Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems



Similar documents
CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed?

Auditing the Security of an SAP HANA Implementation

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager

SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22,

If I want a perfect cyberweapon, I'll target ERP

SAP Business Objects Attacks: Espionage and Poisoning of BI Platforms

The SAProuter An Internet Window to your SAP Platform (and beyond)

External Penetration Assessment and Database Access Review

Are you prepared to be next? Invensys Cyber Security

ATTACKS TO SAP WEB APPLICATIONS

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

EAS-SEC Project: Securing Enterprise Business Applications

EY Cyber Security Hacktics Center of Excellence

Cybersecurity and internal audit. August 15, 2014

Software that provides secure access to technology, everywhere.

External Supplier Control Requirements

Attacks to SAP. Web Applications Your crown jewels online. Mariano Nuñez Di Croce. Troopers, Germany. March 30th,

SAP Netweaver Application Server and Netweaver Portal Security

Cyber Security Strategy

Minimize Access Risk and Prevent Fraud With SAP Access Control

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Leveraging Regulatory Compliance to Improve Cyber Security

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

OCIE CYBERSECURITY INITIATIVE

[ JENNIFER BUKO. The 18 Holes of Security ASUG Session 1201 John Hoover, Stanley Black & Decker Rajkishore Una, GyanSys Inc.

Attachment A. Identification of Risks/Cybersecurity Governance

Reducing Application Vulnerabilities by Security Engineering

White Paper. Data Security. The Top Threat Facing Enterprises Today

Intelligent Security Design, Development and Acquisition

Critical Controls for Cyber Security.

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Defending Against Data Beaches: Internal Controls for Cybersecurity

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

OCIE Technology Controls Program

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

A GLOBAL SURVEY Authors:

Collateral Effects of Cyberwar

Agenda , Palo Alto Networks. Confidential and Proprietary.

12/11/15. Evolving Cybersecurity Risks. Agenda. The current cyber risk landscape Overview. Results on EY s Global Information Security Survey

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Incident Response. Six Best Practices for Managing Cyber Breaches.

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Take Control of Identities & Data Loss. Vipul Kumra

Gregg Gerber. Strategic Engagement, Emerging Markets

What is Cyber Liability

October 24, Mitigating Legal and Business Risks of Cyber Breaches

1 Introduction Product Description Strengths and Challenges Copyright... 5

The Cyber Threat Profiler

How To Protect Your Organization From Insider Threats

Nuclear Security Requires Cyber Security

Cyber Security Metrics Dashboards & Analytics

Securing Database Servers. Database security for enterprise information systems and security professionals

NATIONAL CYBER SECURITY AWARENESS MONTH

APT Advanced Persistent Threat Time to rethink?

CyberArk Privileged Threat Analytics. Solution Brief

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Information Security for the Rest of Us

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Web Application Security

What Do You Mean My Cloud Data Isn t Secure?

N-Dimension Solutions Cyber Security for Utilities

Cybersecurity Awareness. Part 1

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Application Security Testing. Jesper Kråkhede

September 20, 2013 Senior IT Examiner Gene Lilienthal

What is Really Needed to Secure the Internet of Things?

Information Technology Security Review April 16, 2012

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Transcription:

Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems SESSION ID: HTA-R01 Mariano Nunez CEO Onapsis Inc. @marianonunezdc

Why Should We Care? Over 95% of the ERP systems analyzed were exposed to vulnerabilities enabling cyber-attackers to take full control of the Business. In 100% of the cases, information regarding those vulnerabilities had been in the public domain for more than 5 years. 2

Agenda Introduction Measuring Risk: Reality Check A False Sense of Security Live Demo: Attacks on ERP systems over the Internet The Responsibility Gap Live Demo: APTs and ERP systems Protecting your Business 3

Introduction

Business-Critical Applications The applications that build up the Heart of the Business. They store our most critical business information. They run our most critical business processes. Our day-to-day operations are highly dependent on their availability. SCM HCM CRM ERP BI PLM SRM 5

Which Platform(s) are you Running? Implementations in large Organizations are dominated by two vendors: SAP Oracle E-Business Suite PeopleSoft Siebel JD Edwards 6

Complex, Cross-Module Proprietary Frameworks SAP and Oracle business solutions run on top of a common (proprietary) technological framework. You can think of this framework as the OS, and the business solution/module (ERP, CRM, etc.) being just an app. ERP CRM SCM HR BI SAP NetWeaver Database Operating System ERP CRM SCM HR BI PeopleSoft PeopleTools Database Operating System 7

Measuring Risk: Reality Check

Attacks on Business-Critical Platforms Why would someone attack our ERP, CRM, SCM or HR systems? Because of the Information they store Manufacturing recipes, HR data, credit cards, financial results, etc. Because of the Processes they run Procurement, Manufacturing, Logistics, Sales, Payroll, etc. Because of our Dependence on them Interfaces with payment gateways, SCADA/ICS, Govt. entities, etc. Employees use these systems for their everyday work. 9

What could be the Impact? Espionage How much would the information stored in our ERP systems be worth to our biggest competitor? Sabotage How much money would we lose if our ERP system is taken offline continuously, for several hours or even days? Financial Fraud What would be the economic impact if someone is able to manipulate all of our financial information and processes without any kind of restrictions or controls? 10

From the Trenches: Impact Analysis (Sabotage) The information coming out from our SAP platform is used to stamp a governmentseal in our products in the production line. If we lose connection for more than 2 minutes, we are forced to throw away the entire production for that day SAP Security Lead, Global 100 We process over $40,000,000 during the weekend through a Web Service running on top of our externally-facing SAP system Security Architect, Global 100 If our SAP system was taken offline, that would cost the company $22,000,000 per minute CISO, Fortune 1000 (Food & Beverage) 11

What is the Probability? Killing Some Myths My ERP platform is only accessible through internal networks There is no such thing as an Internal Network anymore. There are no more perimeters (spear-phishing, rough contractors, malicious employees) Many ERP systems are directly connected to the Internet (Web apps, Mobile, cloud-deployments, etc.) Finding ERP systems through Google Dorks inurl: /forms/frmservlet (E-Business Suite) inurl: /OA_HTML/OA.jsp (E-Business Suite) inurl: callcenter_enu (Siebel) inurl: esales_enu (Siebel) inurl: start.swe (Siebel) intitle:"peoplesoft Enterprise Sign-in (PeopleSoft) inurl: /EMPLOYEE/HRMS/ (PeopleSoft HR) inurl: /jde/e1menu inurl:/jde/share inurl:/irj/portal inurl:/logon/logonservlet inurl:/sap/bc inurl:/scripts/wgate (JD Edwards) (JD Edwards) (SAP) (SAP) (SAP) (SAP) 12

What is the Probability? Killing Some Myths (cont d) This can only be performed by highly-skilled attackers Who is the Threat Actor? Most likely an unethical competitor, disgruntled employee, hacktivists or foreign state. Even script kiddies the information is out there! Date: Sat, 27 Apr 2002 13

What is the Probability? Killing Some Myths (cont d) Our ERP system has never been hacked Less than 5% of the systems we evaluated have the basic Security Audit Log enabled, and just for compliance reasons. Even with the standard Security Audit features enabled, attacks to the technical layer may not be detected. Furthermore, is someone reviewing those logs? So probably the most honest answer is: we don t know. 14

What is the Probability? Killing Some Myths (cont d) There are no well-known attacks reported against these systems Nov. 2007, students charged with hacking PeopleSoft to fix grades. Oct. 2012, Anonymous claimed intent to exploit SAP systems. Nov. 2013, a malware targeting SAP systems discovered in the wild. Jan. 2014, Chinese hacker published an SAP vulnerability in the Internetfacing SAP NetWeaver Portal of a brand-name Semiconductors company. 2007-2014, several (non-public) SAP security incidents reported to Onapsis. 15

So, What s the Real RISK? The Probability is definitely not Low. Even if we like to think so, the Impact component may be simply too high to be ignored. 16

State-Sponsored Attacks & ERP Systems On Feb 12 th 2013, President Obama issued an Executive Order on Cybersecurity Improving Critical Infrastructure Cybersecurity The EO defines Critical Infrastructure as: systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters. What would be the Impact to the national economy of a large-scale attack to the ERP systems of the Fortune 100 companies and military organizations? 17

Live Demonstration Attacks on ERP systems over the Internet

A False Sense of Security

But we have an ERP Security Team! Several years ago, ERP Security was only about securing the business modules through Segregation of Duties (SoD) controls (aka. access controls / strict user authorizations). Every large organization today does have an ERP Security Team. Therefore, many organizations believed that they were addressing the problem by having a dedicated ERP Security Team enforcing SoD controls. This created a false sense of security, as these controls were not designed to prevent/detect cyber-attacks. 20

The Evolution of the Threat While SoD controls still apply, underlying technological frameworks handle key security aspects: authentication, auditing, interfaces, remote services, etc. The security of this technical layer has been overlooked. Therefore, attackers evolved -> let s now target the technical layer : Exploits and attack vectors are cross-business-module for a target platform No valid user required (!) Attack results in high privileges (!) Lack of audit trails or proper detection mechanisms (!) 21

The Responsibility Gap

Who s Looking after these Threats and Attacks? In some Organizations: still nobody. ERP Security Team ERP CRM SCM HR BI Information Security Team SAP NetWeaver Database Operating System Gap exploited by the Attacker 23

The Responsibility Gap ERP Security Teams know nothing about hackers, zero-days or malware. Information Security Teams know nothing about ERP systems. Who s then responsible for preventing these attacks? Another way to find an answer: Who will Executive Management blame in case an attacker breaks into my ERP platform, exploiting a vulnerability disclosed at DEFCON 5 years ago? 24

Live Demonstration APTs and ERP systems

Protecting your Business

Closing the ERP Cyber (In)Security Gap The ERP Security / Operations Teams must be responsible for properly securing the systems (incorporating secure configuration and security patch management to their current practices). However, Information Security must be the objective 3 rd party that can assure to the Business that these Teams are properly doing so. Furthermore, Information Security must be monitoring the systems for traditional and application-level attacks. In short: Apply the old principle of Trust, but verify. 27

Take-away: A 5-Step Approach to Closing the Gap 1 Inventory Which are our business-critical systems and who are their Business and IT owners? 2 Assess What is our current exposure? Which best-practices are we following to prevent cyberattacks to these systems (beyond SoD)? Who is responsible for applying them? 3 Plan Which is our Risk tolerance? Which kind of Risks are we going to address and Why? Who is going to be responsible for managing these Risks? 28

Take-away: A 5-Step Approach to Closing the Gap 4 Enforce Who is now responsible for ensuring the current Risk level is acceptable with the Business? 5 Monitor and Adjust Are there gaps between the current and desired state? How do we fix them? Have we been attacked? How were those incidents managed? 29

Conclusions

Wrapping Up ERP, SCM, CRM, HCM, BI and PLM are probably some of the most critical platforms of your Business. However, due to a false sense of security and a responsibility gap, they are highly likely exposed to cyber attacks. The Risk is significant the Impact component is too High and many systems are still vulnerable to issues known for several years. The Responsibility Gap puts InfoSec teams in a difficult situation they are not empowered to secure the systems, but it is highly probable that they will be held responsible in the face of a cyber security breach. We need to Close the Gap. 31