Encrypting Sensitive Data in Oracle E-Business Suite



Similar documents
All Things Oracle Database Encryption

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

PCI Compliance in Oracle E-Business Suite

PCI Compliance in Oracle E-Business Suite

mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer

Security Implications of Oracle Product Desupport April 23, 2015

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

How to Audit the Top Ten E-Business Suite Security Risks

Securing Oracle E-Business Suite in the Cloud

Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

New Security Features in Oracle E-Business Suite 12.2

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015

New Oracle 12c Security Features Oracle E-Business Suite Perspective

Oracle Database Security Myths

<Insert Picture Here> Oracle Database Vault

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Oracle Database 11g: Security Release 2

D50323GC20 Oracle Database 11g: Security Release 2

Oracle Database 11g: Security. What you will learn:

Securing Data in Oracle Database 12c

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Oracle Database Security Solutions

The Weakest Link : Securing large, complex, global Oracle ebusiness Suite solutions

Guide to Auditing and Logging in the Oracle E-Business Suite

Data-Centric Security vs. Database-Level Security

Oracle Database 11g: Security

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

<Insert Picture Here> Oracle Database Security Overview

MySQL Security: Best Practices

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Oracle Database 10g: Security Release 2

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Security Trends and Client Approaches

Payment Card Industry Data Security Standard PCI-DSS #SA7D, Platform Database, Tuning & Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

<Insert Picture Here> PCI DSS-Payment Card Industry. Security Summit Master Principal Sales Consultant - Alfredo Valenza - Oracle Italia

AppSentry Application and Database Security Auditing

Page 1. Copyright MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved.

Managing Oracle E-Business Suite Security

Auditing Data Access Without Bringing Your Database To Its Knees

Achieving PCI Compliance Using F5 Products

SafeNet DataSecure vs. Native Oracle Encryption

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

Integrigy Corporate Overview

Sophos Mobile Control Technical guide

AppDefend Application Firewall Overview

Oracle Database 11g: Security

Top Ten Fraud Risks in the Oracle E Business Suite

WHITE PAPER. Oracle E-Business Suite: Credit Cards and PCI Compliance

Database Assessment. Vulnerability Assessment Course

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

MS-55096: Securing Data on Microsoft SQL Server 2012

Oracle Database 10g Security

Vormetric Data Security

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Implementation Guide

Oracle White Paper October Oracle Advanced Security with Oracle Database 11g Release 2

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

Oracle Database Encryption

Introduction to Mobile Access Gateway Installation

Database Security Questions HOUG Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

Oracle Audit Vault and Database Firewall

PCI Requirements Coverage Summary Table

Securing Data on Microsoft SQL Server 2012

Oracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

Top 10 Database. Misconfigurations.

FormFire Application and IT Security. White Paper

Security standards PCI-DSS, HIPAA, FISMA, ISO End Point Corporation, Jon Jensen,

Security and Control Issues within Relational Databases

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Introduction to the EIS Guide

Complete Database Security. Thomas Kyte

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

enicq 5 System Administrator s Guide

Balancing Security Investment Against Today's Threat Environment

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Forward proxy server vs reverse proxy server

Oracle Database Security

Introduction to Endpoint Security

Making Database Security an IT Security Priority

Top Five Database Security and Compliance Resolutions for 2008

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Securing Sensitive Data

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Oracle 1Z0-528 Exam Questions & Answers

White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit

Database Security. Oracle Database 12c - New Features and Planning Now

Database Application Security Models and Policies

Auditing Mission-Critical Databases for Regulatory Compliance

Transcription:

Encrypting Sensitive Data in Oracle E-Business Suite December 19, 2013 Stephen Kost Chief Technology Officer Integrigy Corporation

About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft SQL Server Products Services AppSentry ERP Application and Database Security Auditing Tool AppDefend Enterprise Application Firewall for the Oracle E-Business Suite Validates Security Protects Oracle EBS Verify Security Ensure Compliance Build Security Security Assessments ERP, Database, Sensitive Data, Pen Testing Compliance Assistance SOX, PCI, HIPAA Security Design Services Auditing,, DMZ You

