SlideShare a Scribd company logo
1 of 27
Best Practices for 
Security and Governance 
in SharePoint 2013 
Antonio Maio 
Protiviti, Senior SharePoint Architect & Senior Manager 
Microsoft SharePoint Server MVP 
Email: Antonio.maio@protiviti.com 
Blog: www.trustsharepoint.com 
Slide share: http://www.slideshare.net/AntonioMaio2 
Twitter: 0 
@AntonioMaio2
Welcome to Houston TechFest 
Thank you for being a part of the 
8th Annual Houston TechFest! 
• Please turn off all electronic devices or set them to vibrate. 
• If you must take a phone call, please do so in the lobby so as not 
to disturb others. 
• Thanks to our Diamond Sponsors: 
1
2
What Drives our Information Security Needs? 
• Information Security comes down to 2 or 3 drivers 
4 
• Protecting Your Investments 
(intellectual property, digital assets, competitive advantage…) 
• Reducing Your Liability 
(avoid compliance violations, fines/sanctions, reputation issues…) 
• Public Safety or Mission Success 
(protect classified information, mission plans, reputation issues…) 
• Public Health 
(health records, health insurance, insurance fraud/theft…)
What Drives our Information Security Needs? 
• How does this affect us as SharePoint people? 
• How We Deploy SharePoint 
• Control Access 
• Assign Roles and Permissions 
• Establish Repeatable/Predictable Process 
• Regulatory Compliance Standards 
• Auditing & Reporting Obligations 
5
SharePoint Deployment 
• Plan your Deployments and Necessary User Accounts 
• Use Least Privileged Accounts 
• Review SharePoint deployment guide before you install 
• SharePoint is a web application built on top of SQL Server 
– Best practice: to use specific user accounts for specific purposes with least 
6 
privileges 
• Benefits: Separation of Concerns 
– Targeted auditing of account usage 
– Multiple points of redundancy 
– Minimize the risk of compromised accounts
Deployment User Accounts 
• Use 3 Different Deployment Accounts (at minimum) 
SQL Server Service Account Setup User Account SharePoint Farm Account 
7 
Assign to MSSQLSERVER and 
SQLSERVERAGENT services when 
installing SQL Server 
(ex. domainSQL_service) 
Used to install SharePoint, run 
Product Config Wizard, install 
patches/update 
Used to run the SharePoint farm; 
not just for database access (ex. 
domainsp_farm_user) 
No special domain permissions - 
given required rights in SQL Server 
during SQL setup 
Login with this when running setup 
(ex. domainsp_setup_user) 
After Product Config Wizard run, 
prompted to provide the Database 
Access Account – this is the all 
powerful farm account 
Must be local admin on each server 
in SharePoint farm (except SQL 
Server if its different box) 
Given ownership of Config 
database - also configures several 
SharePoint services (ex. timer 
service) to use this as its identity 
Before starting SharePoint setup, 
assign the securityadmin and 
dbcreator roles in SQL
Deployment User Accounts 
• At least 3 Different Deployment Accounts 
SQL Server Service Account Setup User Account SharePoint Farm Account 
• Should all be AD domain accounts 
• Do not use personal admin account, especially for Setup User Account 
• Test and Production environments should have different accounts 
• Configure central email account for all managed accounts 
8
Authentication 
• Determine that users are who they say they are – typically via login 
9 
• SharePoint 2010 Options 
• Classic Mode Authentication (Integrated Auth, NTLM, Kerberos) 
• Claims Based Authentication 
• Forms Based Authentication - through Claims Based Auth. 
– UI configuration options only available in UI upon web app creation 
– To convert non-claims based web app to claims will require PowerShell 
• SharePoint 2013 Options 
• Claims Based Authentication - default 
• Classic Mode Deprecated - Configuration UI has been removed 
(Only configurable through PowerShell)
Authorization 
• Determine if users have access to specific information 
objects and which level of access are they granted 
• Accomplished through Permissions in SharePoint 
• Allow you to secure any information object or container 
• Apply to items, documents, folders, lists, libraries, sites 
• Do not apply to individual column field values, social fields 
• Assigning Permissions Includes 
• The information object or container in question 
• The user, group or claim that is granted access 
• The permission level we are granting as part of that access 
10
Permission Examples 
11 
Users, Groups or Claims 
• Finance AD Group has Full Control on Library A 
• ProjectContractors SP Group has Read access on site B 
• John.Smith AD user has Contribute access on Document C 
• ‘SecurityClearance=Secret’ has Full Control access on Document X 
• ‘EmploymentStatus=FTE’ has Contribute access on Site Z 
User, Group, or Claim 
(also called a ‘Principle’) 
Permission Level 
(collection of permissions) 
Information Object 
(item or container)
Users Interacting with Permissions 
