SlideShare une entreprise Scribd logo
1  sur  23
Stop Those Prying Eyes Getting to Your Data
Liam Cleary
Solution Architect | SharePoint MVP
About Me
•   Solution Architect @ SusQtech (Winchester, VA)
•   SharePoint MVP since 2007
•   Working with SharePoint since 2002
•   Worked on all kinds of projects
    •   Internet
    •   Intranet
    •   Extranet
    •   Anything SharePoint Really
• Involved in Architecture, Deployment, Customization and
  Development of SharePoint
“The only real security that a man can have
in this world is a reserve of knowledge,
experience and ability.”
Henry Ford

“We spend our time searching for security
and hate it when we get it.”
John Steinbeck
Agenda
• SharePoint Security in General
• SharePoint Topologies
  • Secure Topologies
• Protecting SharePoint
  •   Authentication and Authorization
  •   Firewall
  •   DRM
  •   Data Encryption
• Guidelines for Protecting SharePoint
SharePoint Security in General
Terminologies
• Permission: They are the unit of access that represents the individual task that can be
  performed on a securable object.
• Permission Level: Predefined sets of permissions that are given to users.
• User: Is the smallest object that access can be granted. User could be Active Directory
  account.
• User Groups: Is set of users that are grouped for common properties and ease of
  managing.
• Securable Object: Web (Site), List, Library and Item.
• Inheritance: When a securable object is created, it inherits user access of it`s parent
  object.
• Site Groups: When a new site is created group
  of sites are created automatically for the user.
SharePoint Security in General
• Logical Approach
   •   Item
   •   List or Library
   •   Site
   •   Site Collection
   •   Web Application
   •   Farm
• Service Applications
   • Farm
   • Cross Farm
• SharePoint performs Authorization
   •   Valid Authentication Token
   •   Role
   •   Security Group
   •   Claim Attribute
SharePoint Topologies – Edge Firewall




• Advantages                                         • Disadvantage
• This is the simplest solution that requires the
  least amount of hardware and configuration.        • This configuration results in a single
• The entire server farm is located within the         firewall that separates the corporate
  corporate network.                                   internal network from the Internet.
• There is a single point of data:
   •   Data is located within the trusted network.
   •   Data maintenance occurs in one place.
   •   A single farm is used for both internal and
       external requests; this ensures that all
       authorized users view the same content.
• Internal user requests are not passed
  through a proxy server.
• UAG pre-authenticates users.
SharePoint Topologies – Back-to-back Perimeter




 • Advantages                                     • Disadvantage
 • Content is isolated to a single farm on the    • The back-to-back perimeter topology
   extranet, simplifying sharing and                requires additional network
   maintenance of content across the                infrastructure and configuration.
   intranet and the extranet.
 • External user access is isolated to the
   perimeter network.
 • If the extranet is compromised, damage is
   potentially limited to the affected layer or
   to the perimeter network.
SharePoint Topologies – Back-to-back Perimeter with Cross-Farm Services




 • Advantages                                    • Disadvantages
 • Services are centrally managed inside the     • Some service applications require
   corporate network.                              two-way trust between domains, for
 • Service applications that involve many          example, User Profile and Secure
   contributors, such as Managed Metadata,         Store Service.
   are located where the contributor
   accounts are located. Special access is not
   required for the perimeter network.
SharePoint Topologies – Back-to-back Perimeter with Content Publishing




 • Advantages                                    • Disadvantages
 • Customer-facing and partner-facing            • Additional hardware is required to
                                                   maintain two separate farms.
   content is isolated in a separate perimeter
                                                 • Data overhead is greater. Content is
   network.                                        maintained and coordinated in two
 • Content publishing can be automated.            different farms and networks.
 • If content in the perimeter network is        • Changes to content in the perimeter
   compromised or corrupted as a result of         network are not reflected in the
                                                   corporate network. Consequently,
   Internet access, the integrity of the           content publishing to the perimeter
   content in the corporate network is             domain is not a workable choice for
   retained.                                       extranet sites that are collaborative.
SharePoint Topologies – Split Back-to-back




