: over time number of sites grows to point of
making other governance processes unmanageable
• Process can occur at site collection or subsite level
• Make use of built in attributes: ContentLastModified,
SecurityLastModified
Prevent site sprawl.
Prevent forgotten or unused
sites.
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Goals
TAXONOMY & CLASSIFICATION
Establish standard global & departmental taxonomy with
sensitivity metadata
• Keep global taxonomy small - applies to all content
• Include metadata fields for sensitivity classification -
ex. Sensitive, Restricted, Internal Only, Public
• Make use of managed metadata for centralized
management
• Provide end user training (videos, online)
• End user responsibilities, how to classify, what
they mean, distribution & info. handling policies
Enable and/or enforce end users
to easily identify sensitive
documents & items.
Centrally control classification
schema.
Confidential
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Goals
SECURITY & GOVERNANCE TRAINING
Establish standard periodic training for employees (annual) & new hires which
educates on security & information governance policies, practices, responsibilities
• Use videos, online training, other low impact tools
• Make it very fast for employees to find out how to do
something
• Ex. declare a record, request a site request
access, manage permissions
Ensure that all employees
understand their responsibilities
and are contributing proactively to
the organization's security
strategy.
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Goals
ACTIVITY AUDITING & MONITORING
Make use of Activity Monitoring capabilities for data breach/leak investigation &
automatic alerts
• Build up administrative expertise on using built in
Activity Monitoring capabilities (Office 365)
• Implement automatic alerts for specific key activities:
• Administrative modification of external sharing,
granting access to sites containing sensitive
content, etc.
• Make use of scripts or third party tools
Build expertise to investigate data
breaches.
Ensure all administrators are
aware of key administration
setting changes.
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
Question
& Answer
DEMONSTRATION
ACTIVITY MONITORING IN OFFICE 365
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
CONDUCT A SHAREPOINT SECURITY ASSESSMENT
• In-depth Security Analysis
• Independent Review
• Impartial Observations & Recommendations
• Detailed
• Reproducible
• Actionable
• Realistic
• Prioritized
• Documented Analysis & Report
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
FINAL THOUGHTS & RECOMMENDATIONS
• Overcoming threats and vulnerabilities requires both
good security & strong information governance
• Understand the security capabilities available
• Know what data is sensitive & where it lives
• Know who is responsible for sensitive data
• Establish information governance policies/procedures
• Conduct regular independent security assessments
© 2016 Protiviti Inc.
CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party.
THANK YOU!
ANTONIO MAIO
PROTIVITI SENIOR MANAGER
MICROSOFT SHAREPOINT MVP
Email: antonio.maio@protiviti.com
Twitter: @AntonioMaio2
Blog: www.TrustSharePoint.com
Overcoming Security Threats and Vulnerabilities in SharePoint

Mais conteúdo relacionado

Mais procurados

SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
Evan Hodges
 
SharePoint In The Cloud: Evaluating Impact, Pros, and Cons - SPLive360
SharePoint In The Cloud: Evaluating Impact, Pros, and Cons - SPLive360SharePoint In The Cloud: Evaluating Impact, Pros, and Cons - SPLive360
SharePoint In The Cloud: Evaluating Impact, Pros, and Cons - SPLive360
Richard Harbridge
 

Mais procurados (20)

Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
 
What’s the News About SharePoint News - SPFestSeattle
What’s the News About SharePoint News - SPFestSeattleWhat’s the News About SharePoint News - SPFestSeattle
What’s the News About SharePoint News - SPFestSeattle
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 
Maximizing Your Office 365 Investments With OneDrive
Maximizing Your Office 365 Investments With OneDriveMaximizing Your Office 365 Investments With OneDrive
Maximizing Your Office 365 Investments With OneDrive
 
SPT 104 Unlock your big data with analytics and BI on Office 365
SPT 104 Unlock your big data with analytics and BI on Office 365SPT 104 Unlock your big data with analytics and BI on Office 365
SPT 104 Unlock your big data with analytics and BI on Office 365
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Office 365 for Business Demystified for the average Technology and Business P...
Office 365 for Business Demystified for the average Technology and Business P...Office 365 for Business Demystified for the average Technology and Business P...
Office 365 for Business Demystified for the average Technology and Business P...
 
