16.01.2013 Views

Microsoft Sharepoint Products and Technologies Resource Kit eBook

Microsoft Sharepoint Products and Technologies Resource Kit eBook

Microsoft Sharepoint Products and Technologies Resource Kit eBook

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

662 Part VII: Information Management in SharePoint <strong>Products</strong> <strong>and</strong> <strong>Technologies</strong><br />

plugging many security holes by prescribing acceptable behavior as information is<br />

developed <strong>and</strong> stored.<br />

The more an organization follows information security policies, the more<br />

dependent an organization becomes on these rules in a host of situations, such as<br />

guiding a manager on acceptable behavior about how information is accessed,<br />

informing a legal team as to whether a manager has performed due diligence, or acting<br />

as reference documents for internal security audits.<br />

Some will say that the problem with information security policies is that the<br />

rules are only as effective as the people who obey them. But the presence of information<br />

security policies in an organization is fast becoming a legal assumption:<br />

those companies that operate without information security policies (hereafter<br />

referred to simply as policies) might be subject to the charge that reasonable care for<br />

an organization’s information was not executed. Regardless of an organization’s size,<br />

purpose, or location, effective information security is vital, so we are covering it in<br />

this resource kit.<br />

The purpose of this chapter is to outline those types of policies that should be<br />

considered when implementing either <strong>Microsoft</strong> Windows SharePoint Services or<br />

<strong>Microsoft</strong> Office SharePoint Portal Server 2003. Our purpose is not to write the policies<br />

for you or even to give you a sample set of policies from which to work, but rather<br />

to highlight the types of policies that will be affected when implementing SharePoint<br />

<strong>Products</strong> <strong>and</strong> <strong>Technologies</strong>.<br />

Password Policies<br />

Because SharePoint <strong>Products</strong> <strong>and</strong> <strong>Technologies</strong> require domain services for authentication,<br />

it is wise to have password policies in place for your network. In all likelihood,<br />

if you have any policies in place in your organization, chances are good that<br />

you already have policies that address the issues listed in this section. However, the<br />

implementation of SharePoint <strong>Products</strong> <strong>and</strong> <strong>Technologies</strong> is an appropriate time to<br />

review those policies because most of the information held in SharePoint <strong>Products</strong><br />

<strong>and</strong> <strong>Technologies</strong> can be compromised by obtaining a SharePoint-pervasive username<br />

<strong>and</strong> password combination.<br />

Like most policy domain areas, there are sub-areas that should be addressed as<br />

the policies are written. Password policies are no exception. The following are some<br />

of the issues to be considered when developing your password policies:<br />

■ Minimum password length<br />

■ Password complexity <strong>and</strong> strength<br />

■ Prohibition of reusing old passwords<br />

■ Prohibition of written storage of passwords<br />

■ Prohibition against printing or displaying passwords

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!