SlideShare una empresa de Scribd logo
1 de 29
Descargar para leer sin conexión
Antonio Maio
Protiviti, Senior SharePoint Architect & Senior Manager
Microsoft SharePoint Server MVP
Best Practices for Security and
Governance in SharePoint 2013
Email: Antonio.maio@protiviti.com
Blog: www.trustsharepoint.com
Slide share: http://www.slideshare.net/AntonioMaio2
Twitter: @AntonioMaio2
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
About Protiviti
INDIA (3)
Protiviti (www.protiviti.com) is a global consulting firm that helps companies solve problems in finance,
technology, operations, governance, risk and internal audit. Through our network of more than 70 offices in
over 20 countries, we have served more than 35 percent of FORTUNE® 1000 and Global 500 companies. We
also work with smaller, growing companies, including those looking to go public, as well as with government
agencies.
Protiviti is a wholly owned subsidiary of Robert Half International Inc. (NYSE: RHI). Founded in 1948, Robert
Half International is a member of the S&P 500 index.
• 2,500+
professionals
• 1,000+ clients
• 70+ offices
• Over 20
countries in
the Americas,
Europe and
Asia-Pacific
Protiviti is one of
the fastest
growing
consulting firms
worldwide. Our
revenues have
increased from
US $15 million in
2002, to US
$423.8 million in
2011.
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Goal
Inform and Educate on Key SharePoint Security Features
Illustrate the Importance of Establishing Strong Governance
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
What do we know about Security
and Governance?
• Security is critical in government and military deployments
• It’s a critical consideration in business
• Requires good planning
• Requires good awareness of SharePoint capabilities
• Requires knowledge of what SharePoint cannot do
• Yet… Security and Governance are still often an after thought
for many deployments
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
What Drives our Information Security Needs?
• Information Security comes down to 2 or 3 drivers
– Protecting Your Investments
(intellectual property, digital assets, competitive advantage…)
– Reducing Your Liability
(avoid compliance violations, fines/sanctions, reputation issues…)
– Public Safety or Mission Success
(protect classified information, mission plans, reputation issues…)
– Public Health
(health records, health insurance, insurance fraud/theft…)
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
What Drives our Information Security Needs?
• How does this affect us as SharePoint people?
– How We Deploy SharePoint
– Control Access
– Assign Roles
– Establish Repeatable/Predictable Process
– Regulatory Compliance Standards
– Auditing & Reporting Obligations
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Information Governance
Ignorance is not always bliss… it’s problematic!
… Why?
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Information Governance
• Governance means setting out the structures, people,
policies, procedures and controls implemented to
manage information and support an organization's
immediate and future requirements:
– Regulatory
– Legal
– Risk
– Administrative
– Environmental
– Operational
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Governance and SharePoint
• SharePoint as a platform which offers services to your
organization’s users
• Governance for the SharePoint platform means:
• Managing existing services in a predictable way
• Deploying new services in a predictable way
• Providing a clear set of guidelines for usage and administration
• Achieve Strong Governance for SharePoint:
1. Develop a Governance Plan
• Cross functional - Identifies ownership for business and technical teams
• Regulatory, risk, legal, admin, environmental, organizational Needs
2. Establish a Governance Team
• Include stakeholders from across the organization
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Define Information
Architecture/Structures
(Includes Metadata Taxonomy)
Confidential
Developing a SharePoint Governance Plan
- Key Areas to Focus
Define Security Controls/Groups,
Permissions and Roles for Assigning
Permissions
Define Roles, Responsibilities,
Authority
Determine Training Needs;
Plan to Educate User
Community
Define Rules for Site Creation,
Management, Decommissioning
SharePoint Security
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
SharePoint Deployment
• Plan your Deployments and Necessary User Accounts
• Use Least Privileged Accounts
• Review SharePoint deployment guide before you install
• SharePoint is a web application built on top of SQL Server
– Best practice: to use specific user accounts for specific purposes with
least privileges
• Benefits: Separation of Concerns
– Multiple points of redundancy
– Targeted auditing of account usage
– Minimize the risk of compromised accounts
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Deployment User Accounts
• Use 3 Different Deployment Accounts (at minimum)
SQL Server Service Account Setup User Account SharePoint Farm Account
Assign to MSSQLSERVER and
SQLSERVERAGENT services when
installing SQL Server
(ex. domainSQL_service)
Used to install SharePoint, run
Product Config Wizard, install
patches/update
Used to run the SharePoint farm;
not just for database access (ex.
domainsp_farm_user)
No special domain permissions -
given required rights in SQL Server
during SQL setup
Login with this when running setup
(ex. domainsp_setup_user)
After Product Config Wizard run,
prompted to provide the Database
Access Account – this is the all
powerful farm account
Must be local admin on each server
in SharePoint farm (except SQL
Server if its different box)
Given ownership of Config
database - also configures several
SharePoint services (ex. timer
service) to use this as its identity
Before starting SharePoint setup,
assign the securityadmin and
dbcreator roles in SQL
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Deployment User Accounts
• Use 3 Different Deployment Accounts (at minimum)
SQL Server Service Account Setup User Account SharePoint Farm Account
• Should all be AD domain accounts (user accounts)
• Do not use personal admin account, especially for Setup User Account
• Configure central email account for all managed accounts
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Authentication
• Determine that users are who they say they are (via login)
• Configured on each web app
• Multiple authentication methods per web app
• SharePoint 2010 Options
• Classic Mode Authentication (Integrated Auth, NTLM, Kerberos)
• Claims Based Authentication
• Forms Based Authentication available - through Claims Based Auth.
– UI configuration options only available in UI upon web app creation
– To convert non-claims based web app to claims will require PowerShell
• SharePoint 2013 Options
• Claims Based Authentication - default
• Classic Mode Deprecated - Configuration UI has been removed
(Only configurable through PowerShell)
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Authorization
• Determine if users have access to specific information
objects and which level of access are they granted
• Accomplished through Permissions in SharePoint
• Allow you to secure any information object or container
• Apply to items, documents, folders, lists, libraries, sites
• Do not apply to individual column field values
• Assigning Permissions Includes
• The information object or container in question
• The user, group or claim that is granted access
• The permission level we are granting as part of that access
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Permission Examples: Users and Groups
• Finance AD Group has Full Control on Library A
• ProjectXContractor SP Group has Read access on site B
• Antonio.Maio AD user has Contribute access on Document C
User or Group
(also called a ‘Principle’)
Permission Level
(collection of permissions)
Information Object
(item or container)
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Permission Examples: Claims
• Remember: Claims are trusted attributes about a user
• May assign a Claim as part of a permission to an object
or container (like a user or group)
• ‘SecurityClearance=Secret’ has Full Control access on Document X
• ‘ITARCleared=True’ has Read access on Library Y
• ‘EmploymentStatus=FTE’ has Contribute access on Site Z
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Users Interacting with Permissions
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Users Interacting with Permissions
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Users Interacting with Permissions
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Users Interacting with Permissions
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Inherited Permission Model
• Hierarchical permission model
• Permissions are inherited from
level above
• Can break inheritance and apply
unique permissions
• Manual process
• Permissive Model
SharePoint Farm
Web Application
Site Collection Site Collection
Site Site
Library List
Document
Web Application
Item
Site
Document
Document
Item
Demo Members SharePoint Group Edit
Demo Owners SharePoint Group Full Control
Demo Visitors SharePoint Group Read
Finance Team Domain Group Edit
Senior Mgmt Domain Group Full Control
Research Team Domain Group Full Control
Senior Mgmt Domain Group Full Control
Research Team Domain Group Full Control
Senior Mgmt Domain Group Full Control
Antonio.Maio Domain User Full Control
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Permissions and Security Scopes
• Every time permission inheritance
is broken a new security scope is
created
• Security Scope is made of up
principles:
• Domain users/groups
• SharePoint users/groups
• Claims
• Be aware of “Limited Access”
• Limitations
• Security Scopes (50K per list)
• Size of Scope (5K per scope)
Microsoft SharePoint Boundaries and Limits:
http://technet.microsoft.com/en-us/library/cc262787.aspx
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Information Architecture and Metadata
• Information Architecture – The structural design of your
information sharing environment
• Organization and Storage
• Identification
• Retention
• Business sensitivity and confidentiality
• …
• Metadata can provide important insight into what type of
information you have in SharePoint
• Recommended: Use Metadata to Classify information and
Identify its Sensitivity
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Standardized Metadata
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Standardized Metadata
• Implement Standardized Metadata Fields across libraries/lists
• Library or List Level
• Site Column Level
• Managed Metadata Service (across Site Collection or Farm)
• Ensure users are adding metadata when adding/editing
information (mandatory fields)
• Be aware of situations where SharePoint doesn’t request metadata
(multi-file upload, explorer view)
• Keep it Simple: Limit sensitivity classification to 3 or 4 labels
– Public, Confidential, Restricted, Highly Restricted
– Low Business Impact, Moderate Business Impact, High Business Impact
– Unclassified, Confidential, Secret, Top Secret
• Educate, Educate, Educate: What does each label mean/impact?
© 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer.
Recap
• Develop a SharePoint Governance Plan with Key Stakeholders
• Ignorance is not bliss… it’s problematic!
• Understand the type of information you have
• Develop an information architecture
• Understand the risks to that information: accidental, insider and external threats
• Use Metadata to identify sensitivity
• Educate end users on significance of sensitivities – make them part of the solution
• Deploying SharePoint with Appropriate Least Privileged Accounts
• Determine your Authentication and Authorization Needs
• Understand how permissions work
• Plan for how permissions are given and managed
• Understand SharePoint Security Features
• Others: Web App Policies, Anonymous Users, Information Rights Management,
Privileged Users , Event Auditing
Antonio Maio
Protiviti, Senior SharePoint Architect & Senior Manager
Microsoft SharePoint Server MVP
Thank You!
Email: Antonio.maio@protiviti.com
Blog: www.trustsharepoint.com
Slide share: http://www.slideshare.net/AntonioMaio2
Twitter: @AntonioMaio2

