SAP Security anno Tim Lynen, Manager axl & trax 2017

Similar documents
Onapsis: The CISO Imperative Taking Control of SAP

Mobile Trends And The New Threats Is Your SAP System Vulnerable to Cyber Attacks? Stephen Lamy, Virtual Forge

About the company. What we do? Cybersecurity solutions adapted to protect enterprise business applications (SAP & Oracle).

SAP Certified Technology Associate - System Administration (SAP HANA) with SAP NetWeaver 7.5

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

ABAP Platform 7.4/7.5 Overview. Technology Core Platform Product Management, SAP SE March 22 th, 2017

Institute of Internal Auditors 2018 IIA CHICAGO CHAPTER JOIN NTAC:4UC-11

Securing Digital Transformation

Executing Remote Static Checks in Context of HANA Migration

PT Unified Application Security Enforcement. ptsecurity.com

Sage Data Security Services Directory

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager

CYBERSECURITY RISK LOWERING CHECKLIST

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Attacks based on security configurations

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

Case Study: The Evolution of EMC s Product Security Office. Dan Reddy, CISSP, CSSLP EMC Product Security Office

Kaspersky Enterprise Cybersecurity. Kaspersky Security Assessment Services. #truecybersecurity

CoreMax Consulting s Cyber Security Roadmap

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Cyber Security 2010 THE THREATS! THE FUTURE!

Information Security Controls Policy

CYBER RISK MANAGEMENT: ADDRESSING THE CHALLENGE SIMON CRUMPLIN, FOUNDER & CEO

Cyber Resilience - Protecting your Business 1

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Software and Delivery Requirements

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

SAP Security. BIZEC APP/11 Version 2.0 BIZEC TEC/11 Version 2.0

Rootkits and Trojans on Your SAP Landscape

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

COURSE LISTING. Courses Listed. Training for Database & Technology with Development in ABAP Dialog Programming. Beginner. Intermediate.

GUI Q&A. 3. What is the name space which will be used? A: Our package will use ZGUI06 for all objects. The attached excel file is a sample.

10 FOCUS AREAS FOR BREACH PREVENTION

Enterprise Journey to OpenStack Adoption: Real World Stories

Trigger-Based Data Replication Using SAP Landscape Transformation Replication Server

From Russia With Love

SAP Security in a Hybrid World. Kiran Kola

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

Background FAST FACTS

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Taking Control of Your Application Security

Securing Industrial Control Systems

COURSE LISTING. Courses Listed. Training for Database & Technology with Technologieberater in Associate with Database. Last updated on: 28 Sep 2018

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

1. What is used by the extension application to get access to the extended SAP solution?

Cyber Security Audit & Roadmap Business Process and

Nebraska CERT Conference

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk

Cybersecurity: Incident Response Short

Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

1 IAM Program Launch. 2 Agenda. 3 Introductions. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services

COURSE LISTING. Courses Listed. with HANA Programming. 13 February 2018 (04:51 GMT) HA100 - SAP HANA

GDPR Update and ENISA guidelines

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Strategies for a Successful Security and Digital Transformation

112 th Annual Conference May 6-9, 2018 St. Louis, Missouri

Operationalizing the Three Principles of Advanced Threat Detection

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

The Business Case for Security in the SDLC

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

Skybox Security Vulnerability Management Survey 2012

McAfee Database Security

AKAMAI CLOUD SECURITY SOLUTIONS

Industrial Control System Cyber Security

Layer Seven Security ADVISORY

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Secure Access & SWIFT Customer Security Controls Framework

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Ingram Micro Cyber Security Portfolio

First Look Showcase. Expanding our prevention, detection and response solutions. Sumedh Thakar Chief Product Officer, Qualys, Inc.

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

SAP Policy Management, group insurance add-on 1.1

CYBER SECURITY AIR TRANSPORT IT SUMMIT

SDN Community Contribution

Hackproof Your Cloud: Preventing 2017 Threats for a New Security Paradigm

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Cyber Attacks & Breaches It s not if, it s When

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Data Sheet The PCI DSS

Transforming IT: From Silos To Services

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Trustwave Managed Security Testing

RSA INCIDENT RESPONSE SERVICES

SAP Assurance and Compliance Software Release 1.2 SP04

LESSONS LEARNED IN SMART GRID CYBER SECURITY

SAP and SAP HANA on VMware

Transcription:

SAP Security anno 2017 Tim Lynen, Manager axl & trax 2017

Agenda Introduction axl & trax Importance of landscape security Where to start Top items to focus on Security in the organization Q&A

Introduction axl & trax

axl & trax who are we - the name Fact sheet 20 years expertise Consultancy/advisory/audit/training/implementation/operations in access governance for SAP environments +-30 Dedicated SAP security, GRC & IAM experts With more than 250 customers

Importance of SAP landscape security

Why landscape security SAP = part of critical business applications Financial data Personal data (customers, vendors, employees, ) Confidential data (recipes, strategy, ) Increasing number of cyber attacks on SAP environments Targeting of application vulnerabilities SAP vulnerabilities are known in public New regulations (ex. GDPR) New technology requires new approach HANA, S/4HANA, Fiori, Screen Personas, Increase in connectivity Cloud, Mobile, IoT,

