Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

10 SharePoint Security Mistakes You Probably Make

Bradley Manning allegedly stole sensitive government cables destined for WikiLeaks from a SharePoint server. Are your information security controls tighter than the Army's were?

Top 20 Top Add-Ons For Microsoft SharePoint
(click image for larger view)
Top 20 Top Add-Ons For Microsoft SharePoint
How important is it to secure and monitor Microsoft SharePoint?

Consider the case of Bradley Manning, the Army intelligence analyst who's accused of leaking 250,000 government cables to WikiLeaks. According to an Army investigator who testified at a hearing to determine if Manning should face a court martial, one of Manning's laptops contained an Excel spreadsheet, containing a tab with multiple Wget scripts--designed to download large numbers of files--that "pointed to a Microsoft SharePoint server" that stored documents for the Guantanamo Bay Naval Base detention facility, reported Wired. The investigator further testified that "he ran the scripts to download the documents, then downloaded the ones that WikiLeaks had published and found they were the same."

In other words, the release of sensitive government cables may have been partially prevented, had the military better secured and monitored its SharePoint servers.

Similarly, any business that relies on SharePoint to store confidential--or even sensitive--information should know who's accessing that data, and why. What's the best way to make this happen? Start by avoiding these 10 stupid, but common, SharePoint security mistakes.

[ Check out other tips for optimizing your SharePoint performance. See 5 SharePoint Pitfalls To Avoid. ]

1. Poor security training. According to a survey of 100 SharePoint users conducted by security vendor Cryptzone at a November 2011 SharePoint Saturday conference, 92% agreed that removing information from SharePoint made it less secure, but 30% were willing to take that risk "if it helps me get the job done." Obviously, there's a disconnect at many businesses between security and productivity. Worryingly, 34% of respondents also said they'd never even considered the security implications surrounding SharePoint.

2. Collaboration barriers. Likewise, the survey found that 45% of users regularly copied sensitive or confidential data from SharePoint to their hard drive, to a USB drive, or to email it to someone else. In the majority of cases (55%), this copying was to facilitate information-sharing with someone who lacked access to the SharePoint documents. This highlights the need for businesses to put clear policies in place regarding how information can be shared, and then to monitor access and enforce policy compliance.

3. Unclear security oversight. Who's responsible for SharePoint security? At 69% of businesses, the Cryptzone survey found that access management responsibility fell to in-house IT administrators. But 22% of respondents--which included SharePoint users, administrators, developers, and architects--didn't know who was responsible, which suggests that there's a lack of oversight and thus access accountability at their businesses.

4. Overly broad access rights. When it comes to access, less is typically more. "One of the most common issues we see with SharePoint is end users having access privileges that are far too broad," said Enterprise Management Associates (EMA) senior analyst Torsten Volk, via email. "It's a lot of work to properly create user roles and map them to Active Directory," and even more work to keep them updated, revised, and removed after employees depart. According to Scott Crawford, managing research director at EMA, this challenge "has given rise to vendors such as Aveksa, Varonis, and others" to analyze usage patterns and determine likely data custodians.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
HemantK860
50%
50%
HemantK860,
User Rank: Apprentice
10/29/2013 | 11:19:42 AM
re: 10 SharePoint Security Mistakes You Probably Make
Few Questions to be answered before you start a SharePoint project:

http://sharepoint.asia/few-que...

You are requested to add more here as comments based on what you had to go through in your previous projects .
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
5 Common Errors That Allow Attackers to Go Undetected
Matt Middleton-Leal, General Manager and Chief Security Strategist, Netwrix,  2/12/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20477
PUBLISHED: 2020-02-19
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
CVE-2019-20478
PUBLISHED: 2020-02-19
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
CVE-2011-2054
PUBLISHED: 2020-02-19
A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper in...
CVE-2015-0749
PUBLISHED: 2020-02-19
A vulnerability in Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on the affected software. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker ...
CVE-2015-9543
PUBLISHED: 2020-02-19
An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is rel...