T1213.002 Sharepoint

Adversaries may leverage the SharePoint repository as a source to mine valuable information. SharePoint will often contain useful information for an adversary to learn about the structure and functionality of the internal network and systems. For example, the following is a list of example information that may hold potential value to an adversary and may also be found on SharePoint:

  • Policies, procedures, and standards
  • Physical / logical network diagrams
  • System architecture diagrams
  • Technical system documentation
  • Testing / development credentials (i.e., Unsecured Credentials)
  • Work / project schedules
  • Source code snippets
  • Links to network shares and other internal resources
View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.PS-01.01 Configuration baselines Mitigates T1213.002 Sharepoint
Comments
This diagnostic statement provides for securely configuring production systems. This includes hardening default configurations and making security-focused setting adjustments to reduce the attack surface, enforce best practices, and protect sensitive data thereby mitigating adversary exploitation.
References
    PR.PS-01.02 Least functionality Mitigates T1213.002 Sharepoint
    Comments
    This diagnostic statement provides for limiting unnecessary software, services, ports, protocols, etc. Ensuring systems only have installed and enabled what is essential for their operation reduces the attack surface and minimizes vulnerabilities, which mitigates a wide range of techniques.
    References
      PR.AA-01.01 Identity and credential management Mitigates T1213.002 Sharepoint
      Comments
      This diagnostic statement protects against Sharepoint through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
      References

        NIST 800-53 Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        CA-07 Continuous Monitoring mitigates T1213.002 Sharepoint
        CM-06 Configuration Settings mitigates T1213.002 Sharepoint
        CM-05 Access Restrictions for Change mitigates T1213.002 Sharepoint
        AC-17 Remote Access mitigates T1213.002 Sharepoint
        IA-08 Identification and Authentication (Non-Organizational Users) mitigates T1213.002 Sharepoint
        AC-21 Information Sharing mitigates T1213.002 Sharepoint
        AC-23 Data Mining Protection mitigates T1213.002 Sharepoint
        IA-04 Identifier Management mitigates T1213.002 Sharepoint
        SC-28 Protection of Information at Rest mitigates T1213.002 Sharepoint
        RA-05 Vulnerability Monitoring and Scanning mitigates T1213.002 Sharepoint
        CM-08 System Component Inventory mitigates T1213.002 Sharepoint
        SI-07 Software, Firmware, and Information Integrity mitigates T1213.002 Sharepoint
        AC-16 Security and Privacy Attributes mitigates T1213.002 Sharepoint
        CM-02 Baseline Configuration mitigates T1213.002 Sharepoint
        CM-02 Baseline Configuration mitigates T1213.002 Sharepoint
        IA-02 Identification and Authentication (Organizational Users) mitigates T1213.002 Sharepoint
        CM-07 Least Functionality mitigates T1213.002 Sharepoint
        SI-04 System Monitoring mitigates T1213.002 Sharepoint
        AC-02 Account Management mitigates T1213.002 Sharepoint
        AC-03 Access Enforcement mitigates T1213.002 Sharepoint
        AC-04 Information Flow Enforcement mitigates T1213.002 Sharepoint
        AC-05 Separation of Duties mitigates T1213.002 Sharepoint
        AC-06 Least Privilege mitigates T1213.002 Sharepoint
        CM-03 Configuration Change Control mitigates T1213.002 Sharepoint

        VERIS Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        action.malware.variety.Capture stored data Capture data stored on system disk related-to T1213.002 Sharepoint
        attribute.confidentiality.data_disclosure None related-to T1213.002 Sharepoint

        Azure Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        microsoft_sentinel Microsoft Sentinel technique_scores T1213.002 Sharepoint
        Comments
        The following Microsoft Sentinel Hunting queries can identify potentially malicious access to SharePoint: "SharePointFileOperation via clientIP with previously unseen user agents", "SharePointFileOperation via devices with previously unseen user agents", and "SharePointFileOperation via previously unseen IPs". The Microsoft Sentinel Analytics "SharePointFileOperation via devices with previously unseen user agents" query can identify a high number of upload or download actions by an unknown and possible malicious actor.
        References