Más contenido relacionado

La actualidad más candente

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365AntonioMaio2
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Enterprise Management Associates
 

La actualidad más candente (11)

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
Access management
Access managementAccess management
Access management
 

Destacado

Building SharePoint Apps with Azure PaaS
Building SharePoint Apps with Azure PaaSBuilding SharePoint Apps with Azure PaaS
Building SharePoint Apps with Azure PaaSInnoTech
 
High availability of azure applications(paas)
High availability of azure applications(paas)High availability of azure applications(paas)
High availability of azure applications(paas)Himanshu Sahu
 
News scavenger a SharePoint and Apps Story
News scavenger  a SharePoint and Apps StoryNews scavenger  a SharePoint and Apps Story
News scavenger a SharePoint and Apps StoryInnoTech
 
Introduction to SharePoint 2013 Rest API
Introduction to SharePoint 2013 Rest APIIntroduction to SharePoint 2013 Rest API
Introduction to SharePoint 2013 Rest APIInnoTech
 
Internet of Things from an Azure Developer Perspective
Internet of Things from an Azure Developer PerspectiveInternet of Things from an Azure Developer Perspective
Internet of Things from an Azure Developer PerspectiveInnoTech
 
Building scalable cloud-native applications (Sam Vanhoutte at Codit Azure Paa...
Building scalable cloud-native applications (Sam Vanhoutte at Codit Azure Paa...Building scalable cloud-native applications (Sam Vanhoutte at Codit Azure Paa...
Building scalable cloud-native applications (Sam Vanhoutte at Codit Azure Paa...Codit
 

Destacado (6)

Building SharePoint Apps with Azure PaaS
Building SharePoint Apps with Azure PaaSBuilding SharePoint Apps with Azure PaaS
Building SharePoint Apps with Azure PaaS
 
High availability of azure applications(paas)
High availability of azure applications(paas)High availability of azure applications(paas)
High availability of azure applications(paas)
 
News scavenger a SharePoint and Apps Story
News scavenger  a SharePoint and Apps StoryNews scavenger  a SharePoint and Apps Story
News scavenger a SharePoint and Apps Story
 
