Have Your Peoplesoft System Been Hacked - 2013

January 5, 2018 | Author: Anonymous | Category: Engineering & Technology, Computer Science, Information Security
Share Embed Donate


Short Description

Download Have Your Peoplesoft System Been Hacked - 2013...

Description

Have your PeopleSoft systems been hacked? GreyHeller LLC ©GreyHeller, LLC All Rights Reserved

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Agenda  Introductions

 What

you read in the Press  Identity and Password Management  Data Security  Process Security  Incident Response  Logging and Analysis QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Company Highlights •

Founded by the people who ran PeopleTools



PeopleTools strategists and developers since 1994



Deep PeopleSoft software development skills and DNA



Nearly 100 customers (US; Canada; UK; EU; Australia; Asia; Africa; South America)

• Beta test partner: PeopleTools 8.53 & Applications 9.2 •

2011 & 2012 Oracle Customer Advisory Board



PeopleSoft ecosystem – Blog; Webinars; Conference training QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Software Solutions 

Mobile for PeopleSoft   

   

Any PeopleSoft page / customization….Automatically Single code version: iOS; Android; Blackberry; Windows 7 Highly secure

Single Signon ERP Firewall Version Control Excel Add-in

QuestDirect.org

Customers

GreyHeller LLC, Proprietary & Confidential

Unilever

US. Dept of State

Pfizer

University of North Carolina at Chapel Hill

University of Arkansas

Cambridge University

Philip Morris

Chesapeake Energy

Lazard, Ltd.

Texas Christian Univ

QVC

Arizona State University

US Dept. of Energy

HealthSouth

Robert Half International

MMI Holdings

Stony Brook University

Methanex

Univ. of Oklahoma – Health Sciences Center

University of Central Florida

BCD Travel

Jones Lang LaSalle

University of Montreal

Ryerson University

Berlin Packaging

Frostburg State Univ

University of Kansas

University at Buffalo

AgFirst Bank

Incyte

Amedisys

Quintiles

DLA Piper

GEICO

Logistics Health

Barnabas Health

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

What you read in the press  SQL

Injection  Cross Site Scripting  Content Spoofing and Injection  Authentication and Authorization  Directory Indexing  Information Leakage

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

PeopleTools as a platform  Security

enforced consistently  Central team within PeopleTools who specializes in security.  Vulnerabilities addressed without requiring redevelopment of business logic. Changes are made in the platform, and the vulnerability is addressed platform-wide immediately

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

SQL Injection 





Repercussions  Gather sensitive data  Make unauthorized updates to application data  Escalate privileges and/or bypass system controls  Cause service interruption Mitigated in PeopleTools by  PeopleTools does not concatenate form fields to create the SQL it issues.  The type of form fields are known to PeopleTools, so the entry is validated on size and type. Watch out for SQL Execs. Mitigate by Change Management procedures.

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Cross site scripting  Occurs

when an unauthorized form mimics a form within the application to fool it to allow unauthorized updates  Addressed in PeopleTools by embedding a random token in each PeopleSoft page that the web server validates before accepting it.

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Content Spoofing and Injection 





Modifies traffic between site and browser to find an opportunity to gain unauthorized access or to escalate privileges to it. Examples include:  Modifying the URL in unexpected ways  Altering or removing HTML headers  Altering or removing cookies  Altering the HTML or XML content PeopleTools acts as single controller for traffic QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Content Spoofing and Injection    

Can be bypassed with improper coding practices Utilizing http header to maintain the identity of the user for single signon. Utilizing get request parameter with SQLEXEC function Common location-based security mistakes  Restrict the portal navigation as enforcing location security. 



Utilizing headers to identify the source of traffic.

Common Remediations  

Review any headers that are available on the client. Change management process to review all logic related to the % request. Get parameter() function as well as SQL-Exec functions.

