16.01.2013 Views

Microsoft Sharepoint Products and Technologies Resource Kit eBook

Microsoft Sharepoint Products and Technologies Resource Kit eBook

Microsoft Sharepoint Products and Technologies Resource Kit eBook

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 24: Information Security Policies for SharePoint <strong>Products</strong> <strong>and</strong> <strong>Technologies</strong> 663<br />

■ Periodic forced change in passwords<br />

■ Method to manage expired passwords<br />

■ Authorized means to transmit new passwords to remote users<br />

■ Limits on consecutive attempts to enter a password<br />

■ Acceptance or prohibition of single sign-on services<br />

■ Prohibition of passwords sent through e-mail<br />

■ Requirement for encrypted storage of passwords<br />

■ Reliance on domain services for authentication<br />

■ Requirement for non-anonymous authentication before access to information<br />

is allowed<br />

■ Use of duress passwords (Duress passwords trigger scripts during a duress<br />

situation—that is, if a gun is pointed at your head <strong>and</strong> you are asked to log on to<br />

the server, a duress password would log you on, but because of the password<br />

entered, a script would be triggered to delete all predetermined sensitive data.)<br />

■ Requirement to change all administrative passwords if any have been compromised<br />

■ Password sharing prohibition<br />

■ User responsibility for all actions taken with his username <strong>and</strong> password<br />

combination<br />

■ Security notice in logon system banner<br />

■ Prohibition against leaving systems without logging off or locking the system<br />

■ Use of biometric devices required for logon to portal<br />

■ Use of smartcard devices required for logon to portal system<br />

Note Throughout this chapter, we will introduce issues that should be considered<br />

when writing your policies. Each issue introduced might or might not<br />

apply to your environment. For example, some organizations might have a<br />

strong password complexity policy while another environment might not due<br />

to culture, industry, or other factors. We are not recommending that each<br />

issue be implemented as presented here, only that each issue should be<br />

considered as the policies are written.<br />

Most of these issues relating to password policies should be covered in your network<br />

policy, but one that directly affects SharePoint <strong>Products</strong> <strong>and</strong> <strong>Technologies</strong> is the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!