SlideShare una empresa de Scribd logo
1 de 44
Descargar para leer sin conexión
Shaping-Up SharePoint Security in Five Steps

          Amichai Shulman, CTO, Imperva




                © 2012 Imperva, Inc. All rights reserved.
Agenda

    Introduction to SharePoint
    Security Implications
    Top Five Steps to Securing SharePoint
    Imperva SecureSphere for SharePoint
    Q&A




                     © 2012 Imperva, Inc. All rights reserved.
Amichai Shulman – CTO Imperva

   Speaker at Industry Events
     + RSA, Sybase Techwave, Info Security UK, Black Hat
   Lecturer on Info Security
     + Technion - Israel Institute of Technology
   Former security consultant to banks & financial
    services firms
   Leads the Application Defense Center (ADC)
     + Discovered over 20 commercial application
       vulnerabilities
        – Credited by Oracle, MS-SQL, IBM and others




          Amichai Shulman one of InfoWorld’s “Top 25 CTOs”


                              © 2012 Imperva, Inc. All rights reserved.
Introduction to SharePoint


    One of the fastest selling products
    On its way to becoming the first $2
     billion business
    30% year over year growth
    More than 125 million licenses
    Over 65,000 customers
    Revenue comes from ECM, team
     collaborative applications, and
     enterprise portals
    Security and rights management is
     #2 add-on
 Source: http://www.fiercecontentmanagement.com/story/sharepoint-numbers/2011-10-10
                                              © 2012 Imperva, Inc. All rights reserved.
Impact of SharePoint Insecurity




                 “[Investigators] discovered Wget scripts on
                    Manning’s computer that pointed to a
                 Microsoft SharePoint server holding the
                   Gitmo documents. He ran the scripts to
                 download the documents, then downloaded
                 the ones that WikiLeaks had published and
                         found they were the same.”
                                                 —Wired, Dec 2011




 Source: http://www.wired.com/threatlevel/2011/12/cables-scripts-manning/
                                       © 2012 Imperva, Inc. All rights reserved.
In the Beginning…




          Internal Access

                   © 2012 Imperva, Inc. All rights reserved.
Food Brings Along Appetite




                                                                  External Web
                                                                     Access




           Internal Access                                      Partner access

                    © 2012 Imperva, Inc. All rights reserved.
Collaboration Figures

     Do you use SharePoint for collaboration with any of the
      following?




 Source: ShareP oint: Strategies and Ex periences , September 2011
                                              © 2012 Imperva, Inc. All rights reserved.
Type of Content Shared



                                        Other                                          HR
                                      Proprietary                                     21%
                                         33%


                                                                                            Customer Data
                                                                                                 30%
                                      Financial
                                        22%




  Source: NetworkWorld, May 2, 2011
                                          © 2012 Imperva, Inc. All rights reserved.
Native SharePoint Security Capabilities




    “In general, SharePoint involves a
     complex set of interactions that
       makes it difficult for security
   teams to know if all their concerns
              are covered.”
                —Burton Group, 2010


                  © 2012 Imperva, Inc. All rights reserved.
#1: Getting Permissions Right




11           © 2012 Imperva, Inc. All rights reserved.
#1: Getting Permissions Right


 Summary:
   + Microsoft’s advice begins with permissions
   + “Content should not be available to all users… information should be accessible on a
     need-to-know basis”
 Why challenging?




                             © 2012 Imperva, Inc. All rights reserved.
#1: Getting Permissions Right


 Summary:
   + Microsoft’s advice begins with permissions
   + “Content should not be available to all users… information should be
     accessible on a need-to-know basis”
 Why challenging?
   + Difficult to track and maintain
   + Constantly change
   + No automation or aggregation
   + Need to involve data owners
 What is Required?
   + Automated permissions review tools
   + Baseline and change reports
   + Simplify rights reviews


                           © 2012 Imperva, Inc. All rights reserved.
User Rights Management: Doing it Right


   Aggregate user rights across systems
   Detect excessive rights, reduce access
    to business-need-to-know
   Identify dormant users
   Identify and involve data owners
   Formalize and automate approval cycle




                     © 2012 Imperva, Inc. All rights reserved.
Finding Excessive Permissions


  Focus on access to
 HIPAA regulated data                           What departments have access?




                        Why does G&A have access?
               Who are the users?
        What type of access do they have?




      How did they get the access?