Agenda Sensitive Data Overview Non-EBS Q&A 1 2 3 4 5 EBS Native Network

Agenda Sensitive Data Overview Non-EBS Q&A 1 2 3 4 5 EBS Native Network

Why Sensitive Data Drivers PCI (Payment Card Industry - Data Security Standard) - Must encrypt credit card numbers Privacy Laws (National/State Regulations) - Read access to sensitive data (National Identifier and Bank Account Number) - Breach regulations often specifically exclude encrypted data - California (SB 1386) and Massachusetts data privacy laws HIPAA (Health Insurance Portability and Accountability Act) - Electronic Protected Health Information (ephi) should be encrypted an addressable implementation specification - Breach regulations exclude encrypted data

What is Sensitive Data in Oracle EBS? Payment Card Industry Data Security Standard (PCI-DSS 3.0) Privacy Regulations (employees, customers, vendors) HIPAA (Privacy Standard and Security Rule) Credit Card Number Primary Account Number (PAN) CVV/CV2/CID 3 digits on the back for Visa/MC 4 digits on the front for AMEX Magnetic Stripe Data (very rare in EBS) First and last name Plus one of the following: Social security number (SSN, Tax ID, 1099) Credit card number Bank account number Financial account number Driver license or state ID number First and last name Plus one of the following (Protected Health Information) the past, present, or future physical or mental health, or condition of an individual provision of health care to an individual payment for the provision of health care to an individual

Where is Sensitive Data in Oracle EBS? Credit Card Data Social Security Number (National Identifier) (Tax ID) (1099) Bank Account Number Electronic Protected Health Information (ephi) iby_security_segments (encrypted) ap_bank_accounts_all oe_order_headers_all aso_payments oks_k_headers_* oks_k_lines_* iby_trxn_summaries_all iby_credit_card per_all_people_f hr_h2pi_employees ben_reporting ap_suppliers ap_suppliers_int po_vendors_obs ap_checks_all ap_invoice_payments_all ap_selected_invoice_checks_all Order Management Accounts Receivables Human Resources

Where else might be Sensitive Data? Custom tables - Customizations may be used to store or process sensitive data Maintenance tables - DBA copies tables to make backup prior to direct SQL update - hr.per_all_people_f_011510 Interface tables - Credit card numbers are often accepted in external applications and sent to Oracle EBS or processed using XML Gateway Oracle EBS Flexfields - It happens very hard to find Interface files - Flat files used for interfaces or batch processing Log files - Log files generated by the application (e.g., Oracle Payments) Database File System

How Integrigy EBS Data Protection Process 1 Enterprise Data Privacy Policy P1 EBS Data Protection Policy to the data element level 2 Data Protection Design and Data Discovery P2 Detailed Data Inventory (element table.column action) Annually 3 Native EBS (credit card/bank acct) E1 Access Controls (application & database) C1 Add-on (disk or database) E2 Auditing A1 Clone 4 Scrambling/ Data Masking S1 Network (web and database) E3 5 Security, Hardening, and General IT Controls C2 Production Test/Development

How Integrigy EBS Data Protection Process 1 Enterprise Data Privacy Policy P1 EBS Data Protection Policy to the data element level 2 Data Protection Design and Data Discovery P2 Detailed Data Inventory (element table.column action) Annually 3 Native EBS (credit card/bank acct) E1 Access Controls (application & database) C1 Add-on (disk or database) E2 Auditing A1 Clone 4 Scrambling/ Data Masking S1 Network (web and database) E3 5 Security, Hardening, and General IT Controls C2 Production Test/Development

Types of Storage (Data at rest) - Disk, storage, media level encryption - of data at rest such as when stored in files or on media Network (Data in motion) - of data when transferred between two systems - SSL/HTTPS (users) and SQL*Net encryption (database) Access (Data in use)** - Application or database level encryption - of data with access permitted only to a subset of users in order to enforce segregation of duties

