SP13-00-000020 - SharePoint must use cryptography to protect the integrity of the remote access session.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadband, and wireless.

Remote network access is accomplished by leveraging common communication protocols and establishing a remote connection. These connections will typically occur over the public Internet, the Public Switched Telephone Network (PSTN), or sometimes both. Since neither of these Internetworking mechanisms are private nor secure, if cryptography is not used, then the session data traversing the remote connection could be intercepted and potentially modified. Cryptography provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection, thereby providing a degree of integrity. The encryption strength of a mechanism is selected based on the security categorization of the information traversing the remote connection.

Solution

Configure the SharePoint server configuration to use cryptography to protect the integrity of the remote access session.

Open IIS Manager.

In the Connections pane, expand 'Sites'.

Click the 'Web Application' site.

In the Actions pane, click 'Bindings'.

In the Site Bindings window, click 'Add'.

In the Add Site Binding window, change 'Type' to 'https', and select the site's SSL certificate. Click 'OK'.

Remove all bindings that do not use https.

Click 'Close'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_SharePoint_2013_V2R2_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-8, CAT|I, CCI|CCI-001453, Rule-ID|SV-223241r612235_rule, STIG-ID|SP13-00-000020, STIG-Legacy|SV-74369, STIG-Legacy|V-59939, Vuln-ID|V-223241

Plugin: Windows

Control ID: 75c97da71f604fce25f903091dd91d81886fbe09f8e38577e1ff30b0acaaa039