        M365 Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        EID-CA-E3 Conditional Access Technique Scores T1213.002 Sharepoint
        Comments
        Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint with no ability to download, print, or sync files. Furthermore, with its integration with Microsoft Cloud App Security, it can even restrict cut, copy and paste operations. This can impede an adversary's ability to collect valuable information and/or files from the application. This protection is partial as it doesn't prohibit an adversary from potentially viewing sensitive information and manually collecting it, for example simply writing down information by hand.
        References
        EID-CA-E3 Conditional Access Technique Scores T1213.002 Sharepoint
        Comments
        Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint with no ability to download, print, or sync files. Furthermore, with its integration with Microsoft Cloud App Security, it can even restrict cut, copy and paste operations. This can impede an adversary's ability to collect valuable information and/or files from the application. This protection is partial as it doesn't prohibit an adversary from potentially viewing sensitive information and manually collecting it, for example simply writing down information by hand.
        References
        PUR-AUS-E5 Audit Solutions Technique Scores T1213.002 Sharepoint
        Comments
        Microsoft Purview auditing solutions provide an integrated solution to help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. Thousands of user and admin operations performed in dozens of Microsoft 365 services and solutions are captured, recorded, and retained in your organization's unified audit log. Audit records for these events are searchable by security ops, IT admins, insider risk teams, and compliance and legal investigators in your organization. This capability provides visibility into the activities performed across your Microsoft 365 organization. Microsoft's Audit Solutions protects from Sharepoint attacks due to Audit Solutions providing the visibility to allow admins to consider periodic review of accounts and privileges for critical and sensitive repositories. License Requirements: Microsoft 365 E3 and E5
        References
        DEF-CAPP-E5 Defender for Cloud Apps Technique Scores T1213.002 Sharepoint
        Comments
        This control may detect anomalous user behavior wrt information repositories such as Sharepoint or Confluence.
        References
          DEF-CAPP-E5 Defender for Cloud Apps Technique Scores T1213.002 Sharepoint
          Comments
          This control may detect anomalous user behavior wrt information repositories such as Sharepoint or Confluence.
          References
            DEF-SSCO-E3 Secure Score Technique Scores T1213.002 Sharepoint
            Comments
            Microsoft Secure Score is a measurement of an organization's security posture, with a higher number indicating more recommended actions taken. It can be found at Microsoft Secure Score in the Microsoft Defender portal. Following the Secure Score recommendations can protect your organization from threats. From a centralized dashboard in the Microsoft Defender portal, organizations can monitor and work on the security of their Microsoft 365 identities, apps, and devices. Your score is updated in real time to reflect the information presented in the visualizations and recommended action pages. Secure Score also syncs daily to receive system data about your achieved points for each action. To help you find the information you need more quickly, Microsoft recommended actions are organized into groups: Identity (Microsoft Entra accounts & roles) Device (Microsoft Defender for Endpoint, known as Microsoft Secure Score for Devices) Apps (email and cloud apps, including Office 365 and Microsoft Defender for Cloud Apps) Data (through Microsoft Information Protection)
            References
            DEF-QUAR-E3 Quarantine Policies Technique Scores T1213.002 Sharepoint
            Comments
            In Exchange Online Protection (EOP) and Microsoft Defender for Office 365, quarantine policies allow admins to define the user experience for quarantined messages. Traditionally, users have been allowed or denied levels of interactivity with quarantine messages based on why the message was quarantined. For example, users can view and release messages that were quarantined as spam or bulk, but they can't view or release messages that were quarantined as high confidence phishing or malware. The following M365 features are supported by quarantine policies, “Response” to Anti-malware and Anti-Phishing tagged items. Files that are quarantined as malware by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams. License requirements: M365 E3 (or Defender for Office plan 1)
            References
            DEF-IR-E5 Incident Response Technique Scores T1213.002 Sharepoint
            Comments
            An incident in Microsoft Defender XDR is a collection of correlated alerts and associated data that make up the story of an attack. Microsoft 365 services and apps create alerts when they detect a suspicious or malicious event or activity. Individual alerts provide valuable clues about a completed or ongoing attack. Attacks typically employ various techniques against different types of entities, such as devices, users, and mailboxes. The result of this is multiple alerts for multiple entities in your tenant. Piecing the individual alerts together to gain insight into an attack can be challenging and time-consuming, Microsoft Defender XDR automatically aggregates the alerts and their associated information into an incident. A typical Incident Response workflow in Microsoft Defender XDR begins with a triage action, next is the investigate action, and finally is the response action. Microsoft 365 Defender Incident Response responds to Sharepoint attacks due to Incident Response being able to monitor for newly constructed logon behavior within Microsoft SharePoint. License Requirements: Microsoft Defender XDR
            References
            PUR-PAM-E5 Privileged Access Management Technique Scores T1213.002 Sharepoint
            Comments
            Microsoft Purview Privileged Access Management allows granular access control over privileged admin tasks in Office 365. It can help protect your organization from breaches that use existing privileged admin accounts with standing access to sensitive data or access to critical configuration settings. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bounded approval workflow. This configuration gives users just-enough-access to perform the task at hand, without risking exposure of sensitive data or critical configuration settings. Microsoft 365 configuration settings. When used with Microsoft Entra Privileged Identity Management, these two features provide access control with just-in-time access at different scopes. (e.g., Encryption, RBAC, Conditional Access, JIT, Just Enough Access (with Approval). License requirements: M365 E5 customers.
            References
            EID-RBAC-E3 Role Based Access Control Technique Scores T1213.002 Sharepoint
            Comments
            The RBAC control can be used to implement the principle of least privilege for access to SharePoint repositories to only those required for an account. This scores Partial for its ability to minimize the attack surface of accounts with access to potentially valuable information. License Requirements: ME-ID Built-in Roles (Free)
            References
            DEF-LM-E5 Lateral Movements Technique Scores T1213.002 Sharepoint
            Comments
            Defender for Identity LMPs are visual guides that help you quickly understand and identify exactly how attackers can move laterally inside your network. The purpose of lateral movements within the cyber-attack kill chain are for attackers to gain and compromise your sensitive accounts using non-sensitive accounts. Compromising your sensitive accounts gets them another step closer to their ultimate goal, domain dominance. To stop these attacks from being successful, Defender for Identity LMPs give you easy to interpret, direct visual guidance on your most vulnerable, sensitive accounts.
            References