 15                      © 2012 Imperva, Inc. All rights reserved.
Automatic Identification of Excessive Rights



                      Should “Everyone” have access to sensitive data?
                       • “Everyone” group literally means all users




                         Are there any direct user permissions?




  What rights are not used?
  • Users with access they appear not to need
                              © 2012 Imperva, Inc. All rights reserved.
Identifying Dormant Users

                                                                      Focus on users that are
                                                                     dormant for over 6 month
      Are there dormant users?




                                                                     Who are they and when did
                                                                         they last access?




 17                      © 2012 Imperva, Inc. All rights reserved.
#2: Compliance Reporting




18         © 2012 Imperva, Inc. All rights reserved.
#2: Compliance Reporting


 Summary:
   + If you store business data, you must demonstrate compliance with regulations

 Why challenging?
   + Manual process – minimal inherent data audit capability
   + Native audit trail is not usable/readable
   + No knowledge of the identity of data owners




       Example: In August 2011, Bloomberg reported on 300,000 healthcare
       records that appeared in an Excel file. No one knows where the file came
       from, indicating a lack of auditing.



                              © 2012 Imperva, Inc. All rights reserved.
#2: Compliance Reporting


 Summary:
   + If you store business data, you must demonstrate compliance with
     regulations
 Why challenging?
   + Manual process – minimal inherent data audit capability
   + Native audit trail is not usable/readable
   + No knowledge of the identity of data owners
 What is Required?
   + Human-readable activity auditing and reporting
   + Add enrichment data to simplify compliance process
   + Data owner identification
   + Audit Analytics




                           © 2012 Imperva, Inc. All rights reserved.
Full Audit Trail



   When            Who                                     Where     What




                         © 2012 Imperva, Inc. All rights reserved.
SharePoint Admins Gone Wild




  Most popular documents eyeballed were those containing the details
   of their fellow employees, 34 per cent, followed by salary – 23 per
                    cent – and 30 per cent said "other.“


                        © 2012 Imperva, Inc. All rights reserved.
Detailed Analytics for Forensics

                                          Focus on access to financial data


                                                               What are the primary
                                                          departments accessing this data?




                                             Why are G&A accessing financial data?


                                                          Who accessed this data?
                                                        When & what did they access?




                                          Who owns this data?

                  © 2012 Imperva, Inc. All rights reserved.
Data Owner Identification

                                  Data ownership
                                     • Top users are either owners or can identify them
                                     • Go-to people key for business-based decision making
                                     • Save data owners information for decision making




                 © 2012 Imperva, Inc. All rights reserved.
#3: Respond to Suspicious Activity




25              © 2012 Imperva, Inc. All rights reserved.
#3: Respond to Suspicious Activity

 Summary:
    + SharePoint is used as a place to share information
    + A broad range of internal and external groups are given access
    + Organizations need to balance trust and openness with the ability to
      detect and alert on suspicious activity
 Why challenging?
    + No automated analysis of access activity
    + Rights management (RMS) is complex to configure and maintain
 What is Required?
    + Policy framework layered on top of activity monitoring
    + Pre-configured policies simplify monitoring and response processes
 Example: In the Wikileaks scenario, Manning used an automated
   process to crawl the SharePoint system and to siphon out available files. A
   simple occurrences policy would have alerted if a certain number of files
   were touched in a small timeframe.
                            © 2012 Imperva, Inc. All rights reserved.
Real-time Enforcement: Possible Data Leakage


        Is someone accessing large amounts of data?



                                                                Out-of-the-box policies




                                                    Alert when a user reads 100
                                                     files within the same hour
                                                                             27
                    © 2012 Imperva, Inc. All rights reserved.
Real-time Enforcement: Possible Data Leakage

    See triggered alerts




    Drill down for details on
      “who, what , when,
             where”




           Following an alert:
           • Send emails automatically
           • Create security events in SIEM tools
                           © 2012 Imperva, Inc. All rights reserved.
#4: Protect Web Applications




29           © 2012 Imperva, Inc. All rights reserved.
#4: Protect Web Applications


 Summary:
    + Web attacks are a common threat
    + 30% of organizations have external-facing SharePoint sites
 Why challenging?
    + Need to patch the system frequently
    + 3rd party add-ons
 What is Required?
    + Real-time attack protection
    + Reputation based protection: malicious IPs, anonymous proxies
    + Prevent access to the admin pages by external users
 Example: According to CVE details, XSS is the most commonly reported
   vulnerability in SharePoint.



                             © 2012 Imperva, Inc. All rights reserved.
Attack Protection



     WAF Policies customized for SharePoint
                   based sites




     OOTB Security Policies




      Are external users accessing                                  Repeated failed login
             admin pages?                                               attempts?




                        © 2012 Imperva, Inc. All rights reserved.
Patch Protection




      InfoWorld (2010):
      “Admins report that a new Microsoft patch is causing
      SharePoint servers to fall over – and getting them back
      up isn’t easy”
      http://www.infoworld.com/t/application-security/june-black-tuesday-patch-causes-
      sharepoint-woes-510




 32                           © 2012 Imperva, Inc. All rights reserved.
What Do Hackers Think?




      Example: April 2010, Microsoft reveals a SharePoint issue
     The vulnerability could allow escalation of privilege (EoP) within the
      SharePoint site. If an attacker successfully exploits the vulnerability,
       the person could run commands against the SharePoint server with
                     the privileges of the compromised user.

  Source: http://www.eweek.com/c/a/Security/Microsoft-Confirms-SharePoint-Security-Vulnerability-187410/




                                       © 2012 Imperva, Inc. All rights reserved.
Google Diggity Project




                 © 2012 Imperva, Inc. All rights reserved.
#5: Monitor and Protect the SharePoint Database




35               © 2012 Imperva, Inc. All rights reserved.
#5: Monitor and Protect the SharePoint Database


 Summary:
   + The SharePoint database holds all configuration and content
     information
   + SharePoint administrators have full access to all SharePoint content
   + Whoever gains direct access to the database have full control on
     SharePoint
 Why challenging?
   + The SQL Server database isn't properly secured.
   + No activity monitoring and audit capabilities
   + No built-in database policy prevention
 What is Required?
   + Full audit trail of all activity originated from sources other than
     the application servers.
   + Protection from direct manipulation to the SharePoint internal
     database
                          © 2012 Imperva, Inc. All rights reserved.
Database Protection




      Microsoft Support:
      “Database modifications may results in a unsupported
      database state”
      http://support.microsoft.com/kb/841057




      Gartner (Securing SharePoint, February 2009):
      “Fully audit all SQL Server administrative activities”
      Security Considerations and Best Practices for Securing SharePoint




 37                            © 2012 Imperva, Inc. All rights reserved.
Summary

  5 Steps
      + Getting Permissions Right
      + Compliance Reporting
      + Respond to Suspicious Activity
      + Protect Web Applications
      + Monitor and Protect the SharePoint Database
  Key Issues
      + Full Visibility
      + Automate processes
           – Privilege anomalies
           – Attack detection
           – Compliance Reporting




 38                        © 2012 Imperva, Inc. All rights reserved.
Imperva SecureSphere for SharePoint




39              © 2012 Imperva, Inc. All rights reserved.
SecureSphere for SharePoint Deployment




                © 2012 Imperva, Inc. All rights reserved.
 40
Webinar Materials




41     © 2012 Imperva, Inc. All rights reserved.
Webinar Materials

    Get LinkedIn to
    Imperva Data Security Direct for…

                                                                Answers to
          Post-Webinar
                                                                 Attendee
           Discussions
                                                                Questions



            Webinar
                                                       Webinar Slides
         Recording Link


                    © 2012 Imperva, Inc. All rights reserved.
SharePoint Security Playbook



                                                             Download eBook




 43              © 2012 Imperva, Inc. All rights reserved.
www.imperva.com

Más contenido relacionado

La actualidad más candente

How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark, CISSP, CISA
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
How to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMHow to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMImperva
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Ulf Mattsson
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applicationsedwinlorenzana
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
The Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatThe Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatImperva
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerDuane Blackburn
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 

La actualidad más candente (19)

How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
How to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMHow to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAM
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applications
 
Hacking3e ppt ch10
Hacking3e ppt ch10Hacking3e ppt ch10
Hacking3e ppt ch10
 
Funsec3e ppt ch14
Funsec3e ppt ch14Funsec3e ppt ch14
Funsec3e ppt ch14
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
The Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatThe Insider's Guide to the Insider Threat
The Insider's Guide to the Insider Threat
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Ch12
Ch12Ch12
Ch12
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 

