Microsoft's SharePoint collaboration platform is all the rage in today's business world, especially since third parties gained the ability to plug security holes. But managing it can still be a nightmare for IT security shops Microsoft SharePoint has many fans these days, but Andre Koot isn’t among them.Koot, information security manager at the Unive Verzekeringen insurance company in the Netherlands, says implementing it is a lot like getting a tooth pulled.“The concept of SharePoint is okay, but every implementation is hard and miserable,” he says. “SharePoint is the contrary of a Ferrari – great to own, bad to use.”The business world has enthusiastically embraced SharePoint, a collaboration platform that lets organizations host Web portals to shared workspaces and documents, including wikis and blogs. The problem is that it’s an absolute bear to manage, according to some IT security pros. One of the biggest problems, they say, is configuring it in a secure manner. That discomfort persists even though third-party vendors like Epok and Captaris have developed security add-ons for SharePoint Server 2007 that close some of the holes.Complexities they don’t understandBusiness Aspect Pty Ltd. in Australia, tries to help clients get a handle on their risk environment, find the right security strategy and develop procedures around it. Asked about the SharePoint difficulties he has come across, Taylor offered up four examples: Brendon Taylor, a director and principal consultant for 1. The unintentional or unplanned devolving of security administration away from the traditional skilled and knowledgeable user administration groups within IT out to business users or administrators who do not understand the complexities of roles, role group changes and authorization.2. Transactional workflows built into Sharepoint that incorporate the problem above as well as business administrators changing delegations of authority for workflow approvals and the like.3. Admin-level access to sites and generally poor permissions on sites affecting numerous sub-sites.4. The habit of organizations to ignore Sharepoint updates and service packs.Those problems are consistent with what Burton Group VP and Service Director Gerry Gebel comes across when talking to clients. Part of the problem is that it’s difficult to automate user administration because SharePoint isn’t designed for that kind of provisioning, he says.“Because of that, most people rely on this loose connection between Active Directory and SharePoint and try to provision accounts and group membership to Active Directory directly,” he says. “But it requires manual intervention to make all of that work well, and that can be painful.”One of Gebel’s clients had a large population of users in Active Directory and another group in an LDAP directory and wanted to give everyone the same interface experience on SharePoint. But that’s not possible given SharePoint’s current architecture, he says. As a result, users who log into Active Directory use a process that looks much different from how LDAP users are authenticated. Certain SharePoint functions can be degraded in the process.The desire of organizations to smooth out such difficulties has translated into robust sales for security vendors like Exostar LLC. Vijay Takanti, the company’s senior director, says his customers want a solution to the problem where partners use SharePoint without observing a consistent set of security rules.“They want to make sure all their partners are using two-factor authentication and they want better labeling for Word documents placed in SharePoint,” Takanti says. “What we do to meet the need is to implement SharePoint as a service in the cloud.” Where there’s a will (and manpower) there’s a wayDespite all the difficulties, companies can overcome SharePoint’s eccentricities with the right amount of will and workforce, says George Johnson, chief security officer at the National Center for Crisis and Continuity Coordination (NC4).“Any application can be secured at instantiation,” he says. “The problem is that organizations lack the will, people and process elements for the mission. IT and security should be given the expertise necessary to deploy tools properly at the start.”Once a platform is in place, Johnson says, radically inconsistent missions are put on top of it and people get confused, make mistakes, information is lost or delivered to inappropriate parties, and so on. “This is not the fault of the tool but rather the governance structure or the lack thereof,” he adds. “IT-based collaboration is very tough as it requires governance from far more.”For a SharePoint implementation to be successful, he says, IT, security, sponsor and end-user requirements must be brought into alignment.“These are often either completely overlooked or abandoned once the product is initially deployed,” he says. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe