Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please provide two pages answer for 1, 2, 3 and 4 questions each: 1. Summary of available technologies that address the potential security threats and

Please provide two pages answer for 1, 2, 3 and 4 questions each:

1. Summary of available technologies that address the potential security threats and risks identified for the Sharepoint.

Security Threats to Sharepoint:

Permission Slipups:

Sharepoint control list is similar to windows. Administrators are defined using groups and manually provide permissions. What makes native permissions challenging however is a sharepoint lacks an automated way to ensure that rights remain aligned with business needs as raw and structure data is added to Sharepoint additional permissions are created either t hrough inheritance or assignment and must be managed without a centralized view of permissions for users across sites tracking and managing all of the permissions increases complexity. Further access needs and restriction change as users start new work projects, change job roles or leave the company.

Failure to comply with mandates and governance

Sharepoint building capabilities for access activity auditing and reporting are limited. This screenshot shows an example of the build in audit trail as you can see it does not provide readily usable information for example look at the site Id and the item Id columns.

They contain long string of numbers that must be decoded to provide meaningful information not only in the audit trail unreadable but a malicious administrator may be able to modify or delete native logs. Also sharepoint doesnt have forensic capabilities if a breach occurs either from an insider or a hacker. Share point does not provide a way for Organization to know what happened.

Website Vulnerabilties:

Sharepoint deployments include portals for customers partners or the public and can even be used as the Organizations website infrastructure. As such all the same issues you have with a web application you have with share point typical problems include SQL injection, cross password attack and cross site scripting with todays automated attack tools. No one will be spared including the Sharepoint deployments.

Direct Access to the Backend Database :

Because of sharepoint reliance in SQL server storage protection is essentially database protection administrators and priviledged users can perform any direct modification of the database leaving the in an unsupported in other cases privilege users can simply read the entire database and use the copy to access all the information on SharePoint. This bypasses Share Points permissions and native audit mechanism.

Exposure to Search Engine:

Search engine constantly crawl and update their indexing policies so that breaches or misconfigured entry points are quickly apparent to all. For instance in October 2010, the Missipi national guard notified that it accidentally exposed personal information of nearly 3,000 soilders under external Microsoft Shrepoint website. There are even different google hacking tools which specifically search for sharepoint data exposure. One such tools is Sharepoint hacking diggity project.

The security threats identified are -

1.Failure to secure sharepoint against priviledge insider accounts Limit priviledge levels for administrator accounts and deploy third party security solutions that enable encryption and access control.

2.Inadequate or Non-existent audit trails for sharepoint usage and administrative access Enable auditing for system and file access, and for all administrative charges to sharepoint.

3. Failure to limit administrator and service accounts Limits privilege on service accounts, disable the install account and dont use shared administrator accounts.

4. Sharepoint system architecture and network configuration issues Put a dedicated sharepoint web front end in DM2, use a single person per server approach, and harden the sharepoint, OS and database according to best practices.

5.Failure to perform backups and provide DR capabilities Perform backups and test and restore them on a regular basis, atleast manually. Then consider how to recover from disasters using sharepoint services.

--------

2. Summary of suggested policies or practices that can be implemented to mitigate the security threats or risks identified

--------

3. Implications for the reliability, accuracy and integrity of information processed within the system suggested

-------

4. Recommendations on an approach to security the organization should adopt using some or all of the technologies, policies or practices discuss

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Explain the importance of the strategic business plan.

Answered: 1 week ago

Question

How do we organise for international logistics?

Answered: 1 week ago

Question

What are the logistics implications of internationalisation?

Answered: 1 week ago