SlideShare a Scribd company logo
© 2014 Imperva, Inc. All rights reserved.
The 6 Most Surprising SharePoint
Security Risks
Webinar
Confidential1
Carrie McDaniel - Product Marketing Manager, SharePoint Security
© 2014 Imperva, Inc. All rights reserved.
Agenda
Confidential2
§  Discuss 6 of the most surprising SharePoint risks
•  An example of each risk
•  Ways to mitigate these threats
§  Newly released, supporting research
© 2014 Imperva, Inc. All rights reserved.
Carrie McDaniel – SharePoint Security Team
3
§  Product Marketing Manager for File
Security; focus on SharePoint security
§  Previously held product marketing
position at Moody’s Analytics in San
Francisco
§  Past experience in finance and tech
industries at Wells Fargo and NetApp
§  Holds degrees in Marketing and French
from Santa Clara University
© 2014 Imperva, Inc. All rights reserved. Confidential4
Web applications remain the proverbial
punching bag of the internet. They’re
beaten in one of two ways: by exploiting a
weakness in the application or by using
stolen credentials to impersonate a valid
user.
Many of the attacks in our 2013 dataset
targeted off the shelf content
management systems…
2014 Verizon Data Breach Investigations Report
© 2014 Imperva, Inc. All rights reserved.
SharePoint Architecture
Confidential5
Web Servers
Application Servers
MS SQL Databases
© 2014 Imperva, Inc. All rights reserved.
SharePoint Components Hit Hard in 2013
Confidential6
35% of data
breaches resulted
from web
application attacks.
88% of all incidents
reported were due to
privilege abuse.
Out of all corporate
assets, 25% of data
was stolen from
databases.
2014 Verizon Data Breach Investigations Report
© 2014 Imperva, Inc. All rights reserved.
Reasons Why This is Happening
Confidential7
Only 42% audit
external SharePoint
access.
76% grant
non-employee
SharePoint access.
Only 7% run
SharePoint access
logs.
Dimensional Research. SharePoint and Security Survey. December 2013.
© 2014 Imperva, Inc. All rights reserved.
SharePoint Security Risk 1
Confidential8
Insider Threats
© 2014 Imperva, Inc. All rights reserved.
Critical Data is Stored in SharePoint
Confidential9
Regulated
Sensitive
2014 Verizon Data Breach Investigations Report
© 2014 Imperva, Inc. All rights reserved.
The Insider Threat is Multifaceted
Confidential10
1.  Insiders steal data by abusing excessive privileges
2.  Users are compromised, and privileges are escalated
“…taking advantage of the system access privileges
granted by an employer and using them to commit
nefarious acts – tops the list.”
2014 Verizon Data Breach Investigations Report
Administrators hold the
keys to the kingdom.
© 2014 Imperva, Inc. All rights reserved.
SharePoint is Complex; Permissions
are Challenging
Confidential11
HR
Site
Finance
Site
Engineering
Site
IT
Contractor
HR Employee Engineer
© 2014 Imperva, Inc. All rights reserved.
Conclusions on Insider Threats
Confidential12
1.  Organizations must have a centralized
view of file and folder permissions
across the SharePoint platform.
2.  Preventing data access based solely
on an ACL-based security model is
ineffective.
•  Insiders are getting around these controls
3.  Monitor, monitor, monitor.
© 2014 Imperva, Inc. All rights reserved.
SharePoint Security Risk 2
Confidential13
Ineffective Log Management
© 2014 Imperva, Inc. All rights reserved.
Companies Not Monitoring SharePoint
File Access
Confidential14
However:
•  29% of organizations do
not use SharePoint
access logs
•  64% run them monthly
Dimensional Research. SharePoint and Security Survey. December 2013.
Facts:
•  76% of organizations
allow non-employees
access to SharePoint
•  The majority are worried
about unauthorized
access from the general
public and partners
© 2014 Imperva, Inc. All rights reserved.
SharePoint’s Access Logs Have Challenges
Confidential15
1.  Not typically turned on.
2.  Audit logs accumulate volumes of
unnecessary data.
3.  Logs are cyclic, and rollover quickly.
4.  No separation of duties.
5.  Not auditor-ready.
© 2014 Imperva, Inc. All rights reserved.
Conclusions on SharePoint Log Management
Confidential16
1.  Organizations need to record all
access across the web, content and
database layers of SharePoint.
2.  Monitoring must occur in real-time to
ensure data security.
3.  Auditors need to ensure that
appropriate data controls are in
place, no matter where it’s stored.
© 2014 Imperva, Inc. All rights reserved.
SharePoint Security Risk 3
Confidential17
Vulnerabilities in Third-party Code
© 2014 Imperva, Inc. All rights reserved. Confidential18
More than half of organizations use or are
“…planning to use third-party add-on
products in order to enhance functionality.
Only a third thinks they will stick with the
vanilla product.”
AIIM 2012 Industry Watch Survey
Nowhere is this exploited on a larger
scale than in Content Management
Systems (CMS)…and even then, more
in the added plugins than the core CMS
code itself.
2012
2013
2014 Verizon Data Breach Investigations Report
© 2014 Imperva, Inc. All rights reserved.
Add-ons Defined
Confidential19
Plug-in
A software component that adds additional functionality
to the larger SharePoint system.
Example: SharePoint Outlook Integration
Web Part
A stand-alone application that is embedded into SharePoint
that pulls in useful information from other Websites.
Example: Twitter feed
Optimus.com
© 2014 Imperva, Inc. All rights reserved. Confidential20
Convenience
Collaboration
Productivity
Ease-of-use
© 2014 Imperva, Inc. All rights reserved.21
3rd Party
According to Veracode:
•  “Up to 70% of internally developed code originates outside of the
development team”
•  28% of assessed applications are identified as created by a 3rd
party
Confidential
© 2014 Imperva, Inc. All rights reserved. Confidential22
IT and security teams should always assume that third-party code
present in SharePoint applications contain significant vulnerabilities.
You can’t fix code you don’t own.
Organizations won’t be protected
until that third-party addresses the
vulnerabilities.
What’s the
risk?
© 2014 Imperva, Inc. All rights reserved.23
OWASP Top 10 – 2013 Update
New, A9 - Using Known Vulnerable Components
Confidential
© 2014 Imperva, Inc. All rights reserved.
Classic Web Site Hacking
Confidential24
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Single Site Attack
© 2014 Imperva, Inc. All rights reserved.
Classic Web Site Hacking
Confidential25
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Multiple Site Attacks
© 2014 Imperva, Inc. All rights reserved.
SharePoint Application Hacking
Confidential26
Hacking
1.  Identify add-on
2.  Find Vulnerability
3.  Exploit
© 2014 Imperva, Inc. All rights reserved.
Imperva’s Take: Vulnerabilities in Third-party
Code are Inevitable
Confidential27
Photo Credit: cnet.com
© 2014 Imperva, Inc. All rights reserved.
SharePoint Security Risk 4
Confidential28
Data Leakage
© 2014 Imperva, Inc. All rights reserved.
Global Site
Sensitive Data Leakage Often Occurs Accidently
Confidential29
§  Simple SharePoint misconfigurations can expose corporate
data
Head of Finance
Finance Site
HR Site
Sales Site
© 2014 Imperva, Inc. All rights reserved.
Global Site
Sophisticated Search Tools Can Uncover
Sensitive Data
Confidential30
§  Google capabilities like Indexed FTP, Search by Image, and
Table Search offer new ways to discover and extract data
Web User
Finance Site
HR Site
Sales Site
© 2014 Imperva, Inc. All rights reserved.
Conclusions on SharePoint Data Leakage
Confidential31
1.  Organizations need tight controls
over the content being served by
SharePoint.
2.  Implementing security policies that
check for outgoing data can help
prevent leakage.