It's all about Search
It's all about SearchIt's all about Search
It's all about Search
 
Sp24 design a share point 2013 architecture – the basics
Sp24   design a share point 2013 architecture – the basicsSp24   design a share point 2013 architecture – the basics
Sp24 design a share point 2013 architecture – the basics
 
Spt 101 Loving Onedrive for business as a productivity tool
Spt 101 Loving Onedrive for business as a productivity toolSpt 101 Loving Onedrive for business as a productivity tool
Spt 101 Loving Onedrive for business as a productivity tool
 
SharePoint Migration Series: Success Takes Three Actions
SharePoint Migration Series: Success Takes Three ActionsSharePoint Migration Series: Success Takes Three Actions
SharePoint Migration Series: Success Takes Three Actions
 
SPSHOU - Upgrading and Migrating to SharePoint 2016 like a Pro
SPSHOU - Upgrading and Migrating to SharePoint 2016 like a ProSPSHOU - Upgrading and Migrating to SharePoint 2016 like a Pro
SPSHOU - Upgrading and Migrating to SharePoint 2016 like a Pro
 
Google Analytics for Charities
Google Analytics for CharitiesGoogle Analytics for Charities
Google Analytics for Charities
 
Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013
 
Establishing Content Structure & Information Governance in SharePoint
Establishing Content Structure & Information Governance in SharePointEstablishing Content Structure & Information Governance in SharePoint
Establishing Content Structure & Information Governance in SharePoint
 
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...
 
Share Point online
Share Point onlineShare Point online
Share Point online
 
SharePoint In The Cloud: Evaluating Impact, Pros, and Cons - SPLive360
SharePoint In The Cloud: Evaluating Impact, Pros, and Cons - SPLive360SharePoint In The Cloud: Evaluating Impact, Pros, and Cons - SPLive360
SharePoint In The Cloud: Evaluating Impact, Pros, and Cons - SPLive360
 
Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365
 
Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016
Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016
Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016
 

Semelhante a Overcoming Security Threats and Vulnerabilities in SharePoint

IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration
Sri Chilukuri
 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...
AntonioMaio2
 

Semelhante a Overcoming Security Threats and Vulnerabilities in SharePoint (20)

Best Practices for Security and Governance in SharePoint 2013
Best Practices for Security and Governance in SharePoint 2013  Best Practices for Security and Governance in SharePoint 2013
Best Practices for Security and Governance in SharePoint 2013
 
Enterprise Security: Tableau vs. Power BI
Enterprise Security: Tableau vs. Power BIEnterprise Security: Tableau vs. Power BI
Enterprise Security: Tableau vs. Power BI
 
Information security in office 365 a shared responsibility - antonio maio
Information security in office 365   a shared responsibility - antonio maioInformation security in office 365   a shared responsibility - antonio maio
Information security in office 365 a shared responsibility - antonio maio
 
Delivering the Composable Enterprise
Delivering the Composable EnterpriseDelivering the Composable Enterprise
Delivering the Composable Enterprise
 
Enhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace SolutionsEnhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace Solutions
 
IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration
 
SharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
SharePoint Securely Moblized - webinar with Colligo and Bitzer MobileSharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
SharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
 
Governance sharepointserver-2010
Governance sharepointserver-2010Governance sharepointserver-2010
Governance sharepointserver-2010
 
Why Use Add ins with SharePoint and SharePoint Online? Webinar
Why Use Add ins with SharePoint and SharePoint Online? WebinarWhy Use Add ins with SharePoint and SharePoint Online? Webinar
Why Use Add ins with SharePoint and SharePoint Online? Webinar
 
Whitepaper SharePoint Online vs SharePoint On-premise
Whitepaper SharePoint Online vs SharePoint On-premiseWhitepaper SharePoint Online vs SharePoint On-premise
Whitepaper SharePoint Online vs SharePoint On-premise
 
Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.
 
