sharepoint security playbook [ebook]

15
SharePoint Security Resource Kit SharePoint Security Playbook 5 Lines of Defense You Need to Secure Your SharePoint Environment

Upload: imperva

Post on 19-May-2015

5.573 views

Category:

Technology


6 download

DESCRIPTION

The SharePoint Security Playbook [eBook] outlines the five lines of defense you need to secure your SharePoint environment from both internal and external threats.

TRANSCRIPT

Page 3: SharePoint Security Playbook [eBook]

SharePoint Security Resource Kit

It’s Time to Think about SharePoint Security

The increasing use of Microsoft SharePoint to store sensitive business data and extend

access and collaboration to partners, customers, and suppliers has outpaced native SharePoint

security capabilities. More and more organizations are storing and accessing sensitive, regulated

information through this platform. To improve business security, organizations must invest in

organizing, managing, and protecting these valuable assets. By implementing the five lines of

defense outlined in this playbook, you will be able to overcome operational challenges and

protect your SharePoint deployments against both internal and external threats.

Page 4: SharePoint Security Playbook [eBook]

SharePoint Security Resource Kit

Ensure access rights remain aligned with business needs.

CHALLENGE #1

SharePoint Security GapWithout an aggregated, centralized system to view rights information, SharePoint permissions for each site collection must first be extracted to an Excel spreadsheet and then combined by hand to analyze. And, that analysis must be done manually within Excel or exported – yet again – to a third-party analytics platform.

“Unstructured data now accounts for more than 90% of the Digital Universe. ”-IDC 2011

Page 5: SharePoint Security Playbook [eBook]

SharePoint Security Resource Kit

Ensure access rights remain aligned with business needs.

The PlayAggregate permissions across the entire SharePoint deployment and automate the review process to keep rights aligned with business needs.

The Advantage- Understand who has access to what data or, conversely, what data any given user or group can access, and how that access was assigned or inherited. - Simplify the process of identifying where excessive access rights have been granted, if there are dormant users, and who owns each item and document.- Help administrators and data owners establish a baseline snapshot of access rights and conduct rights reviews.

CHALLENGE #1

Page 14: SharePoint Security Playbook [eBook]

SharePoint Security Resource Kit

SharePoint Security Checklist

Get ahead of all SharePoint deployments Implement a SharePoint governance policy Put security requirements in place when SharePoint instances go live Look beyond native SharePoint security features Specify what kind of information can be put on SharePoint

Concentrate on business-critical assets first Start with regulated, employee, or proprietary data, and intellectual property Streamline access to a “business need-to-know” level Identify and clean up dormant users and stale data Alert on unauthorized access Establish a regular review cycle for dormant users, stale data, and excessive rights

Work with data owners to manage user access Locate data owners Create permission reports so data owners have visibility into who can access their data Validate with owners that access to data is legitimate Create usage reports so owners can see who is accessing their data

Jump start your Microsoft SharePoint security efforts with this quick reference guide

Protect Web sites from external attack Identify SharePoint Web applications that work with sensitive data Deploy a Web application firewall to monitor and protect sensitive SharePoint Web sites, portals, and intranets Respond to suspicious activity such as external users accessing admin pages

Enable auditing for compliance and forensics Who owns this data? Who accessed this data? When and what did they access? Have there been repeated failed login attempts?

Page 15: SharePoint Security Playbook [eBook]

SharePoint Security Resource Kit

Imperva Headquarters3400 Bridge Parkway, Suite 200

Redwood Shores, CA 94065Tel: +1-650-345-9000Fax: +1-650-345-9004

Toll Free (U.S. only): +1-866-926-4678www.imperva.com

© Copyright 2012 Imperva, Inc. All rights reserved. Imperva, the Imperva logo and SecureSphere are trademarks of Imperva, Inc. All other brand or product names are trademarks or registered trademarks of their respective holders.

About Imperva

Imperva data security solutions provide visibility and control of high-value business data

across critical systems within the data center. Imperva SecureSphere includes database, file,

and Web application security solutions that prioritize and mitigate risks to business data,

protect against hackers and malicious insiders, and streamline regulatory compliance.

Find Us on the Web | Contact Us Direct | Read our Blog | Facebook | Twitter | SlideShare | YouTube