• Advantages                                   • Disadvantages
• Computers running SQL Server are not         • The complexity of the solution is greatly
  hosted inside the perimeter network.           increased.
• Farm components within both the              • Intruders who compromise perimeter
  corporate network and the perimeter            network resources might gain access to
  network can share the same databases.          farm content stored in the corporate
                                                 network by using the server farm accounts.
• Content can be isolated to a single farm
  inside the corporate network, which          • Inter-farm communication is split across
  simplifies sharing and maintaining content     two domains.
  across the corporate network and the
  perimeter network.
SharePoint Topologies – Split Back-to-back optimized for Content Publishing




  • Advantages                                   • Disadvantages
  • Computers running SQL Server are not         • The complexity of the solution is greatly
    hosted inside the perimeter network.           increased.
  • Farm components within both the              • Intruders who compromise perimeter
    corporate network and the perimeter            network resources might gain access to
    network can share the same databases.          farm content stored in the corporate
                                                   network by using the server farm accounts.
  • Content can be isolated to a single farm
    inside the corporate network, which          • Inter-farm communication is split across
    simplifies sharing and maintaining content     two domains.
    across the corporate network and the
    perimeter network.
Protecting SharePoint - Authentication and Authorization

 • Windows
   •   NTLM
   •   Kerberos
   •   Basic
   •   Anonymous
   •   Digest
 • Forms-based Authentication
   • Lightweight Directory Access Protocol (LDAP)
   • Microsoft SQL Server
   • ASP.NET Membership and Role Providers
 • SAML Token-based Authentication
   • Active Directory Federated Services
   • 3rd Party Identity Provider
   • Lightweight Directory Access Protocol (LDAP)
Protecting SharePoint - Authentication and Authorization

 Claims Authentication?
   • Wide Support
   • Standards Based
        • WS-Federation 1.1
        • WS-Trust 1.4
        • SAML Token 1.1 AuthN
   • Single Sign On
   • Federation
        • Already many providers, Live, Google, Facebook etc.
   •   Microsoft standard approach
   •   Fed up custom coding everything, every time
   •   Gets round (some) Office Integration problems
   •   Easy to configure with little effort
        • Multiple Web Config changes, Web Application Changes and then of
          course the actual configuration of your identity provider
Protecting SharePoint – ADFS 2.0

 •   Standard Based Authentication
 •   Supports Multiple Authentication Mechanisms
 •   Enables Federation – federationmetadata.xml
 •   No “Code” claims augmentation
     • Claim Rules
        • Custom Mappings
        • Custom Connections
     • Unique Scripting Language
     • Supports Custom Connections
        • Inherit from “IAttributeStore” class
 • Central “off-loaded” security mechanism
 • SSO Support
ADFS
Protecting SharePoint – Digital Rights Management

 • Protection over the Access Control
 • Integration with Office
   • Office & SharePoint
   • .NET & Silverlight
 • Internal & External
   • Requires Certificates for Encryption
 • Protects more than just documents
   • Email too 
RIGHTS MANAGEMENT
Protecting SharePoint – Data Encryption

 • Various Options
   • Cell Level – Encrypts Cells in Databases
       • Not Usable with SharePoint
   • File Level (Bit Locker, EFS)
       • Could be used with SharePoint
   • RMS
       • Could be used with SharePoint
 • Transparent Data Encryption
   • SQL Level
   • Content Database Level
       •   Specifically set
       •   Backups cannot be restored to other servers without the “Private Key”
       •   Does not protect data in memory – potential security risk
       •   Prescribed Approach:
           http://www.slideshare.net/michaeltnoel/transparent-data-encryption-
           for-sharepoint-content-databases
SHOW ME THE MONEY
Protecting SharePoint – Server Guidelines

 • Block the standard SQL Server ports
 • Configure SQL Server database instances to listen on a nonstandard
   port
 • Configure SQL client aliases
   • Bypass the actual server name
 • Implement Windows Firewall / IPsec Policies
   • Custom Rules as needed
 • Utilize Group Policies
 • Utilize Claim Attributes
   •   Implement ADFS when using Claims Authentication
   •   Add Attribute Store
   •   Add Custom Attribute Rules
   •   Secure Communication with SSL
 • Follow server hardening plan
   • http://technet.microsoft.com/en-us/library/cc262849.aspx
Protecting SharePoint – General Guidelines

