UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Microsoft SharePoint 2013 Security Technical Implementation Guide


Overview

Date Finding Count (38)
2020-12-10 CAT I (High): 14 CAT II (Med): 23 CAT III (Low): 1
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC II - Mission Support Sensitive)

Finding ID Severity Title
V-223259 High SharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec.
V-223258 High SharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded.
V-223257 High SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.
V-223255 High SharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.
V-223254 High SharePoint must employ NSA-approved cryptography to protect classified information.
V-223252 High SharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
V-223262 High SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.
V-223263 High SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.
V-223260 High SharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions.
V-223249 High SharePoint must prevent the execution of prohibited mobile code.
V-223264 High SharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
V-223240 High SharePoint must utilize approved cryptography to protect the confidentiality of remote access sessions.
V-223241 High SharePoint must use cryptography to protect the integrity of the remote access session.
V-223243 High SharePoint must enforce approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy.
V-223273 Medium When configuring SharePoint Central Administration, the port number selected must comply with DoD Ports and Protocol Management (PPSM) program requirements.
V-223239 Medium SharePoint must maintain and support the use of security attributes with stored information.
V-223238 Medium SharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired.
V-223277 Medium SharePoint must validate the integrity of security attributes exchanged between systems.
V-223276 Medium The SharePoint farm service account (database access account) must be configured with the minimum privileges for the local server.
V-223271 Medium The SharePoint setup account must be configured with the minimum privileges for the local server.
V-223270 Medium The SharePoint setup account must be configured with the minimum privileges on the SQL server.
V-223246 Medium SharePoint must display an approved system use notification message or banner before granting access to the system.
V-223251 Medium SharePoint must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
V-223250 Medium SharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.
V-223247 Medium SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system.
V-223261 Medium SharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
V-223248 Medium SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds.
V-223265 Medium The SharePoint Central Administration site must not be accessible from Extranet or Internet connections.
V-223244 Medium SharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied.
V-223245 Medium SharePoint must provide the ability to prohibit the transfer of unsanctioned information in accordance with security policy.
V-223268 Medium The SharePoint farm service account (database access account) must be configured with minimum privileges on the SQL server.
V-223269 Medium The SharePoint setup account must be configured with the minimum privileges in Active Directory.
V-223242 Medium SharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited.
V-223275 Medium SharePoint server access to the Online Web Part Gallery must be configured for limited access.
V-223274 Medium SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured.
V-223266 Medium For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ.
V-223267 Medium The SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD).
V-223272 Low A secondary SharePoint site collection administrator must be defined when creating a new site collection.