36

SAP HANA Security: New Technology, New Risks

Embed Size (px)

Citation preview

Page 1: SAP HANA Security: New Technology, New Risks
Page 2: SAP HANA Security: New Technology, New Risks

run your business safer

SEC 112

SAP HANA Security: New technologies, new risks

Markus Schumacher © 2015, Virtual Forge, Inc. All rights reserved.

Page 3: SAP HANA Security: New Technology, New Risks

Agenda

Virtual Forge: Who we are

Understanding HANA security

New risks in SAP HANA

5 rules to protect SAP HANA

Security, Compliance and Quality solutions

Page 4: SAP HANA Security: New Technology, New Risks

Virtual Forge: Who we are

Page 5: SAP HANA Security: New Technology, New Risks

About Virtual Forge

Experts in SAP Security, Compliance and Quality

2001: Founded as consulting house

2008: Release of “CodeProfiler”

2013: Release of “SystemProfiler”

Patented Data and Control Flow Analysis for ABAP®

Gartner: Magic Quadrant for Application Security Testing 2013

Named Virtual Forge the “Leading Vendor for ABAP® Security”

Cool Vendor in the SAP Ecosystem 2011

Page 6: SAP HANA Security: New Technology, New Risks

About Virtual Forge The Key Benefits

Cost reduction

Automated process leads to lower effort and cost for:

-  identifying errors (up to 95%)

-  correcting errors (up to 70%)

-  QA effort (up to 90%)

Improved User Experience

Our products are seamlessly integrated into the SAP environment

-  enables working in a familiar environment

-  Makes work noticeably easier

Expertise & Experience

-  more than 170 customers

-  more than 1,400 customer projects

-  more than 2,000 product installations

Independence

-  active member of the SAP community

-  participating in DSAG and ASUG chapters

-  cooperating with global auditing firms

Industry recognition

-  admitted to the Garter Magic Quadrant for Application Security Testing (AST) in 2013 and 2014

-  Chosen as one of the top 500 cyber security companies to watch in 2015

Page 7: SAP HANA Security: New Technology, New Risks

Trusted Advisor for Security, Compliance and Quality

Page 8: SAP HANA Security: New Technology, New Risks

The Virtual Forge Portfolio

Security

Compliance

Quality

Code Level System Level

Virtual Forge Professional Services help

to improve development, operating lifecycle and

security in SAP® standards.

Virtual Forge SystemProfiler detects

and corrects errors in SAP system

configurations and avoids recurrence.

SYSTEMPROFILER

Virtual Forge CodeProfiler pinpoints vulnerabilities in ABAP®

program codes and corrects errors automatically.

CODEPROFILER PROFESSIONAL SERVICES

Entire SAP landscape

Page 9: SAP HANA Security: New Technology, New Risks

Understanding HANA security

Page 10: SAP HANA Security: New Technology, New Risks

  HANA as a data mart   Similar to “classic” BW architecture, HANA gathers data from (several) source systems

  HANA in a classic 3-tier architecture   HANA replaces regular relational database

  HANA as a technical infrastructure for native applications   New business application platform (S/4 HANA)

Understanding HANA Security

HANA deployment scenarios

Page 11: SAP HANA Security: New Technology, New Risks

Content Considerations   Contains business critical data à espionage target

  Central to business processes à sabotage target

Technology Considerations   Fraud possibilities

  IT / Security has little experience with HANA

Understanding HANA Security Why is HANA important to Hackers

Page 12: SAP HANA Security: New Technology, New Risks

  HANA provides its own security functions

  Standard security features such as authentication, user/role mgt., authorization,

encryption…

  Need to be configured within HANA toolset

  Other mechanisms to integrate HANA into the general security infrastructure   Includes Standard SAP administration tools, Network, OS and DB security tools, etc.

  Different documents deal with HANA security, e.g. HANA security overview, HANA security admin guide, SQLScript-Reference-guide

Understanding HANA Security

What SAP says about HANA security

Security complexity rises with SAP HANA !

Page 13: SAP HANA Security: New Technology, New Risks

New risks in SAP HANA

Page 14: SAP HANA Security: New Technology, New Risks

Weaknesses can include XSS, SQL injection, Directory Traversal

Risk #1: Web Applications

SAP HANA systems can easily be found on the Internet

Unauthorized access possible

Services can be misused

SAP HANA is still vulnerable to typical web weaknesses

Page 15: SAP HANA Security: New Technology, New Risks

Be aware of risks in privileged functions, preventing OS command execution, etc.

