STIGQter STIGQter: STIG Summary: MS SharePoint 2013 Security Technical Implementation Guide

Version: 1

Release: 8 Benchmark Date: 25 Oct 2019

CheckedNameTitle
SV-74349r1_ruleSharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired.
SV-74365r1_ruleSharePoint must maintain and support the use of security attributes with stored information.
SV-74367r2_ruleSharePoint must utilize approved cryptography to protect the confidentiality of remote access sessions.
SV-74369r2_ruleSharePoint must use cryptography to protect the integrity of the remote access session.
SV-74371r1_ruleSharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited.
SV-74373r1_ruleSharePoint must enforce approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy.
SV-74375r2_ruleSharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied.
SV-74377r2_ruleSharePoint must provide the ability to prohibit the transfer of unsanctioned information in accordance with security policy.
SV-74379r2_ruleSharePoint must display an approved system use notification message or banner before granting access to the system.
SV-74383r1_ruleSharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system.
SV-74385r1_ruleSharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds.
SV-74387r1_ruleSharePoint must prevent the execution of prohibited mobile code.
SV-74391r1_ruleSharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.
SV-74393r1_ruleSharePoint must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
SV-74395r4_ruleSharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
SV-74397r4_ruleSharePoint must employ FIPS-validated cryptography to protect unclassified information.
SV-74399r4_ruleSharePoint must employ NSA-approved cryptography to protect classified information.
SV-74401r4_ruleSharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.
SV-74403r2_ruleSharePoint must validate the integrity of security attributes exchanged between systems.
SV-74405r2_ruleSharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.
SV-74407r1_ruleSharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded.
SV-74409r1_ruleSharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec.
SV-74411r1_ruleSharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions.
SV-74413r1_ruleSharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
SV-74415r1_ruleSharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.
SV-74417r1_ruleSharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.
SV-74419r4_ruleSharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
SV-74421r2_ruleSharePoint server access to the Online Web Part Gallery must be configured for limited access.
SV-74423r1_ruleThe SharePoint Central Administration site must not be accessible from Extranet or Internet connections.
SV-74425r1_ruleFor environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ.
SV-74427r1_ruleThe SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD).
SV-74429r2_ruleThe SharePoint farm service account (database access account) must be configured with minimum privileges on the SQL server.
SV-74431r1_ruleThe SharePoint setup account must be configured with the minimum privileges in Active Directory.
SV-74433r2_ruleThe SharePoint setup account must be configured with the minimum privileges on the SQL server.
SV-74435r2_ruleThe SharePoint setup account must be configured with the minimum privileges for the local server.
SV-74437r1_ruleA secondary SharePoint site collection administrator must be defined when creating a new site collection.
SV-74439r2_ruleWhen configuring SharePoint Central Administration, the port number selected must comply with DoD Ports and Protocol Management (PPSM) program requirements.
SV-74441r1_ruleSharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured.
SV-74821r1_ruleThe SharePoint farm service account (database access account) must be configured with the minimum privileges for the local server.