MS SharePoint 2013 Security Technical Implementation Guide

Developed by Microsoft in coordination with DISA for use in the DoD. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]

Details

Version / Release: V1R8

Published: 2019-09-30

Updated At: 2019-11-11 10:45:59

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-74349r1_rule SP13-00-000005 CCI-000057 MEDIUM SharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired. A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporary nature of the absence. Rather than relying on the user t
    SV-74365r1_rule SP13-00-000010 CCI-000366 MEDIUM SharePoint must maintain and support the use of security attributes with stored information. Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These attributes are typically associated with internal data structures (e.g., r
    SV-74367r2_rule SP13-00-000015 CCI-000068 HIGH SharePoint must utilize approved cryptography to protect the confidentiality of remote access sessions. Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadb
    SV-74369r2_rule SP13-00-000020 CCI-001453 HIGH SharePoint must use cryptography to protect the integrity of the remote access session. Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadb
    SV-74371r1_rule SP13-00-000025 CCI-001454 MEDIUM SharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited. Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadb
    SV-74373r1_rule SP13-00-000030 CCI-001414 HIGH SharePoint must enforce approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy. Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to who is allowed to access the information) and without explicit regard to subsequent accesses to that info
    SV-74375r2_rule SP13-00-000035 CCI-000366 MEDIUM SharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied. Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to who is allowed to access the information) and without explicit regard to subsequent accesses to that info
    SV-74377r2_rule SP13-00-000040 CCI-001374 MEDIUM SharePoint must provide the ability to prohibit the transfer of unsanctioned information in accordance with security policy. The application enforces approved authorizations for controlling the flow of information within the system and between interconnected systems in accordance with applicable policy. Information flow control regulates where information is allowed to travel
    SV-74379r2_rule SP13-00-000045 CCI-000048 MEDIUM SharePoint must display an approved system use notification message or banner before granting access to the system. Applications are required to display an approved system use notification message or banner before granting access to the system providing privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulat
    SV-74383r1_rule SP13-00-000055 CCI-000171 MEDIUM SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system. Audit records can be generated from various components within the information system, such as network interfaces, hard disks, modems, etc. From an application perspective, certain specific application functionalities may be audited as well. The list of a
    SV-74385r1_rule SP13-00-000060 CCI-000366 MEDIUM SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds. It is critical when a system is at risk of failing to process audit logs as required; actions are automatically taken to mitigate the failure or risk of failure. One method used to thwart the auditing system is for an attacker to attempt to overwhelm the
    SV-74387r1_rule SP13-00-000065 CCI-001695 HIGH SharePoint must prevent the execution of prohibited mobile code. Decisions regarding the utilization of mobile code within organizational information systems need to include evaluations that help determine the potential for the code to cause damage to the system if used maliciously. Mobile code technologies include, f
    SV-74391r1_rule SP13-00-000075 CCI-000774 MEDIUM SharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts. An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Techniques used to address this include protocols using nonces (e.g., numbers gener
    SV-74393r1_rule SP13-00-000080 CCI-000804 MEDIUM SharePoint must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users). Non-organizational users include all information system users other than organizational users, which include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors, guest researchers, indiv
    SV-74395r4_rule SP13-00-000085 CCI-000803 HIGH SharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the Windows Server OS, and versions of SharePoint will have different suites available.
    SV-74397r4_rule SP13-00-000090 CCI-002450 HIGH SharePoint must employ FIPS-validated cryptography to protect unclassified information. Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the Windows Server OS, and versions of SharePoint will have different suites available.
    SV-74399r4_rule SP13-00-000095 CCI-002450 HIGH SharePoint must employ NSA-approved cryptography to protect classified information. Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the Windows Server OS, and versions of SharePoint will have different suites available.
    SV-74401r4_rule SP13-00-000100 CCI-002450 HIGH SharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals. Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the Windows Server OS, and versions of SharePoint will have different suites available.
    SV-74403r2_rule SP13-00-000105 CCI-001158 MEDIUM SharePoint must validate the integrity of security attributes exchanged between systems. When data is exchanged between information systems, the security attributes associated with said data need to be maintained. Security attributes are an abstraction representing the basic properties or characteristics of an entity with respect to safeguar
    SV-74405r2_rule SP13-00-000110 CCI-001184 HIGH SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication. This control focuses on communications protection at the session, versus packet level. At the application layer, session IDs are tokens generated by web applications to uniquely identify an application user's session. Web applications utilize session tok