Company Profile - NPC with TIBCO Spotfire solution
Company Profile - NPC with TIBCO Spotfire solution  Company Profile - NPC with TIBCO Spotfire solution
Company Profile - NPC with TIBCO Spotfire solution
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Managing SharePoint On-Premises vs. Online -- Compare and Contrast
Managing SharePoint On-Premises vs. Online -- Compare and ContrastManaging SharePoint On-Premises vs. Online -- Compare and Contrast
Managing SharePoint On-Premises vs. Online -- Compare and Contrast
 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the Cloud
 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the Cloud
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions Guide
 
Coexist or Integrate? How Add-ins Deliver an Integrated Environment to Manage...
Coexist or Integrate? How Add-ins Deliver an Integrated Environment to Manage...Coexist or Integrate? How Add-ins Deliver an Integrated Environment to Manage...
Coexist or Integrate? How Add-ins Deliver an Integrated Environment to Manage...
 
Age of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide DiscoveryAge of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide Discovery
 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...
 

Mais de AntonioMaio2

A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013
AntonioMaio2
 

Mais de AntonioMaio2 (15)

Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
 
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365
 
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point   an...Developing custom claim providers to enable authorization in share point   an...
Developing custom claim providers to enable authorization in share point an...
 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 published
 
Keeping SharePoint Always On
Keeping SharePoint Always OnKeeping SharePoint Always On
Keeping SharePoint Always On
 
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointHow Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013
 
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
 
Share point security 101 sps-ottawa 2012 - antonio maio
Share point security 101   sps-ottawa 2012 - antonio maioShare point security 101   sps-ottawa 2012 - antonio maio
Share point security 101 sps-ottawa 2012 - antonio maio
 
Webinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint SecurityWebinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint Security
 
SharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioSharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio Maio
 

Último

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 

Último (20)

