6 SharePoint Security Challenges

  /     /     /  
Publicated : 22/11/2024   Category : security


6 SharePoint Security Challenges


Even Microsoft recommends locking down its popular and widely used collaboration, file sharing, and online publishing platform.



(click image for larger view)
Top 20 Top Add-Ons For Microsoft SharePoint
How many businesses consider security when implementing Microsoft SharePoint?
The question is pertinent because the collaboration, file-sharing, and website-building platform is
widely used
. According to 2009 sales figures, SharePoint already had more than 100 million licensed users and generated $1.3 billion in revenues per year. While Microsoft has yet to update those figures, earlier this year it claimed to be
adding 20,000 new SharePoint users
per day.
Those are a lot of SharePoint installations to secure. Heres where to start:
1. Discover SharePoint.
As with any popular product--especially one that involves collaboration--individual business departments may implement SharePoint without going through IT channels. SharePoint is very easy to set up and use, so a lot of organizations find very organic growth of SharePoint inside their organization, said Raphael Reich, director of product marketing at security firm Imperva. Uncontrolled growth increases the risk that not every SharePoint installation has been properly secured, or kept updated via the businesss
patch management program
.
[ Considering social software? Read
Forrester Names 4 Leading Enterprise Social Platforms
]
2. Identify Exposure.
As bespeaks SharePoints range of capabilities--from collaboration to website and extranet creation--the SharePoint application platform ships with well-known ports, protocols, and services active by default. No wonder that Microsoft
recommends hardening
out-of-the-box SharePoint implementations to reduce the potential for attack.
3. Secure Databases.
Start the security exercise by locking down the databases that power SharePoint. When securing data in SharePoint, another facet is that ... youre dealing with files. But theyre really stored in a Microsoft SQL database, and there are no inherent protections for that database, said Reich. Likewise, such databases dont feature
audit trails
, which are a must when storing regulated data.
4. Spot Web Applications.
Hackers
favorite online attack vector
is the Web application. SharePoint, meanwhile, is used by many businesses to build websites and custom Web applications. Ergo, SharePoint websites and extranet portals, especially, are at risk of online attack and must be secured appropriately. SharePoint, as a Web-facing application, would be subject to SQL injection, cross-site scripting, or any potential attack against a website, said Reich. Consider
Web application firewalls
and virtual patching.
5. Trace Access.
Controlling access to files is hard enough. How do you handle access to unstructured data? From a security standpoint, SharePoint is in some ways very similar to Microsoft file servers, said Reich. One of the challenges with securing files is just the ACL--access control list--for files is kind of unwieldy, said Reich. Theres a lot of permissions chaos, right at the level of these files. Businesses typically attempt to marry Active Directory groups with file-level access permissions, but these need to be managed, as they may easily allow employees to access too much--or even too little--sensitive data.
6. Block The Bugs.
Do hackers favor SharePoint over, say, WordPress or Lotus Notes? In fact, a better question is: If someone wanted to break into SharePoint and steal sensitive information, how would they go about it? I went into a couple of hacker forums recently to see what they think about SharePoint, and ultimately the question is, if a website is built on SharePoint, they need to know a couple of vulnerabilities about SharePoint, said Rob Rachwald, director of security strategy at Imperva, in an interview.
In other words, where SharePoint is concerned, dont forget to test, harden, manage, audit, and regularly update it. Because even for an unstructured-data platform with collaboration capabilities, security rules still apply.
In Becoming A Security Detective, this all-day virtual event from InformationWeek and Dark Reading, experts will offer detailed insight in how to collect security intelligence in the enterprise, and how to analyze and study it in order to efficiently identify new threats as well as low-and-slow attacks such as advanced persistent threats. It happens Oct. 20.
Sign up now
. (Free with registration.)

Last News

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
6 SharePoint Security Challenges