about erpscan - sap cyber security solutions · erpscan security monitoring suite. 360-degree...

33
1

Upload: others

Post on 05-Jul-2020

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

1

Page 2: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

2

Page 3: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

About ERPScanERPScan and Oracle

• ERPScan researchers were acknowledged 20+ times during quarterly Oracle patch updates since 2008

• Totally 100+ Vulnerabilities closed in Oracle Applications o Oracle EBSo Oracle Peoplesofto Oracle JDEo Oracle Oracle Weblogico Oracle BIo Oracle Database

3

Page 4: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Agenda 4

Page 5: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Cybersecurity trends 5

Page 6: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

ERP systemsAll business processes are generally contained in ERP systems.Any information an attacker, be it a cybercriminal, industrial spy or competitor, might want is stored in a company’s ERP.

This information can include financial, customer or public relations, intellectual property, personally identifiable information and more. Industrial espionage, sabotage and fraud or insider embezzlement may be very effective, if targeted at a victim’s ERP system, and cause significant damage to the business.

6

Business application security

Page 7: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

The challenges we faceCyber attack killchain

7

Page 8: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

The CISO responsibilities

• Network security• Web Application security• Endpoint security• Identity and access governance• Threat Detection and Incident response • Business application security

8

Just detecting/preventinginitial intrusion

that’s where a real attack happens

Page 9: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Why is ERP security critical ?

9

Enterprises need to shed outmoded concepts of SAP and Oracle enterpriseapplication security in light of attackers that have become increasingly adept atfinding high-value targets. A systematic approach to enterprise applicationvulnerability and security risk management is needed not only to assure that thesehigh-value assets get the protection they require, but also to handle them with thecare that their business-critical status typically demands”.

Scott Crawford, Research Director, 451 Research

Page 10: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

ERP Security 10

Q: What are the most critical business applications?

Q: What kind of Business applications are used in your company?

Source: ERP Cybersecurity Survey 2017

Business Intelligence (BI/BW) 36% | Supply Chain Management 32% | Product Lifecycle Management (PLM) 30% |Enterprise Asset Management (EAM) 27% | Supplier Relationship Management (SRM) 18% | Manufacturing Execution System (MES) 18%

Microsoft Dynamics

Financial System (FL)

Page 11: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

11

Page 12: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Notable news 12

Page 13: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

How importantCyberattacks on ERP

13

Source: ERP Cybersecurity Survey 2017

Q: How will the number of cyberattacks against ERP Systems change within the next 2-3 years?

Page 14: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

How can they do this?• 2650+ Vulnerabilities in all Oracle Products• 338+ Vulnerabilities in Oracle PeopleSoft

14

0

50

100

150

200

250

300

350

Number of PeopleSoft vulnerabilities

Page 15: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Top 10 Oracle Vulnerabilities

• Default Database Passwords• Default Application Passwords• Direct Database Access• Poor Application Security Design• External Application Access Configuration• Poor Patching Policies and Procedures• Access to SQL Forms in Application• Weak Change Control Procedures• No Database or Application Auditing• Weak Application Password Controls

15

Page 16: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

PeopleSoft SecurityWhy hacking PeopleSoft?

• EspionageTo steal financial or HR data, supplier and customer lists or disclose corporate secrets.

• Sabotage To cause denial of service, counterfeit financial records and accounting data, access technology network (SCADA).

• FraudTo carry out false transactions, modify master data.

16

Page 17: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Challenges

• Complexity Complexity kills security. There are a lot of various vulnerabilities on all levels from network to application

• CustomizationNumerous vulnerable Java Server Pages, PeopleSoft Forms, Core Services, Web Servlets and other …

• Closed natureMostly available inside a company (closed world)

17

of securing PeopleSoft

Page 18: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Responsibility 18

Q: Who will be responsible if your ERP System is breached?

Source: ERP Cybersecurity Survey 2017

Page 19: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Security issuesSome real Hacks

Page 20: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Oracle PeopleSoftTypical Security Issues

• Default Users and passwords• Authentication bypass (Decrypt Access ID)• Data sniffing (Plaintext protocol Tuxedo)• WebLogic Remote Code Execution• SSO vulnerabilities (TokenChpoken)• Vulnerable Servlets

20

Page 21: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Default UsersInformation

• In WebLogic (when PS is installed):o system: Passw0rd (password) – main administratoro operator: password – operator roleo monitor: password – monitor role

• In PeopleSoft:o Before PeopleTools 8.51: password = login Like, PS:PS, VP1:VP1, PTDMO:PTDMOo After PeopleTools 8.51: password = PS’s password, PS:Password, VP1:Password, PTDMO:Password

• In PSIGW (PeopleSoft Integration Gateway):o Username is usually “Administrator” pass is password

PS account is not protected against bruteforce attacks by default

21

Page 22: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

PeopleSoft vulnerabilitiesAuthentication bypass

• User ID – an account in PeopleSoft Application.

• Connect ID – a low privileged account in the RDBMS

• Access ID – a high privileged account in the RDBMS

22

Page 23: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Authentication Process 23

Page 24: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

RDBMS accounts

Some facts: • Common Connect ID – “people”

o with password “people”/ “ peop1e”o max password length is 8 chars

• Default Access ID: o “SYSADM” for Oracle o “sa” for MSSQL

• Connect ID password is often the same as Access ID password

Let’s try to conduct a dictionary attack on RDBMS

24

Page 25: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Connect ID accessin RDBMS

Connect ID has:• Access to 3 tables• Where Access ID and the password are encrypted• Is Access ID really encrypted? – NO it’s XORed• If we have Connect ID and network access to RDMBS, we can get

Access ID

25

Page 26: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

SolutionProtecting PeopleSoft from Cyberattacks

Page 27: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

• Current security solutions like Vulnerability Management, SIEM, Code Scanners provide very little PeopleSoft coverage

• Solutions focused only on ERP security are more effective but typically cover one of the fields: SoD, Vulnerability Management or Code Security

• ERP security tools, in general, are oriented on those who work with ERP systems, not on security specialists.

About the companyThe challenge

27

Page 28: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

ERPScan Security Monitoring Suite360-degree Oracle

PeopleSoft Protection

Identify• Vulnerability Management• Customization protection• Segregation of Duties

Remediate• Transparent Integration• Virtual Patching

Analyze• Threat Map• Trend Analysis

28

Page 29: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Architecture 29

How does it work

Page 30: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

DEMOProtecting PeopleSoft from Cyberattacks

Page 31: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Uniqueness & BenefitsThe Only solution for PeopleSoft protection

360-degree approach: SoD, Source Code, Vulnerability Management

Identification, Analysis & Remediation of security issues

Threat map (patent-pending)

Module-specific checks: for HR, CRM, Finance, Campus and other

Nonintrusive solutions: implementation doesn’t require any agents or modification of PeopleSoft

31

Page 32: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Conclusion 32

To do: Implement latest CPU Configure security-relevant parameters Perform Security Audits Continuously monitor PeopleSoft security

Page 33: About ERPScan - SAP Cyber Security Solutions · ERPScan Security Monitoring Suite. 360-degree Oracle PeopleSoft Protection. Identify • Vulnerability Management • Customization

Thank you 33

USA HQ:228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301Phone 650.798.5255

EU office:Luna ArenA 238 Herikerbergweg, 1101 CM AmsterdamPhone +31 20 8932892

[email protected]

Eugene NeyolovHead of R&[email protected]

Read our blogerpscan.com/category/press-center/blog/

Join our webinarserpscan.com/category/press-center/events/

Subscribe to our newsletterseepurl.com/bef7h1