 • Make it Clear What Content Is Permissible
     • Security and Permission
     • Rights Management Services
 •   Educate Employees
 •   Use Classification to Guide Behavior
 •   Don't Forget to Enforce the Policies
 •   Utilize Claim Attributes
     • Augmentation using ADFS
 • Use out of the box configuration
     •   Users or Active Directory Groups
     •   Provider Roles
     •   SharePoint Site Groups
     •   Permission Groups assigned to SharePoint Site Groups
Thank You



www.cloudshare.com                 www.susqtech.com


      •   Personal Email: liamcleary@msn.com
      •   Work: http://www.susqtech.com
      •   Twitter: @helloitsliam
      •   Blog: www.helloitsliam.com

Contenu connexe

Tendances

Developing for SharePoint Online
Developing for SharePoint OnlineDeveloping for SharePoint Online
Developing for SharePoint OnlineAri Bakker
 
Oracle web center
Oracle web centerOracle web center
Oracle web centerEast Le
 
What‘s new in Office 365
What‘s new in Office 365What‘s new in Office 365
What‘s new in Office 365SPC Adriatics
 
Unlock your Big Data with Analytics and BI on Office 365 - OFF103
Unlock your Big Data with Analytics and BI on Office 365 - OFF103Unlock your Big Data with Analytics and BI on Office 365 - OFF103
Unlock your Big Data with Analytics and BI on Office 365 - OFF103Brian Culver
 
Oracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewOracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewEslam Hafez
 
Webcenter Portlal training...
Webcenter Portlal training...Webcenter Portlal training...
Webcenter Portlal training...Vinay Kumar
 
Portal and Intranets
Portal and Intranets Portal and Intranets
Portal and Intranets Redar Ismail
 
Oracle WebCenter Solutions
Oracle WebCenter SolutionsOracle WebCenter Solutions
Oracle WebCenter SolutionsReiner Ernst
 
How Microsoft SharePoint Gives You a Realistic Approach to Content Management
How Microsoft SharePoint Gives You a Realistic Approach to Content ManagementHow Microsoft SharePoint Gives You a Realistic Approach to Content Management
How Microsoft SharePoint Gives You a Realistic Approach to Content ManagementNicky Bleiel
 
Switching to Oracle Document Cloud
Switching to Oracle Document CloudSwitching to Oracle Document Cloud
Switching to Oracle Document CloudBrian Huff
 
PleaseReview integration with Oracle WebCenter Content
PleaseReview integration with Oracle WebCenter Content PleaseReview integration with Oracle WebCenter Content
PleaseReview integration with Oracle WebCenter Content PleaseTech
 
5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for Hybrid5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for HybridAdam Levithan
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People SPC Adriatics
 
MindSurf 2013 - Improving Business Productivity with SharePoint 2013
MindSurf 2013 - Improving Business Productivity with SharePoint 2013MindSurf 2013 - Improving Business Productivity with SharePoint 2013
MindSurf 2013 - Improving Business Productivity with SharePoint 2013Don Donais
 
SharePoint Saturday Paris 2015 Validating SharePoint 2013 Farm Before Go-Live
SharePoint Saturday Paris 2015   Validating SharePoint 2013 Farm Before Go-LiveSharePoint Saturday Paris 2015   Validating SharePoint 2013 Farm Before Go-Live
SharePoint Saturday Paris 2015 Validating SharePoint 2013 Farm Before Go-LiveChirag Patel
 
Manage how people use your SharePoint Online
Manage how people use your SharePoint OnlineManage how people use your SharePoint Online
Manage how people use your SharePoint OnlineSuhail Jamaldeen
 
Enterprise content management overview in SharePoint 2013
Enterprise content management overview in SharePoint 2013Enterprise content management overview in SharePoint 2013
Enterprise content management overview in SharePoint 2013SPC Adriatics
 
Rolling Out OneDrive Successfully
Rolling Out OneDrive SuccessfullyRolling Out OneDrive Successfully
Rolling Out OneDrive SuccessfullyAdam Levithan
 
SharePoint 2013 Admin in the Hybrid World
SharePoint 2013 Admin in the Hybrid WorldSharePoint 2013 Admin in the Hybrid World
SharePoint 2013 Admin in the Hybrid WorldJason Himmelstein
 

Tendances (20)

Developing for SharePoint Online
Developing for SharePoint OnlineDeveloping for SharePoint Online
Developing for SharePoint Online
 
Oracle web center
Oracle web centerOracle web center
Oracle web center
 
What‘s new in Office 365
What‘s new in Office 365What‘s new in Office 365
What‘s new in Office 365
 
Unlock your Big Data with Analytics and BI on Office 365 - OFF103
Unlock your Big Data with Analytics and BI on Office 365 - OFF103Unlock your Big Data with Analytics and BI on Office 365 - OFF103
Unlock your Big Data with Analytics and BI on Office 365 - OFF103
 
Oracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewOracle Webcenter Suite Overview
Oracle Webcenter Suite Overview
 
Webcenter Portlal training...
Webcenter Portlal training...Webcenter Portlal training...
Webcenter Portlal training...
 
Portal and Intranets
Portal and Intranets Portal and Intranets
Portal and Intranets
 
Oracle WebCenter Solutions
Oracle WebCenter SolutionsOracle WebCenter Solutions
Oracle WebCenter Solutions
 
How Microsoft SharePoint Gives You a Realistic Approach to Content Management
How Microsoft SharePoint Gives You a Realistic Approach to Content ManagementHow Microsoft SharePoint Gives You a Realistic Approach to Content Management
How Microsoft SharePoint Gives You a Realistic Approach to Content Management
 
Switching to Oracle Document Cloud
Switching to Oracle Document CloudSwitching to Oracle Document Cloud
Switching to Oracle Document Cloud
 
PleaseReview integration with Oracle WebCenter Content
PleaseReview integration with Oracle WebCenter Content PleaseReview integration with Oracle WebCenter Content
PleaseReview integration with Oracle WebCenter Content
 
5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for Hybrid5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for Hybrid
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
 
Webinar: The Slippery Slope of Migrating to SharePoint Online or On-Premise
Webinar: The Slippery Slope of Migrating to SharePoint Online or On-PremiseWebinar: The Slippery Slope of Migrating to SharePoint Online or On-Premise
Webinar: The Slippery Slope of Migrating to SharePoint Online or On-Premise
 
MindSurf 2013 - Improving Business Productivity with SharePoint 2013
MindSurf 2013 - Improving Business Productivity with SharePoint 2013MindSurf 2013 - Improving Business Productivity with SharePoint 2013
MindSurf 2013 - Improving Business Productivity with SharePoint 2013
 
SharePoint Saturday Paris 2015 Validating SharePoint 2013 Farm Before Go-Live
SharePoint Saturday Paris 2015   Validating SharePoint 2013 Farm Before Go-LiveSharePoint Saturday Paris 2015   Validating SharePoint 2013 Farm Before Go-Live
SharePoint Saturday Paris 2015 Validating SharePoint 2013 Farm Before Go-Live
 
Manage how people use your SharePoint Online
Manage how people use your SharePoint OnlineManage how people use your SharePoint Online
Manage how people use your SharePoint Online
 
Enterprise content management overview in SharePoint 2013
Enterprise content management overview in SharePoint 2013Enterprise content management overview in SharePoint 2013
Enterprise content management overview in SharePoint 2013
 
Rolling Out OneDrive Successfully
Rolling Out OneDrive SuccessfullyRolling Out OneDrive Successfully
Rolling Out OneDrive Successfully
 
SharePoint 2013 Admin in the Hybrid World
SharePoint 2013 Admin in the Hybrid WorldSharePoint 2013 Admin in the Hybrid World
SharePoint 2013 Admin in the Hybrid World
 

Similaire à Stop Those Prying Eyes Getting To Your Data SPTechCon

gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1Anne Starr
 
Stay productive_while_slicing_up_the_monolith
Stay productive_while_slicing_up_the_monolithStay productive_while_slicing_up_the_monolith
Stay productive_while_slicing_up_the_monolithMarkus Eisele
 
Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1Anne Starr
 
Introductorytocomputing
IntroductorytocomputingIntroductorytocomputing
IntroductorytocomputingAnne Starr
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy ServerLakshyaArora12
 
Keynote oracle days final 16x9 v3.alain
Keynote oracle days final 16x9 v3.alainKeynote oracle days final 16x9 v3.alain
Keynote oracle days final 16x9 v3.alainDoina Draganescu
 
Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...
Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...
Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...C/D/H Technology Consultants
 
Cloud patterns at Carleton University
Cloud patterns at Carleton UniversityCloud patterns at Carleton University
Cloud patterns at Carleton UniversityTaswar Bhatti
 
Network Sage™ Into To C Level V1.4
Network Sage™ Into To C Level V1.4Network Sage™ Into To C Level V1.4
Network Sage™ Into To C Level V1.4ikirmer
 
Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingRutuja751147
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Materialpkaviya
 
Hpc lunch and learn
Hpc lunch and learnHpc lunch and learn
Hpc lunch and learnJohn D Almon
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Nederland
 
Tokyo Azure Meetup #5 - Microservices and Azure Service Fabric
Tokyo Azure Meetup #5 - Microservices and Azure Service FabricTokyo Azure Meetup #5 - Microservices and Azure Service Fabric
Tokyo Azure Meetup #5 - Microservices and Azure Service FabricTokyo Azure Meetup
 
Network and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle TransformationNetwork and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle TransformationMatsuo Sawahashi
 
What’s New in SharePoint 2013 for IT Pros
What’s New in SharePoint 2013 for IT ProsWhat’s New in SharePoint 2013 for IT Pros
What’s New in SharePoint 2013 for IT ProsSPC Adriatics
 

Similaire à Stop Those Prying Eyes Getting To Your Data SPTechCon (20)

gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
 
Stay productive_while_slicing_up_the_monolith
Stay productive_while_slicing_up_the_monolithStay productive_while_slicing_up_the_monolith
Stay productive_while_slicing_up_the_monolith
 
Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1
 
Introductorytocomputing
IntroductorytocomputingIntroductorytocomputing
Introductorytocomputing
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Keynote oracle days final 16x9 v3.alain
Keynote oracle days final 16x9 v3.alainKeynote oracle days final 16x9 v3.alain
Keynote oracle days final 16x9 v3.alain
 
Forefront UAG
Forefront UAGForefront UAG
Forefront UAG
 
P2 p
P2 pP2 p
P2 p
 
Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...
Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...
Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...
 
Cloud patterns at Carleton University
Cloud patterns at Carleton UniversityCloud patterns at Carleton University
Cloud patterns at Carleton University
 
Network Sage™ Into To C Level V1.4
Network Sage™ Into To C Level V1.4Network Sage™ Into To C Level V1.4
Network Sage™ Into To C Level V1.4
 
Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud Computing
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
 
Hpc lunch and learn
Hpc lunch and learnHpc lunch and learn
Hpc lunch and learn
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
 
Tokyo Azure Meetup #5 - Microservices and Azure Service Fabric
Tokyo Azure Meetup #5 - Microservices and Azure Service FabricTokyo Azure Meetup #5 - Microservices and Azure Service Fabric
Tokyo Azure Meetup #5 - Microservices and Azure Service Fabric
 
Network and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle TransformationNetwork and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle Transformation
 
EAI example
EAI exampleEAI example
EAI example
 
What’s New in SharePoint 2013 for IT Pros
What’s New in SharePoint 2013 for IT ProsWhat’s New in SharePoint 2013 for IT Pros
What’s New in SharePoint 2013 for IT Pros
 
142 wendy shank
142 wendy shank142 wendy shank
142 wendy shank
 

Dernier

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Stop Those Prying Eyes Getting To Your Data SPTechCon

