DISA STIG SharePoint 2013 v2r3

Audit Details

Name: DISA STIG SharePoint 2013 v2r3

Updated: 4/12/2023

Authority: DISA STIG

Plugin: Windows

Revision: 1.4

Estimated Item Count: 44

File Details

Filename: DISA_STIG_SharePoint_2013_v2r3.audit

Size: 136 kB

MD5: a8b0d7d61a670c05c8d77707ceb556a7
SHA256: 7bbcfcaef914aa835d8fa2299eb8983a4a8367a5b80d1b741481918057d1792a

Audit Items

DescriptionCategories
DISA_STIG_SharePoint_2013_v2r3.audit from DISA Microsoft SharePoint 2013 v2r3 STIG
SP13-00-000005 - SharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired.

ACCESS CONTROL

SP13-00-000010 - SharePoint must maintain and support the use of security attributes with stored information - 'Custom content types have been defined for Site'

CONFIGURATION MANAGEMENT

SP13-00-000010 - SharePoint must maintain and support the use of security attributes with stored information - Document Library'

CONFIGURATION MANAGEMENT

SP13-00-000015 - SharePoint must utilize approved cryptography to protect the confidentiality of remote access sessions.

ACCESS CONTROL

SP13-00-000020 - SharePoint must use cryptography to protect the integrity of the remote access session.

ACCESS CONTROL

SP13-00-000025 - SharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited.

ACCESS CONTROL

SP13-00-000030 - SharePoint must enforce approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy.

ACCESS CONTROL

SP13-00-000035 - SharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied.

CONFIGURATION MANAGEMENT

SP13-00-000040 - SharePoint must provide the ability to prohibit the transfer of unsanctioned information in accordance with security policy.

ACCESS CONTROL

SP13-00-000045 - SharePoint must display an approved system use notification message or banner before granting access to the system.

ACCESS CONTROL

SP13-00-000055 - SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system.

AUDIT AND ACCOUNTABILITY

SP13-00-000060 - SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds - ConnectionTimeout

CONFIGURATION MANAGEMENT

SP13-00-000060 - SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds - maxBandwidth

CONFIGURATION MANAGEMENT

SP13-00-000060 - SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds - maxConnections

CONFIGURATION MANAGEMENT

SP13-00-000065 - SharePoint must prevent the execution of prohibited mobile code.

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000075 - SharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.

IDENTIFICATION AND AUTHENTICATION

SP13-00-000080 - SharePoint must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

IDENTIFICATION AND AUTHENTICATION

SP13-00-000085 - SharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.

IDENTIFICATION AND AUTHENTICATION

SP13-00-000095 - SharePoint must employ NSA-approved cryptography to protect classified information.

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000100 - SharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000105 - SharePoint must validate the integrity of security attributes exchanged between systems.

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000110 - SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000115 - SharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded.

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000120 - SharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec.

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000125 - SharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions.

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000130 - SharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000135 - SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000140 - SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.

ACCESS CONTROL

SP13-00-000145 - SharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.

IDENTIFICATION AND AUTHENTICATION

SP13-00-000150 - The SharePoint Central Administration site must not be accessible from Extranet or Internet connections.

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000155 - For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ.

ACCESS CONTROL

SP13-00-000160 - The SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD).

CONFIGURATION MANAGEMENT

SP13-00-000165 - The SharePoint farm service account (database access account) must be configured with minimum privileges on the SQL server.

CONFIGURATION MANAGEMENT

SP13-00-000170 - The SharePoint setup account must be configured with the minimum privileges in Active Directory.

CONFIGURATION MANAGEMENT

SP13-00-000175 - The SharePoint setup account must be configured with the minimum privileges on the SQL server.

CONFIGURATION MANAGEMENT

SP13-00-000180 - The SharePoint setup account must be configured with the minimum privileges for the local server.

CONFIGURATION MANAGEMENT

SP13-00-000185 - A secondary SharePoint site collection administrator must be defined when creating a new site collection.

CONFIGURATION MANAGEMENT

SP13-00-000190 - When configuring SharePoint Central Administration, the port number selected must comply with DoD Ports and Protocol Management (PPSM) program requirements.

CONFIGURATION MANAGEMENT

SP13-00-000195 - SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured - 'Attempt to Clean Infected Documents is enabled'

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000195 - SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured - 'Scan Documents on Download is enabled'

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000195 - SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured - 'Scan Documents on Upload is enabled'

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000205 - SharePoint server access to the Online Web Part Gallery must be configured for limited access.

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000210 - The SharePoint farm service account (database access account) must be configured with the minimum privileges for the local server.

CONFIGURATION MANAGEMENT