3.  As part of your security strategy,
put a process in place to validate
the content accessible via your
SharePoint web servers.
© 2014 Imperva, Inc. All rights reserved.
SharePoint Security Risk 5
Confidential32
Targeted Attacks / Phishing
© 2014 Imperva, Inc. All rights reserved.
Attackers Pull Data From Websites for Use
in Targeted Attacks
Confidential33
§  Site scraping – not just for undercutting competitor’s prices and
republishing Website listings
80% of the Fortune 500 are using SharePoint
Source: www.topsharepoint.com
© 2014 Imperva, Inc. All rights reserved.
Conclusions on Phishing and Targeted Attacks
Confidential34
1.  Companies can protect their brand
by protecting against site scrapers.
2.  It’s difficult to distinguish site
scrapers from legitimate users;
proactive detection must be in
place.
3.  Organizations can rely on malicious
source IP address feeds to protect
against site scraping.
© 2014 Imperva, Inc. All rights reserved.
SharePoint Security Risk 6
Confidential35
Unauthorized Access to the Microsoft SQL Database
© 2014 Imperva, Inc. All rights reserved.
An Overlooked SharePoint Security Risk
Confidential36
Databases and file servers, both repositories of
so much valuable information, are targeted
regularly…
Admins unknowingly
make unsupported
database changes.
Malware-compromised
insiders access the
database.
Malicious insiders target
the database.
2014 Verizon Data Breach Investigations Report
© 2014 Imperva, Inc. All rights reserved.
Conclusions on Unauthorized Database Access
Confidential37
1.  The SharePoint SQL database holds the crown jewels, and must be
protected from abuse.
2.  Even unintentional changes can have a broad security impact on the
SharePoint system.
3.  Monitor, monitor, monitor.
© 2014 Imperva, Inc. All rights reserved.
Reduce Risk, Protect Your Data,
Save Time
Confidential38
SecureSphere for SharePoint
© 2014 Imperva, Inc. All rights reserved.
Imperva Secures the SharePoint Platform,
From End-to-end
Confidential39
1.  Insider Threats
2.  Ineffective Log Management
3.  Vulnerabilities in Third Party Code
4.  Data Leakage
5.  Targeted Attacks
6.  Unauthorized Access to the SQL Database
Web Application
Security
File
Security
Database
Security
© 2014 Imperva, Inc. All rights reserved.
Audit
Enterprise Users
The Internet
SQL
Injection
XSS
Web
Servers
Application
Servers
MS SQL
Databases
Web-Application
Firewall
Activity Monitoring,
Permissions Management &
Access Control
Excessive
Rights
Administrators
DB Activity Monitoring
& Access Control
Unauthorized
Changes
Audit
Unauthorized
Access
Layers of SharePoint Protection
Confidential40
© 2014 Imperva, Inc. All rights reserved.
Gartner’s Take:
WAFs Are Worth the Investment
Confidential41
Firewalls and Intrusion prevention systems don’t
provide sufficient protections for most public-
facing websites or internal business-critical and
custom Web applications.
WAFs are different from NGFWs and IPSs.
WAFs protect, at a granular level, the
enterprise's custom Web applications against
Web attacks.
Web Application Firewalls Are Worth the Investment for Enterprises
Jeremy D’Hoinne & Adam Hils; Feb 28, 2014
Gartner, Inc.
© 2014 Imperva, Inc. All rights reserved.
Webinar Materials
42
Post-Webinar
Discussions
Answers to
Attendee
Questions
Webinar
Recording Link
Join Group
Join Imperva LinkedIn Group,
Imperva Data Security Direct, for…
© 2014 Imperva, Inc. All rights reserved.
www.imperva.com
43

More Related Content

PPT
Mckinsey presentation template
PDF
Mind the-(ai)-gap : BCG study
PDF
Lessons from: 2015
PDF
Media-Morphosis Transforming Media and Entertainment
PDF
New Science: Pharma's new growth machine
PDF
Startups and Venture Capital in Germany
PDF
Test & Learn: How to Find Your Product's North Star Metric
PDF
The Story of a Redesign - Aaron Weyenberg - SearchLove 2014
Mckinsey presentation template
Mind the-(ai)-gap : BCG study
Lessons from: 2015
Media-Morphosis Transforming Media and Entertainment
New Science: Pharma's new growth machine
Startups and Venture Capital in Germany
Test & Learn: How to Find Your Product's North Star Metric
The Story of a Redesign - Aaron Weyenberg - SearchLove 2014

What's hot (15)

PDF
Death By Powerpoint
PDF
AWS Certified SysOps Administrator Official Study Guide.pdf
PDF
Governing Innovation: The recipe for portfolio growth | Accenture
DOCX
Full report final for NotPetya
PDF
A step-by-step overview of a typical cybersecurity attack—and how companies c...
PDF
Data privacy by the numbers
PDF
PwC's Global Technology IPO Review -- Q1 2015
PDF
Reinventing the Last Mile: Win the Race to the Top (AU)
PDF
Five strategy execution myths exposed | London Business School
PDF
Is vc still a thing final
PDF
How Python Programmers Can Change the World
PDF
Mammalian Brain Chemistry Explains Everything
PDF
AVentures - CEE SoftDev M&A report Oct 2022.pdf
PDF
China metaverse report by daxue consulting and ayo consulting
PDF
Crap. The Content Marketing Deluge.
Death By Powerpoint
AWS Certified SysOps Administrator Official Study Guide.pdf
Governing Innovation: The recipe for portfolio growth | Accenture
Full report final for NotPetya
A step-by-step overview of a typical cybersecurity attack—and how companies c...
Data privacy by the numbers
PwC's Global Technology IPO Review -- Q1 2015
Reinventing the Last Mile: Win the Race to the Top (AU)
Five strategy execution myths exposed | London Business School
Is vc still a thing final
How Python Programmers Can Change the World
Mammalian Brain Chemistry Explains Everything
AVentures - CEE SoftDev M&A report Oct 2022.pdf
China metaverse report by daxue consulting and ayo consulting
Crap. The Content Marketing Deluge.
Ad

Viewers also liked (20)

PPTX
Auditing SharePoint Permissions
PDF
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
PDF
The Anatomy of Comment Spam
PDF
The Value of Shared Threat Intelligence
PDF
Is Your Business Safe From Malware And Targeted Attacks
PDF
Anatomy of the Compromised Insider
PDF
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
PDF
Lessons Learned From the Yahoo! Hack
PDF
Top Five Security Must-Haves for Office 365
PDF
Web Application Attack Report, Edition #4
PDF
More databases. More hackers.
PDF
Top Security Trends for 2014
PDF
Database monitoring - First and Last Line of Defense
PPTX
Stop Account Takeover Attacks, Right in their Tracks
PPTX
Man in the Cloud Attacks
PDF
Automation of Web Application Attacks
PDF
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
PPTX
Why Network and Endpoint Security Isn’t Enough
PDF
Preparing for the Imminent Terabit DDoS Attack
PDF
Web Applications Under Attack: Why Network Security Solutions Leave You Exposed
Auditing SharePoint Permissions
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
The Anatomy of Comment Spam
The Value of Shared Threat Intelligence
Is Your Business Safe From Malware And Targeted Attacks
Anatomy of the Compromised Insider
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Lessons Learned From the Yahoo! Hack
Top Five Security Must-Haves for Office 365
Web Application Attack Report, Edition #4
More databases. More hackers.