    SV-74407r1_rule SP13-00-000115 CCI-001185 HIGH SharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded. This requirement focuses on communications protection at the application session, versus network packet level. Session IDs are tokens generated by web applications to uniquely identify an application user's session. Applications will make application de
    SV-74409r1_rule SP13-00-000120 CCI-001132 HIGH SharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec. Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Lay
    SV-74411r1_rule SP13-00-000125 CCI-000366 HIGH SharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions. The information system isolates security functions from nonsecurity functions by means of an isolation boundary (implemented via partitions and domains) controlling access to and protecting the integrity of, the hardware, software, and firmware that perfo
    SV-74413r1_rule SP13-00-000130 CCI-000366 MEDIUM SharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers. The information system isolates security functions from nonsecurity functions by means of an isolation boundary (implemented via partitions and domains) controlling access to, and protecting the integrity of, the hardware, software, and firmware that perf
    SV-74415r1_rule SP13-00-000135 CCI-001131 HIGH SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures. Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Lay
    SV-74417r1_rule SP13-00-000140 CCI-001248 HIGH SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities. Malicious code protection software must be protected to prevent a non-privileged user or malicious piece of software from disabling the protection mechanism. A common tactic of malware is to identify the type of malicious code protection software running
    SV-74419r4_rule SP13-00-000145 CCI-000803 HIGH SharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication. Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the Windows Server OS, and versions of SharePoint will have different suites available.
    SV-74421r2_rule SP13-00-000205 CCI-000366 MEDIUM SharePoint server access to the Online Web Part Gallery must be configured for limited access. Web Part galleries are groupings of Web Parts. There are four Web Part galleries: Closed Web Parts, Site Name Gallery, Server Gallery, and Online Gallery. The Online Gallery is a collection of Microsoft MSNBC Web Parts located on the Internet. Allowing us
    SV-74423r1_rule SP13-00-000150 CCI-000366 MEDIUM The SharePoint Central Administration site must not be accessible from Extranet or Internet connections. SharePoint must prevent the presentation of information system management-related functionality at an interface utilized by general, (i.e., non-privileged), users. The Central Administrator is an application used to manage SharePoint system settings and
    SV-74425r1_rule SP13-00-000155 CCI-000366 MEDIUM For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ. Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to who is allowed to access the information) and without explicit regard to subsequent accesses to the infor
    SV-74427r1_rule SP13-00-000160 CCI-000037 MEDIUM The SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD). Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating system and in applications. It serves to eliminate or reduce the possibility that a single user may carry
    SV-74429r2_rule SP13-00-000165 CCI-000366 MEDIUM The SharePoint farm service account (database access account) must be configured with minimum privileges on the SQL server. Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating system and in applications. It serves to eliminate or reduce the possibility that a single user may carry
    SV-74431r1_rule SP13-00-000170 CCI-000037 MEDIUM The SharePoint setup account must be configured with the minimum privileges in Active Directory. Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating system and in applications. It serves to eliminate or reduce the possibility that a single user may carry
    SV-74433r2_rule SP13-00-000175 CCI-000366 MEDIUM The SharePoint setup account must be configured with the minimum privileges on the SQL server. Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating system and in applications. It serves to eliminate or reduce the possibility that a single user may carry
    SV-74435r2_rule SP13-00-000180 CCI-000366 MEDIUM The SharePoint setup account must be configured with the minimum privileges for the local server. Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating system and in applications. It serves to eliminate or reduce the possibility that a single user may carry
    SV-74437r1_rule SP13-00-000185 CCI-000037 LOW A secondary SharePoint site collection administrator must be defined when creating a new site collection. If a site reaches its maximum size, users will be denied access until an administrator fixes the problem. Having a secondary administrator reduces the risk of having a Denial-of-Service on a site. If the site reaches its maximum size, the secondary admini
    SV-74439r2_rule SP13-00-000190 CCI-000366 MEDIUM When configuring SharePoint Central Administration, the port number selected must comply with DoD Ports and Protocol Management (PPSM) program requirements. During the installation of Microsoft SharePoint, the Central Administration Web site is established on a randomly-assigned TCP port by default. Allowing a randomly-assigned default may result in use of a port which violates DoD policy or conflicts with po
    SV-74441r1_rule SP13-00-000195 CCI-000366 MEDIUM SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured. Configuring anti-virus settings ensures documents will be scanned for viruses upon download from and upload to the SharePoint server. Anti-virus settings are not configured by default, therefore leaving the documents downloaded from or uploaded to SharePo
    SV-74821r1_rule SP13-00-000210 CCI-000037 MEDIUM The SharePoint farm service account (database access account) must be configured with the minimum privileges for the local server. Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating system and in applications. It serves to eliminate or reduce the possibility that a single user may carry