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 

Overcoming Security Threats and Vulnerabilities in SharePoint

  • 1. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. ANTONIO MAIO PROTIVITI SENIOR MANAGER MICROSOFT SHAREPOINT MVP Email: antonio.maio@protiviti.com Twitter: @AntonioMaio2 Blog: www.TrustSharePoint.com
  • 2. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. 3,300 professionals Over 20 countries in the Americas, Europe, the Middle East and Asia-Pacific 70+ offices Our revenue: More than $743 million in 2015 Protiviti (www.protiviti.com) is a global consulting firm that helps companies solve problems in finance, technology, operations, governance, risk and internal audit, and has served more than 40 percent of FORTUNE 1000® and FORTUNE Global 500® companies. Protiviti serve clients through a network of more than 70 locations in over 20 countries. Protiviti is a wholly owned subsidiary of Robert Half (NYSE: RHI). Founded in 1948, Robert Half is a member of the S&P 500 index. WHO ARE WE
  • 3. AGENDA Where is the Exposure? SharePoint On Premise vs Office 365 Online: Security Strategy and Features On Premise: Security Configuration & Hardening Information Governance Final Thoughts & Recommendations
  • 4. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. WHERE IS THE EXPOSURE? The Disorganized The Lazy The Overcautious The StressedThe Inexperienced The Home Worker The Newcomer The Industrious The Partisan The Spy The CarelessThe Malicious Malware
  • 5. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. WHY SECURE SHAREPOINT? • Represents our intranet, collaboration portal, extranet, public facing web site, line of business, process automation, business analytics… • SharePoint is our Repository for Corporate Data • Sensitive Corporate Data • Many Aspects of our Business Run on SharePoint • Users Rely on it to Accomplish Day to Day Work • Critical Business Infrastructure
  • 6. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. SHAREPOINT ON PREMISE VS OFFICE 365 SharePoint On Premise Hosted within corporate network (data center, Azure, AWS). Office 365 - SharePoint Online SharePoint infrastructure hosted in Microsoft Data Centers. • All data and systems is fully within corporate control • Corporate IT is responsible for: • All servers/infrastructure – security hardening, firewall, network security, anti-malware, intrusion detection, etc • Regular patching & updates • System uptime • TLS (data in motion) & SQL encryption (data at rest) • Corporate IT & Business responsible for Compliance • New Services/Solutions – Corporate Dev team responsible for security design & privacy • User security controls/Administrative security controls • You are responsible for security configuration within sites and information governance policies/procedures • World class physical data center security (included) • Microsoft manages: • Security hardening & network level security • Regular patching & updates • SLA ensuring 99.9% uptime • DR through global network of data centers • Encryption for data at rest and in motion • Complies with data privacy standards: HIPAA, HITECH, CSA Star Registry, EU Model Clauses, ISO27001, SOC1, SOC2 (included) • New Services/Solutions – Privacy by Design • User security controls/Administrative security controls • You are responsible for security configuration within sites and information governance policies/procedures
  • 7. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. OFFICE 365 DEFENSE IN DEPTH STRATEGY Facility and Network Security Automated Operations Control Admin Access to Data Security Development Life Cycle Anti-Malware, Patching, and Config. Management Data Isolation Data Integrity Physical Layer Logical Layer Data Layer Security Features
  • 8. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. • Information Rights Management • Retention Policies • Activity Monitoring • Data Loss Prevention • External Sharing Controls • SharePoint Permissions • Audit Reports • (built in) TLS 1.2 Communication • (built in) Encrypted Data at Rest OFFICE 365 SECURITY FEATURES • Customer Lockbox • Azure AD Multi-Factor Auth. • Azure AD Identity Protection • Bring your Own Key • Office 365 Trust Center
  • 9. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Question & Answer DEMONSTRATION DATA LOSS PREVENTION IN OFFICE 365
  • 10. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Question & AnswerSHAREPOINT ON PREMISE SECURITY CONFIGURATION & SECURITY HARDENING
  • 11. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. SECURITY STARTS WITH DEPLOYMENT • Before deploying, plan and document your service accounts • SQL Server Service Account • Setup Account • Farm Service Account • SharePoint Web Application Pool Account • SharePoint Service Account (Service App Pool Identity) • Search Crawl Account • User Profile Synchronization Account • Cache Accounts (superreader, superuser) • SQL Service Analytics & Excel Services Accounts • Using a Least Privileged Model • Determine which account farm admin use to login to Central Admin • Determine which users will have Shell Access (PowerShell)
  • 12. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. WEB APPLICATION AND SITE COLLECTION Farm & Web Application Configuration • Authentication • Web Application Policies (user & permission policies) • TLS/SSL Communication • Anonymous Access • File Types Permitted • Web Part Security • Anti-Virus Configuration • Thresholds (unique security scopes, list view threshold) • Establish a strategy for patching and security updates Site Collection Configuration • Site Collection Administrators • Site Collection Auditing • Permission Levels • Anonymous Access