Top Security Trends for 2014
Database monitoring - First and Last Line of Defense
Stop Account Takeover Attacks, Right in their Tracks
Man in the Cloud Attacks
Automation of Web Application Attacks
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
Why Network and Endpoint Security Isn’t Enough
Preparing for the Imminent Terabit DDoS Attack
Web Applications Under Attack: Why Network Security Solutions Leave You Exposed
Ad

Similar to 6 Most Surprising SharePoint Security Risks (20)

PDF
Protecting Against Vulnerabilities in SharePoint Add-ons
PDF
4 Security Guidelines for SharePoint Governance
PPTX
Hacking_SharePoint_FINAL
PDF
Shaping-Up SharePoint Security in 5 Steps
PDF
Share point encryption
PDF
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
PDF
CISO's Guide to Securing SharePoint
PPTX
Securing the SharePoint Platform
PPT
D Cornell Securing Share Point
PDF
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
PPTX
Best Practices for Security and Governance in SharePoint 2013
PPTX
Best practices for Security and Governance in SharePoint 2013
PPTX
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
PDF
Taking the Share out of Sharepoint: SharePoint Application Security.
PDF
Overcoming Security Threats and Vulnerabilities in SharePoint
PPTX
6 Biggest Cyber Security Risks and How You Can Fight Back
PDF
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
PPTX
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
PPTX
Best practices for security and governance in share point 2013 published
PDF
Detect & Remediate Malware & Advanced Targeted Attacks
Protecting Against Vulnerabilities in SharePoint Add-ons
4 Security Guidelines for SharePoint Governance
Hacking_SharePoint_FINAL
Shaping-Up SharePoint Security in 5 Steps
Share point encryption
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
CISO's Guide to Securing SharePoint
Securing the SharePoint Platform
D Cornell Securing Share Point
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
Best Practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Taking the Share out of Sharepoint: SharePoint Application Security.
Overcoming Security Threats and Vulnerabilities in SharePoint
6 Biggest Cyber Security Risks and How You Can Fight Back
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
Best practices for security and governance in share point 2013 published
Detect & Remediate Malware & Advanced Targeted Attacks

More from Imperva (20)

PPTX
Cybersecurity and Healthcare - HIMSS 2018 Survey
PPTX
API Security Survey
PPTX
Imperva ppt
PPTX
Beyond takeover: stories from a hacked account
PPTX
Research: From zero to phishing in 60 seconds
PDF
Making Sense of Web Attacks: From Alerts to Narratives
PDF
How We Blocked a 650Gb DDoS Attack Over Lunch
PPTX
Survey: Insider Threats and Cyber Security
PPTX
Companies Aware, but Not Prepared for GDPR
PPTX
Rise of Ransomware
PDF
7 Tips to Protect Your Data from Contractors and Privileged Vendors
PDF
SEO Botnet Sophistication
PDF
Phishing Made Easy
PDF
Imperva 2017 Cyber Threat Defense Report
PDF
Combat Payment Card Attacks with WAF and Threat Intelligence
PDF
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
PDF
Get Going With Your GDPR Plan
PDF
Cyber Criminal's Path To Your Data
PDF
Combat Today's Threats With A Single Platform For App and Data Security
PPTX
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Cybersecurity and Healthcare - HIMSS 2018 Survey
API Security Survey
Imperva ppt
Beyond takeover: stories from a hacked account
Research: From zero to phishing in 60 seconds
Making Sense of Web Attacks: From Alerts to Narratives
How We Blocked a 650Gb DDoS Attack Over Lunch
Survey: Insider Threats and Cyber Security
Companies Aware, but Not Prepared for GDPR
Rise of Ransomware
7 Tips to Protect Your Data from Contractors and Privileged Vendors
SEO Botnet Sophistication
Phishing Made Easy
Imperva 2017 Cyber Threat Defense Report
Combat Payment Card Attacks with WAF and Threat Intelligence
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
Get Going With Your GDPR Plan
Cyber Criminal's Path To Your Data
Combat Today's Threats With A Single Platform For App and Data Security
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation

Recently uploaded (20)

PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
August Patch Tuesday
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
1. Introduction to Computer Programming.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
Enhancing emotion recognition model for a student engagement use case through...