Storage/Access Oracle EBS Solutions Application (access = responsibility) Oracle EBS Credit Card Number for Customizations (DBMS_CRYPTO/FND_VAULT) Database (access = db account) View/Trigger for Customizations Disk/Storage (access = database) Oracle Transparent Data (TDE) Third-party Solutions (e.g., Vormetric) Disk/SAN Vendor Solutions Backup (e.g., RMAN)

Network Oracle EBS Solutions User Application Server (http) Native EBS SSL SSL Endpoint Use a load balancer or reverse proxy Application Server Database Server SQL*Net Formerly part of Advanced Security Option Now included with Oracle EBS Database (SQL*Net)

Big 3 Sensitive Data Elements in EBS Sensitive Data Element Most Common Data Types EBS Module EBS Native Credit Card Number Customer OM/AR/IBY Optional Employee Corporate Card AP/IBY/iExp Optional Employee HR No Social Security Number Vendor Tax ID/1099 AP No Customer AR/Custom No Company Bank Account CE No Bank Account Number Employee Bank Account (direct deposit) HR No Vendor Bank Account AP/IBY Optional

Agenda Sensitive Data Overview Non-EBS Q&A 1 2 3 4 5 EBS Native Network

Oracle EBS Native Oracle E-Business Suite includes native application-level encryption for a limited set of fields based on version and module. Not enabled by default in 11i or R12 11i = general patch release availability October 2006 R12 = included with base R12 release Significantly better solution than TDE or disk level encryption

Big 3 Sensitive Data Elements in EBS Sensitive Data Element Most Common Data Types EBS Module EBS Native Credit Card Number Customer OM/AR/IBY 11i and R12 Employee Corporate Card AP/IBY/iExp R12 Employee HR No Social Security Number Vendor Tax ID/1099 AP No Customer AR/Custom No Company Bank Account CE No Bank Account Number Employee Bank Account (direct deposit) HR No Vendor Bank Account AP/IBY R12

Oracle EBS Native MOS Note ID 338756.1 Patch 4607647 11i Significant functional pre-requisites (11.5.10.2) Only credit card numbers Keys stored in the database MOS Note ID 863053.1 R12 Credit card numbers and bank account numbers Uses Oracle Wallet to store encryption keys

Oracle Credit Card Design iby_security_segments ap_bank_accounts_all Collections oks_k_headers_* oks_k_lines_* aso_payments oe_order_headers_all Service Contracts Oracle Capture Oracle Mgmt AR istore ipayment iby_trxn_summaries_all iby_credit_card Not pictured: Internet Expenses (AP) R12 Lease Management (AP) same as AR Student System (IGS) IGS patch

EBS Native Challenges keys must be rotated periodically as required by PCI No method or supported procedure to purge encrypted data as required by PCI keys must be changed in test and development environments For PCI, no live credit card numbers allowed in test and development

Agenda Sensitive Data Overview Non-EBS Q&A 1 2 3 4 5 EBS Native Network

What is Oracle TDE? Transparent database encryption - Requires no application code or database structure changes to implement - Only major change to database function is the Oracle Wallet must be opened during database startup - Add-on feature licensed with Advanced Security Option Limited to encrypting only certain columns - Cannot be a foreign key or used in another database constraint - Only simple data types like number, varchar, date, - Less than 3,932 bytes in length

What does TDE do and not do? TDE only encrypts data at rest TDE protects data if following is stolen or lost - - disk drive - database file - backup tape of the database files An authenticated database user sees no change Does TDE meet legal requirements for encryption? - California SB1386, Payment Card Industry Data Security - Ask your legal department

Data Center Theft From Chicago Police Report - At least two masked intruders entered the suite after cutting into the reinforced walls with a power saw. During the robbery, the night manager was repeatedly tazered and struck with a blunt instrument. At least 20 data servers were stolen.