12
Users Interacting with Permissions 
13
Users Interacting with Permissions 
14
Users Interacting with Permissions 
15
Inherited Permission Model 
16 
• Hierarchical permission model 
• Permissions are inherited from 
level above 
• Can break inheritance and apply 
unique permissions 
• Manual process 
• Permissive Model 
SharePoint Farm 
Web Application 
Site Collection Site Collection 
Site Site 
Site 
Library List 
Document 
Web Application 
Item 
Document 
Document 
Item 
Demo Members SharePoint Group Edit 
Demo Owners SharePoint Group Full Control 
Demo Visitors SharePoint Group Read 
Finance Team Domain Group Edit 
Senior Mgmt Domain Group Full Control 
Research Team Domain Group Full Control 
Senior Mgmt Domain Group Full Control 
Research Team Domain Group Full Control 
Senior Mgmt Domain Group Full Control 
Antonio.Maio Domain User Full Control
Permissions and Security Scopes 
17 
• Every time permission 
inheritance is broken a new 
security scope is created 
• Security Scope is made of up 
principles: 
• Domain users/groups 
• SharePoint users/groups 
• Claims 
• Be aware of “Limited Access” 
• Limitations 
• Security Scopes (50K per list) 
• Size of Scope (5K per scope) 
Microsoft SharePoint Boundaries and Limits: 
http://technet.microsoft.com/en-us/library/cc262787.aspx
Information Architecture and Metadata 
• Information Architecture – The structural design of your 
information sharing environment 
• Organization and Storage 
• Identification 
• Retention 
• Business sensitivity and confidentiality 
• Metadata can provide important insight into what type of 
information you have in SharePoint 
• Recommended: Use Metadata to Classify information and 
Identify its Sensitivity 
18
Standardized Metadata 
19
Standardized Metadata 
• Implement Standardized Metadata Fields across sites, libraries, lists 
• Library or List Level 
• Site Column Level 
• Managed Metadata Service (across Site Collection or Farm) 
• Ensure users are adding metadata when adding/editing information 
20 
(mandatory fields) 
• Be aware of situations where SharePoint doesn’t request 
metadata (multi-file upload, explorer view) 
• Keep it Simple: Limit sensitivity classification to 3 or 4 labels 
– Public, Confidential, Restricted, Highly Restricted 
– Low Business Impact, Moderate Business Impact, High Business Impact 
– Unclassified, Confidential, Secret, Top Secret 
• Educate, Educate, Educate: What does each label mean/impact?
Information Governance 
Governance means setting out the structures, people, 
policies, procedures and controls to manage information 
and support an organization's immediate and future 
requirements for that information: 
21 
• Regulatory Compliance 
• Legal 
• Risk 
• Administrative 
• Environmental 
• Operational
Information Governance 
Ignorance is not always bliss… it’s problematic! 
22
Governance and SharePoint 
• SharePoint as a platform which offers services to your 
23 
organization’s users 
• Governance for the SharePoint platform means: 
• Managing existing services in a predictable way 
• Understanding how to deploy new services in a predictable way 
• Providing a clear set of guidelines for usage and administration 
• Achieve Strong Governance for SharePoint: 
1. Establish a Governance Team 
• Include stakeholders from across the organization 
2. Develop a Governance Plan 
• Cross functional - Identifies ownership for business and technical 
teams 
• Regulatory, risk, legal, admin, environmental, organizational Needs
Developing a SharePoint Governance Plan 
Key Areas to Focus 
Define Information 
Architecture/Structures 
(Includes Metadata Taxonomy) 
24 
Confidential 
Define Security Controls/Groups, 
Permissions and Roles for Assigning 
Permissions 
Define Roles, Responsibilities, 
Who has authority? 
Determine Training Needs; 
Plan to Educate User 
Community 
Define Rules for Site Creation, 
Management, Decommissioning
Conclusion 
• Develop a SharePoint Governance Plan with Key Stakeholders 
• Ignorance is not bliss… it’s problematic! 
• Understand the type of information you have 
• Develop an information architecture 
• Understand the risks to that information: accidental, insider and external threats 
• Use Metadata to identify sensitivity 
• Educate end users on significance of sensitivities – make them part of the solution 
• Deploying SharePoint with Appropriate Least Privileged Accounts 
• Determine your Authentication and Authorization Needs 
• Understand how permissions work 
• Plan for how permissions are given and managed 
• Understand SharePoint Security Features 
• Others: Web App Policies, Anonymous Users, Information Rights Management, Privileged 
25 
Users , Event Auditing
Please Leave Feedback During Q&A 
26 
If you leave session 
feedback and provide 
contact information in 
the survey, you will be 
qualified for a prize 
Scan the QR Code to 
the right or go to 
http://bit.ly/1p13f3n
Thanks to all our Sponsors! 
27