August Patch Tuesday
Zenith AI: Advanced Artificial Intelligence
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
MIND Revenue Release Quarter 2 2025 Press Release
A novel scalable deep ensemble learning framework for big data classification...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Hindi spoken digit analysis for native and non-native speakers
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
1 - Historical Antecedents, Social Consideration.pdf
Unlocking AI with Model Context Protocol (MCP)
1. Introduction to Computer Programming.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Group 1 Presentation -Planning and Decision Making .pptx
DP Operators-handbook-extract for the Mautical Institute

6 Most Surprising SharePoint Security Risks

  • 1. © 2014 Imperva, Inc. All rights reserved. The 6 Most Surprising SharePoint Security Risks Webinar Confidential1 Carrie McDaniel - Product Marketing Manager, SharePoint Security
  • 2. © 2014 Imperva, Inc. All rights reserved. Agenda Confidential2 §  Discuss 6 of the most surprising SharePoint risks •  An example of each risk •  Ways to mitigate these threats §  Newly released, supporting research
  • 3. © 2014 Imperva, Inc. All rights reserved. Carrie McDaniel – SharePoint Security Team 3 §  Product Marketing Manager for File Security; focus on SharePoint security §  Previously held product marketing position at Moody’s Analytics in San Francisco §  Past experience in finance and tech industries at Wells Fargo and NetApp §  Holds degrees in Marketing and French from Santa Clara University
  • 4. © 2014 Imperva, Inc. All rights reserved. Confidential4 Web applications remain the proverbial punching bag of the internet. They’re beaten in one of two ways: by exploiting a weakness in the application or by using stolen credentials to impersonate a valid user. Many of the attacks in our 2013 dataset targeted off the shelf content management systems… 2014 Verizon Data Breach Investigations Report
  • 5. © 2014 Imperva, Inc. All rights reserved. SharePoint Architecture Confidential5 Web Servers Application Servers MS SQL Databases
  • 6. © 2014 Imperva, Inc. All rights reserved. SharePoint Components Hit Hard in 2013 Confidential6 35% of data breaches resulted from web application attacks. 88% of all incidents reported were due to privilege abuse. Out of all corporate assets, 25% of data was stolen from databases. 2014 Verizon Data Breach Investigations Report
  • 7. © 2014 Imperva, Inc. All rights reserved. Reasons Why This is Happening Confidential7 Only 42% audit external SharePoint access. 76% grant non-employee SharePoint access. Only 7% run SharePoint access logs. Dimensional Research. SharePoint and Security Survey. December 2013.
  • 8. © 2014 Imperva, Inc. All rights reserved. SharePoint Security Risk 1 Confidential8 Insider Threats
  • 9. © 2014 Imperva, Inc. All rights reserved. Critical Data is Stored in SharePoint Confidential9 Regulated Sensitive 2014 Verizon Data Breach Investigations Report
  • 10. © 2014 Imperva, Inc. All rights reserved. The Insider Threat is Multifaceted Confidential10 1.  Insiders steal data by abusing excessive privileges 2.  Users are compromised, and privileges are escalated “…taking advantage of the system access privileges granted by an employer and using them to commit nefarious acts – tops the list.” 2014 Verizon Data Breach Investigations Report Administrators hold the keys to the kingdom.
  • 11. © 2014 Imperva, Inc. All rights reserved. SharePoint is Complex; Permissions are Challenging Confidential11 HR Site Finance Site Engineering Site IT Contractor HR Employee Engineer
  • 12. © 2014 Imperva, Inc. All rights reserved. Conclusions on Insider Threats Confidential12 1.  Organizations must have a centralized view of file and folder permissions across the SharePoint platform. 2.  Preventing data access based solely on an ACL-based security model is ineffective. •  Insiders are getting around these controls 3.  Monitor, monitor, monitor.
