Weitere ähnliche Inhalte
Ähnlich wie 4 Security Guidelines for SharePoint Governance (20)
Kürzlich hochgeladen (20)
4 Security Guidelines for SharePoint Governance
- 1. © 2013 Imperva, Inc. All rights reserved.
SharePoint Governance:
4 Security Guidelines
1
Carrie McDaniel, File Security Team
- 2. © 2013 Imperva, Inc. All rights reserved.
Agenda
2
§ Introduction to SharePoint governance
§ Common business drivers
§ 4 guidelines for SharePoint governance and security
§ SecureSphere for SharePoint
§ Q&A
- 3. © 2013 Imperva, Inc. All rights reserved.
Carrie McDaniel – File Security Team
3
§ Product Marketing Manager for File
Security; focus on SharePoint security
§ Previously held product marketing
position at Moody’s Analytics in San
Francisco
§ Past experience in finance and tech
industries at Wells Fargo and NetApp
§ Holds degrees in Marketing and French
from Santa Clara University
- 4. © 2013 Imperva, Inc. All rights reserved.
Efficient & Effective Use of Business Data
4
BUILD
Build
sites
Build
apps
Publish
apps
MANAGE
Manage
costs
Manage
risk
Manage
6me
DISCOVER
Connect
across
the
organiza6on
Draw
insights
from
reports
Customizable
search
ORGANIZE
Keep
projects
on
track
Connect
with
your
team
Store
and
sync
documents
SHARE
Share
ideas
with
social
features
Share
content
internally
and
externally
microsoft.com
- 5. © 2013 Imperva, Inc. All rights reserved.
Challenges
5
BUILD
Build
sites
Build
apps
Publish
apps
MANAGE
Manage
costs
Manage
risk
Manage
6me
DISCOVER
Connect
across
the
organiza6on
Draw
insights
from
reports
Customizable
search
ORGANIZE
Keep
projects
on
track
Connect
with
your
team
Store
and
sync
documents
SHARE
Share
ideas
with
social
features
Share
content
internally
and
externally
• Migration
• Customization
• Security
• Rollout
• Adoption
- 6. © 2013 Imperva, Inc. All rights reserved.
Microsoft’s View of SharePoint Governance
6
§ Streamlining the deployment
of products and technologies
§ Helping protect your
enterprise from security
threats or noncompliance
liability
§ Helping ensure the best
return on your investment in
technologies
Governance is the set of
policies, roles, responsibilities,
and processes that guide, direct,
and control how an
organization's business divisions
and IT teams cooperate to
achieve business goals.
- 7. © 2013 Imperva, Inc. All rights reserved.
Governance From The Start, Or…
7
- 8. © 2013 Imperva, Inc. All rights reserved.
Business Drivers for Effective SharePoint
Governance
8
ADOPTION
COMPLIANCE
RISK
41%
72%
82%
- 9. © 2013 Imperva, Inc. All rights reserved.
4 Steps to Streamline SharePoint
Security Governance Efforts
9
- 10. © 2013 Imperva, Inc. All rights reserved.
Step 1:
Identify and Secure Critical Business Assets
10
§ Address valuable data targets
Financial Information
Personal Health Information (PHI)
Legal Documents
Intellectual Property
Personally Identifiable Information (PII)
- 11. © 2013 Imperva, Inc. All rights reserved.
Step 1:
Identify and Secure Critical Business Assets
11
§ Identify valuable data targets
You need to identify the data
assets that generate value for the
business that are high-risk targets
for cybercriminals, or that are
subject to regulatory compliance,
and then focus your efforts there.
Forrester Research, Inc.
- 12. © 2013 Imperva, Inc. All rights reserved.
Step 1:
Identify and Secure Critical Business Assets
12
§ Address valuable data targets
§ Secure business critical assets with automation
Financial Information
Personal Health Information (PHI)
Legal Documents
Intellectual Property
Personally Identifiable Information (PII)
- 13. © 2013 Imperva, Inc. All rights reserved.
Step 2:
Establish a User Rights Management Framework
13
§ Sensitive content accessible to everyone
§ Access rights granted but not used
§ Data where individual users have rights,
not groups
§ Dormant user accounts and stale files
Common Access Rights Risks
- 14. © 2013 Imperva, Inc. All rights reserved.
Step 2:
Establish a User Rights Management Framework
14
§ Sensitive content accessible to everyone
§ Access rights granted but not used
§ Data where individual users have rights,
not groups
§ Dormant user accounts and stale files
Common Access Rights Risks
The top four internal and
external audit findings relate to
access management, with
excessive access rights being
the top audit finding.