More Related Content

What's hot

Sp24 design a share point 2013 architecture – the basics
Sp24   design a share point 2013 architecture – the basicsSp24   design a share point 2013 architecture – the basics
Sp24 design a share point 2013 architecture – the basicsAlexander Meijers
 
Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...CoLaboraDK
 
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointHow Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointAntonioMaio2
 
Best Practices to SharePoint Physical and Information Architecture
Best Practices to SharePoint Physical and Information ArchitectureBest Practices to SharePoint Physical and Information Architecture
Best Practices to SharePoint Physical and Information ArchitectureJoel Oleson
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat teamAntonioMaio2
 
SharePoint Saturday Ottawa - How secure is my data in office 365?
SharePoint Saturday Ottawa - How secure is my data in office 365?SharePoint Saturday Ottawa - How secure is my data in office 365?
SharePoint Saturday Ottawa - How secure is my data in office 365?AntonioMaio2
 
SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365NCCOMMS
 
Securing the SharePoint Platform
Securing the SharePoint PlatformSecuring the SharePoint Platform
Securing the SharePoint PlatformBert Johnson
 
Give Your SharePoint Site a Physical
Give Your SharePoint Site a PhysicalGive Your SharePoint Site a Physical
Give Your SharePoint Site a PhysicalAscendum Solutions
 
Highlights from the SharePoint Conference 2011
Highlights from the SharePoint Conference 2011Highlights from the SharePoint Conference 2011
Highlights from the SharePoint Conference 2011Intergen
 
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point   an...Developing custom claim providers to enable authorization in share point   an...
Developing custom claim providers to enable authorization in share point an...AntonioMaio2
 
Options for Building a Modern Extranet
Options for Building a Modern ExtranetOptions for Building a Modern Extranet
Options for Building a Modern ExtranetChristian Buckley
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...Peter Selch Dahl
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsDrew Madelung
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...Peter Selch Dahl
 
Old CloudHaven presentation for SW Eng/Comp Sci Students
Old CloudHaven presentation for SW Eng/Comp Sci StudentsOld CloudHaven presentation for SW Eng/Comp Sci Students
Old CloudHaven presentation for SW Eng/Comp Sci StudentsRichardVann4
 
SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013
SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013
SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013Jasper Oosterveld
 

What's hot (20)

Sp24 design a share point 2013 architecture – the basics
Sp24   design a share point 2013 architecture – the basicsSp24   design a share point 2013 architecture – the basics
Sp24 design a share point 2013 architecture – the basics
 
Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...
 
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointHow Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
 
Best Practices to SharePoint Physical and Information Architecture
Best Practices to SharePoint Physical and Information ArchitectureBest Practices to SharePoint Physical and Information Architecture
Best Practices to SharePoint Physical and Information Architecture
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
 
SharePoint Saturday Ottawa - How secure is my data in office 365?
SharePoint Saturday Ottawa - How secure is my data in office 365?SharePoint Saturday Ottawa - How secure is my data in office 365?
SharePoint Saturday Ottawa - How secure is my data in office 365?
 
SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365
 
Securing the SharePoint Platform
Securing the SharePoint PlatformSecuring the SharePoint Platform
Securing the SharePoint Platform
 
Give Your SharePoint Site a Physical
Give Your SharePoint Site a PhysicalGive Your SharePoint Site a Physical
Give Your SharePoint Site a Physical
 
Why Web 2.0?
Why Web 2.0?Why Web 2.0?
Why Web 2.0?
 