  • 13. © 2014 Imperva, Inc. All rights reserved. SharePoint Security Risk 2 Confidential13 Ineffective Log Management
  • 14. © 2014 Imperva, Inc. All rights reserved. Companies Not Monitoring SharePoint File Access Confidential14 However: •  29% of organizations do not use SharePoint access logs •  64% run them monthly Dimensional Research. SharePoint and Security Survey. December 2013. Facts: •  76% of organizations allow non-employees access to SharePoint •  The majority are worried about unauthorized access from the general public and partners
  • 15. © 2014 Imperva, Inc. All rights reserved. SharePoint’s Access Logs Have Challenges Confidential15 1.  Not typically turned on. 2.  Audit logs accumulate volumes of unnecessary data. 3.  Logs are cyclic, and rollover quickly. 4.  No separation of duties. 5.  Not auditor-ready.
  • 16. © 2014 Imperva, Inc. All rights reserved. Conclusions on SharePoint Log Management Confidential16 1.  Organizations need to record all access across the web, content and database layers of SharePoint. 2.  Monitoring must occur in real-time to ensure data security. 3.  Auditors need to ensure that appropriate data controls are in place, no matter where it’s stored.
  • 17. © 2014 Imperva, Inc. All rights reserved. SharePoint Security Risk 3 Confidential17 Vulnerabilities in Third-party Code
  • 18. © 2014 Imperva, Inc. All rights reserved. Confidential18 More than half of organizations use or are “…planning to use third-party add-on products in order to enhance functionality. Only a third thinks they will stick with the vanilla product.” AIIM 2012 Industry Watch Survey Nowhere is this exploited on a larger scale than in Content Management Systems (CMS)…and even then, more in the added plugins than the core CMS code itself. 2012 2013 2014 Verizon Data Breach Investigations Report
  • 19. © 2014 Imperva, Inc. All rights reserved. Add-ons Defined Confidential19 Plug-in A software component that adds additional functionality to the larger SharePoint system. Example: SharePoint Outlook Integration Web Part A stand-alone application that is embedded into SharePoint that pulls in useful information from other Websites. Example: Twitter feed Optimus.com
  • 20. © 2014 Imperva, Inc. All rights reserved. Confidential20 Convenience Collaboration Productivity Ease-of-use
  • 21. © 2014 Imperva, Inc. All rights reserved.21 3rd Party According to Veracode: •  “Up to 70% of internally developed code originates outside of the development team” •  28% of assessed applications are identified as created by a 3rd party Confidential
  • 22. © 2014 Imperva, Inc. All rights reserved. Confidential22 IT and security teams should always assume that third-party code present in SharePoint applications contain significant vulnerabilities. You can’t fix code you don’t own. Organizations won’t be protected until that third-party addresses the vulnerabilities. What’s the risk?
  • 23. © 2014 Imperva, Inc. All rights reserved.23 OWASP Top 10 – 2013 Update New, A9 - Using Known Vulnerable Components Confidential
  • 24. © 2014 Imperva, Inc. All rights reserved. Classic Web Site Hacking Confidential24 Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Single Site Attack
  • 25. © 2014 Imperva, Inc. All rights reserved. Classic Web Site Hacking Confidential25 Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Multiple Site Attacks
  • 26. © 2014 Imperva, Inc. All rights reserved. SharePoint Application Hacking Confidential26 Hacking 1.  Identify add-on 2.  Find Vulnerability 3.  Exploit
  • 27. © 2014 Imperva, Inc. All rights reserved. Imperva’s Take: Vulnerabilities in Third-party Code are Inevitable Confidential27 Photo Credit: cnet.com
  • 28. © 2014 Imperva, Inc. All rights reserved. SharePoint Security Risk 4 Confidential28 Data Leakage
  • 29. © 2014 Imperva, Inc. All rights reserved. Global Site Sensitive Data Leakage Often Occurs Accidently Confidential29 §  Simple SharePoint misconfigurations can expose corporate data Head of Finance Finance Site HR Site Sales Site
  • 30. © 2014 Imperva, Inc. All rights reserved. Global Site Sophisticated Search Tools Can Uncover Sensitive Data Confidential30 §  Google capabilities like Indexed FTP, Search by Image, and Table Search offer new ways to discover and extract data Web User Finance Site HR Site Sales Site
  • 31. © 2014 Imperva, Inc. All rights reserved. Conclusions on SharePoint Data Leakage Confidential31 1.  Organizations need tight controls over the content being served by SharePoint. 2.  Implementing security policies that check for outgoing data can help prevent leakage. 3.  As part of your security strategy, put a process in place to validate the content accessible via your SharePoint web servers.