Introduction to SharePoint 2013 Rest API
Introduction to SharePoint 2013 Rest APIIntroduction to SharePoint 2013 Rest API
Introduction to SharePoint 2013 Rest API
 
Internet of Things from an Azure Developer Perspective
Internet of Things from an Azure Developer PerspectiveInternet of Things from an Azure Developer Perspective
Internet of Things from an Azure Developer Perspective
 
Building scalable cloud-native applications (Sam Vanhoutte at Codit Azure Paa...
Building scalable cloud-native applications (Sam Vanhoutte at Codit Azure Paa...Building scalable cloud-native applications (Sam Vanhoutte at Codit Azure Paa...
Building scalable cloud-native applications (Sam Vanhoutte at Codit Azure Paa...
 

Similar a Best Practices for Security and Governance in SharePoint 2013

How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointHow Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointAntonioMaio2
 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013AntonioMaio2
 
Overcoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePointOvercoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePointAntonioMaio2
 
Real world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedReal world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedAntonioMaio2
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 publishedAntonioMaio2
 
Enterprise Security: Tableau vs. Power BI
Enterprise Security: Tableau vs. Power BIEnterprise Security: Tableau vs. Power BI
Enterprise Security: Tableau vs. Power BISenturus
 
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio MaioHybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio MaioAntonioMaio2
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat teamAntonioMaio2
 
SharePoint Governance 101 - Austin O365 & SharePoint User Group
SharePoint Governance 101  - Austin O365 & SharePoint User GroupSharePoint Governance 101  - Austin O365 & SharePoint User Group
SharePoint Governance 101 - Austin O365 & SharePoint User GroupJim Adcock
 
SharePoint Governance 101 - OKCSUG
SharePoint Governance 101 - OKCSUGSharePoint Governance 101 - OKCSUG
SharePoint Governance 101 - OKCSUGJim Adcock
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...AntonioMaio2
 
Iam update 2014.10.16
Iam update   2014.10.16Iam update   2014.10.16
Iam update 2014.10.16kevin_donovan
 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...AntonioMaio2
 
Governance sharepointserver-2010
Governance sharepointserver-2010Governance sharepointserver-2010
Governance sharepointserver-2010Chad Solomonson
 
SharePoint Governance 101 SPSSA2016
SharePoint Governance 101  SPSSA2016SharePoint Governance 101  SPSSA2016
SharePoint Governance 101 SPSSA2016Jim Adcock
 
Mythra Product Presentation
Mythra Product PresentationMythra Product Presentation
Mythra Product PresentationSANAND809
 
SharePoint Governance 101 - Austin SharePoint User Group August 2014
SharePoint Governance 101 - Austin SharePoint User Group August 2014SharePoint Governance 101 - Austin SharePoint User Group August 2014
SharePoint Governance 101 - Austin SharePoint User Group August 2014Jim Adcock
 
#SharePoint Governance 101 #SPEngage October 2015
#SharePoint Governance 101  #SPEngage October 2015#SharePoint Governance 101  #SPEngage October 2015
#SharePoint Governance 101 #SPEngage October 2015Jim Adcock
 
Keeping SharePoint Always On
Keeping SharePoint Always OnKeeping SharePoint Always On
Keeping SharePoint Always OnAntonioMaio2
 

Similar a Best Practices for Security and Governance in SharePoint 2013 (20)

How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointHow Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013
 
Overcoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePointOvercoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePoint
 
Real world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedReal world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - published
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 published
 
Enterprise Security: Tableau vs. Power BI
Enterprise Security: Tableau vs. Power BIEnterprise Security: Tableau vs. Power BI
Enterprise Security: Tableau vs. Power BI
 
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio MaioHybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
 
SharePoint Governance 101 - Austin O365 & SharePoint User Group
SharePoint Governance 101  - Austin O365 & SharePoint User GroupSharePoint Governance 101  - Austin O365 & SharePoint User Group
SharePoint Governance 101 - Austin O365 & SharePoint User Group
 
SharePoint Governance 101 - OKCSUG
SharePoint Governance 101 - OKCSUGSharePoint Governance 101 - OKCSUG
SharePoint Governance 101 - OKCSUG
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
 
Iam update 2014.10.16
Iam update   2014.10.16Iam update   2014.10.16
Iam update 2014.10.16
 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...
 