Column vs. Tablespace Column encryption - Fairly straight forward for simple cases such as NATIONAL_IDENTIFIER in HR.PER_ALL_PEOPLE_F - done in place using ALTER TABLE - Do not use SALT for Oracle EBS columns - Use for standard Oracle EBS columns Tablespace encryption - Tablespace encryption only supported in 11g for 11i/R12 - Tablespace must be exported and imported to implement encryption - OATM uses large tablespaces (APPS_TS_TX_DATA) - Use for custom tablespaces or entire database

Performance Considerations Impact is limited to CPU performance - Data must be encrypted and decrypted - Highly dependent on access patterns to data No disk I/O read or write impact - Change is not significant Column - 5% to 20% CPU performance impact for several customers Tablespace - Encrypting entire database is feasible - 10% to 15% CPU performance impact for one customer on high transaction volume tables

Agenda Sensitive Data Overview Non-EBS Q&A 1 2 3 4 5 EBS Native Network

Oracle EBS Default Network Communication Client Browser HTTP Oracle EBS Application Server 1 2 Apache Java Container SQL*Net Database 1 Communication from the client browser to the application server uses the HTTP protocol and all traffic is unencrypted, including passwords. Communication from the application server to the database uses the Oracle SQL*Net protocol and all traffic is unencrypted, except database passwords. 2

Client to Application Server (Native) Client Browser 1 SSL/ HTTPS Oracle EBS Application Server Apache Java Container 2 SQL*Net Database SSL encryption (just like with your bank uses) should be implemented for Oracle EBS as EBS natively supports SSL. Modify SSL encryption settings to strengthen. See My Oracle Support Notes 376700.1 (R12) and 123718.1 (11i). Many Oracle EBS implementations will only encrypt external application servers (isupplier, istore, etc.).

Client to Application Server (Proxy) 1 Client Browser SSL/ HTTPS Load Balancer or Reverse Proxy HTTP Oracle EBS Application Server 2 SQL*Net Database SSL encryption may be off-loaded to a load balancer (F5 BigIP) or reverse proxy server to centralize the SSL implementation and reduce load on the application server. SSL terminates on the load balancer and communication is HTTP between load balancer and application server. See My Oracle Support Notes 380489.1 (R12), 217368.1 (11i), and 727171.1 for more information.

Application Server to Database Server Client Browser Oracle EBS Application Server 1 2 HTTP Apache Java Container SQL*Net using ANO Database SQL*Net encryption requires Advanced Networking Option (ANO). ANO is included with the database as of July 2013. See My Oracle Support Notes 376700.1 (R12) and 391248.1 (11i) for implementation details.

How - Data Protection vs. Threats Data Access Method and Threats 1 EBS Encrypt 2 Trigger View 3 Oracle TDE Options 4a FGAC 4b Internal Audit 4c External Audit 3 + 4 TDE + Auditing 1. Application access by end-users (responsibility) E E C A A A 2. Application access by application administrators E+ E- C A A A 3. Database access by DBA E E C A+ A A 4. Database access by Applications DBA (SYSTEM, APPS) E+ E+ A+ A+ A+ 5. Database access by other database accounts E E C A A A 6. Operating system access to database data files E E E E 7. On-line or off-line access to database backups E E E E 8. Exploitation of Oracle Applications security vulnerabilities E- E- C+ A+ A+ A+ 9. Exploitation of Oracle Database security vulnerabilities E+ E+ C+ A+ A+ A+ 10. Exploitation of operating system security vulnerabilities E E E E E = Encrypted, C = Access Controlled, A = Access Audited, + = Mostly - = Partially

Agenda Sensitive Data Overview Non-EBS Q&A 1 2 3 4 5 EBS Native Network

Contact Information Stephen Kost Chief Technology Officer Integrigy Corporation web: www.integrigy.com e-mail: stephen.kost@integrigy.com blog: integrigy.com/oracle-security-blog Copyright 2013 Integrigy Corporation. All rights reserved.