SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH



Similar documents
SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

SAP R/3 Security Assessment Framework

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

Master Data Governance Security Guide

SAP Netweaver Application Server and Netweaver Portal Security

Processed on SAP Solution Manager Service Center Release EHP 1 for Solution Manager 7.0 Telephone Service Tool 701_2011_1 SP0 Fax

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager

05.0 Application Development

So far in the first three chapters of this book we have studied an overview of SAP

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

SAP SECURITY OPTIMIZATION

SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.

EAS-SEC Project: Securing Enterprise Business Applications

Autodesk PLM 360 Security Whitepaper

CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed?

Business-Driven, Compliant Identity Management

Information Technology General Controls (ITGCs) 101

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

R/3 Security Guide : VOLUME II

Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT

Configuring Java IDoc Adapter (IDoc_AAE) in Process Integration. : SAP Labs India Pvt.Ltd

Payment Card Industry Data Security Standard

Business-Driven, Compliant Identity Management

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Hosted Testing and Grading

SAP SECURITY OPTIMIZATION

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

The Information Systems Audit

Security and Your SAP System When Working with Winshuttle Products

SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22,

How Accenture is taking SAP NetWeaver Identity Management to the next level. Kristian Lehment, SAP AG Matthew Pecorelli, Accenture

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Addressing the SAP Data Migration Challenges with SAP Netweaver XI

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

How To Achieve Pca Compliance With Redhat Enterprise Linux

Quick Guide to the SAP Customer Relationship Management Rapid- Deployment Solution (based on EhP1) Demo/Evaluation Appliance

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Security Guide SAP GUI for Windows

Application Monitoring for SAP

Change and Transport System - Overview (BC-CTS)

Data Management Policies. Sage ERP Online

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Integrating a Hitachi IP5000 Wireless IP Phone

SAP Security Monitoring with agilesi. agilesi tm Solution Brief Product Specification July 2012 Version 1.1

Mitigating Risks and Monitoring Activity for Database Security

Minimize Access Risk and Prevent Fraud With SAP Access Control

Upgrade made easy: SAP Tools, Accelerators and Best Practices for migrating from SAP NetWeaver PI to SAP NetWeaver Process Orchestration

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

SAP Enterprise Architecture in the Era of SAP HANA, Infrastructure, Platforms, Software and Everything-as-a-Service

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

8 Steps to Holistic Database Security

Best Practices for PCI DSS V3.0 Network Security Compliance

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Introducing Systemwalker Operation Manager V13.3. July 2008 FUJITSU LIMITED

Cisco Advanced Services for Network Security

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

SAP BASIS and Security Administration

PCI Requirements Coverage Summary Table

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Proven LANDesk Solutions

GE Measurement & Control. Cyber Security for NEI 08-09

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Overcoming Security Challenges to Virtualize Internet-facing Applications

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

IT Architecture Review. ISACA Conference Fall 2003

Compliant, Business-Driven Identity Management using. SAP NetWeaver Identity Management and SBOP Access Control. February 2010

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

Auditing the Security of an SAP HANA Implementation

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

SAP Identity Management Overview

SAP NetWeaver 04 Security Guide. Security Guide for SAP Mobile Infrastructure

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

[ JENNIFER BUKO. The 18 Holes of Security ASUG Session 1201 John Hoover, Stanley Black & Decker Rajkishore Una, GyanSys Inc.

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security

Top 10 System Implementation Audit Considerations

SAP Standard for Security

Information Technology Branch Access Control Technical Standard

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Security Controls What Works. Southside Virginia Community College: Security Awareness

March

Oracle Database Security

The Who, What, When, Where and Why of IAM Bob Bentley

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Hardening of SAP HTTP- and Webservices

Cybersecurity and Secure Authentication with SAP Single Sign-On

Integration of SAP Netweaver User Management with LDAP

If I want a perfect cyberweapon, I'll target ERP

How can Identity and Access Management help me to improve compliance and drive business performance?

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

VBLOCK SOLUTION FOR SAP APPLICATION SERVER ELASTICITY

Transcription:

SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH WWW.MANTRANCONSULTING.COM 25 Mar 2011, ISACA Singapore

SOD SAS70 Project Controls Infrastructure security Configurable controls Change controls Architecture security SE16, SM30 & SM31 SAP security and controls Authorizations review Information Security Policy and Procedures SAPRouter Access controls SAP Pre Implementation Review SOX Logical access SA38 and SE38 Transport Management System (TMS) SAP*, CPIC, DDIC and EARLYWATCH Segregation Of Duties SAP Post Upgrade Review Roles, Profiles, Authorizations and Authorization Objects BASIS Controls NetWeaver Security Data Migration Change and Transport System (CTS) SAP Post Implementation Review

Objectives 3 Discuss various types of security controls in SAP Define framework for SAP security audits Discuss integration with IT and operational audits This presentation does not cover individual SAP security controls and concepts in detail. And it is not a technical presentation on SAP security controls