Governance sharepointserver-2010
Governance sharepointserver-2010Governance sharepointserver-2010
Governance sharepointserver-2010
 
SharePoint Governance 101 SPSSA2016
SharePoint Governance 101  SPSSA2016SharePoint Governance 101  SPSSA2016
SharePoint Governance 101 SPSSA2016
 
Mythra Product Presentation
Mythra Product PresentationMythra Product Presentation
Mythra Product Presentation
 
SharePoint Governance 101 - Austin SharePoint User Group August 2014
SharePoint Governance 101 - Austin SharePoint User Group August 2014SharePoint Governance 101 - Austin SharePoint User Group August 2014
SharePoint Governance 101 - Austin SharePoint User Group August 2014
 
#SharePoint Governance 101 #SPEngage October 2015
#SharePoint Governance 101  #SPEngage October 2015#SharePoint Governance 101  #SPEngage October 2015
#SharePoint Governance 101 #SPEngage October 2015
 
Keeping SharePoint Always On
Keeping SharePoint Always OnKeeping SharePoint Always On
Keeping SharePoint Always On
 
Best of Intranet Global Forum LA 2015
Best of Intranet Global Forum LA 2015Best of Intranet Global Forum LA 2015
Best of Intranet Global Forum LA 2015
 

Más de InnoTech

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"InnoTech
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is MaturingInnoTech
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?InnoTech
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostInnoTech
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering StormInnoTech
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the fieldInnoTech
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implicationsInnoTech
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged InfrastructureInnoTech
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365InnoTech
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studiesInnoTech
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential InnoTech
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?InnoTech
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...InnoTech
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeInnoTech
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacyInnoTech
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio InnoTech
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumInnoTech
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2InnoTech
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionInnoTech
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentationInnoTech
 

Más de InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 

Último

Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Careerr98588472
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024Chandresh Chudasama
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 

Último (20)

Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Career
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Authentically Social - presented by Corey Perlman
Authentically Social - presented by Corey PerlmanAuthentically Social - presented by Corey Perlman
Authentically Social - presented by Corey Perlman
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 

