Configuring Secure SharePoint Site Permissions
Audience: Site owners, departmental IT staff, SharePoint administrators
Purpose: Configure SharePoint permissions for security, governance, and usability
Quick Reference
- Use Scope Groups — Always use CSG (site access) and FSG (folder access) instead of individual accounts
- Start Private & Verify Defaults — Create sites as "Private" and remove broad groups like
Everyone except external users - Share Wisely — Use "Specific people" links; avoid "Anyone" or organization-wide links
Key Principles Checklist
Before configuring permissions:
- ✅ Use Scope Groups — CSG for site access, FSG for folder/library access
- ✅ Start Private — Explicitly grant access rather than starting public
- ✅ Review Defaults Immediately — Remove
Everyone except external usersfrom site groups - ✅ Understand Site Types — Team Sites vs. Communication Sites have different models
- ✅ Share Wisely — Use "Specific people" links for sensitive content
- ✅ Regularly Review Access — Periodically audit who has access
- ✅ Least Privilege — Grant minimum permissions needed
Permission Levels Reference
| Level | Abilities |
|---|---|
| Read | View pages, list items, download documents |
| Contribute | View, add, update, delete list items and documents |
| Edit | Contribute + add, edit, delete lists |
| Full Control | Complete control over site, content, settings, and permissions |
| Design | Edit + approve items, customize site design |
SharePoint Groups vs. Entra ID Groups
SharePoint Groups
- Exist only within a specific SharePoint site
- Examples:
[Site Name] Owners,[Site Name] Members,[Site Name] Visitors - Act as containers assigned a permission level
- You add users or Entra ID groups into these groups
Entra ID Groups (CSG/FSG)
- Centrally managed in Microsoft Entra ID
CSG— Cloud Scope Groups for site-level accessFSG— File Scope Groups for folder/library access- Security groups used for granting resource access
Populate SharePoint Groups with Entra ID Security Groups (CSG/FSG) rather than adding individual user accounts.
Prerequisites
| Requirement | Details |
|---|---|
| Role | SharePoint Site Owner or Site Manager |
| Credentials | University NetID |
| Data Classification | Understanding of site data sensitivity |
| Scope Groups | CSGs/FSGs created in Entra ID |
Configuration Procedure
Step 1: Define Site Purpose and Data Sensitivity
Before configuring permissions:
-
Determine Site Type
- Team Site — For collaborative group work
- Communication Site — To broadcast information
-
Identify Audience Roles
- Owners — Site administrators (2-3 people)
- Members/Contributors — Create and edit content
- Visitors/Readers — View content only
-
Assess Data Sensitivity
- Public, Internal, Confidential, FERPA-protected
- Classification dictates security level required
Step 2: Utilize Scope Groups (CSGs & FSGs)
Do not add individual user accounts directly to SharePoint site groups.
For Site-Level Access
Use CSG (Cloud Scope Groups):
CSG - [FAMIS Code] - [Site Purpose] - [Access Level]
Example: CSG - VPOP - ResearchAlpha - Collaborators
For Granular Access
Use FSG (File Scope Groups) only when breaking inheritance:
FSG - [FAMIS Code] - [Descriptive Purpose]
Example: FSG - VPOP - ResearchAlphaSensitiveData - EditRestricted
Document where inheritance is broken and which FSGs are used.
Step 3: Configure SharePoint Site Group Permissions
Navigate to Settings → Site permissions → Advanced permissions settings
Configure Owners Group
- Click on
[Site Name] Owners - Remove individuals and non-approved groups
- Remove
EveryoneandEveryone except external users - Add your
CSG - ... - Ownersgroup - Verify Full Control permission level
Configure Members Group
- Click on
[Site Name] Members - Remove
Everyone except external users - Add your
CSG - ... - Membersgroup - Assign Edit or Contribute permission level
Configure Visitors Group
- Click on
[Site Name] Visitors - Remove
Everyone except external users - Add your
CSG - ... - Visitorsgroup - Verify Read permission level
Always check Advanced permissions settings to remove broad system groups from Owners, Members, and Visitors SharePoint groups.
Step 4: Configure External Sharing
In SharePoint Admin Center, configure site sharing:
| Setting | Use Case |
|---|---|
| Only people in your organization | Most secure; no external sharing |
| New and existing guests | Controlled external collaboration |
| Anyone (Anonymous links) | Strongly discouraged — only for public data |
Set default sharing link type to "Specific people".
Step 5: Educate Users
Pair technical controls with user education:
- Share Specific Items — Share individual files/folders, not entire sites
- Use "Specific people" Links — Most secure link type
- Explain Risks — "People in Organization" links can be forwarded; "Anyone" links are unauthenticated
- Review Access — Use "Manage access" panel to see who has access
Step 6: Ongoing Reviews and Audits
Site Owner Reviews
- Periodically review CSG memberships
- Use Site usage → Shared with external users report
Administrative Monitoring
- Use SharePoint Admin Center → Reports → Data access governance
- Find overexposed content from "Anyone" or org-wide links
Audit Log Searching
Search Microsoft Purview audit log for:
SharingLinkCreatedAnonymousLinkUsedAdded user or group to SharePoint group
Access Reviews
For sensitive CSGs, implement formal Entra ID Access Reviews.
Troubleshooting
| Issue | Resolution |
|---|---|
| User can't access content | Verify user is in correct CSG; check CSG is in correct SharePoint Group; check for broken inheritance |
| "Private" site appears overshared | Check for Everyone or Everyone except external users in site groups; remove from Advanced permissions settings |
| Copilot surfaces unexpected data | Investigate oversharing; check for broad groups and permissive sharing links |
Related Resources
- SharePoint Scope Groups — Naming conventions
- Scope Groups & Naming — Full scope group reference
- Microsoft SharePoint Permissions — Official documentation
- Data Access Governance Reports — Reporting documentation