STIGQter STIGQter: STIG Summary:

Microsoft SharePoint 2013 Security Technical Implementation Guide

Version: 2

Release: 1 Benchmark Date: 22 Jan 2021

CheckedNameTitle
SV-223238r612235_ruleSharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired.
SV-223239r612235_ruleSharePoint must maintain and support the use of security attributes with stored information.
SV-223240r612235_ruleSharePoint must utilize approved cryptography to protect the confidentiality of remote access sessions.
SV-223241r612235_ruleSharePoint must use cryptography to protect the integrity of the remote access session.
SV-223242r612235_ruleSharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited.
SV-223243r612235_ruleSharePoint must enforce approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy.
SV-223244r612235_ruleSharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied.
SV-223245r612235_ruleSharePoint must provide the ability to prohibit the transfer of unsanctioned information in accordance with security policy.
SV-223246r612235_ruleSharePoint must display an approved system use notification message or banner before granting access to the system.
SV-223247r612235_ruleSharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system.
SV-223248r612235_ruleSharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds.
SV-223249r612235_ruleSharePoint must prevent the execution of prohibited mobile code.
SV-223250r612235_ruleSharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.
SV-223251r612235_ruleSharePoint must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
SV-223252r612235_ruleSharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
SV-223254r612235_ruleSharePoint must employ NSA-approved cryptography to protect classified information.
SV-223255r612235_ruleSharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.
SV-223257r612235_ruleSharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.
SV-223258r612235_ruleSharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded.
SV-223259r612235_ruleSharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec.
SV-223260r612235_ruleSharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions.
SV-223261r612235_ruleSharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
SV-223262r612235_ruleSharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.
SV-223263r612235_ruleSharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.
SV-223264r612235_ruleSharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
SV-223265r612235_ruleThe SharePoint Central Administration site must not be accessible from Extranet or Internet connections.
SV-223266r612235_ruleFor environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ.
SV-223267r612235_ruleThe SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD).
SV-223268r612235_ruleThe SharePoint farm service account (database access account) must be configured with minimum privileges on the SQL server.
SV-223269r612235_ruleThe SharePoint setup account must be configured with the minimum privileges in Active Directory.
SV-223270r612235_ruleThe SharePoint setup account must be configured with the minimum privileges on the SQL server.
SV-223271r612235_ruleThe SharePoint setup account must be configured with the minimum privileges for the local server.
SV-223272r612235_ruleA secondary SharePoint site collection administrator must be defined when creating a new site collection.
SV-223273r612235_ruleWhen configuring SharePoint Central Administration, the port number selected must comply with DoD Ports and Protocol Management (PPSM) program requirements.
SV-223274r612235_ruleSharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured.
SV-223275r612235_ruleSharePoint server access to the Online Web Part Gallery must be configured for limited access.
SV-223276r612235_ruleThe SharePoint farm service account (database access account) must be configured with the minimum privileges for the local server.
SV-223277r612235_ruleSharePoint must validate the integrity of security attributes exchanged between systems.