16.01.2013 Views

Microsoft Sharepoint Products and Technologies Resource Kit eBook

Microsoft Sharepoint Products and Technologies Resource Kit eBook

Microsoft Sharepoint Products and Technologies Resource Kit eBook

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 24<br />

Information Security<br />

Policies for SharePoint<br />

<strong>Products</strong> <strong>and</strong><br />

<strong>Technologies</strong><br />

In this chapter:<br />

Password Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 662<br />

Personal Use of Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664<br />

Information Storage Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665<br />

Administrative Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666<br />

Logging Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666<br />

Authorized Web Parts <strong>and</strong> Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . 667<br />

Change Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667<br />

Information Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668<br />

Data Classification Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669<br />

Extranet Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670<br />

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670<br />

In today’s world, you cannot really secure a network without having information<br />

security policies in place. Such policies are really business rules—rules that define<br />

acceptable <strong>and</strong> sometimes required behavior regarding your company’s information.<br />

Information security policies continue to become more complex because the technologies<br />

that host an organization’s mission-critical information are also becoming<br />

more complex every year, if not every month. From cell phones to laptops, from<br />

PDAs to servers, the access vectors <strong>and</strong> potential security holes are increasing as the<br />

technology complexity increases. Information security policies are one method of<br />

661

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!