Microsoft Partner 2025

Security & Compliance

Gap Analysis
CISA Baseline

Safeguarding your organization’s data, infrastructure, and users.

Gap Analysis

Microsoft SharePoint Online

Microsoft 365 (M365) SharePoint Online is a web-based collaboration and document management platform. It is primarily used to collaborate on documents and communicate information in projects. M365 OneDrive is a cloud-based file storage system primarily used to store a user’s personal files, but it can also be used to share documents with others. This secure configuration baseline (SCB) provides specific policies to strengthen the security of both services.

The Cybersecurity and Infrastructure Security Agency (CISA), provides guidance and capabilities to secure federal civilian executive branch agencies’ cloud business application environments and protect federal information that is created, accessed, shared, and stored in those environments.

 

Assumptions

The License Requirements sections of this document assume the organization is using an M365 E3 license level at a minimum. Therefore, only licenses not included in E3 are listed.

Key Terminology

The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in RFC 2119.

Security Solutions

1. External Sharing

This section helps reduce security risks related to sharing files with users external to the agency. This includes guest users, users who use a verification code, and users who access an Anyone link.

Policies

MS.SHAREPOINT.1.1v1 – External sharing for SharePoint SHALL be limited to Existing guests or Only people in your organization.

MS.SHAREPOINT.1.2v1 – External sharing for OneDrive SHALL be limited to Existing guests or Only people in your organization.

MS.SHAREPOINT.1.3v1 – External sharing SHALL be restricted to approved external domains and/or users in approved security groups per interagency collaboration needs.

Resources

License Requirements

  • N/A

Security Solutions

2. File and Folder Default Sharing Settings

This section provides policies to set the scope and permissions for sharing links to secure default values.

Policies

MS.SHAREPOINT.2.1v1 – File and folder default sharing scope SHALL be set to Specific people (only the people the user specifies).

MS.SHAREPOINT.2.2v1 – File and folder default sharing permissions SHALL be set to View.

Resources

License Requirements

  • N/A

Security Solutions

Sharing files with external users via the usage of Anyone links or Verification codes is strongly discouraged because it provides access to data within a tenant with weak or no authentication. If these features are used, this section details some access restrictions that could provide limited security risk mitigations.

Note: The settings in this section are only applicable if an agency is using Anyone links or Verification code sharing. See each policy below for details.

Policies

MS.SHAREPOINT.3.1v1 – Expiration days for Anyone links SHALL be set to 30 days or less.

MS.SHAREPOINT.3.2v1 – The allowable file and folder permissions for links SHALL be set to View only.

  • Rationale: Unauthorized changes to files can be made if permissions allow editing by anyone. By restricting permissions on links to View only, administrators prevent anonymous file changes.
  • Last modified: March 2025
  • Note: This policy is only applicable if the external sharing slider in the SharePoint admin center is set to Anyone.
  • MITRE ATT&CK TTP Mapping:

MS.SHAREPOINT.3.3v1 – Reauthentication days for people who use a verification code SHALL be set to 30 days or less.

  • Rationale: A verification code may be given out to provide access to information for a short period of time. By setting expiration timers for verification code access, administrators prevent unintended sustained access to information.
  • Last modified: March 2025
  • Note: This policy is only applicable if the external sharing slider in the SharePoint admin center is set to Anyone or New and existing guests.
  • MITRE ATT&CK TTP Mapping:

License Requirements

  • N/A

Resources

Our Expertise

Why Choose

Crimson Line?

By partnering with Crimson Line, you gain access to a team of experts who are committed to enhancing your business’s productivity and security.

01.

Crimson Line

Innovation

We stay ahead of the curve by embracing AI-driven tools like Copilot.

02.

Crimson Line

Expertise

Our experienced team architects and manages cloud-native solutions.

03.

Crimson Line

Cost-Effective

Enjoy the benefits of PaaS with minimal risk.

04.

Crimson Line

Flexibility

We tailor solutions to meet your unique needs.

Get Started

Create a Customized
Security Strategy

At Crimson Line, security is not just a product—it’s our commitment to your peace of mind.