IDS for SAP. Application Based IDS Reporting in the ERP system SAP R/3



Similar documents
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

USM IT Security Council Guide for Security Event Logging. Version 1.1

Guideline on Auditing and Log Management

Application Based IDS Reporting in the ERP system SAP R/3. Odd Christian Hauge

Observation and Findings

Information Technology Policy

ITIL A guide to Event Management

Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015

White Paper. Sarbanes Oxley and iseries Security, Audit and Compliance

FairWarning Mapping to PCI DSS 3.0, Requirement 10

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

SIEM Implementation Approach Discussion. April 2012

Strengthen security with intelligent identity and access management

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

Taxonomy of Intrusion Detection System

Estate Agents Authority

How To Manage Security On A Networked Computer System

Radware s Behavioral Server Cracking Protection

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

Real-Time Database Protection and. Overview IBM Corporation

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

ITIL A guide to event management

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Take Control of Identities & Data Loss. Vipul Kumra

Internet Banking Internal Control Questionnaire

Penetration Testing in Romania

INTRUSION DETECTION SYSTEMS and Network Security

Circular to All Licensed Corporations on Information Technology Management

Building Reference Security Architecture

WHITE PAPER Moving Beyond the FFIEC Guidelines

DIVISION OF INFORMATION SECURITY (DIS)

NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Secret Server Qualys Integration Guide

Exam 1 - CSIS 3755 Information Assurance

End-user Security Analytics Strengthens Protection with ArcSight

SAP Security Monitoring with agilesi. agilesi tm Solution Brief Product Specification July 2012 Version 1.1

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Globalnest SAP Technical Services

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

Sarbanes-Oxley Control Transformation Through Automation

SERVICE ORIENTED EVENT ASSESSMENT CLOSING THE GAP OF COMPLIANCE MANAGEMENT

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Understanding Vulnerability Management Life Cycle Functions

Data Management Policies. Sage ERP Online

Continuous Controls Monitoring ISACA, Houston Chapter. August 17, 2006

ISO COMPLIANCE WITH OBSERVEIT

Attachment A. Identification of Risks/Cybersecurity Governance

NIST Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Service Management Policy

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

Enable Connectivity for 3PAR Storage:

Security Tools - A Try Before You Buy Web-Based Approach

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

FISMA / NIST REVISION 3 COMPLIANCE

Application Monitoring for SAP

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Name. Description. Rationale

Security Event Management. February 7, 2007 (Revision 5)

End-to-end Service Level Monitoring with Synthetic Transactions

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Using Assurance Models in IT Audit Engagements

Vulnerability. Management

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

SAP GRC Superuser Privilege Management

System Security Policy Management: Advanced Audit Tasks

SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH

Continuous Monitoring: Match Your Business Needs with the Right Technique

Computer Security DD2395

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide

Manage and Control Access Risk and Assess Its Financial Impact

State of Oregon. State of Oregon 1

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation

Security Controls What Works. Southside Virginia Community College: Security Awareness

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Network- vs. Host-based Intrusion Detection

QRadar SIEM 6.3 Datasheet

Transcription:

IDS for SAP Application Based IDS Reporting in the ERP system SAP R/3 1

Research Question How is the performance of this SAP IDS when running with reduction of false positives and anonymization? Hypothesis It is possible to make an application based IDS for SAP and increase performance with false positive reduction in anonymized mode. 2

Goals Simplicity Automate security monitoring for SLA meetings and Security Audits. Effective and Proactive processing of Security Audit Log Improve organizational security awareness 3

SAP R/3 facts ERP system (Enterprise Resource Planning) Integrated database containing all data and processes for the organization. Realtime 3-tier (database, application, client) Extensive and complicated authorization system. Role based access control, (RBAC). 4

IDS Intrusion Detection System: Software that automates the intrusion detection process. IDPS intrusion detection and prevention system Purpose [NIST SP800-94] monitoring...events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. IDS challenge: False positives and true negatives. Optimize false positive reduction, (FPR) without generating true negatives. 5

Why an Internal IDS for SAP? Use for SLA Meetings and Security Audits Monitoring and investigating security audit logs for internal security incidents and misuse is time consuming and dull Output from IDS will produce more findings. 6

Performance Considerations Why Anonymization? Some information in the reports are internal What is Good IDS Performance? Comprehensive Timely Comprehensible Accuracy 7

Ethical Dilemma Security personnel responsible for reporting signs of misuse and abnormal activity No time is allocated to work in this area by the employer Outsourced IS operations personnel instructed not to report problem areas unless service agreement for this type of work is in place 8

Building Blocks for IDS Security Audit Logging ABAP programs Access Roles Authorization User Groups SOD Matrix, Virsa Compliance Calibrator Customized tables SAP standard tables 9

Transaction codes Tcodes for short Typically a four letter alphanumeric code. Executes a program or script when entered. 10

Security Audit Logging Stored at OS level (UNIX) One file for each 24 hour period on each application server Text based file with delimiter for linefeed Collect log files for specified time period and populate customized table. 11

Security Audit Logging 12

Log Collector 13

Misuse Detection Update of own access Incidents where user has changed his own authorizations Segregation of Duties, SOD risks Potential for fraudulent gain and misappropriation of funds. Dualism Incidents in which a user is running transactions classified as IS operations and business postings. 14

FPR in Misuse Detection Update of own access Actual update of authorization profiles Segregation of Duties, SOD risks Illicit use or attempts, i.e. no approval. Dualism Exclude privileged users. 15

Anomaly Detection Login Failures Incorrect user name, password, or validity period Authorization Failures Attempts to perform unauthorized postings and operations. Download Activity Downloading information from system and storing in PC format 16

FPR in Anomaly Detection Login Failures Exclude non-existing user IDs (typos) Authorization Failures Exclude non-existing tcodes (typos) Download Activity Check enterprisers only 17

Detection Engine 18

Log files 19

10000 9000 8000 7000 6000 5000 4000 3000 2000 1000 0 Incidents Total 20 Jan2 Jan3 Feb1 Feb2 Feb3 Mar1 Mar2 Mar3 Apr1 Apr2 Apr3 May1 May2 May3 June1 June2 June3 2007 own1 own3 SOD1 SOD3 Dua1 Dua3 Log1 Log3 Aut1 Aut3 Dwn1 Dwn3 Incidents

Misuse Conclusions, FPR Misuse of privileges to gain additional authorizations Good performance, actual changes only Misuse with SOD risks Effective with corrective actions Misuse with Dualism Effective with corrective actions 21

Anomaly Conclusion, FPR Login failures Some performance improvement, but what about brute force attacks? Authorization failures Some performance improvement, but what about menu cruisers Download activity Performance improvement! but, should account for quantity of downloads 22

Conclusions, Anonymization One to one correlation between FPR only mode and FPR anonymized mode. Anonymization does not affect other performance characteristics than comprehensibility. 23

Experiences & Suggestions Consider more than one FPR for each IDS characteristic Introduce thresholds Incorporate white lists and black lists Incorporate alert facilities? Check total number of downloads not just number of users, as for the SOD analysis 24