Highlights from the SharePoint Conference 2011
Highlights from the SharePoint Conference 2011Highlights from the SharePoint Conference 2011
Highlights from the SharePoint Conference 2011
 
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point   an...Developing custom claim providers to enable authorization in share point   an...
Developing custom claim providers to enable authorization in share point an...
 
Options for Building a Modern Extranet
Options for Building a Modern ExtranetOptions for Building a Modern Extranet
Options for Building a Modern Extranet
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
 
Old CloudHaven presentation for SW Eng/Comp Sci Students
Old CloudHaven presentation for SW Eng/Comp Sci StudentsOld CloudHaven presentation for SW Eng/Comp Sci Students
Old CloudHaven presentation for SW Eng/Comp Sci Students
 
Share Point online
Share Point onlineShare Point online
Share Point online
 
SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013
SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013
SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013
 

Viewers also liked

Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013AntonioMaio2
 
Infrastructure Best Practices for SharePoint On-Premises presented by Michael...
Infrastructure Best Practices for SharePoint On-Premises presented by Michael...Infrastructure Best Practices for SharePoint On-Premises presented by Michael...
Infrastructure Best Practices for SharePoint On-Premises presented by Michael...European SharePoint Conference
 
Ultimate SharePoint 2013 Infrastructure Best Practices Session - SPKSLO 2012
Ultimate SharePoint 2013 Infrastructure Best Practices Session - SPKSLO 2012Ultimate SharePoint 2013 Infrastructure Best Practices Session - SPKSLO 2012
Ultimate SharePoint 2013 Infrastructure Best Practices Session - SPKSLO 2012Michael Noel
 
The SharePoint 2013 App Model
The SharePoint 2013 App ModelThe SharePoint 2013 App Model
The SharePoint 2013 App ModelSPC Adriatics
 
Office 365 Deployment Strategies 2.0
Office 365 Deployment Strategies 2.0Office 365 Deployment Strategies 2.0
Office 365 Deployment Strategies 2.0Bert Johnson
 
10 Reasons to Avoid Folders in SharePoint 2013/2010
10 Reasons to Avoid Folders in SharePoint 2013/201010 Reasons to Avoid Folders in SharePoint 2013/2010
10 Reasons to Avoid Folders in SharePoint 2013/2010Bobby Chang
 
Online safety coaching module teachers
Online safety coaching module teachersOnline safety coaching module teachers
Online safety coaching module teachersAmber Burkholder
 
Alberto Di Minin - Open Innovation 2.0 - Findings of JRC study
Alberto Di Minin - Open Innovation 2.0 - Findings of JRC studyAlberto Di Minin - Open Innovation 2.0 - Findings of JRC study
Alberto Di Minin - Open Innovation 2.0 - Findings of JRC studyAlberto Minin
 
Bart Van Looy a Quantitative approach to IP Management Research
Bart Van Looy a Quantitative approach to IP Management ResearchBart Van Looy a Quantitative approach to IP Management Research
Bart Van Looy a Quantitative approach to IP Management ResearchAlberto Minin
 
DHS Class of 1973
DHS Class of 1973DHS Class of 1973
DHS Class of 1973Rick Mills
 
Little league power point
Little league power pointLittle league power point
Little league power pointdsidelinger
 
Institutional presentation 1_q13
Institutional presentation 1_q13Institutional presentation 1_q13
Institutional presentation 1_q13Arezzori
 
Impresario credentials
Impresario credentialsImpresario credentials
Impresario credentialsdelvasani
 
Ela - Gagan Brochure - New 3
Ela - Gagan Brochure - New 3Ela - Gagan Brochure - New 3
Ela - Gagan Brochure - New 3gagandevelopers
 
05 17-2011 - 1 q11 conference call presentation
05 17-2011 - 1 q11 conference call presentation05 17-2011 - 1 q11 conference call presentation
05 17-2011 - 1 q11 conference call presentationArezzori
 
Institutional presentation 3 q13
Institutional presentation 3 q13Institutional presentation 3 q13
Institutional presentation 3 q13Arezzori
 
September 2011 - institutional presentation - sep 2011
September 2011 - institutional presentation - sep 2011September 2011 - institutional presentation - sep 2011
September 2011 - institutional presentation - sep 2011Arezzori
 

Viewers also liked (20)

Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013
 
Infrastructure Best Practices for SharePoint On-Premises presented by Michael...
Infrastructure Best Practices for SharePoint On-Premises presented by Michael...Infrastructure Best Practices for SharePoint On-Premises presented by Michael...
Infrastructure Best Practices for SharePoint On-Premises presented by Michael...
 