Deloitte
- 15. © 2013 Imperva, Inc. All rights reserved.
Step 2:
Establish a User Rights Management Framework
15
§ Streamline access processes
§ Formalize the approval cycle
§ Report on effective permissions, usage, and permissions
changes
§ Send permissions and usage reports on a scheduled
basis for review
§ Identify data owners
§ Track approval tasks
Benefits of Automating User Rights Management
- 16. © 2013 Imperva, Inc. All rights reserved.
Step 2:
Establish a User Rights Management Framework
16
Understanding How Access is Granted
§ Gain insight into how access was granted
§ Align access with business need-to-know
§ Minimize business interruptions
- 17. © 2013 Imperva, Inc. All rights reserved.
Step 2:
Establish a User Rights Management Framework
17
Unauthorized Access Scenarios
A high volume of activity within a short period of
time
Operations outside of normal business hours or
maintenance windows
Activity from suspicious or external IPs
Access of sensitive data from different departments
or by administrators
Creation of new sites or administrative accounts
- 18. © 2013 Imperva, Inc. All rights reserved.
Step 3:
Defend Applications from Web Attacks and Code Exploits
18
§ Test SharePoint applications
§ Scan for vulnerabilities
§ Perform virtual patching
- 19. © 2013 Imperva, Inc. All rights reserved.
Step 3:
Defend Applications from Web Attacks and Code Exploits
19
§ Test SharePoint applications
§ Scan for vulnerabilities
§ Perform virtual patching
Web Application Firewalls
genuinely raise the bar on
application security…they
‘virtually’ patch the application
faster than code fixes can be
implemented.
Adrian Lane, CTO, Securosis
- 20. © 2013 Imperva, Inc. All rights reserved.
Step 4:
Trust, But Verify, User Behavior
20
§ Establish a complete audit trail
§ Leverage sophisticated analytics and reporting capabilities
Address compliance requirements
Monitor activity in real-time
Store data in a secured, centralized repository
Enrich native audit information
- 21. © 2013 Imperva, Inc. All rights reserved.
Step 4:
Trust, But Verify, User Behavior
21
§ Establish a complete audit trail
§ Leverage sophisticated analytics and reporting capabilities
Address compliance requirements
Monitor activity in real-time
Store data in a secured, centralized repository
Enrich native audit information
- 23. © 2013 Imperva, Inc. All rights reserved.
Where Native SharePoint Security and
Controls Fall Short
23
Defending against Web-based attacks
Maintaining a comprehensive audit trail
Real-time responses to unwanted activity
Managing permissions and rights
Performing rights reviews
Monitoring MS SQL database activity
- 24. © 2013 Imperva, Inc. All rights reserved.
Imperva Data Security
24
External
Customers
Staff, Partners
Hackers
Internal
Employees
Malicious Insiders
Compromised Insiders
Data Center
Systems and Admins
Tech. Attack
Protection
Logic Attack
Protection
Fraud
Prevention
Usage
Audit
User Rights
Management
Access
Control
- 25. © 2013 Imperva, Inc. All rights reserved.
Security for SharePoint’s File, Web and
Database Resources
25
Web Application Firewall
File Activity Monitoring
Database Firewall
§ Protection against Web-based attacks
§ Tuned for Microsoft SharePoint traffic
§ Fraud prevention and reputation controls available
§ Protect against changes to SQL server that would
render it unsupportable by Microsoft
§ Enforce separation of duties
§ Prevent unauthorized access and fraudulent activity
§ Monitor and audit file activity
§ Comprehensive user rights management
§ Enforce file access control policies
SecureSphereforSharePoint
- 26. © 2013 Imperva, Inc. All rights reserved.
Audit
Enterprise Users
The Internet
SQL
Injection
XSS
IIS Web
Servers
Application
Servers
MS SQL
Databases
Web-Application
Firewall
Activity Monitoring &
User Rights Management
Excessive
Rights
Administrators
DB Activity Monitoring
& Access Control
Unauthorized
Changes
Audit
Unauthorized
Access
Layers of SharePoint Protection
26
- 28. © 2013 Imperva, Inc. All rights reserved.
Additional Resources
28
DOWNLOAD SHAREPOINT
GOVERNANCE & SECURITY
WHITE PAPER
VIEW SHAREPOINT SECURITY
CUSTOMER STORY