Similar a 5 Steps to Secure SharePoint and Comply with Regulations

SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...Jeff Willinger
 
Database Security: What Gets Overlooked?
Database Security: What Gets Overlooked?Database Security: What Gets Overlooked?
Database Security: What Gets Overlooked?Brent Spencer
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsDenim Group
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareMarie-Michelle Strah, PhD
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsSplunk
 
Big Data LDN 2018: INTELLIGENCE EVERYWHERE – POWER TO THE PEOPLE
Big Data LDN 2018: INTELLIGENCE EVERYWHERE – POWER TO THE PEOPLEBig Data LDN 2018: INTELLIGENCE EVERYWHERE – POWER TO THE PEOPLE
Big Data LDN 2018: INTELLIGENCE EVERYWHERE – POWER TO THE PEOPLEMatt Stubbs
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015ObserveIT
 
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster Godlan, Inc
 
Big Data and Analytics
Big Data and AnalyticsBig Data and Analytics
Big Data and Analyticsdmurph4
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint GovernanceImperva
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
Altimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessAltimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessChris Silva
 
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...Altimeter, a Prophet Company
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetBVU
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022lior mazor
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsAlfonso Sintjago
 
User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...
User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...
User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...SPTechCon
 

Similar a 5 Steps to Secure SharePoint and Comply with Regulations (20)

SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
 
Database Security: What Gets Overlooked?
Database Security: What Gets Overlooked?Database Security: What Gets Overlooked?
Database Security: What Gets Overlooked?
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
 
Big Data LDN 2018: INTELLIGENCE EVERYWHERE – POWER TO THE PEOPLE
Big Data LDN 2018: INTELLIGENCE EVERYWHERE – POWER TO THE PEOPLEBig Data LDN 2018: INTELLIGENCE EVERYWHERE – POWER TO THE PEOPLE
Big Data LDN 2018: INTELLIGENCE EVERYWHERE – POWER TO THE PEOPLE
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015
 
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
 
Big Data and Analytics
Big Data and AnalyticsBig Data and Analytics
Big Data and Analytics
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Altimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessAltimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile Business
 
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security Considerations
 
User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...
User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...
User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...
 

Más de Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 

Más de Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Último

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Último (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