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Authentication and Authorization  Identity

management processes and controls  Password storage, management, and controls  Privilege management  Consistent application controls  PeopleTools enforces security

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Information Leakage 



To aid in development and troubleshooting, information about the configuration and version of the parts of the system need to be accessible at times. However, making this information available publicly can provide information that can help attackers find vulnerabilities. The access of this information is not controllable by developers, but by the PeopleTools platform itself in the web profile. Therefore, we recommend that the web profile settings of the production web servers are audited to ensure that the settings for providing this information are turned off.

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Discussion Points  Identity

and Password Management  Data Security  Process Security  Incident Response  Logging and Analysis

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Identifying and Authenticating Users





Risks  User IDs and passwords  Users can have privileges that are not appropriate for them  Lack of visibility into inappropriate use of user ids, passwords, or privileges Categories  User Account and Identity Management  Processes that surround user identity and role changes  Differentiated levels of trust and re-authentication  Password Controls

QuestDirect.org

Centralize user credentials, password controls, and authentication process (Single Signon)

   

One place to protect the user account information One ID across different University systems Password controls enforced consistently Changes in access administered and enforced in a single place

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

One Identity for System Access regardless of role 

 

Risks:  Password controls are not enforced consistently, and users must remember the credentials for each  Changes in the user’s identity and access must often be applied manually to both accounts  It is more difficult to audit users’ actions across the different accounts. Controls over account provisioning process Batch Processes QuestDirect.org

Processes for controlling changes in user identity GreyHeller LLC, Proprietary & Confidential

     

Student Self-Service Access: Risk limited to the individual student Faculty and Student Intern Access: Risk related to activities that faculty and interns perform for students or University, such as grading and advising Functional Administrator Access: Risk is related to operations of the system in a functional area System Administrator Access: Risk is related to the operations of the PeopleSoft Environment End-user Support Access: Risk is related to the scope of tasks that can be performed. Developer Access: Risk related to changes and the data that the developer accessible.

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Key Activities  Provisioning

of a new individual

 Termination  Transfer  Assumption

of new responsibilities

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Login attempt capture and analysis  Identify    

Suspicious Activity

Identification of accounts targeted in attacks Identification of potentially compromised accounts Early Identification organized attacks Identification of sources of attacks

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Protecting Application Data 

  

Controls over how data is stored Controls over how data is accessed Controls over how data is moved Focus on Roles  End-User  Administrator  Developer  DBA

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Administrator Best Practices 

 



Hiding or Masking sensitive data Externalizing sensitive data from the application Policies for exporting and storing data  Stewardship  Controlling storage and access  Single control point over access (real time) Controlling PS/Query Access

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Controlling Access to PeopleSoft Functions 

The areas to consider within each type of user include:  Protecting against actions performed by unauthorized user with an valid account  Protecting against actions performed by an authorized user with an authorized account  Protecting against system changes that could allow privilege escalation

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Mitigation Techniques 

Controlling access to a machine with an open session or saved credentials



Controlling access to administrative functions that could compromise business functions or cause privilege escalation



Providing audits and controls over high risk functions

QuestDirect.org

Best Practice: 2-factor authentication

GreyHeller LLC, Proprietary & Confidential

 Two   

of the three standard authentication factors

Something the user knows (password, PIN, pattern) Something the user has (Phone, Email Account, USB Key, smart card, Secure ID token) Something the user is (biometric characteristic).

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Common Tokens 



Connected token  Smart card reader  USB token  Fingerprint scanner Disconnected token  Secure ID token  Email  SMS  IVR  Mobile App

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Best Practice: Differentiated Levels of Trust 

Based on following attributes  Location from which access is being performed  Device from which the user is accessed  User  History of access

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Location Attributes      

Access from a campus office with keycard access Access from campus locations that have wired connections Access from campus locations that are accessed wirelessly Access from non-campus locations, but in the community of the campus Access from other US locations Access from other countries

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Device Attributes

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

User Attributes

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

History Attributes

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Setting the Levels  

Banding sets of session attributes into levels of trust. Banding PeopleSoft functionality into the different levels of access.  Functionality should be analyzed with the following in mind:   



The results of this banding will group PeopleSoft functionality into how it will be provided  



Can it be used for privilege escalation? Can it be used fraudulently to benefit or damage students, faculty, administration or the University? Are there other processes in place to review or approve changes made?