Ultimate SharePoint 2013 Infrastructure Best Practices Session - SPKSLO 2012
Ultimate SharePoint 2013 Infrastructure Best Practices Session - SPKSLO 2012Ultimate SharePoint 2013 Infrastructure Best Practices Session - SPKSLO 2012
Ultimate SharePoint 2013 Infrastructure Best Practices Session - SPKSLO 2012
 
The SharePoint 2013 App Model
The SharePoint 2013 App ModelThe SharePoint 2013 App Model
The SharePoint 2013 App Model
 
Office 365 Deployment Strategies 2.0
Office 365 Deployment Strategies 2.0Office 365 Deployment Strategies 2.0
Office 365 Deployment Strategies 2.0
 
10 Reasons to Avoid Folders in SharePoint 2013/2010
10 Reasons to Avoid Folders in SharePoint 2013/201010 Reasons to Avoid Folders in SharePoint 2013/2010
10 Reasons to Avoid Folders in SharePoint 2013/2010
 
Online safety coaching module teachers
Online safety coaching module teachersOnline safety coaching module teachers
Online safety coaching module teachers
 
Alberto Di Minin - Open Innovation 2.0 - Findings of JRC study
Alberto Di Minin - Open Innovation 2.0 - Findings of JRC studyAlberto Di Minin - Open Innovation 2.0 - Findings of JRC study
Alberto Di Minin - Open Innovation 2.0 - Findings of JRC study
 
Bart Van Looy a Quantitative approach to IP Management Research
Bart Van Looy a Quantitative approach to IP Management ResearchBart Van Looy a Quantitative approach to IP Management Research
Bart Van Looy a Quantitative approach to IP Management Research
 
DHS Class of 1973
DHS Class of 1973DHS Class of 1973
DHS Class of 1973
 
Little league power point
Little league power pointLittle league power point
Little league power point
 
月亮西瓜2003
月亮西瓜2003月亮西瓜2003
月亮西瓜2003
 
Een andere manier van werken.
Een andere manier van werken.Een andere manier van werken.
Een andere manier van werken.
 
Institutional presentation 1_q13
Institutional presentation 1_q13Institutional presentation 1_q13
Institutional presentation 1_q13
 
Impresario credentials
Impresario credentialsImpresario credentials
Impresario credentials
 
Ela - Gagan Brochure - New 3
Ela - Gagan Brochure - New 3Ela - Gagan Brochure - New 3
Ela - Gagan Brochure - New 3
 
05 17-2011 - 1 q11 conference call presentation
05 17-2011 - 1 q11 conference call presentation05 17-2011 - 1 q11 conference call presentation
05 17-2011 - 1 q11 conference call presentation
 
Institutional presentation 3 q13
Institutional presentation 3 q13Institutional presentation 3 q13
Institutional presentation 3 q13
 
September 2011 - institutional presentation - sep 2011
September 2011 - institutional presentation - sep 2011September 2011 - institutional presentation - sep 2011
September 2011 - institutional presentation - sep 2011
 
Anne rose 22
Anne rose 22Anne rose 22
Anne rose 22
 

Similar to Best practices for security and governance in share point 2013 published

Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Christian Buckley
 
Best Practices for Security and Governance in SharePoint 2013
Best Practices for Security and Governance in SharePoint 2013  Best Practices for Security and Governance in SharePoint 2013
Best Practices for Security and Governance in SharePoint 2013 InnoTech
 
March 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarRobert Crane
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarConcept Searching, Inc
 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudAntonioMaio2
 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudChristian Buckley
 
SharePoint Governance: stories, myths, legends and real life
SharePoint Governance: stories, myths, legends and real lifeSharePoint Governance: stories, myths, legends and real life
SharePoint Governance: stories, myths, legends and real lifeToni Frankola
 
SC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsSC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsFredBrandonAuthorMCP
 
Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.Aspenware
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Securitymferraz
 
SharePoint and GDPR Compliance
SharePoint and GDPR Compliance SharePoint and GDPR Compliance
SharePoint and GDPR Compliance SysKit Ltd
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365David Broussard
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Lance Peterman
 
Segregation of Duties and Sensitive Access as a Service
Segregation of Duties and Sensitive Access as a ServiceSegregation of Duties and Sensitive Access as a Service
Segregation of Duties and Sensitive Access as a ServiceSmart ERP Solutions, Inc.
 
