2.3 Ensure the SharePoint setup account is configured with the minimum privileges in Active Directory.

Information

The SharePoint setup account must be configured with the minimum privileges in Active
Directory.

Rationale:

Separation of duties is a prevalent Information Technology control implemented at
different layers of the information system including the operating system and in
applications. It serves to eliminate or reduce the possibility that a single user may carry out
a prohibited action. Separation of duties requires the person accountable for approving an
action not be the same person who is tasked with implementing the action.

This requirement is intended to limit exposure due to user accounts being used to operate
from within a privileged account or role. Limiting the access and permissions of privileged
accounts to the minimum required, reduces exposure if the account is compromised and
provides forensic history of activity when operating from these accounts.

This policy limits the setup account privileges in AD. However, default permissions for this
account are configured by the SharePoint Products Configuration Wizard during product
installation. This account is referred to during the installation as the 'Database Access'
account. By default, the account is used as the service account for the SharePoint Timer
Service and the SharePoint Central Administration Web Site Application Pool. These
settings should not be changed. Furthermore, this account should not be used as the service
account for non-privileged services, applications, or application pools.

NOTE: The setup account does need to be a member of the local Administrators group on
the SharePoint server for installation and configuration.

Solution

1. Navigate to Active Directory Users and Computers > Users.
2. Double click on the setup user account to view the account properties.
3. Select the Members of tab and remove and group that is not Domain Users.
4. Select the other tabs in this area to verify no other services or permissions are
configured for this account.

See Also

https://workbench.cisecurity.org/files/2395

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6, CSCv6|5.1

Plugin: Windows

Control ID: dd12fc72a378689d5354e04ac33184f76269ee0126b8938c857c6656f755a2ab