5 Steps to Secure SharePoint and Comply with Regulations

  • 1. Shaping-Up SharePoint Security in Five Steps Amichai Shulman, CTO, Imperva © 2012 Imperva, Inc. All rights reserved.
  • 2. Agenda  Introduction to SharePoint  Security Implications  Top Five Steps to Securing SharePoint  Imperva SecureSphere for SharePoint  Q&A © 2012 Imperva, Inc. All rights reserved.
  • 3. Amichai Shulman – CTO Imperva  Speaker at Industry Events + RSA, Sybase Techwave, Info Security UK, Black Hat  Lecturer on Info Security + Technion - Israel Institute of Technology  Former security consultant to banks & financial services firms  Leads the Application Defense Center (ADC) + Discovered over 20 commercial application vulnerabilities – Credited by Oracle, MS-SQL, IBM and others Amichai Shulman one of InfoWorld’s “Top 25 CTOs” © 2012 Imperva, Inc. All rights reserved.
  • 4. Introduction to SharePoint  One of the fastest selling products  On its way to becoming the first $2 billion business  30% year over year growth  More than 125 million licenses  Over 65,000 customers  Revenue comes from ECM, team collaborative applications, and enterprise portals  Security and rights management is #2 add-on Source: http://www.fiercecontentmanagement.com/story/sharepoint-numbers/2011-10-10 © 2012 Imperva, Inc. All rights reserved.
  • 5. Impact of SharePoint Insecurity “[Investigators] discovered Wget scripts on Manning’s computer that pointed to a Microsoft SharePoint server holding the Gitmo documents. He ran the scripts to download the documents, then downloaded the ones that WikiLeaks had published and found they were the same.” —Wired, Dec 2011 Source: http://www.wired.com/threatlevel/2011/12/cables-scripts-manning/ © 2012 Imperva, Inc. All rights reserved.
  • 6. In the Beginning… Internal Access © 2012 Imperva, Inc. All rights reserved.
  • 7. Food Brings Along Appetite External Web Access Internal Access Partner access © 2012 Imperva, Inc. All rights reserved.
  • 8. Collaboration Figures  Do you use SharePoint for collaboration with any of the following? Source: ShareP oint: Strategies and Ex periences , September 2011 © 2012 Imperva, Inc. All rights reserved.
  • 9. Type of Content Shared Other HR Proprietary 21% 33% Customer Data 30% Financial 22% Source: NetworkWorld, May 2, 2011 © 2012 Imperva, Inc. All rights reserved.
  • 10. Native SharePoint Security Capabilities “In general, SharePoint involves a complex set of interactions that makes it difficult for security teams to know if all their concerns are covered.” —Burton Group, 2010 © 2012 Imperva, Inc. All rights reserved.
  • 11. #1: Getting Permissions Right 11 © 2012 Imperva, Inc. All rights reserved.
  • 12. #1: Getting Permissions Right  Summary: + Microsoft’s advice begins with permissions + “Content should not be available to all users… information should be accessible on a need-to-know basis”  Why challenging? © 2012 Imperva, Inc. All rights reserved.
  • 13. #1: Getting Permissions Right  Summary: + Microsoft’s advice begins with permissions + “Content should not be available to all users… information should be accessible on a need-to-know basis”  Why challenging? + Difficult to track and maintain + Constantly change + No automation or aggregation + Need to involve data owners  What is Required? + Automated permissions review tools + Baseline and change reports + Simplify rights reviews © 2012 Imperva, Inc. All rights reserved.
  • 14. User Rights Management: Doing it Right  Aggregate user rights across systems  Detect excessive rights, reduce access to business-need-to-know  Identify dormant users  Identify and involve data owners  Formalize and automate approval cycle © 2012 Imperva, Inc. All rights reserved.
  • 15. Finding Excessive Permissions Focus on access to HIPAA regulated data What departments have access? Why does G&A have access? Who are the users? What type of access do they have? How did they get the access? 15 © 2012 Imperva, Inc. All rights reserved.
  • 16. Automatic Identification of Excessive Rights Should “Everyone” have access to sensitive data? • “Everyone” group literally means all users Are there any direct user permissions? What rights are not used? • Users with access they appear not to need © 2012 Imperva, Inc. All rights reserved.
  • 17. Identifying Dormant Users Focus on users that are dormant for over 6 month Are there dormant users? Who are they and when did they last access? 17 © 2012 Imperva, Inc. All rights reserved.
  • 18. #2: Compliance Reporting 18 © 2012 Imperva, Inc. All rights reserved.
  • 19. #2: Compliance Reporting  Summary: + If you store business data, you must demonstrate compliance with regulations  Why challenging? + Manual process – minimal inherent data audit capability + Native audit trail is not usable/readable + No knowledge of the identity of data owners Example: In August 2011, Bloomberg reported on 300,000 healthcare records that appeared in an Excel file. No one knows where the file came from, indicating a lack of auditing. © 2012 Imperva, Inc. All rights reserved.
  • 20. #2: Compliance Reporting  Summary: + If you store business data, you must demonstrate compliance with regulations  Why challenging? + Manual process – minimal inherent data audit capability + Native audit trail is not usable/readable + No knowledge of the identity of data owners  What is Required? + Human-readable activity auditing and reporting + Add enrichment data to simplify compliance process + Data owner identification + Audit Analytics © 2012 Imperva, Inc. All rights reserved.
  • 21. Full Audit Trail When Who Where What © 2012 Imperva, Inc. All rights reserved.
  • 22. SharePoint Admins Gone Wild Most popular documents eyeballed were those containing the details of their fellow employees, 34 per cent, followed by salary – 23 per cent – and 30 per cent said "other.“ © 2012 Imperva, Inc. All rights reserved.