Best Practices for Security and Governance in SharePoint 2013

  • 1. Antonio Maio Protiviti, Senior SharePoint Architect & Senior Manager Microsoft SharePoint Server MVP Best Practices for Security and Governance in SharePoint 2013 Email: Antonio.maio@protiviti.com Blog: www.trustsharepoint.com Slide share: http://www.slideshare.net/AntonioMaio2 Twitter: @AntonioMaio2
  • 2. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. About Protiviti INDIA (3) Protiviti (www.protiviti.com) is a global consulting firm that helps companies solve problems in finance, technology, operations, governance, risk and internal audit. Through our network of more than 70 offices in over 20 countries, we have served more than 35 percent of FORTUNE® 1000 and Global 500 companies. We also work with smaller, growing companies, including those looking to go public, as well as with government agencies. Protiviti is a wholly owned subsidiary of Robert Half International Inc. (NYSE: RHI). Founded in 1948, Robert Half International is a member of the S&P 500 index. • 2,500+ professionals • 1,000+ clients • 70+ offices • Over 20 countries in the Americas, Europe and Asia-Pacific Protiviti is one of the fastest growing consulting firms worldwide. Our revenues have increased from US $15 million in 2002, to US $423.8 million in 2011.
  • 3. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Goal Inform and Educate on Key SharePoint Security Features Illustrate the Importance of Establishing Strong Governance
  • 4. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. What do we know about Security and Governance? • Security is critical in government and military deployments • It’s a critical consideration in business • Requires good planning • Requires good awareness of SharePoint capabilities • Requires knowledge of what SharePoint cannot do • Yet… Security and Governance are still often an after thought for many deployments
  • 5. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. What Drives our Information Security Needs? • Information Security comes down to 2 or 3 drivers – Protecting Your Investments (intellectual property, digital assets, competitive advantage…) – Reducing Your Liability (avoid compliance violations, fines/sanctions, reputation issues…) – Public Safety or Mission Success (protect classified information, mission plans, reputation issues…) – Public Health (health records, health insurance, insurance fraud/theft…)
  • 6. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. What Drives our Information Security Needs? • How does this affect us as SharePoint people? – How We Deploy SharePoint – Control Access – Assign Roles – Establish Repeatable/Predictable Process – Regulatory Compliance Standards – Auditing & Reporting Obligations
  • 7. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Information Governance Ignorance is not always bliss… it’s problematic! … Why?
  • 8. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Information Governance • Governance means setting out the structures, people, policies, procedures and controls implemented to manage information and support an organization's immediate and future requirements: – Regulatory – Legal – Risk – Administrative – Environmental – Operational
  • 9. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Governance and SharePoint • SharePoint as a platform which offers services to your organization’s users • Governance for the SharePoint platform means: • Managing existing services in a predictable way • Deploying new services in a predictable way • Providing a clear set of guidelines for usage and administration • Achieve Strong Governance for SharePoint: 1. Develop a Governance Plan • Cross functional - Identifies ownership for business and technical teams • Regulatory, risk, legal, admin, environmental, organizational Needs 2. Establish a Governance Team • Include stakeholders from across the organization
  • 10. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Define Information Architecture/Structures (Includes Metadata Taxonomy) Confidential Developing a SharePoint Governance Plan - Key Areas to Focus Define Security Controls/Groups, Permissions and Roles for Assigning Permissions Define Roles, Responsibilities, Authority Determine Training Needs; Plan to Educate User Community Define Rules for Site Creation, Management, Decommissioning
  • 12. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. SharePoint Deployment • Plan your Deployments and Necessary User Accounts • Use Least Privileged Accounts • Review SharePoint deployment guide before you install • SharePoint is a web application built on top of SQL Server – Best practice: to use specific user accounts for specific purposes with least privileges • Benefits: Separation of Concerns – Multiple points of redundancy – Targeted auditing of account usage – Minimize the risk of compromised accounts
  • 13. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Deployment User Accounts • Use 3 Different Deployment Accounts (at minimum) SQL Server Service Account Setup User Account SharePoint Farm Account Assign to MSSQLSERVER and SQLSERVERAGENT services when installing SQL Server (ex. domainSQL_service) Used to install SharePoint, run Product Config Wizard, install patches/update Used to run the SharePoint farm; not just for database access (ex. domainsp_farm_user) No special domain permissions - given required rights in SQL Server during SQL setup Login with this when running setup (ex. domainsp_setup_user) After Product Config Wizard run, prompted to provide the Database Access Account – this is the all powerful farm account Must be local admin on each server in SharePoint farm (except SQL Server if its different box) Given ownership of Config database - also configures several SharePoint services (ex. timer service) to use this as its identity Before starting SharePoint setup, assign the securityadmin and dbcreator roles in SQL
  • 14. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Deployment User Accounts • Use 3 Different Deployment Accounts (at minimum) SQL Server Service Account Setup User Account SharePoint Farm Account • Should all be AD domain accounts (user accounts) • Do not use personal admin account, especially for Setup User Account • Configure central email account for all managed accounts
  • 15. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Authentication • Determine that users are who they say they are (via login) • Configured on each web app • Multiple authentication methods per web app • SharePoint 2010 Options • Classic Mode Authentication (Integrated Auth, NTLM, Kerberos) • Claims Based Authentication • Forms Based Authentication available - through Claims Based Auth. – UI configuration options only available in UI upon web app creation – To convert non-claims based web app to claims will require PowerShell • SharePoint 2013 Options • Claims Based Authentication - default • Classic Mode Deprecated - Configuration UI has been removed (Only configurable through PowerShell)
  • 16. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Authorization • Determine if users have access to specific information objects and which level of access are they granted • Accomplished through Permissions in SharePoint • Allow you to secure any information object or container • Apply to items, documents, folders, lists, libraries, sites • Do not apply to individual column field values • Assigning Permissions Includes • The information object or container in question • The user, group or claim that is granted access • The permission level we are granting as part of that access
  • 17. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Permission Examples: Users and Groups • Finance AD Group has Full Control on Library A • ProjectXContractor SP Group has Read access on site B • Antonio.Maio AD user has Contribute access on Document C User or Group (also called a ‘Principle’) Permission Level (collection of permissions) Information Object (item or container)
  • 18. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Permission Examples: Claims • Remember: Claims are trusted attributes about a user • May assign a Claim as part of a permission to an object or container (like a user or group) • ‘SecurityClearance=Secret’ has Full Control access on Document X • ‘ITARCleared=True’ has Read access on Library Y • ‘EmploymentStatus=FTE’ has Contribute access on Site Z
  • 19. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Users Interacting with Permissions
  • 20. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Users Interacting with Permissions
  • 21. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Users Interacting with Permissions
  • 22. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Users Interacting with Permissions
  • 23. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Inherited Permission Model • Hierarchical permission model • Permissions are inherited from level above • Can break inheritance and apply unique permissions • Manual process • Permissive Model SharePoint Farm Web Application Site Collection Site Collection Site Site Library List Document Web Application Item Site Document Document Item Demo Members SharePoint Group Edit Demo Owners SharePoint Group Full Control Demo Visitors SharePoint Group Read Finance Team Domain Group Edit Senior Mgmt Domain Group Full Control Research Team Domain Group Full Control Senior Mgmt Domain Group Full Control Research Team Domain Group Full Control Senior Mgmt Domain Group Full Control Antonio.Maio Domain User Full Control
  • 24. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Permissions and Security Scopes • Every time permission inheritance is broken a new security scope is created • Security Scope is made of up principles: • Domain users/groups • SharePoint users/groups • Claims • Be aware of “Limited Access” • Limitations • Security Scopes (50K per list) • Size of Scope (5K per scope) Microsoft SharePoint Boundaries and Limits: http://technet.microsoft.com/en-us/library/cc262787.aspx
  • 25. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Information Architecture and Metadata • Information Architecture – The structural design of your information sharing environment • Organization and Storage • Identification • Retention • Business sensitivity and confidentiality • … • Metadata can provide important insight into what type of information you have in SharePoint • Recommended: Use Metadata to Classify information and Identify its Sensitivity
  • 26. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Standardized Metadata
  • 27. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Standardized Metadata • Implement Standardized Metadata Fields across libraries/lists • Library or List Level • Site Column Level • Managed Metadata Service (across Site Collection or Farm) • Ensure users are adding metadata when adding/editing information (mandatory fields) • Be aware of situations where SharePoint doesn’t request metadata (multi-file upload, explorer view) • Keep it Simple: Limit sensitivity classification to 3 or 4 labels – Public, Confidential, Restricted, Highly Restricted – Low Business Impact, Moderate Business Impact, High Business Impact – Unclassified, Confidential, Secret, Top Secret • Educate, Educate, Educate: What does each label mean/impact?
  • 28. © 2014 Protiviti Consulting Private Ltd. An Equal Opportunity Employer. Recap • Develop a SharePoint Governance Plan with Key Stakeholders • Ignorance is not bliss… it’s problematic! • Understand the type of information you have • Develop an information architecture • Understand the risks to that information: accidental, insider and external threats • Use Metadata to identify sensitivity • Educate end users on significance of sensitivities – make them part of the solution • Deploying SharePoint with Appropriate Least Privileged Accounts • Determine your Authentication and Authorization Needs • Understand how permissions work • Plan for how permissions are given and managed • Understand SharePoint Security Features • Others: Web App Policies, Anonymous Users, Information Rights Management, Privileged Users , Event Auditing
  • 29. Antonio Maio Protiviti, Senior SharePoint Architect & Senior Manager Microsoft SharePoint Server MVP Thank You! Email: Antonio.maio@protiviti.com Blog: www.trustsharepoint.com Slide share: http://www.slideshare.net/AntonioMaio2 Twitter: @AntonioMaio2