The cyber threat is real Known breaches due to misuse of vulnerabilities 2012 - Greek ministry of finance 2013 - First malware looking for SAP data 2014 - High tech company s SAP breached 2015 - Attack on USIS SAP systems 2016 - First ever US-CERT alert on SAP 2017 -. Many remain unknown to avoid image damage

Where to start

How to increase your security level Find out where you are Start with solving the most obvious issues 1. Patches (All stacks) 2. Gateway security 3. Default users & passwords 4. Open unused RFC connections & Java Services 5. Custom (ABAP) coding 6. RFC connection hopping 7. Critical access rights & SoD 8. Switchable authorization framework 9. System parameter configuration 10. Advanced security topics

How to find out where you are Differences (Release, EHP, SP,..) between SAP systems in your landscape Focus on productive but don t neglect the others Use your SAP Solution Manager to help out Service Level Reports (SLR) automate vulnerability reporting for SAP systems System Recommendations is an application in Solution Manger that performs automated patch management for SAP systems Security Dashboards monitor critical key performance indicators to track vulnerabilities and threats across SAP landscapes in real-time Interface Monitoring is used to map and track system interfaces in SAP landscapes including RFC, HTTP, IDOC and Web Service connections. Security Alerting is based on the Monitoring and Alerting Infrastructure (MAI) of Solution Manager. MAI connects to data providers including event logs to monitor for security vulnerabilities and incidents

Solve 1 - patches Most common issue at customers = insufficiently patched system Vulnerabilities are publicly known SAP releases security patches every 2 nd Tuesday of the month Source: https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/

Solve 2 SAP gateway security Very common that customers do not have any gateway security But my system is not connected to the internet.. We don t use the gateway By default no security is implemented 2 ACL files ( Access Control List = security files) should be setup File reginfo controls the registration of external programs in the gateway. The secinfo security file is used to prevent unauthorized launching of external program Gateway logging should be activated Your SAP Solution Manager is a gateway to all your SAP systems this makes Solution Manager mission critical

Solve 3 Default users & passwords All SAP systems have default users and password SAP* does not even have to exist as a user to be in use Run report RSUSR003 on each system

Solve 4 Open unused RFC connections and JAVA services RFC = Remote Function Call +/- 38.000 remote enabled function modules in an SAP system Typical SAP customer uses a few hundred of them* Close function modules not in use by using SAP UCON = Unified Connectivity For external connections only Included in SAP NetWeaver as of SAP_BASIS 7.40 For JAVA services the same logic applies unused = deactivate SAP UCON is ABAP stack only * source = SAP.com

Solve 5 Custom (ABAP) coding Every SAP customer has custom code in their system Namespace Y*, Z*, /* Security in custom code is a major issue at most customers Some example: Missing authority checks SQL code injection possibilities Hard code users, systems, clients A customer specific development policy should be implemented having a chapter on security and secure coding Default (limited scope) SAP tool is available SAP ABAP test cockpit (ATC) SAP code inspector (SCI) Extended program check (SLIN) Syntax check (SE80, check) 3 rd party tools cover a broader scope

Solve 6 RFC connection hopping RFC connections exist in every SAP system in your landscape Connection can and are made between systems DEV to QAS, QAS to PROD, sandbox to a BI to an ERP,. Fixed credentials might be in the connection especially in sandboxes which later on become production systems

Solve 7 Critical access rights Define what s critical for you organization There is no ruleset that fits all companies Monitor critical access rights within the system Debug access (maintenance) Direct table access (confidentiality, GDPR, ) Using other users access rights to launch jobs Build in tools exist for certain items SAP Read Access Log who read which data SAP Solution Manager 3 rd party tools cover a broader scope

Solve 8 Switchable authorization framework New approach from SAP Non disruptive way of implementing security by SAP Security is build-in but mostly not activated by default Recommendation is to activate all used scenarios Available in all NetWeaver releases as of a certain SP

Solve 9 System parameter configuration System configuration is partially done by setting system parameters A SAP security policy or at least guideline should be available in the company management decides, IT executes This is mostly not in line with best practices and not aligned between systems Wrong configuration opens the door for exploits Some critical parameters with regard to security login/no_automatic_user_sapstar SAP* users login/disable_multi_gui_login account sharing auth/no_check_in_some_cases deactivate authority checks Tools to compare and / or correct system parameter settings Solution Manager Configuration Validation 3rd party tools cover a broader scope

Solve 10 Advanced security topics Discovering vulnerabilities not yet known Cover for zero day exploits until SAP releases patch Evaluating new releases and technologies for security impact Upgrades, EHP s, SP s, Many security tool vendors invest in security research Pattern evaluation requires software Good security does not consist out of securing 1 system, the whole landscape is involved

Security in an organization a lifecycle It all starts with a clear governance structure, policies, guidelines, Budget allocation for security should not be underestimated Protection Apply your security policy Implement an ABAP coding process with security attention Secure your perimeter Conduct regular penetration testing Detection Use solution manager to the full extend Implement other tools to augment the security level Response Have a dedicated security team with decent skills on the SAP level

Affiliations and partnerships affiliations partnerships

Q&A Thank you for your attention Tim Lynen manager axl & trax Certified SAP NetWeaver Security Consultant CRISC tim.lynen@axl-trax.com