Skip to content

Microsoft SharePoint 2013 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000003

    Group
  • SharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired.

    A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporar...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • SharePoint must maintain and support the use of security attributes with stored information.

    Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These attributes are t...
    Rule Medium Severity
  • SRG-APP-000014

    Group
  • SharePoint must utilize approved cryptography to protect the confidentiality of remote access sessions.

    Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet)....
    Rule High Severity
  • SRG-APP-000015

    Group
  • SRG-APP-000016

    Group
  • SharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited.

    Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet)....
    Rule Medium Severity
  • SRG-APP-000039

    Group
  • SRG-APP-000516

    Group
  • SharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied.

    Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to who is allowed to access the information) and w...
    Rule Medium Severity
  • SRG-APP-000047

    Group
  • SRG-APP-000068

    Group
  • SharePoint must display an approved system use notification message or banner before granting access to the system.

    Applications are required to display an approved system use notification message or banner before granting access to the system providing privacy and security notices consistent with applicable fed...
    Rule Medium Severity
  • SRG-APP-000090

    Group
  • SRG-APP-000516

    Group
  • SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds.

    It is critical when a system is at risk of failing to process audit logs as required; actions are automatically taken to mitigate the failure or risk of failure. One method used to thwart the audi...
    Rule Medium Severity
  • SRG-APP-000112

    Group
  • SRG-APP-000156

    Group
  • SharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.

    An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Techniques used to addres...
    Rule Medium Severity
  • SRG-APP-000180

    Group
  • SRG-APP-000179

    Group
  • SharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.

    Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the Windows Server OS and versions of SharePoint wi...
    Rule High Severity
  • SRG-APP-000514

    Group
  • SRG-APP-000555

    Group
  • SRG-APP-000219

    Group
  • SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.

    This control focuses on communications protection at the session, versus packet level. At the application layer, session IDs are tokens generated by web applications to uniquely identify an applic...
    Rule High Severity
  • SRG-APP-000220

    Group
  • SharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded.

    This requirement focuses on communications protection at the application session, versus network packet level. Session IDs are tokens generated by web applications to uniquely identify an applicat...
    Rule High Severity
  • SRG-APP-000441

    Group
  • SRG-APP-000219

    Group
  • SharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions.

    The information system isolates security functions from nonsecurity functions by means of an isolation boundary (implemented via partitions and domains) controlling access to and protecting the int...
    Rule High Severity
  • SRG-APP-000238

    Group
  • SharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.

    The information system isolates security functions from nonsecurity functions by means of an isolation boundary (implemented via partitions and domains) controlling access to, and protecting the in...
    Rule Medium Severity
  • SRG-APP-000440

    Group
  • SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.

    Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order to protect the information during transmission....
    Rule High Severity
  • SRG-APP-000340

    Group
  • SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.

    Malicious code protection software must be protected to prevent a non-privileged user or malicious piece of software from disabling the protection mechanism. A common tactic of malware is to identi...
    Rule High Severity
  • SRG-APP-000179

    Group
  • SRG-APP-000212

    Group
  • The SharePoint Central Administration site must not be accessible from Extranet or Internet connections.

    SharePoint must prevent the presentation of information system management-related functionality at an interface utilized by general, (i.e., non-privileged), users. The Central Administrator is an...
    Rule Medium Severity
  • SRG-APP-000039

    Group
  • For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ.

    Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to who is allowed to access the information) and w...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • The SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD).

    Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating system and in applications. It serves to elimina...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • SRG-APP-000516

    Group
  • The SharePoint setup account must be configured with the minimum privileges in Active Directory.

    Separation of duties is a prevalent Information Technology control implemented at different layers of the information system including the operating system and in applications. It serves to elimina...
    Rule Medium Severity
  • SRG-APP-000516

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules