Tech Titans: Lock it down, securing your Costpoint 7 deployments. Drew Roman, IT Solutions Director WJ Technologies L.L.C. GC-518



Similar documents
PowerChute TM Network Shutdown Security Features & Deployment

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Configuring SSL in OBIEE 11g

Configuring User Identification via Active Directory

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

SonicWALL PCI 1.1 Implementation Guide

Installing Digital Certificates for Server Authentication SSL on. BEA WebLogic 8.1

Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.

What is the Barracuda SSL VPN Server Agent?

VPN Lesson 2: VPN Implementation. Summary

Deltek Costpoint New Installation Guide for Microsoft SQL Server

BlackBerry Enterprise Service 10. Version: Configuration Guide

1. If there is a temporary SSL certificate in your /ServerRoot/ssl/certs/ directory, move or delete it. 2. Run the following command:

Exchange Reporter Plus SSL Configuration Guide

NCSU SSO. Case Study

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

Oracle Identity Manager

IBM Security QRadar Vulnerability Manager Version User Guide

Summer Webinar Series

Configuration Guide BES12. Version 12.2

SSO Plugin. Case study: Integrating with Ping Federate. J System Solutions. Version 4.0

Integrating EJBCA and OpenSSO

Oracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles

How to Implement Two-Way SSL Authentication in a Web Service

The Bomgar Appliance in the Network

PortWise Access Management Suite

CHAPTER 7 SSL CONFIGURATION AND TESTING

IBM Unica emessage Version 8 Release 6 February 13, Startup and Administrator's Guide

Configuration Guide BES12. Version 12.1

Configuring Global Protect SSL VPN with a user-defined port

Security Guide Release 7.3

PortWise Access Management Suite

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Password Reset PRO INSTALLATION GUIDE

Host/Platform Security. Module 11

Preparing for GO!Enterprise MDM On-Demand Service

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

Windows Remote Access

Service Manager and the Heartbleed Vulnerability (CVE )

Secret Server Qualys Integration Guide

Next Generation Network Firewall

Covene Cohesion Server Installation Guide A Modular Platform for Pexip Infinity Management November 11, 2014 Version 2.0 Revision 1.

Enterprise Security with mobilecho

Creating an authorized SSL certificate

SSL Certificate Generation

Security Guide vcenter Operations Manager for Horizon View 1.5 TECHNICAL WHITE PAPER

C O N F I G U R I N G O P E N L D A P F O R S S L / T L S C O M M U N I C A T I O N

Enable SSL in Go2Group SOAP Server

Enabling SSO between Cognos 8 and WebSphere Portal

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

WebLogic Server Admin

FileCloud Security FAQ

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Configuring Secure Socket Layer (SSL) for use with BPM 7.5.x

Oracle EXAM - 1Z Oracle Weblogic Server 11g: System Administration I. Buy Full Product.

SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release [August] [2014]

Enterprise Content Management System Monitor 5.1 Security Considerations Revision CENIT AG Brandner, Marc

Directory and File Transfer Services. Chapter 7

Deploy Remote Desktop Gateway on the AWS Cloud

VMware vcenter Log Insight Security Guide

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM

Configuration Guide BES12. Version 12.3

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal

Administering User Security

docs.hortonworks.com

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

How To - Implement Clientless Single Sign On Authentication with Active Directory

VMware vrealize Operations for Horizon Security

Centrify Cloud Connector Deployment Guide

CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS

Achieving PCI-Compliance through Cyberoam

Deploying Mobile HR applications for Oracle

Secondary DMZ: DMZ (2)

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

VMware vrealize Operations for Horizon Security

Symantec App Center 4.0 Admin Documentation

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

OVERVIEW. DIGIPASS Authentication for Office 365

PCI Requirements Coverage Summary Table

VMware vcenter Log Insight Security Guide

ADSelfService Plus: Guide to Install SSL Certificate. 1 P a g e

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

CA Performance Center

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Training module 2 Installing VMware View

From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen

With Great Power comes Great Responsibility: Managing Privileged Users

Avatier Identity Management Suite

IBM Security Identity Manager Version 6.0. Security Guide SC

Websense Support Webinar: Questions and Answers

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Using LDAP Authentication in a PowerCenter Domain

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 5

Microsoft SQL Server Security Best Practices

HP Cloud Service Automation

Enterprise Security Interests Require SSL with telnet server from outside the LAN

Oracle WebLogic Server 11g Administration

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

Transcription:

Tech Titans: Lock it down, securing your Costpoint 7 deployments Drew Roman, IT Solutions Director WJ Technologies L.L.C. GC-518

Agenda

Agenda Overview The Basics of Secure Deployment Database Application tier Web Tier Network Changes in Costpoint 7 Questions 3 11/24/2014 2014 Deltek, Inc. All Rights Reserved

Overview

Overview There is no such thing as a truly secure computer system, only more or less secure Security starts with the proper mindset The techniques covered today are only a few of the steps you can take to make your system more secure Security is a constantly moving target, please do not take what is covered today and think that it is all you need to do to secure your systems Our main goal is to minimize the attack surface as much as possible while maintaining functionality 5 11/24/2014 2014 Deltek, Inc. All Rights Reserved

