Documente Academic
Documente Profesional
Documente Cultură
Contents
ITS TIME TO THINK ABOUT SHAREPOINT SECURITY Challenge 1: Ensure access rights remain aligned with business needs Challenge 2: Address compliance mandates Challenge 3: Respond to suspicious activity in real time Challenge 4: Protect Web applications from attack Challenge 5: Take control when migrating data Conclusion: SharePoint Security Checklist ABOUT IMPERVA
CHALLENGE #1
Unstructured data now accounts for more than 90% of the Digital Universe.
SharePoint Security Gap
Without an aggregated, centralized system to view rights information, SharePoint permissions for each site collection must first be extracted to an Excel spreadsheet and then combined by hand to analyze. And, that analysis must be done manually within Excel or exported yet again to a third-party analytics platform.
-IDC 2011
CHALLENGE #1
The Play
Aggregate permissions across the entire SharePoint deployment and automate the review process to keep rights aligned with business needs.
The Advantage
- Understand who has access to what data or, conversely, what data any given user or group can access, and how that access was assigned or inherited. - Simplify the process of identifying where excessive access rights have been granted, if there are dormant users, and who owns each item and document. - Help administrators and data owners establish a baseline snapshot of access rights and conduct rights reviews.
CHALLENGE #2
60% of organizations have yet to bring SharePoint into line with existing data compliance policies.
SharePoint Security Gap
Native SharePoint activity monitoring lacks an intuitive, easy-to-use interface for reporting and analytics. Without a third-party solution, businesses must first decode SharePoints internal representation of log data before they can access meaningful information.
-AIIM 2011
CHALLENGE #2
The Play
Use enterprise-class technology that combines permissions and activity details to automate compliance reporting.
The Advantage
- Generate compliance reports on-time and tailored to each recipients needs. - Drill down, filter, and organize data. - Enrich native data with relevant information, such as type of data, department, and data owner.
CHALLENGE #3
CHALLENGE #3
The Play
Use a policy framework to build rules across SharePoints Web, file, and database components to identify suspicious behavior and complement native access controls.
The Advantage
- Monitor, control, and respond to suspicious activity in real time. - Balance the need for trust and openness with security concerns.
CHALLENGE #4
31% of organizations are using SharePoint for externally facing Web sites, and another 47% are planning to do so.
-Forrester Research, Inc. 2011
CHALLENGE #4
ADMIN
DATABASE
SharePoint
The Play
Deploy a proven Web application firewall (WAF) technology.
The Advantage
- Provide a powerful defense against common attacks, such as SQL injection and cross-site scripting. - Streamline and automate regulatory compliance. - Mitigate data risk.
CHALLENGE #5
CHALLENGE #5
The Play
Identify where excessive access rights have been granted, and use file activity monitoring to locate stale data that can be archived or deleted.
The Advantage
- Keep rights aligned with business needs. - Free up storage space and reduce the amount of data that must be actively managed.
About Imperva
Imperva data security solutions provide visibility and control of high-value business data across critical systems within the data center. Imperva SecureSphere includes database, file, and Web application security solutions that prioritize and mitigate risks to business data, protect against hackers and malicious insiders, and streamline regulatory compliance.
Find Us on the Web | Contact Us Direct | Read our Blog | Facebook | Twitter | SlideShare | YouTube
Imperva Headquarters 3400 Bridge Parkway, Suite 200 Redwood Shores, CA 94065 Tel: +1-650-345-9000 Fax: +1-650-345-9004 Toll Free (U.S. only): +1-866-926-4678 www.imperva.com