15.04.2014 Views

CISO's Guide to Securing SharePoint - owasp

CISO's Guide to Securing SharePoint - owasp

CISO's Guide to Securing SharePoint - owasp

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A Checklist <strong>to</strong> <strong>Securing</strong><br />

<strong>SharePoint</strong><br />

Manage User Rights<br />

• Manage permissions on a need-<strong>to</strong>-know basis.<br />

• Identify and delete dormant users<br />

• Prevent the use of direct permissions <strong>to</strong> users<br />

• Avoid managing permissions at the item level<br />

• Use claims authentication for external users for better control<br />

• Involve data owners in the review process.<br />

Protect Web sites<br />

• Protect your <strong>SharePoint</strong> applications from web attacks<br />

• Log all failed login attempts.<br />

• Identify suspicious activity<br />

• Prevent access <strong>to</strong> admin pages by external users

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!