Allowed with any valid session Allowed with a valid session and an additional factor of authentication

Disallowed for the current session

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Other Best Practices 

Temporary access to high risk functions



Well defined policies and training over administrative use



Release process over configuration settings

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Developer and Tester Best Practices



Limit developer access to production Change Management solution for development tasks Automating migrations into production with segregation of duties Removal of PeopleSoft-delivered accounts and roles Audit and controls over development and testing accounts and permissions in production Test Automation



Develop and test scripts instead of running SQL directly in

    

production

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Incident Response  Common    

Incidents

Solicited and/or unsolicited information provided by security research organizations Publication of issue or breach that affecting the University’s system. Discovery of potential breach that could affect the University’s system. Account-level issues including breaches and password resets QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Incident Response Best Practices  Cross-Functional

incident response teams  Communication processes and plans  Incident response policies and procedures that define SLA’s, roles, responsibilities, and automation wherever possible

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Logging and Auditing  Helps  





with

Prevent security breaches Identify breaches or attacks early thereby reducing the scope of impact Quickly understand the of scope of attacks or breaches so that a response can be planned and quickly implemented Gather better information for security audits or litigation QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Logging Best Practices  Information  Failed

about the location accessed from

login activity

 Information

about the data accessed or any transaction activity QuestDirect.org

Best Practice: Capturing additional information

GreyHeller LLC, Proprietary & Confidential



  

 

IP Address or Location Web Server being accessed User ID Pages accessed within the application Keys to identify the data accessed or transaction to be processed Actions performed within the application

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Best Practice: Segmented Logs       



Login activity Password resets Administrative access by functional area Student access by functional area Support access Access from high-risk locations Access from high-risk personnel Access to sensitive data or transactions

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Summary 

Masking and externalizing sensitive data



Differentiated Security and 2-factor authentication



Logging and Auditing



Change Management and Automation

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

GreyHeller Security Products  Desktop

Single Signon  ERP Firewall  

  

Differentiated Security Location based Security 2 Factor Authentication Delegation Logging

 GreyHeller

Version Control QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

ERP Firewall

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Allows you to  Control

access based on location, user, content, and state.  Log only the requests you care about.  Implement additional challenges for content you wish to secure more strongly  Display your own system messages to your users  Restrict access when system is under maintenance QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Access Control Made Easy

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

ERP Firewall Flow

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Flexible, Powerful Conditions

QuestDirect.org

Powerful Logging  Gathers   

Oprid / IP Address / Result / Browser / Date / Time Login Page / Portal Content / PeopleSoft Page / iScript EMPLID / Search Criteria / Actions taken

 Allows    

a complete picture of access

creation of targeted logs

Failed login activity Activity for specific content Activity for types of users 2-factor activity QuestDirect.org

Definitional 2-factor authentication

GreyHeller LLC, Proprietary & Confidential

 Identify

areas that require additional security upon access  Only grant extended privileges when needed  Limit the scope of those privileges

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Change Management   

 

Segregation of duties and Release Management Controls Visibility into all development and release activity Facilitates automated testing No footprint on your PeopleSoft servers PeopleSoft environments are not linked to each other

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Collaboration 



Access to all parts of your release process from browser  Code Browsing and revision history  Check-in History  Migration definition and execution  Tickets, Approvals, and state of work Integrated Collaboration Tools  Email Notifications  RSS Feeds

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Normal Release Process

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

Standard Release Process

QuestDirect.org

GreyHeller LLC, Proprietary & Confidential

APRIL 7-11, 2014 Sands Expo and Convention Center Las Vegas, Nevada

QuestDirect.org/COLLABORATE COLLABORATE 14- Quest Forum is THE source for PeopleSoft roadmaps & news. It matters where you register! All PeopleSoft education and events run through Quest

QuestDirect.org

View more...

Comments

Copyright � 2017 NANOPDF Inc.
SUPPORT NANOPDF