SAP is a sensitive & critical system 4 SAP is an ERP and a business application system Any security vulnerability may result in financial loss, business disruptions, misstatement of financial information, etc Unlike infrastructure security vulnerability, SAP security vulnerability may directly impact the business SAP is an integrated system therefore, any errors may have a widespread impact One of the most important system in any organization

What is the impact on IT audit? 5 It is important to secure SAP system To secure SAP, it is not sufficient to enforce controls inside SAP only

SAP is a part of IT infrastructure 6 Application Server 1 User PC/ Laptop Application Server 2 Database Server User PC/ Laptop Application Server 3

What needs to be secured? 7 Application appropriate security controls need to be enforced in SAP Infrastructure the supporting infrastructure needs to be secured as well Network routers, switches, firewalls Server application server and database server Operating system Database PCs/ Laptops presentation layer of the SAP system

What organizations review.. 8 SAP Audit/ Review Scope 70% Authorizations 68% SoD 54% SAP security policies and procedures 38% Configurable/ automated business 24% BASIS controls 16% Data migration Not performed Don't know/ others 14% 8% Source: MANTRAN SAP Security Practices Survey 2010

Security controls in SAP 9 Business Process Controls Authorization s Controls BASIS Controls Segregation of Duties (SOD)

Authorization controls 10 Allow users in SAP to perform their work while securing transactions from unauthorized access It is a complex and scalable concept Determines WHAT activity can be performed by a user as well as WHERE it can be performed Enforced through a pseudo object oriented concept using authorization objects Authorizations are assigned to Roles, which are then assigned to Users Approximately 2,000 authorization objects control access to more than 100,000 transaction codes

Look for the holes 11 SAP checks user master record for required authorizations SAP provides information on which authorizations are required for each transaction codes It is important to look for disabled authorization checks!

Disabling authorization checks 12 The Authorization Object check has been disabled for the Transaction Code using transaction SU24 (table USOBT_C and USOBX_C) Don t forget global deactivation of Authorization Objects through transaction AUTH_SWITCH_OBJECTS (profile parameter auth/object_disabling_active should be set to Y for this to take effect!)

What should be reviewed? 13 Access to critical/ sensitive activities are controlled User access is appropriate (i.e., based on their roles and responsibilities) Roles are appropriate (i.e., authorizations within roles are as per the role definition)

Segregation of Duties (SoD) 14 Ensures that no one individual has complete control over major phase of a process Key component of any effective internal controls environment Typically enforced through a combination of access control and mitigating controls

What should be reviewed? 15 SoD framework has been defined Users do not have SoD conflicts Roles do not have SoD conflicts If SoD conflicts exists in users, there are appropriate mitigating controls

Beyond the basics 16 Mitigating controls do they work? It is important to check whether the mitigating controls work Mitigating controls should be documented and tested regularly!

BASIS controls 17 Refers to technical controls in SAP Password controls User administration Privileged users Auditing Change controls Batch job management Direct access to data through tables

Go beyond the basics 18 Client settings direct changes should not be allowed on the production client Don t forget to check system settings! And the table logging!

What should be reviewed? 19 BASIS review Policies and procedures Technical settings in SAP IT procedures related to SAP administration and maintenance

Business process controls 20 Refers to automated (and IT dependent) controls available in SAP for various business processes such as purchasing, sales, financial reporting, inventory, HR, etc Broadly classified under following three categories: Inherent controls Configurable controls Procedural controls

Business process controls 21 Inherent controls Enforced by default in SAP Sales Order cannot be created with an invalid customer Configurable controls Switches that can be set by turning them on or off based on the business requirements Configured through Implementation Guide (IMG) Examples - tolerance limits for three way match, PO approval hierarchy Procedural controls IT dependent controls (e.g., review of exception reports)

Do organizations use them? 22 Utilization of SAP automated controls 13% 11% Very confident 30% Somewhat confident 46% Not confident Don't know/ others Source: MANTRAN SAP Security Practices Survey 2010

Some examples of such controls 23 PMIN condition for pricing PMIN is used 16% 35% 25% 24% PMIN is not required Not aware that SAP has PMIN Don't know Source: MANTRAN SAP Security Practices Survey 2010

A few more examples 24 Dual controls for customer and vendor masters

A few more examples 25 Alternate payee

A few more examples 26 Regular review of vendor reports such as RFKABL00 (Changes to Vendors)

What should be reviewed? 27 Configuration settings Procedural controls Exception reports

Clearing the confusion 28 1. Business Process Review 2. Configuration Review 3. Blueprint Review 4. IT Automated Controls (ITAC) Review 5. IT Application Controls (ITAC) Review 1. BASIS Review 2. IT General Controls (ITGC) Review 3. Technical Review 1. Authorizations Review 2. Access Review 3. SoD review 4. Role Review 5. User Review