  • 1. Stop Those Prying Eyes Getting to Your Data Liam Cleary Solution Architect | SharePoint MVP
  • 2. About Me • Solution Architect @ SusQtech (Winchester, VA) • SharePoint MVP since 2007 • Working with SharePoint since 2002 • Worked on all kinds of projects • Internet • Intranet • Extranet • Anything SharePoint Really • Involved in Architecture, Deployment, Customization and Development of SharePoint
  • 3. “The only real security that a man can have in this world is a reserve of knowledge, experience and ability.” Henry Ford “We spend our time searching for security and hate it when we get it.” John Steinbeck
  • 4. Agenda • SharePoint Security in General • SharePoint Topologies • Secure Topologies • Protecting SharePoint • Authentication and Authorization • Firewall • DRM • Data Encryption • Guidelines for Protecting SharePoint
  • 5. SharePoint Security in General Terminologies • Permission: They are the unit of access that represents the individual task that can be performed on a securable object. • Permission Level: Predefined sets of permissions that are given to users. • User: Is the smallest object that access can be granted. User could be Active Directory account. • User Groups: Is set of users that are grouped for common properties and ease of managing. • Securable Object: Web (Site), List, Library and Item. • Inheritance: When a securable object is created, it inherits user access of it`s parent object. • Site Groups: When a new site is created group of sites are created automatically for the user.
  • 6. SharePoint Security in General • Logical Approach • Item • List or Library • Site • Site Collection • Web Application • Farm • Service Applications • Farm • Cross Farm • SharePoint performs Authorization • Valid Authentication Token • Role • Security Group • Claim Attribute
  • 7. SharePoint Topologies – Edge Firewall • Advantages • Disadvantage • This is the simplest solution that requires the least amount of hardware and configuration. • This configuration results in a single • The entire server farm is located within the firewall that separates the corporate corporate network. internal network from the Internet. • There is a single point of data: • Data is located within the trusted network. • Data maintenance occurs in one place. • A single farm is used for both internal and external requests; this ensures that all authorized users view the same content. • Internal user requests are not passed through a proxy server. • UAG pre-authenticates users.
  • 8. SharePoint Topologies – Back-to-back Perimeter • Advantages • Disadvantage • Content is isolated to a single farm on the • The back-to-back perimeter topology extranet, simplifying sharing and requires additional network maintenance of content across the infrastructure and configuration. intranet and the extranet. • External user access is isolated to the perimeter network. • If the extranet is compromised, damage is potentially limited to the affected layer or to the perimeter network.
  • 9. SharePoint Topologies – Back-to-back Perimeter with Cross-Farm Services • Advantages • Disadvantages • Services are centrally managed inside the • Some service applications require corporate network. two-way trust between domains, for • Service applications that involve many example, User Profile and Secure contributors, such as Managed Metadata, Store Service. are located where the contributor accounts are located. Special access is not required for the perimeter network.
  • 10. SharePoint Topologies – Back-to-back Perimeter with Content Publishing • Advantages • Disadvantages • Customer-facing and partner-facing • Additional hardware is required to maintain two separate farms. content is isolated in a separate perimeter • Data overhead is greater. Content is network. maintained and coordinated in two • Content publishing can be automated. different farms and networks. • If content in the perimeter network is • Changes to content in the perimeter compromised or corrupted as a result of network are not reflected in the corporate network. Consequently, Internet access, the integrity of the content publishing to the perimeter content in the corporate network is domain is not a workable choice for retained. extranet sites that are collaborative.
  • 11. SharePoint Topologies – Split Back-to-back • Advantages • Disadvantages • Computers running SQL Server are not • The complexity of the solution is greatly hosted inside the perimeter network. increased. • Farm components within both the • Intruders who compromise perimeter corporate network and the perimeter network resources might gain access to network can share the same databases. farm content stored in the corporate network by using the server farm accounts. • Content can be isolated to a single farm inside the corporate network, which • Inter-farm communication is split across simplifies sharing and maintaining content two domains. across the corporate network and the perimeter network.
