* This article was written in the context of Internet Security and Acceleration (ISA) 2006, a technology now considered deprecated with the introduction of Forefront Threat Management Gateway (TMG). Variations may exist. *
The Several Hat of the SharePoint Administrator
Often times, one person is tasked within an organization to be responsible for several platforms. If you have MOSS 2007, you also might have a range of other sister server platforms such as EPM, DPM, LCS, MIIS, or a variety of supplementary Microsoft platforms. The one server that is characteristically common within an external, as well as internal, facing SharePoint deployment is ISA server 2006 for its inherent security routines and web caching solutions, along with several other security options that can be typically of interest to SharePoint administrators such as honey pots and intrusion detection systems.
What is ISA server 2006?
ISA Server 2006 plays a very vital role with your enterprise, particularly when leveraging its security framework with your communications and collaborations platform since business critical data and enterprise processes will eventually be housed there. In relation to SharePoint, the main feature that we are looking to implement will be secure application publishing, in the current circumstance, MOSS 2007 (or SharePoint 2003 if currently not planning on an upgrade). It is important to realize that ISA has several other purposes and applications within an enterprise, however since the context of this site is SharePoint security, the main focus will be on leveraging ISA to securely use a SharePoint framework.
Mitigating Risks Leveraging ISA Server 2006 in Regards To MOSS (SharePoint 2007)
As part of any integrated security planning and implementation, it is necessary to take certain precautions to mitigate several risks to protect your corporate network. Implementing SharePoint within your environment can have several implications, depending on the context of what features an organization seeks to gain out of a SharePoint rollout. However, it is clear that several legacy business processes when it becomes a de facto standard within an organization will be placed moved from paper to electronic, streamlining them, but also placing them in a container with more points of access for an attacker to take advantage of. Bring processes out of the physical realm a majority of the times will cause more visibility into them, therefore bringing other points of access for an attacker to expose. This becomes increasingly important if you have any type of compliance or regulatory issues that will effect your business operations, SOX and HIPPA being the most common in relation to SharePoint and because SharePoint is so common within the healthcare field. This by no means implies that there aren’t other regulations to consider when implementing SharePoint, specifically within governmental and financial fields (such as consideration of the US Patriot Act), all of which should be examined prior to the rollout to ensure complete compliance upon initialization of the implementation.
Protecting Against Exposure in Regards to MOSS Mobility Controls
Because of the built in mobility controls with SharePoint, this risk becomes even greater since it will allow you to expose your portal at a more granular and prevalent level (those directories that exist within /m), carrying its own application richness nevertheless its own implications. Combining this valuable mobile functionality with the probability with a new external (or internal portal that may face attacks) facing functionality leveraging the numerous new SharePoint authentication controls (authentication in MOSS has more internet style controls), there is a higher possibility that an attacker will try to take over your portal.
Why Even Attack SharePoint?
So why is SharePoint a lucrative attack point for a person with malicious intent to gain access into, and possible corrupt. There are two main points of interest from an attacker standpoint in relation to SharePoint. Since SharePoint plays the role of an information repository, an attacker could potentially desire to gain business information for a multitude of arbitrary reasons. This could range from a lot of different points of interest, from blackmailing a company to gain this information back to a secondary company getting a competitive advantage onto another company. The second main reason is corporate espionage, taking down SharePoint, on a large scale could cause business interruptions, massive loss of data, or a platform to attack other sister server systems that might house the same type of sensitive information. For example, with the archiving agent with Live Communication Server it is feasible that once an attack gains a point of entry within the SharePoint environment that they may also have access to these archived records, which could expose a business further, or have an employee possibly covering their tracks from past malicious intent.
What Are the Benefits of Implementing ISA server with SharePoint?
- Enabling and monitoring access to SharePoint
- Implementing cryptographic solutions
- Leveraging Web Farms and Load Balancing
- Providing Secure and Fluid External Access to your SharePoint Portal
- Implementing Several Types of Access Such As Smart Cards and Biometrics
- Track User Traffic
- Implement Plug-ins such as Intrusion Detection, Honey pots, and Other Functionality
What are the benefits of leveraging ISA server 2006 with SharePoint 2003 or MOSS (SharePoint 2007)? There are several, in regards to SharePoint there are clear hooks that exist between SharePoint and ISA that allow you to face your portal in a variety of fashions depending on your corporate need. One of the largest problems when leveraging ISA server 2004 was that although the process of setting up listeners and routing was straightforward, SharePoint implementations were never very generic and varied to heavily for a standardized process, however with ISA server 2006, publishing your communications and collaborations network including exchange and ISA server are extremely simple. The second largest problem was setting up a secure implementation that leveraged a certain level of cryptographic methods, most notably SSL. However, as attacks become more sophisticated, it becomes possibly to implement cryptographic cloaking which can overcome packet inspection at the firewall level, compromising communications. However, ISA server with advanced SSL bridging allows an administrator to further protect a network while maintaining stateful packet inspection. Thirdly, SharePoint implementations often take advantage of sophisticated farming solutions that can exist in the amount of n servers, Web Publishing Load Balancing can make this easier to execute with a SharePoint environment. Fourthly, facing a SharePoint portal externally for 24×7 employee access is fairly common since it becomes a platform to build virtual teams with throughout the enterprise. This poses a multitude of problems, including but not limited to several windows of access (multiple logins) and pass-through link translation from multiple levels. ISA provides mechanisms to solve all of this, to ensure constant and fluid access to your SharePoint Portal at all times. Fifthly, providing mechanisms for several types of access, such as those with Smart Cards, is necessary within several organizations, particularly those within the governmental sector. ISA helps to translate these authentication types into your portal so that the facilities exist so that there are adaptable ways to authenticate to the portal. Sixthly, maintaining inspection and providing mechanisms to properly troubleshoot ISA, and authentication to your portal related problems, usually requiring using tools such as the SSL diagnostic tools or other third party products. ISA provides interfaces to your requested and responded packets so that you can properly implement and repair any issues that may arise within your network related to your security and web caching solution so that you can ensure that your portal is always secure, yet available. Seventhly, and lastly, ISA provides mechanisms to monitor and report on traffic within your SharePoint portal so that as a SharePoint administrator at all times you can watch traffic footprints and report on any problems as they may arise. These ISA interfaces are not technically difficult to invoke and massage to gain insight to certain activities, ensuring security of your portal at all times and providing faculties by which a SharePoint administrator can report on portal activities.
Maintaining Stateful Packet Inspection
One of the largest security mechanisms used with corporate network security in regards to publishing SharePoint servers is packet inspection through HTTP protocols, it is pretty default or is hopefully part of the current network configuration. This is related to the firewall level, and therefore is not typically aware of malicious activity at the application level, so therefore is indifferent to any type of attacks that would happen against your SharePoint environment at that particular level. The main feature that we need is stateful packet inspection that will promote application layer filtering mechanisms since this will make our security configuration more aware of our communications and collaborations platforms.