Security controls outside SAP 29 It is equally important to enforce security controls in the underlying infrastructure components SAP interacts with its underlying infrastructure components in unique ways Therefore, it is important to consider controls related to these interactions at the infrastructure level

Network controls are important 30 SAP network security Can users directly connect to the database through backend? Is the data transmission over the network secure? What network communication is allowed between user machines and application server? What network communication is allowed between application server and database server? Apart from usual network security controls, consider SAP specific controls such as SAPRouter and SNC

SAP supports network security 31 SAPRouter SAPRouter is an SAP program that serves as an intermediate station (proxy) in a network connection between SAP systems or programs Controls access to your network (application level gateway) Useful extension to an existing firewall Secure Network Communications SNC is used to secure SAP network connections Provides reliable authentication as well as encryption of the data to be transferred SAPRouter allows SNC connections to be set up

SAP server needs to be hardened 32 Both application and database servers need to be hardened Consider SAP specific hardening requirements such as transport tools security, profile parameter file security and security audit logs security

SAP changes are controlled by OS 33 Operating system level transport tools in SAP servers Change and Transport System (CTS) is a set of tools to organize development projects in the ABAP Workbench and in customizing, and then transport the changes between the SAP systems and clients It broadly consists of Change and Transport Organizer (CTO), Transport Management System (TMS) and some operating system level transport tools

SAP Change and Transport System 34 Transport Tools (tp and R3trans) RFC Transport Organizer RFC CTO Workbench Organizer RFC Customizing Organizer TMS Transport Management System

CTS depends on OS files 35 There are two global configuration files TP_DOMAIN_<SID>.PFL and TPPARAM that must include entries for each SAP systems taking part in transports tp uses these files for making transports. Stored in /usr/sap/trans or <DRIVE>/usr/sap/trans Access rights should be configured so that all SAP systems within the transport group can access these files

Transport tools reside at OS level 36 Imports can be performed using tp program at the OS level by logging into the target system as user <SID>adm, going to /usr/sap/trans/bin directory and calling the program

SAP profiles are OS files 37 Profile parameter files stored in SAP server A profile in SAP is an operating system file containing parameters and configuration information of SAP instance The profile files are located under the directory /usr/sap/<sid>/sys/profile This directory is shared by all application servers belonging to the same SAP system (i.e., SID) Access to modify the profile files should be restricted

Audit log is stored on server 38 Security audit logs stored in SAP server Rsau/local/file define names and locations of the security audit log files Access to the security audit log files and directories should be restricted

And vice versa.. 39 With appropriate access, OS level commands can be executed from within SAP!

Indicative SAP security framework..

What does it mean for IT auditors? 41 SAP audit covers both technical and functional areas Requires integration between IT and internal/ operational auditors Within IT audit team, coordination between infrastructure and SAP auditors is important to ensure that important infrastructure controls are covered Excellent opportunity to understand business and align IT audit with business risks!

Integrated audit is not yet common 42 IA Approach 22% 32% No - no integration with systemic controls in SAP Yes - to a very small extent 32% 14% Yes - to large extent Don't know/ Others Source: MANTRAN SAP Security Practices Survey 2010

SAP review through its lifecycle 43 SAP review may be performed at various stages of SAP lifecycle Accordingly, scope and coverage may vary Pre-Implementation Review Post-Implementation Review

Pre-implementation review 44 Conducted before SAP is implemented (i.e., before go-live) and may include Blueprint/configuration/ business process controls review Authorizations and SoD review IT general controls/ BASIS review Data migration / conversion/ cutover review Project management review Program development review

Pre-implementation review 45 System may not exist or controls may not have been implemented It is often a document review based on documents such as Business blueprints Authorization design documents Project plan, strategy and other project documents Data migration plan, strategy and cutover plan SAP technical design documents UAT documents

Post-implementation review 46 Usually conducted after system stabilization It usually includes the following areas Configuration/ business process controls review Authorizations and SoD review IT general controls/ BASIS review Usually conducted by reviewing the system settings

Other areas 47 There are new security concerns with use of various NetWeaver products Other SAP products such as CRM, SRM, SCM and SLM have their own security issues

Mantran Consulting Pte Ltd 2011 All rights reserved. MANTRAN logo are registered or unregistered trademarks of Mantran Consulting Pte Ltd. All other names, brands, logo, etc are registered trade or service marks of their respective owners. SAP, SAP logo and all SAP screenshots are copyright of SAP AG. SAP is a registered trademark of SAP AG. All information provided in the training is true to best of our knowledge. The information provided is a summarization of various concepts for ease of understanding. Certain facts may have been ignored or simplified for easy understanding. The information provided may not be accurate or complete. Questions Presented by Barun Kumar Director Mantran Consulting Pte Ltd +65 8118 9972 Email ID barunkumar@mantranconsulting.com LinkedIn profile http://www.linkedin.com/in/barunkumar My blogs http://www.mantranconsulting.blogspot.com/