v0.1.0-draft AI Drafted

Smartsheet Hardening Guide

Productivity Last updated: 2025-12-14

Work management security for sharing defaults, connector controls, and activity logging

Overview

Smartsheet is a collaborative work management platform for projects, workflows, and data collection. REST API, OAuth apps, and connectors access project data and business processes. Compromised access exposes project timelines, resource allocation, and potentially sensitive form submissions.

Intended Audience

  • Security engineers managing work management platforms
  • Smartsheet administrators
  • GRC professionals assessing project management security
  • Third-party risk managers evaluating workflow integrations

How to Use This Guide

  • L1 (Baseline): Essential controls for all organizations
  • L2 (Hardened): Enhanced controls for security-sensitive environments
  • L3 (Maximum Security): Strictest controls for regulated industries

Scope

This guide covers Smartsheet security configurations including authentication, access controls, and integration security.


Table of Contents

  1. Authentication & Access Controls
  2. Sharing & Permissions
  3. Integration Security
  4. Monitoring & Detection

1. Authentication & Access Controls

1.1 Enforce SSO with MFA

Profile Level: L1 (Baseline) NIST 800-53: IA-2(1)

ClickOps Implementation

Step 1: Configure SAML SSO (Enterprise)

  1. Navigate to: Admin Center → Security Controls → SAML
  2. Configure SAML IdP
  3. Enable: Require SAML

Step 2: Enable MFA

  1. Configure MFA through IdP
  2. Or enable Smartsheet MFA
  3. Require for all users

1.2 User Types and Roles

Profile Level: L1 (Baseline) NIST 800-53: AC-3, AC-6

ClickOps Implementation

Step 1: Define User Types

Type Permissions
System Admin Full admin access
Group Admin Manage specific groups
Licensed User Create and share
Resource Viewer View resources only

Step 2: Configure Groups

  1. Navigate to: Admin Center → User Management → Groups
  2. Create department groups
  3. Assign permissions by group

2. Sharing & Permissions

2.1 Configure Sharing Defaults

Profile Level: L1 (Baseline) NIST 800-53: AC-21

Description

Control sheet and workspace sharing.

Rationale

Attack Scenario: Public links to project sheets expose sensitive timelines; form submissions accessible to unauthorized users.

ClickOps Implementation

Step 1: Global Sharing Settings

  1. Navigate to: Admin Center → Security Controls
  2. Configure:
    • Published item restrictions
    • External sharing policies
    • Default sharing permissions

Step 2: Workspace Controls

  1. Create workspaces per team
  2. Set workspace sharing defaults
  3. Restrict external sharing

2.2 Form Security

Profile Level: L1 (Baseline) NIST 800-53: AC-21

ClickOps Implementation

Step 1: Form Access Controls

  1. Limit who can view form submissions
  2. Restrict form sharing
  3. Configure submission notifications

3. Integration Security

3.1 Connector Security

Profile Level: L1 (Baseline) NIST 800-53: CM-7

ClickOps Implementation

Step 1: Review Connectors

  1. Navigate to: Admin Center → Integrations
  2. Review all connected apps
  3. Remove unused connectors

Step 2: API Access

  1. Navigate to: Personal Settings → API Access
  2. Audit access tokens
  3. Revoke unused tokens

3.2 Premium App Security

Profile Level: L2 (Hardened) NIST 800-53: CM-7

ClickOps Implementation

Step 1: Control Premium Apps

  1. Navigate to: Admin Center → Premium Apps
  2. Enable/disable by app
  3. Configure access permissions

4. Monitoring & Detection

4.1 Activity Log (Enterprise)

Profile Level: L1 (Baseline) NIST 800-53: AU-2, AU-3

ClickOps Implementation

Step 1: Access Activity Log

  1. Navigate to: Admin Center → Security Controls → Activity Log
  2. Review user activities
  3. Export for SIEM integration

Detection Focus


Appendix A: Edition Compatibility

Control Pro Business Enterprise
SAML SSO
Activity Log
Group Admin
External Sharing Controls

Appendix B: References

Official Smartsheet Documentation:

API & Developer Tools:

Compliance Frameworks:

Security Incidents:

  • No major direct Smartsheet data breach publicly reported. In the October 2023 Okta support system compromise, a Smartsheet service account credential was stolen and later used by threat actors to access Cloudflare’s Atlassian environment (not a Smartsheet platform breach). Separately, Smartsheet patched an account-hijacking vulnerability before any known exploitation.

Changelog

Date Version Maturity Changes Author
2025-12-14 0.1.0 draft Initial Smartsheet hardening guide Claude Code (Opus 4.5)