  • 13. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. AUTHENTICATION MODELS Important to Understand the Options Available • SharePoint 2010 Options  Classic Mode (Integrated Authentication, NTLM, Kerberos)  Claims Based Authentication  Forms Based Authentication - through Claims Based Auth. • SharePoint 2013 & 2016 Options  Claims Based Authentication - Default  Forms Based Authentication  Classic Mode Authentication Deprecated! (only configurable through PowerShell) • SharePoint Online  Only Claims Based Authentication Available • Other Considerations  Trusted Identity Providers  Multi-Factor Authentication
  • 14. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. AUTHORIZATION • SharePoint Permissions - Hierarchical model • Permissions are inherited from level above • Break inheritance to apply unique permissions • Manual process • Permissive Model • SharePoint’s “Share” Interface allows easy fine grained permissions SharePoint Farm Web Application Site Collection Site Collection Site Site Library List Document Web Application Item Site Document Document Item Demo Members SharePoint Group Edit Demo Owners SharePoint Group Full Control Demo Visitors SharePoint Group Read Finance Team Domain Group Edit Senior Mgmt Domain Group Full Control Research Team Domain Group Full Control Senior Mgmt Domain Group Full Control Research Team Domain Group Full Control Senior Mgmt Domain Group Full Control Antonio.Maio Domain User Full Control
  • 15. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. SHAREPOINT PERMISSIONS • Every time permission inheritance is broken a new security scope is created • Security Scope is made up of principles: • Domain users/groups • SharePoint users/groups • Claims • Be aware of “Limited Access” • Limitations • Security Scopes (50K per list) • Size of Scope (5K principals per scope) Microsoft SharePoint Boundaries and Limits: http://technet.microsoft.com/en-us/library/cc262787.aspx
  • 16. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. SECURITY HARDENING • System Updates • Web Server and Application Server Roles • Services • Ports and Protocols • Database Server Role • Blocking standard ports; Listening on non-standard ports • Permissions on SQL Service Accounts • Service Application Communication • User Profile Synchronization Service • Connection to External Servers • Web.Config
  • 17. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. DATA IN MOTION & DATA AT REST • Protect Data in Motion with TLS/SSL • Even for Intranets • IIS Configuration and SharePoint Central Admin • Protect Data at Rest with SQL TDE Encryption • Separate keys for Test & Prod • Understand who you are protecting system from (DB level access only)
  • 18. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Question & Answer INFORMATION GOVERNANCE
  • 19. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Goals ROLES & RESPONSIBILITIES Establish and document key administrative roles & responsibilities • Document each role related to SharePoint and owners • Each role has a primary and secondary owner • Define/educate each role on responsibilities & access requirements • Include administrative, development and management roles • Keep documentation up to date and centrally located Goal… Document and educate admins on the division of duties related to managing the environment and who is responsible for each system. Enable other users to easily determine who to go to for specific tasks/questions/issues.
  • 20. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. GoalsGoal… DATA OWNERSHIP Establish data owners for each site collection, subsite or collection of subsites • Typically business users; can be different from site owners • Define data owner responsibilities • Understand sensitivity & regulatory compliance requirements for the data in areas they own • Approve/Deny requests for access to data • Responsible for permission remediation and certification for their area • Define & document data owners – ensure they accept • In all cases, assign a primary & secondary data owners Define on a site basis the users responsible for the compliance and security requirements of all types of data. Facilitate implementation of other security policies.
  • 21. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Goals PERMISSION MANAGEMENT Establish a standard permission management policy • Determine who manages permissions on sites: • Delegate to business OR centralize in IT • IT must support data owners & site owners • Site Collection Admins are different from Site Owners • Consider if Full Control is right, even to site owners • Customize permission levels • Assist and provide training where necessary • Create training videos • Provide one-on-one where necessary Standardize the method by which permissions are assigned & managed.
  • 22. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Goals PERMISSION REMEDIATION PROCESS Establish standard process requiring data owners to review and certify permissions are correct • Establish regular cadence • Perform every 6 months or 12 months • More frequently in areas with sensitive data • Automate reminders & reports • Scripts, reports or third party tools • Provide data owners with reports of current permissions • Allow data owners to remediate and IT provides support • Require data owners to provide written certification On a periodic basis validate that content is correctly shared and users are only permitted to access content necessary to perform their role. Facilitate data owners resolving permission issues.
  • 23. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Goals PRIVILEGED ACCESS REVIEWS Establish standard process for access reviews of privileged accounts • Include IT administrators, Site Collection Admins, Vendors/Contractors with privileged access • Establish regular cadence - Recommend Quarterly • Document and Include Executive Oversight • Automate where possible (notifications, data gathering, reports) • Scripts, BI reports or third party tools On a periodic basis ensure that privileged users are permitted to only access necessary systems. Facilitate resolution of permission issues.
  • 24. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Goals REQUESTING ACCESS TO INFORMATION Establish standard process for end users to request access to information • Create a standard form with fields that must be provided for all site requests: • name, purpose, if access must expire? • Include approvals by IT, data owners and/or requestor's manager • Make use of workflows for notifications & approval requests • Log all access - don't rely on SharePoint logs Provide approval process for all access requests. Maintain historical record. Avoid oversharing data internally..
  • 25. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Goals REQUESTING & CREATING SITES Establish standard process for end users to request new sites • Create a standard form with fields that must be provided for all site requests • name, purpose, primary & secondary data owners, site owners (if different), will contain sensitive data? • Consider centralize site creation process with IT • Include approval process by IT, data owners, and/or requestor's manager • Make use of workflows for notifications & approval requests • Log all requests - don't rely on SharePoint logs Prevent site sprawl. Help users to use existing sites instead of always creating new ones. Maintain historical record Provide oversight and centralized review.
  • 26. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Goals SITE LIFECYCLE & DECOMMISSIONING Establish standard processes for site review, archiving & deletion • Consider: • Scenario 1: site is requested - site is created - site never gets used • Scenario 2: site is requested & created - site is used - all employees having access leave company - site is forgotten • Scenario 3: over time number of sites grows to point of making other governance processes unmanageable • Process can occur at site collection or subsite level • Make use of built in attributes: ContentLastModified, SecurityLastModified Prevent site sprawl. Prevent forgotten or unused sites.
  • 27. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Goals TAXONOMY & CLASSIFICATION Establish standard global & departmental taxonomy with sensitivity metadata • Keep global taxonomy small - applies to all content • Include metadata fields for sensitivity classification - ex. Sensitive, Restricted, Internal Only, Public • Make use of managed metadata for centralized management • Provide end user training (videos, online) • End user responsibilities, how to classify, what they mean, distribution & info. handling policies Enable and/or enforce end users to easily identify sensitive documents & items. Centrally control classification schema. Confidential
  • 28. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Goals SECURITY & GOVERNANCE TRAINING Establish standard periodic training for employees (annual) & new hires which educates on security & information governance policies, practices, responsibilities • Use videos, online training, other low impact tools • Make it very fast for employees to find out how to do something • Ex. declare a record, request a site request access, manage permissions Ensure that all employees understand their responsibilities and are contributing proactively to the organization's security strategy.
  • 29. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Goals ACTIVITY AUDITING & MONITORING Make use of Activity Monitoring capabilities for data breach/leak investigation & automatic alerts • Build up administrative expertise on using built in Activity Monitoring capabilities (Office 365) • Implement automatic alerts for specific key activities: • Administrative modification of external sharing, granting access to sites containing sensitive content, etc. • Make use of scripts or third party tools Build expertise to investigate data breaches. Ensure all administrators are aware of key administration setting changes.
  • 30. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. Question & Answer DEMONSTRATION ACTIVITY MONITORING IN OFFICE 365
  • 31. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. CONDUCT A SHAREPOINT SECURITY ASSESSMENT • In-depth Security Analysis • Independent Review • Impartial Observations & Recommendations • Detailed • Reproducible • Actionable • Realistic • Prioritized • Documented Analysis & Report
  • 32. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. FINAL THOUGHTS & RECOMMENDATIONS • Overcoming threats and vulnerabilities requires both good security & strong information governance • Understand the security capabilities available • Know what data is sensitive & where it lives • Know who is responsible for sensitive data • Establish information governance policies/procedures • Conduct regular independent security assessments
  • 33. © 2016 Protiviti Inc. CONFIDENTIAL: An Equal Opportunity Employer M/F/D/V. This document is for your company's internal use only and may not be copied nor distributed to another third party. THANK YOU! ANTONIO MAIO PROTIVITI SENIOR MANAGER MICROSOFT SHAREPOINT MVP Email: antonio.maio@protiviti.com Twitter: @AntonioMaio2 Blog: www.TrustSharePoint.com