The Basics 11/24/2014 6 2014 Deltek, Inc. All Rights Reserved

The Basics Securing the different tiers Database App tier Web tier Windows Patching Network The upgrade from Costpoint 6 to 7 is an ideal time to put these practices in place Take advantage of the extended testing and make sure that everything is working and performing as you would expect it to If you re already on Costpoint 7, making these changes to test systems first is strongly recommended Deltek s Costpoint 7.0.1 Post-Installation Hardening Guide covers some of these topics, a few others and contains many links to other resources 7 11/24/2014 2014 Deltek, Inc. All Rights Reserved

Database The database is the foundation of your system, the Keys to the Kingdom so to speak A person with malicious intent can wreak havoc if they gain access to the database, even if it s read-only access Set strong passwords for each of the users and change them regularly End-users no longer require database accounts for Costpoint access Disable and/or remove accounts that are no longer needed Control who has administrator level access to database servers and individual databases Audit privileged account use For all accounts, grant the minimum required rights needed for running the software 8 11/24/2014 2014 Deltek, Inc. All Rights Reserved

App Tier Change the password for the Weblogic system account and other Weblogic acccounts Minimize rights of the service account running the Costpoint services This user should only be a regular domain user with admin rights on the app servers locally Only grant this account file and share access to the bare minimum that it needs for operation Only install the bare minimum of software and Windows Roles/Features required for operation If using Active Directory Authentication, secure the connection using SSL if possible 9 11/24/2014 2014 Deltek, Inc. All Rights Reserved

Web Tier Don t expose the application directly to the internet unless you have to Remote access is usually best handled using a VPN or other methods to remotely connect to your network resources Use and enforce SSL, even if Costpoint is only available on your LAN Only install the IIS Role Services that you need 10 11/24/2014 2014 Deltek, Inc. All Rights Reserved

Windows Server Only install the roles, features and 3 rd party applications needed to run the software and manage your systems Ensure that the systems are fully patched when you put them into service and patched on a regular schedule Use the Windows firewall to minimize what ports are available Ports required for management and ports for services like database listeners, web server ports, etc. 11 11/24/2014 2014 Deltek, Inc. All Rights Reserved

Network If you must expose Costpoint to the internet, the Web Tiers should be nondomain members, set up in a DMZ zone on your network Set rules on your firewall to only allow the ports needed TCP 443,80 in to IIS TCP 7009 from IIS server to Weblogic Use SSL to secure the connection to Active Directory if possible Weblogic performs an LDAP simplebind when connecting to Active Directory If you are connected to the AD over the standard TCP port of 389 and not using SSL (port 636) your AD usernames and passwords are traveling over the network in the clear Active Directory must be set up for secure communications and the certificate that signed your AD servers certificate needs to be imported into the cacerts certificate store in Weblogic 12 11/24/2014 2014 Deltek, Inc. All Rights Reserved

Network (cont.) Configuring trust for your Active Directory Server Oracle s documentation for this process is very detailed Export the certificate of your CA The Java keytool command is what s used to import the certificate, the command would be similar to: keytool -import -alias ALIAS -file CA_CERT_FILE - keystore KEYSTORE -storepass KEYSTORE_PASSWORD trustcacerts Once imported, you can go into the Costpoint configuration Utility and set your configured AD server(s) to use SSL and connect over TCP port 636 After restarting Weblogic, you should be connecting securely 13 11/24/2014 2014 Deltek, Inc. All Rights Reserved

Patching Keep your Operating Systems as up to date as possible Keep up with the patches for your Database platform Subscribe to the emails from Deltek regarding your products, monitoring them for any security related patches and apply as soon as feasible Ideally apply them in a test environment first Deltek delivers patches for products that are bundled with the applications, such as Weblogic, I would not recommend obtaining those directly from Oracle or the other vendors 14 11/24/2014 2014 Deltek, Inc. All Rights Reserved

Costpoint 7 Changes 11/24/2014 15 2014 Deltek, Inc. All Rights Reserved

Costpoint 7 Authentication Options You now have many new authentication options for Costpoint 7 Costpoint Database Active Directory Single Sign-on Single Sign-on or Active Directory Windows Domain and Active Directory Windows Domain and Costpoint Database Client Certificate 16 11/24/2014 2014 Deltek, Inc. All Rights Reserved

Costpoint 7 Authorization Changes Groups are now additive Users can be members of multiple groups, with rights adding up to a resultant set of rights Deny always takes precedence WAY more flexible than Costpoint 6 Segregation of Duties Allows for configuration and enforcement of Segregation of Duties rules 17 11/24/2014 2014 Deltek, Inc. All Rights Reserved

Questions? 11/24/2014 18 2014 Deltek, Inc. All Rights Reserved

Contact Us Drew Roman IT Solutions Director Drew.roman@wjtechnologies.com 703-885-8160 http://linkedin.com/in/drewroman 13665 Dulles Technology Drive Herndon, VA 20171 www.wjtechnologies.com 19 11/24/2014 2014 Deltek, Inc. All Rights Reserved