Check: SHPT-00-000760
Sharepoint 2010 SRG:
SHPT-00-000760
(in versions v1 r8 through v1 r7)
Title
SharePoint must implement security functions as largely independent modules to avoid unnecessary interactions between modules. (Cat II impact)
Discussion
Microsoft recommends separate Application Pools (and security accounts) for site collections with authenticated and anonymous content; to isolate applications storing security or management information; or where users have great liberty to create and administer sites and to collaborate on content. With this configuration, if an attacker gains control of one Application Pool, they do not gain universal access to all data hosted in the SharePoint farm. Configuring separate Application Pools with the appropriate security based on access and content allows for content isolation and load balancing, limiting access to specific servers. Organizations can use custom HTTP modules for specific zones to create unique sign-on rules based on these groups of users.
Check Content
1. Use the IIS Manager to navigate to the SharePoint Applications Pools and Sites list. 2. Verify the following for SharePoint applications: - Applications are not assigned to the Default Application Pool. - Central Administration is not assigned to an Application Pool with applications that have non-privileged user access. - Internet and Extranet sites are assigned to different Application Pools. Verify the Central Administration Application is in a separate Application Pool. 1. Open IIS Manager. 2. Click Application Pools. 3. Identify the SharePoint Central Administration application. 4. If SharePoint Central Administration is not the only application in the pool, this is a finding.
Fix Text
Consult the IIS STIG for further guidance. Either remove applications from the application pool or create a separate application pool for the SharePoint Central Administration site.
Additional Identifiers
Rule ID:
Vulnerability ID: V-28207
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002383 |
The organization defines the procedures to be employed to prevent unauthorized information transfer via shared resources when system processing explicitly switches between different information classification levels or security categories. |
Controls
Number | Title |
---|---|
SC-4 (2) |
Periods Processing |