  • 32. © 2014 Imperva, Inc. All rights reserved. SharePoint Security Risk 5 Confidential32 Targeted Attacks / Phishing
  • 33. © 2014 Imperva, Inc. All rights reserved. Attackers Pull Data From Websites for Use in Targeted Attacks Confidential33 §  Site scraping – not just for undercutting competitor’s prices and republishing Website listings 80% of the Fortune 500 are using SharePoint Source: www.topsharepoint.com
  • 34. © 2014 Imperva, Inc. All rights reserved. Conclusions on Phishing and Targeted Attacks Confidential34 1.  Companies can protect their brand by protecting against site scrapers. 2.  It’s difficult to distinguish site scrapers from legitimate users; proactive detection must be in place. 3.  Organizations can rely on malicious source IP address feeds to protect against site scraping.
  • 35. © 2014 Imperva, Inc. All rights reserved. SharePoint Security Risk 6 Confidential35 Unauthorized Access to the Microsoft SQL Database
  • 36. © 2014 Imperva, Inc. All rights reserved. An Overlooked SharePoint Security Risk Confidential36 Databases and file servers, both repositories of so much valuable information, are targeted regularly… Admins unknowingly make unsupported database changes. Malware-compromised insiders access the database. Malicious insiders target the database. 2014 Verizon Data Breach Investigations Report
  • 37. © 2014 Imperva, Inc. All rights reserved. Conclusions on Unauthorized Database Access Confidential37 1.  The SharePoint SQL database holds the crown jewels, and must be protected from abuse. 2.  Even unintentional changes can have a broad security impact on the SharePoint system. 3.  Monitor, monitor, monitor.
  • 38. © 2014 Imperva, Inc. All rights reserved. Reduce Risk, Protect Your Data, Save Time Confidential38 SecureSphere for SharePoint
  • 39. © 2014 Imperva, Inc. All rights reserved. Imperva Secures the SharePoint Platform, From End-to-end Confidential39 1.  Insider Threats 2.  Ineffective Log Management 3.  Vulnerabilities in Third Party Code 4.  Data Leakage 5.  Targeted Attacks 6.  Unauthorized Access to the SQL Database Web Application Security File Security Database Security
  • 40. © 2014 Imperva, Inc. All rights reserved. Audit Enterprise Users The Internet SQL Injection XSS Web Servers Application Servers MS SQL Databases Web-Application Firewall Activity Monitoring, Permissions Management & Access Control Excessive Rights Administrators DB Activity Monitoring & Access Control Unauthorized Changes Audit Unauthorized Access Layers of SharePoint Protection Confidential40
  • 41. © 2014 Imperva, Inc. All rights reserved. Gartner’s Take: WAFs Are Worth the Investment Confidential41 Firewalls and Intrusion prevention systems don’t provide sufficient protections for most public- facing websites or internal business-critical and custom Web applications. WAFs are different from NGFWs and IPSs. WAFs protect, at a granular level, the enterprise's custom Web applications against Web attacks. Web Application Firewalls Are Worth the Investment for Enterprises Jeremy D’Hoinne & Adam Hils; Feb 28, 2014 Gartner, Inc.
  • 42. © 2014 Imperva, Inc. All rights reserved. Webinar Materials 42 Post-Webinar Discussions Answers to Attendee Questions Webinar Recording Link Join Group Join Imperva LinkedIn Group, Imperva Data Security Direct, for…
  • 43. © 2014 Imperva, Inc. All rights reserved. www.imperva.com 43