  • 23. Detailed Analytics for Forensics Focus on access to financial data What are the primary departments accessing this data? Why are G&A accessing financial data? Who accessed this data? When & what did they access? Who owns this data? © 2012 Imperva, Inc. All rights reserved.
  • 24. Data Owner Identification Data ownership • Top users are either owners or can identify them • Go-to people key for business-based decision making • Save data owners information for decision making © 2012 Imperva, Inc. All rights reserved.
  • 25. #3: Respond to Suspicious Activity 25 © 2012 Imperva, Inc. All rights reserved.
  • 26. #3: Respond to Suspicious Activity  Summary: + SharePoint is used as a place to share information + A broad range of internal and external groups are given access + Organizations need to balance trust and openness with the ability to detect and alert on suspicious activity  Why challenging? + No automated analysis of access activity + Rights management (RMS) is complex to configure and maintain  What is Required? + Policy framework layered on top of activity monitoring + Pre-configured policies simplify monitoring and response processes  Example: In the Wikileaks scenario, Manning used an automated process to crawl the SharePoint system and to siphon out available files. A simple occurrences policy would have alerted if a certain number of files were touched in a small timeframe. © 2012 Imperva, Inc. All rights reserved.
  • 27. Real-time Enforcement: Possible Data Leakage Is someone accessing large amounts of data? Out-of-the-box policies Alert when a user reads 100 files within the same hour 27 © 2012 Imperva, Inc. All rights reserved.
  • 28. Real-time Enforcement: Possible Data Leakage See triggered alerts Drill down for details on “who, what , when, where” Following an alert: • Send emails automatically • Create security events in SIEM tools © 2012 Imperva, Inc. All rights reserved.
  • 29. #4: Protect Web Applications 29 © 2012 Imperva, Inc. All rights reserved.
  • 30. #4: Protect Web Applications  Summary: + Web attacks are a common threat + 30% of organizations have external-facing SharePoint sites  Why challenging? + Need to patch the system frequently + 3rd party add-ons  What is Required? + Real-time attack protection + Reputation based protection: malicious IPs, anonymous proxies + Prevent access to the admin pages by external users  Example: According to CVE details, XSS is the most commonly reported vulnerability in SharePoint. © 2012 Imperva, Inc. All rights reserved.
  • 31. Attack Protection WAF Policies customized for SharePoint based sites OOTB Security Policies Are external users accessing Repeated failed login admin pages? attempts? © 2012 Imperva, Inc. All rights reserved.
  • 32. Patch Protection InfoWorld (2010): “Admins report that a new Microsoft patch is causing SharePoint servers to fall over – and getting them back up isn’t easy” http://www.infoworld.com/t/application-security/june-black-tuesday-patch-causes- sharepoint-woes-510 32 © 2012 Imperva, Inc. All rights reserved.
  • 33. What Do Hackers Think? Example: April 2010, Microsoft reveals a SharePoint issue The vulnerability could allow escalation of privilege (EoP) within the SharePoint site. If an attacker successfully exploits the vulnerability, the person could run commands against the SharePoint server with the privileges of the compromised user. Source: http://www.eweek.com/c/a/Security/Microsoft-Confirms-SharePoint-Security-Vulnerability-187410/ © 2012 Imperva, Inc. All rights reserved.
  • 34. Google Diggity Project © 2012 Imperva, Inc. All rights reserved.
  • 35. #5: Monitor and Protect the SharePoint Database 35 © 2012 Imperva, Inc. All rights reserved.
  • 36. #5: Monitor and Protect the SharePoint Database  Summary: + The SharePoint database holds all configuration and content information + SharePoint administrators have full access to all SharePoint content + Whoever gains direct access to the database have full control on SharePoint  Why challenging? + The SQL Server database isn't properly secured. + No activity monitoring and audit capabilities + No built-in database policy prevention  What is Required? + Full audit trail of all activity originated from sources other than the application servers. + Protection from direct manipulation to the SharePoint internal database © 2012 Imperva, Inc. All rights reserved.
  • 37. Database Protection Microsoft Support: “Database modifications may results in a unsupported database state” http://support.microsoft.com/kb/841057 Gartner (Securing SharePoint, February 2009): “Fully audit all SQL Server administrative activities” Security Considerations and Best Practices for Securing SharePoint 37 © 2012 Imperva, Inc. All rights reserved.
  • 38. Summary  5 Steps + Getting Permissions Right + Compliance Reporting + Respond to Suspicious Activity + Protect Web Applications + Monitor and Protect the SharePoint Database  Key Issues + Full Visibility + Automate processes – Privilege anomalies – Attack detection – Compliance Reporting 38 © 2012 Imperva, Inc. All rights reserved.
  • 39. Imperva SecureSphere for SharePoint 39 © 2012 Imperva, Inc. All rights reserved.
  • 40. SecureSphere for SharePoint Deployment © 2012 Imperva, Inc. All rights reserved. 40
  • 41. Webinar Materials 41 © 2012 Imperva, Inc. All rights reserved.
  • 42. Webinar Materials Get LinkedIn to Imperva Data Security Direct for… Answers to Post-Webinar Attendee Discussions Questions Webinar Webinar Slides Recording Link © 2012 Imperva, Inc. All rights reserved.
  • 43. SharePoint Security Playbook Download eBook 43 © 2012 Imperva, Inc. All rights reserved.