Microsoft SharePoint 2013 Security Technical Implementation Guide

Overview

VersionDateFinding Count (37)Downloads
22024-12-10CAT I (High): 14CAT II (Medium): 22CAT III (Low): 1
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - All

Finding IDSeverityTitleDescription
V-223240
LOWMEDIUMHIGH
SharePoint must utilize approved cryptography to protect the confidentiality of remote access sessions.Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organi...
V-223241
LOWMEDIUMHIGH
SharePoint must use cryptography to protect the integrity of the remote access session.Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organi...
V-223243
LOWMEDIUMHIGH
SharePoint must enforce approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy.Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to ...
V-223249
LOWMEDIUMHIGH
SharePoint must prevent the execution of prohibited mobile code.Decisions regarding the utilization of mobile code within organizational information systems need to include evaluations that help determine the poten...
V-223252
LOWMEDIUMHIGH
SharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the ...
V-223254
LOWMEDIUMHIGH
SharePoint must employ NSA-approved cryptography to protect classified information.Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the ...
V-223255
LOWMEDIUMHIGH
SharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the ...
V-223257
LOWMEDIUMHIGH
SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.This control focuses on communications protection at the session, versus packet level. At the application layer, session IDs are tokens generated by ...
V-223258
LOWMEDIUMHIGH
SharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded.This requirement focuses on communications protection at the application session, versus network packet level. Session IDs are tokens generated by we...
V-223259
LOWMEDIUMHIGH
SharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec.Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order ...
V-223260
LOWMEDIUMHIGH
SharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions.The information system isolates security functions from nonsecurity functions by means of an isolation boundary (implemented via partitions and domain...
V-223262
LOWMEDIUMHIGH
SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order ...
V-223263
LOWMEDIUMHIGH
SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.Malicious code protection software must be protected to prevent a non-privileged user or malicious piece of software from disabling the protection mec...
V-223264
LOWMEDIUMHIGH
SharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the ...
V-223238
LOWMEDIUMHIGH
SharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired.A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information syst...
V-223239
LOWMEDIUMHIGH
SharePoint must maintain and support the use of security attributes with stored information.Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to sa...
V-223242
LOWMEDIUMHIGH
SharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited.Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organi...
V-223244
LOWMEDIUMHIGH
SharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied.Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to ...
V-223245
LOWMEDIUMHIGH
SharePoint must provide the ability to prohibit the transfer of unsanctioned information in accordance with security policy.The application enforces approved authorizations for controlling the flow of information within the system and between interconnected systems in accor...
V-223246
LOWMEDIUMHIGH
SharePoint must display an approved system use notification message or banner before granting access to the system.Applications are required to display an approved system use notification message or banner before granting access to the system providing privacy and ...
V-223247
LOWMEDIUMHIGH
SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system.Audit records can be generated from various components within the information system, such as network interfaces, hard disks, modems, etc. From an app...
V-223248
LOWMEDIUMHIGH
SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds.It is critical when a system is at risk of failing to process audit logs as required; actions are automatically taken to mitigate the failure or risk ...
V-223250
LOWMEDIUMHIGH
SharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous aut...
V-223251
LOWMEDIUMHIGH
SharePoint must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).Non-organizational users include all information system users other than organizational users, which include organizational employees or individuals t...
V-223261
LOWMEDIUMHIGH
SharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.The information system isolates security functions from nonsecurity functions by means of an isolation boundary (implemented via partitions and domain...
V-223265
LOWMEDIUMHIGH
The SharePoint Central Administration site must not be accessible from Extranet or Internet connections.SharePoint must prevent the presentation of information system management-related functionality at an interface utilized by general, (i.e., non-privil...
V-223266
LOWMEDIUMHIGH
For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ.Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to ...
V-223267
LOWMEDIUMHIGH
The SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD).Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating s...
V-223268
LOWMEDIUMHIGH
The SharePoint farm service account (database access account) must be configured with minimum privileges on the SQL server.Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating s...
V-223269
LOWMEDIUMHIGH
The SharePoint setup account must be configured with the minimum privileges in Active Directory.Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating s...
V-223270
LOWMEDIUMHIGH
The SharePoint setup account must be configured with the minimum privileges on the SQL server.Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating s...
V-223273
LOWMEDIUMHIGH
When configuring SharePoint Central Administration, the port number selected must comply with DoD Ports and Protocol Management (PPSM) program requirements.During the installation of Microsoft SharePoint, the Central Administration Web site is established on a randomly-assigned TCP port by default. Allowi...
V-223274
LOWMEDIUMHIGH
SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured.Configuring anti-virus settings ensures documents will be scanned for viruses upon download from and upload to the SharePoint server. Anti-virus setti...
V-223275
LOWMEDIUMHIGH
SharePoint server access to the Online Web Part Gallery must be configured for limited access.Web Part galleries are groupings of Web Parts. There are four Web Part galleries: Closed Web Parts, Site Name Gallery, Server Gallery, and Online Gall...
V-223276
LOWMEDIUMHIGH
The SharePoint farm service account (database access account) must be configured with the minimum privileges for the local server.Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating s...
V-223277
LOWMEDIUMHIGH
SharePoint must validate the integrity of security attributes exchanged between systems.When data is exchanged between information systems, the security attributes associated with said data need to be maintained. Security attributes are ...
V-223272
LOWMEDIUMHIGH
A secondary SharePoint site collection administrator must be defined when creating a new site collection.If a site reaches its maximum size, users will be denied access until an administrator fixes the problem. Having a secondary administrator reduces the...