  • 12. SharePoint Topologies – Split Back-to-back optimized for Content Publishing • Advantages • Disadvantages • Computers running SQL Server are not • The complexity of the solution is greatly hosted inside the perimeter network. increased. • Farm components within both the • Intruders who compromise perimeter corporate network and the perimeter network resources might gain access to network can share the same databases. farm content stored in the corporate network by using the server farm accounts. • Content can be isolated to a single farm inside the corporate network, which • Inter-farm communication is split across simplifies sharing and maintaining content two domains. across the corporate network and the perimeter network.
  • 13. Protecting SharePoint - Authentication and Authorization • Windows • NTLM • Kerberos • Basic • Anonymous • Digest • Forms-based Authentication • Lightweight Directory Access Protocol (LDAP) • Microsoft SQL Server • ASP.NET Membership and Role Providers • SAML Token-based Authentication • Active Directory Federated Services • 3rd Party Identity Provider • Lightweight Directory Access Protocol (LDAP)
  • 14. Protecting SharePoint - Authentication and Authorization Claims Authentication? • Wide Support • Standards Based • WS-Federation 1.1 • WS-Trust 1.4 • SAML Token 1.1 AuthN • Single Sign On • Federation • Already many providers, Live, Google, Facebook etc. • Microsoft standard approach • Fed up custom coding everything, every time • Gets round (some) Office Integration problems • Easy to configure with little effort • Multiple Web Config changes, Web Application Changes and then of course the actual configuration of your identity provider
  • 15. Protecting SharePoint – ADFS 2.0 • Standard Based Authentication • Supports Multiple Authentication Mechanisms • Enables Federation – federationmetadata.xml • No “Code” claims augmentation • Claim Rules • Custom Mappings • Custom Connections • Unique Scripting Language • Supports Custom Connections • Inherit from “IAttributeStore” class • Central “off-loaded” security mechanism • SSO Support
  • 16. ADFS
  • 17. Protecting SharePoint – Digital Rights Management • Protection over the Access Control • Integration with Office • Office & SharePoint • .NET & Silverlight • Internal & External • Requires Certificates for Encryption • Protects more than just documents • Email too 
  • 19. Protecting SharePoint – Data Encryption • Various Options • Cell Level – Encrypts Cells in Databases • Not Usable with SharePoint • File Level (Bit Locker, EFS) • Could be used with SharePoint • RMS • Could be used with SharePoint • Transparent Data Encryption • SQL Level • Content Database Level • Specifically set • Backups cannot be restored to other servers without the “Private Key” • Does not protect data in memory – potential security risk • Prescribed Approach: http://www.slideshare.net/michaeltnoel/transparent-data-encryption- for-sharepoint-content-databases
  • 20. SHOW ME THE MONEY
  • 21. Protecting SharePoint – Server Guidelines • Block the standard SQL Server ports • Configure SQL Server database instances to listen on a nonstandard port • Configure SQL client aliases • Bypass the actual server name • Implement Windows Firewall / IPsec Policies • Custom Rules as needed • Utilize Group Policies • Utilize Claim Attributes • Implement ADFS when using Claims Authentication • Add Attribute Store • Add Custom Attribute Rules • Secure Communication with SSL • Follow server hardening plan • http://technet.microsoft.com/en-us/library/cc262849.aspx
  • 22. Protecting SharePoint – General Guidelines • Make it Clear What Content Is Permissible • Security and Permission • Rights Management Services • Educate Employees • Use Classification to Guide Behavior • Don't Forget to Enforce the Policies • Utilize Claim Attributes • Augmentation using ADFS • Use out of the box configuration • Users or Active Directory Groups • Provider Roles • SharePoint Site Groups • Permission Groups assigned to SharePoint Site Groups
  • 23. Thank You www.cloudshare.com www.susqtech.com • Personal Email: liamcleary@msn.com • Work: http://www.susqtech.com • Twitter: @helloitsliam • Blog: www.helloitsliam.com

Notes de l'éditeur

  1. [twitter] Starting @ 11:30: Stop Those Prying Eyes Getting to Your Data[/twitter]
  2. [twitter]Protect #SharePoint Wondering what session to visit come and see me in Plaza Room A - Stop Those Prying Eyes Getting to Your Data[/twitter]
  3. [twitter] We spend our time searching for security and hate it when we get it. [/twitter]
  4. [twitter]Which Firewall topology? Edge, Back-to-Back, Back-to-Back + Perimeter or Split-Back-to-Back – chatting now[/twitter]
  5. [twitter]ADFS 2.0 – Custom Claims Mappings without Code [/twitter]
  6. [twitter]Rights Management Services – great solution for securing collaboration in #SharePoint[/twitter]
  7. [twitter]Transport Data Encryption can be used in SQL for securing #SharePoint content[/twitter]
  8. [twitter]Protect #SharePoint, Block ports, IPSec and Firewall, Group Policies, custom Claim Attributes and harden those servers[/twitter]
  9. [twitter]Protect #SharePoint Security Guidelines: Clearly Define what content is permissible, Use Classification, Use Claim Attributes and use out of the box Security as it is defined [/twitter]
  10. [twitter]Thanks to #CloudShare for hosting my Environment[/twitter]