Smartsheet Hardening Guide
Work management security for sharing defaults, connector controls, and activity logging
Overview
Smartsheet is a collaborative work management platform for projects, workflows, and data collection. REST API, OAuth apps, and connectors access project data and business processes. Compromised access exposes project timelines, resource allocation, and potentially sensitive form submissions.
Intended Audience
- Security engineers managing work management platforms
- Smartsheet administrators
- GRC professionals assessing project management security
- Third-party risk managers evaluating workflow integrations
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Smartsheet security configurations including authentication, access controls, and integration security.
Table of Contents
1. Authentication & Access Controls
1.1 Enforce SSO with MFA
Profile Level: L1 (Baseline) NIST 800-53: IA-2(1)
ClickOps Implementation
Step 1: Configure SAML SSO (Enterprise)
- Navigate to: Admin Center → Security Controls → SAML
- Configure SAML IdP
- Enable: Require SAML
Step 2: Enable MFA
- Configure MFA through IdP
- Or enable Smartsheet MFA
- Require for all users
1.2 User Types and Roles
Profile Level: L1 (Baseline) NIST 800-53: AC-3, AC-6
ClickOps Implementation
Step 1: Define User Types
| Type | Permissions |
|---|---|
| System Admin | Full admin access |
| Group Admin | Manage specific groups |
| Licensed User | Create and share |
| Resource Viewer | View resources only |
Step 2: Configure Groups
- Navigate to: Admin Center → User Management → Groups
- Create department groups
- Assign permissions by group
2. Sharing & Permissions
2.1 Configure Sharing Defaults
Profile Level: L1 (Baseline) NIST 800-53: AC-21
Description
Control sheet and workspace sharing.
Rationale
Attack Scenario: Public links to project sheets expose sensitive timelines; form submissions accessible to unauthorized users.
ClickOps Implementation
Step 1: Global Sharing Settings
- Navigate to: Admin Center → Security Controls
- Configure:
- Published item restrictions
- External sharing policies
- Default sharing permissions
Step 2: Workspace Controls
- Create workspaces per team
- Set workspace sharing defaults
- Restrict external sharing
2.2 Form Security
Profile Level: L1 (Baseline) NIST 800-53: AC-21
ClickOps Implementation
Step 1: Form Access Controls
- Limit who can view form submissions
- Restrict form sharing
- Configure submission notifications
3. Integration Security
3.1 Connector Security
Profile Level: L1 (Baseline) NIST 800-53: CM-7
ClickOps Implementation
Step 1: Review Connectors
- Navigate to: Admin Center → Integrations
- Review all connected apps
- Remove unused connectors
Step 2: API Access
- Navigate to: Personal Settings → API Access
- Audit access tokens
- Revoke unused tokens
3.2 Premium App Security
Profile Level: L2 (Hardened) NIST 800-53: CM-7
ClickOps Implementation
Step 1: Control Premium Apps
- Navigate to: Admin Center → Premium Apps
- Enable/disable by app
- Configure access permissions
4. Monitoring & Detection
4.1 Activity Log (Enterprise)
Profile Level: L1 (Baseline) NIST 800-53: AU-2, AU-3
ClickOps Implementation
Step 1: Access Activity Log
- Navigate to: Admin Center → Security Controls → Activity Log
- Review user activities
- Export for SIEM integration
Detection Focus
Appendix A: Edition Compatibility
| Control | Pro | Business | Enterprise |
|---|---|---|---|
| SAML SSO | ❌ | ❌ | ✅ |
| Activity Log | ❌ | ❌ | ✅ |
| Group Admin | ❌ | ❌ | ✅ |
| External Sharing Controls | ❌ | ✅ | ✅ |
Appendix B: References
Official Smartsheet Documentation:
API & Developer Tools:
- Developer Portal
- API Introduction
- SDKs available for C#, Java, Node.js, and Python – via Developer Portal
Compliance Frameworks:
- SOC 1, SOC 2 Type II, SOC 3, ISO 27001:2022, ISO 27018:2019, ISO 27701:2019 – via Trust Center / Compliance
- SOC Reports
- ISO Certification
Security Incidents:
- No major direct Smartsheet data breach publicly reported. In the October 2023 Okta support system compromise, a Smartsheet service account credential was stolen and later used by threat actors to access Cloudflare’s Atlassian environment (not a Smartsheet platform breach). Separately, Smartsheet patched an account-hijacking vulnerability before any known exploitation.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-12-14 | 0.1.0 | draft | Initial Smartsheet hardening guide | Claude Code (Opus 4.5) |