Threat from within
Threat from withinThreat from within
Threat from withinNuxeo
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Miguel Isidoro
 
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with GovernanceDon Donais
 

Similar to Best practices for security and governance in share point 2013 published (20)

Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
 
Best Practices for Security and Governance in SharePoint 2013
Best Practices for Security and Governance in SharePoint 2013  Best Practices for Security and Governance in SharePoint 2013
Best Practices for Security and Governance in SharePoint 2013
 
March 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know Webinar
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the Cloud
 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the Cloud
 
SharePoint Governance: stories, myths, legends and real life
SharePoint Governance: stories, myths, legends and real lifeSharePoint Governance: stories, myths, legends and real life
SharePoint Governance: stories, myths, legends and real life
 
SC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsSC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance Solutions
 
Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
 
SharePoint and GDPR Compliance
SharePoint and GDPR Compliance SharePoint and GDPR Compliance
SharePoint and GDPR Compliance
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Segregation of Duties and Sensitive Access as a Service
Segregation of Duties and Sensitive Access as a ServiceSegregation of Duties and Sensitive Access as a Service
Segregation of Duties and Sensitive Access as a Service
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Threat from within
Threat from withinThreat from within
Threat from within
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365
 
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
 
Intranet content management (webinar)
Intranet content management (webinar)Intranet content management (webinar)
Intranet content management (webinar)
 

More from AntonioMaio2

Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365AntonioMaio2
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maioAntonioMaio2
 
Information security in office 365 a shared responsibility - antonio maio
Information security in office 365   a shared responsibility - antonio maioInformation security in office 365   a shared responsibility - antonio maio
Information security in office 365 a shared responsibility - antonio maioAntonioMaio2
 
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security   new innovations from microsoft ignite - antonio maioOffice 365 security   new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maioAntonioMaio2
 
What’s new in SharePoint 2016!
What’s new in SharePoint 2016!What’s new in SharePoint 2016!
What’s new in SharePoint 2016!AntonioMaio2
 
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365AntonioMaio2
 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...AntonioMaio2
 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013AntonioMaio2
 
Keeping SharePoint Always On
Keeping SharePoint Always OnKeeping SharePoint Always On
Keeping SharePoint Always OnAntonioMaio2
 
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013AntonioMaio2
 
Share point security 101 sps-ottawa 2012 - antonio maio
Share point security 101   sps-ottawa 2012 - antonio maioShare point security 101   sps-ottawa 2012 - antonio maio
Share point security 101 sps-ottawa 2012 - antonio maioAntonioMaio2
 
Webinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint SecurityWebinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint SecurityAntonioMaio2
 
SharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioSharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioAntonioMaio2
 

More from AntonioMaio2 (14)

Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
 
Information security in office 365 a shared responsibility - antonio maio
Information security in office 365   a shared responsibility - antonio maioInformation security in office 365   a shared responsibility - antonio maio
Information security in office 365 a shared responsibility - antonio maio
 
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security   new innovations from microsoft ignite - antonio maioOffice 365 security   new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maio
 
What’s new in SharePoint 2016!
What’s new in SharePoint 2016!What’s new in SharePoint 2016!
What’s new in SharePoint 2016!
 
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365
 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...
 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013
 
Keeping SharePoint Always On
Keeping SharePoint Always OnKeeping SharePoint Always On
Keeping SharePoint Always On
 
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
 
Share point security 101 sps-ottawa 2012 - antonio maio
Share point security 101   sps-ottawa 2012 - antonio maioShare point security 101   sps-ottawa 2012 - antonio maio
Share point security 101 sps-ottawa 2012 - antonio maio
 
Webinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint SecurityWebinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint Security
 
SharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioSharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio Maio
 

Recently uploaded

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 

Recently uploaded (20)

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 

Best practices for security and governance in share point 2013 published

  • 1. Best Practices for Security and Governance in SharePoint 2013 Antonio Maio Protiviti, Senior SharePoint Architect & Senior Manager Microsoft SharePoint Server MVP Email: Antonio.maio@protiviti.com Blog: www.trustsharepoint.com Slide share: http://www.slideshare.net/AntonioMaio2 Twitter: 0 @AntonioMaio2
  • 2. Welcome to Houston TechFest Thank you for being a part of the 8th Annual Houston TechFest! • Please turn off all electronic devices or set them to vibrate. • If you must take a phone call, please do so in the lobby so as not to disturb others. • Thanks to our Diamond Sponsors: 1
  • 3. 2
  • 4. What Drives our Information Security Needs? • Information Security comes down to 2 or 3 drivers 4 • Protecting Your Investments (intellectual property, digital assets, competitive advantage…) • Reducing Your Liability (avoid compliance violations, fines/sanctions, reputation issues…) • Public Safety or Mission Success (protect classified information, mission plans, reputation issues…) • Public Health (health records, health insurance, insurance fraud/theft…)
  • 5. What Drives our Information Security Needs? • How does this affect us as SharePoint people? • How We Deploy SharePoint • Control Access • Assign Roles and Permissions • Establish Repeatable/Predictable Process • Regulatory Compliance Standards • Auditing & Reporting Obligations 5
  • 6. SharePoint Deployment • Plan your Deployments and Necessary User Accounts • Use Least Privileged Accounts • Review SharePoint deployment guide before you install • SharePoint is a web application built on top of SQL Server – Best practice: to use specific user accounts for specific purposes with least 6 privileges • Benefits: Separation of Concerns – Targeted auditing of account usage – Multiple points of redundancy – Minimize the risk of compromised accounts
  • 7. Deployment User Accounts • Use 3 Different Deployment Accounts (at minimum) SQL Server Service Account Setup User Account SharePoint Farm Account 7 Assign to MSSQLSERVER and SQLSERVERAGENT services when installing SQL Server (ex. domainSQL_service) Used to install SharePoint, run Product Config Wizard, install patches/update Used to run the SharePoint farm; not just for database access (ex. domainsp_farm_user) No special domain permissions - given required rights in SQL Server during SQL setup Login with this when running setup (ex. domainsp_setup_user) After Product Config Wizard run, prompted to provide the Database Access Account – this is the all powerful farm account Must be local admin on each server in SharePoint farm (except SQL Server if its different box) Given ownership of Config database - also configures several SharePoint services (ex. timer service) to use this as its identity Before starting SharePoint setup, assign the securityadmin and dbcreator roles in SQL
  • 8. Deployment User Accounts • At least 3 Different Deployment Accounts SQL Server Service Account Setup User Account SharePoint Farm Account • Should all be AD domain accounts • Do not use personal admin account, especially for Setup User Account • Test and Production environments should have different accounts • Configure central email account for all managed accounts 8
  • 9. Authentication • Determine that users are who they say they are – typically via login 9 • SharePoint 2010 Options • Classic Mode Authentication (Integrated Auth, NTLM, Kerberos) • Claims Based Authentication • Forms Based Authentication - through Claims Based Auth. – UI configuration options only available in UI upon web app creation – To convert non-claims based web app to claims will require PowerShell • SharePoint 2013 Options • Claims Based Authentication - default • Classic Mode Deprecated - Configuration UI has been removed (Only configurable through PowerShell)
  • 10. Authorization • Determine if users have access to specific information objects and which level of access are they granted • Accomplished through Permissions in SharePoint • Allow you to secure any information object or container • Apply to items, documents, folders, lists, libraries, sites • Do not apply to individual column field values, social fields • Assigning Permissions Includes • The information object or container in question • The user, group or claim that is granted access • The permission level we are granting as part of that access 10