Risk #2: R-Serve

R is used for statistical and advanced data analysis

SAP HANA can be connected to R-Serve to utilize R functions

For separate hosts, remote functions enabled

Page 16: SAP HANA Security: New Technology, New Risks

Make sure server-side scripting is protected against any injection attack

Risk #3: RAM scraping

HANA makes RAM scraping attractive for hackers Leaves almost no footprint

Circumvents encryption

Data on SAP HANA is not encrypted on RAM level

Page 17: SAP HANA Security: New Technology, New Risks

ABAP programming needs to be validated for weaknesses

Risk #4: Custom Development

SAP HANA applications are accessible through browsers

ABAP is still used for HANA in a 3-tier or data mart scenario

Increased development complexity

Web applications need to be secured at all levels

Page 18: SAP HANA Security: New Technology, New Risks

Risk #5: Basis security

Reality: SAP HANA runs in parallel to existing systems

SAP HANA includes separate security functions

Basic security features to be considered

Increased system landscape complexity with HANA means more security settings to keep in mind

Page 19: SAP HANA Security: New Technology, New Risks

5 rules to protect SAP HANA

Page 20: SAP HANA Security: New Technology, New Risks

Rule #1: No surprise: User and role management

Secure standard users (SYSTEM, <sid>adm, etc.)

Restrict authorizations

Use Single Sign-On

Strong Password Policies

Extensive privileges compromise the entire system !

Page 21: SAP HANA Security: New Technology, New Risks

Rule #2: Obviously: Data encryption and security

Encrypt all sensitive data (encryption is disabled by default on SAP HANA)

Encrypt at all levels (data at rest, secure store in the file system)

Establish key management procedures

Encryption effectively minimizes data theft !

Page 22: SAP HANA Security: New Technology, New Risks

Rule #3: Remember: Secure application development

Avoid http exposed packages

Use standard authentication methods

Follow development guidelines

Validate custom application security

Your code – your responsibility !

Page 23: SAP HANA Security: New Technology, New Risks

Rule #4: Don’t forget: Harden System settings

Ensure OS system security

Validate all other (HANA) system security settings

Secure communications for all connections

Restrict access wherever necessary

Monitor all security settings – configuration drift is a real challenge !

Page 24: SAP HANA Security: New Technology, New Risks

Rule #5: Not to mention: Enable auditing and logging

Enable audit log

Restrict audit authorizations

Secure access to audits and logs

Auditing enables a forensic analysis in case of an attack !

Page 25: SAP HANA Security: New Technology, New Risks

Security, Compliance and Quality Solutions

Page 26: SAP HANA Security: New Technology, New Risks

  HANA can be an attractive target for hackers

  Many known and new risks apply to HANA   Web applications

  R-Serve

  RAM-Scraping

  Custom developments

  Complexity of SAP system landscapes increases with additional HANA scenarios

  For an optimal use of HANA, many settings need to be adjusted

Challenges to HANA Security & Quality

Page 27: SAP HANA Security: New Technology, New Risks

  Optimizing ABAP code for HANA usage (CodeProfiler)   HANA Test Cases (HANA Readiness & Optimization)   Automated Correction (“Quick Fix” and Bulk)

  Securing HANA configuration (SystemProfiler)   Additional platform for SystemProfiler   Test Cases, e.g. communication security, authorization, others

  CodeProfiler for HANA   Eclipse and Web IDE Integration   First HANA Code Scanner ever

Virtual Forge HANA Security Suite

Page 28: SAP HANA Security: New Technology, New Risks

Optimizing Code for HANA

Page 29: SAP HANA Security: New Technology, New Risks

Hybrid Performance Analysis for HANA

Page 30: SAP HANA Security: New Technology, New Risks

Securing HANA configuration with SystemProfiler

Page 31: SAP HANA Security: New Technology, New Risks

Scanning HANA Scripts During Development (Eclipse)

Page 32: SAP HANA Security: New Technology, New Risks

Scanning HANA Scripts During Development (Web Editor)

Page 33: SAP HANA Security: New Technology, New Risks

Reporting Dashboards

Page 34: SAP HANA Security: New Technology, New Risks

Take action: We evaluate the current state of your SAP environment for free

Take an instant test Visit www.virtualforge.com

ü  Summary of

findings

ü  Priorization and

classification of

vulnerabilities

ü  Specific examples

of findings

ü  Code and system

metrics Quality

Compliance

Security Secure SAP®- systems

Risk Assessment / Penetration Test

•  SAP configuration •  Custom code

Free

Page 35: SAP HANA Security: New Technology, New Risks

Dr. Markus Schumacher www.virtualforge.com

@Virtual_Forge

Thank you! Feel free to write or call for any questions and requests 35

Page 36: SAP HANA Security: New Technology, New Risks

Disclaimer

© 2015 Virtual Forge Inc. All rights reserved. SAP, R/3, SAP NetWeaver, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG. All other product and service names mentioned are the trademarks of their respective companies. Information contained in this publication is subject to change without prior notice. It is provided by Virtual Forge and serves informational purposes only. Virtual Forge is not liable for errors or incomplete information in this publication. Information contained in this publication does not imply any further liability. Virtual Forge Terms and Conditions apply. See www.virtualforge.com for details.