  • 11. Permission Examples 11 Users, Groups or Claims • Finance AD Group has Full Control on Library A • ProjectContractors SP Group has Read access on site B • John.Smith AD user has Contribute access on Document C • ‘SecurityClearance=Secret’ has Full Control access on Document X • ‘EmploymentStatus=FTE’ has Contribute access on Site Z User, Group, or Claim (also called a ‘Principle’) Permission Level (collection of permissions) Information Object (item or container)
  • 12. Users Interacting with Permissions 12
  • 13. Users Interacting with Permissions 13
  • 14. Users Interacting with Permissions 14
  • 15. Users Interacting with Permissions 15
  • 16. Inherited Permission Model 16 • Hierarchical permission model • Permissions are inherited from level above • Can break inheritance and apply unique permissions • Manual process • Permissive Model SharePoint Farm Web Application Site Collection Site Collection Site Site Site Library List Document Web Application Item Document Document Item Demo Members SharePoint Group Edit Demo Owners SharePoint Group Full Control Demo Visitors SharePoint Group Read Finance Team Domain Group Edit Senior Mgmt Domain Group Full Control Research Team Domain Group Full Control Senior Mgmt Domain Group Full Control Research Team Domain Group Full Control Senior Mgmt Domain Group Full Control Antonio.Maio Domain User Full Control
  • 17. Permissions and Security Scopes 17 • Every time permission inheritance is broken a new security scope is created • Security Scope is made of up principles: • Domain users/groups • SharePoint users/groups • Claims • Be aware of “Limited Access” • Limitations • Security Scopes (50K per list) • Size of Scope (5K per scope) Microsoft SharePoint Boundaries and Limits: http://technet.microsoft.com/en-us/library/cc262787.aspx
  • 18. Information Architecture and Metadata • Information Architecture – The structural design of your information sharing environment • Organization and Storage • Identification • Retention • Business sensitivity and confidentiality • Metadata can provide important insight into what type of information you have in SharePoint • Recommended: Use Metadata to Classify information and Identify its Sensitivity 18
  • 20. Standardized Metadata • Implement Standardized Metadata Fields across sites, libraries, lists • Library or List Level • Site Column Level • Managed Metadata Service (across Site Collection or Farm) • Ensure users are adding metadata when adding/editing information 20 (mandatory fields) • Be aware of situations where SharePoint doesn’t request metadata (multi-file upload, explorer view) • Keep it Simple: Limit sensitivity classification to 3 or 4 labels – Public, Confidential, Restricted, Highly Restricted – Low Business Impact, Moderate Business Impact, High Business Impact – Unclassified, Confidential, Secret, Top Secret • Educate, Educate, Educate: What does each label mean/impact?
  • 21. Information Governance Governance means setting out the structures, people, policies, procedures and controls to manage information and support an organization's immediate and future requirements for that information: 21 • Regulatory Compliance • Legal • Risk • Administrative • Environmental • Operational
  • 22. Information Governance Ignorance is not always bliss… it’s problematic! 22
  • 23. Governance and SharePoint • SharePoint as a platform which offers services to your 23 organization’s users • Governance for the SharePoint platform means: • Managing existing services in a predictable way • Understanding how to deploy new services in a predictable way • Providing a clear set of guidelines for usage and administration • Achieve Strong Governance for SharePoint: 1. Establish a Governance Team • Include stakeholders from across the organization 2. Develop a Governance Plan • Cross functional - Identifies ownership for business and technical teams • Regulatory, risk, legal, admin, environmental, organizational Needs
  • 24. Developing a SharePoint Governance Plan Key Areas to Focus Define Information Architecture/Structures (Includes Metadata Taxonomy) 24 Confidential Define Security Controls/Groups, Permissions and Roles for Assigning Permissions Define Roles, Responsibilities, Who has authority? Determine Training Needs; Plan to Educate User Community Define Rules for Site Creation, Management, Decommissioning
  • 25. Conclusion • Develop a SharePoint Governance Plan with Key Stakeholders • Ignorance is not bliss… it’s problematic! • Understand the type of information you have • Develop an information architecture • Understand the risks to that information: accidental, insider and external threats • Use Metadata to identify sensitivity • Educate end users on significance of sensitivities – make them part of the solution • Deploying SharePoint with Appropriate Least Privileged Accounts • Determine your Authentication and Authorization Needs • Understand how permissions work • Plan for how permissions are given and managed • Understand SharePoint Security Features • Others: Web App Policies, Anonymous Users, Information Rights Management, Privileged 25 Users , Event Auditing
  • 26. Please Leave Feedback During Q&A 26 If you leave session feedback and provide contact information in the survey, you will be qualified for a prize Scan the QR Code to the right or go to http://bit.ly/1p13f3n
  • 27. Thanks to all our Sponsors! 27