Web Channel Security 3.0
Web Channel Security 3.0
0
Target Audience J2? System administrators J2? Technology consultants J2? Security consultants
Document History
CAUTION
Before you start the implementation, make sure you have the latest version of this document. You can find the latest version on SAP Service Marketplace at http://service.sap.com/ securityguide or at http://service.sap.com/wec-inst. The following table provides an overview of the most important document changes:
Version Date Description
Initial Version Restructuring done to make what was previously section 15.9 into chapter 16 Security Checklist. Addition of reference to SAP Note 1029819 to chapter 2.2 Important SAP Notes. Correction in section 12.4.1 Restricting Access to the Administration Area of Web Channel Applications. Addition of caution in section 8.1.1.1 HTTPS Switch.
2/118
CUSTOMER
2013-02-07
Table of Contents
Chapter 1 1.1 1.2 Chapter 2 2.1 2.2 2.3 Chapter 3 Chapter 4 4.1 4.2 4.2.1 4.2.2 4.2.3 4.2.3.1 4.2.3.2 4.2.3.3 Chapter 5 5.1 5.1.1 5.1.2 5.1.2.1 5.1.2.2 5.2 5.2.1 5.2.2 5.2.3 5.2.3.1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Why Is Security Necessary? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Overview of the Guide's Main Sections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Before You Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fundamental Security Guides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important SAP Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Additional Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 13 13 14
Technical System Landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Security Aspects of Data, Data Flow, and Processes . . . . . . . . . . . . . . . . . General Data Flow of Web Channel Applications . . . . . . . . . . . . . . . . . . . . . . . Data and Data Flow of Specific Web Channel Functionality . . . . . . . . . . . . . . . Web Channel Builder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Product Catalog and Product Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . Product Catalog: Browsing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Product Catalog: Adding to the Shopping Cart . . . . . . . . . . . . . . . . . . . . . . . . Product Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Administration and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Internet User Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Web Shop Customers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Web Channel Builder Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Service User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Administration User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Internet User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UME Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 17 18 18 18 19 19 20 21 23 23 23 24 24 26 26 26 27 27 27
2013-02-07
CUSTOMER
3/118
5.2.3.2 5.2.3.3 5.2.3.4 5.2.3.5 5.3 5.3.1 5.3.1.1 5.3.1.2 5.3.1.3 5.3.1.4 5.3.2 5.3.3 5.4 5.5 5.5.1 5.6 Chapter 6 6.1 6.1.1 6.1.1.1 6.1.1.2 6.1.1.3 6.1.1.4 6.1.1.5 6.1.2 6.1.2.1 6.1.2.2 6.1.2.3 6.1.2.4 6.2 6.2.1 6.2.2 6.2.3 6.2.3.1 6.2.3.2 6.2.3.3
Web Channel Logon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Follow-On Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Identification Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Early Logon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Administration Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Service Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Web Channel Builder Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Web Shop Customers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Users Relevant for Web Channel Applications . . . . . . . . . . . . . . . . . . . . . . . . . User Data Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Integration into Single Sign-On (SSO) Environments . . . . . . . . . . . . . . . . . . . Secure Network Communications (SNC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Management Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Authorization Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Roles and Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Predefined User Roles on SAP NetWeaver AS ABAP . . . . . . . . . . . . . . . . . . . . . Predefined User Roles on SAP NetWeaver MDM . . . . . . . . . . . . . . . . . . . . . . . Predefined User Role on SAP NetWeaver AS Java . . . . . . . . . . . . . . . . . . . . . . . Additional Aspects of Web Channel User Roles . . . . . . . . . . . . . . . . . . . . . . . . Authorization Proposals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SU24 Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Service Name Prefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Web Channel Module ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Service Name Suffix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Authorization Trace Activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Authorization Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Standard Authorization Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Critical Authorizations and Combinations . . . . . . . . . . . . . . . . . . . . . . . . . . . Special Web Channel Authorization Objects . . . . . . . . . . . . . . . . . . . . . . . . . . Document Authorization Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Web Channel Builder Authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Authorization Values of Different Web Channel Builder User Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
28 28 28 29 29 29 29 30 30 33 34 34 36 37 37 37 39 39 39 39 43 44 45 45 47 48 48 48 49 49 49 51 52 53 54 55
4/118
CUSTOMER
2013-02-07
6.2.3.4 6.2.3.5 6.2.4 6.2.4.1 6.2.4.2 Chapter 7 7.1 7.1.1 7.1.1.1 7.1.1.2 7.1.2 Chapter 8 8.1 8.1.1 8.1.1.1 8.1.1.2 8.1.1.3 8.1.1.4 8.2 8.2.1 8.2.2 8.3 8.3.1 8.3.1.1 8.3.2 Chapter 9 9.1 9.1.1 9.1.2 9.1.2.1 9.1.2.2 9.1.2.3 9.1.2.4 9.1.3
Authorizations Required for Setting Certain Request URL Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Authorizations for Development, Testing, and Support . . . . . . . . . . . . . . . . . Business Object Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Authorizations Based on the Access Control Engine in SAP CRM . . . . . . . . . . Business Object Access Control in SAP ERP . . . . . . . . . . . . . . . . . . . . . . . . . . . Session Security Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Session Security Protection on SAP NetWeaver AS Java . . . . . . . . . . . . . . . . . . Recommended Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Switch to HTTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HTTPS for Whole Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Session Security Aspects of the Product Catalog . . . . . . . . . . . . . . . . . . . . . . . Network and Communication Security . . . . . . . . . . . . . . . . . . . . . . . . . . . Communication Channel Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HTTPS for Web Channel Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HTTPS Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HTTPS Servlet Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Grace Period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HTTPS in the Administration Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Communication Destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RFC Destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Automatic Creation of Destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SAP NetWeaver MDM Destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Data Storage Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Storage Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SAP Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cookies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HTTPSRequired Cookie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . COMSAPWECUM01 Cookie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Java Cart Cookie (recoverCart) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Additional Cookies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database of SAP NetWeaver AS Java . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
56 57 57 57 57 59 59 59 60 60 61 63 63 65 65 66 67 68 69 69 70 70 70 72 72 75 75 75 75 76 76 77 77 78
2013-02-07
CUSTOMER
5/118
9.1.4 9.1.5 9.1.6 9.1.7 9.1.8 Chapter 10 10.1 10.2 10.3 10.4 10.5 10.5.1 10.5.2 10.6 10.6.1 10.6.2 10.6.3 10.7 10.8 10.9 10.10 10.11 10.12 10.13 Chapter 11 11.1 11.2
Secure Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Encryption of Payment Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Encryption of Gift Card Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Customer-Specific List Price . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Web Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HTTP Request Serialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cross Site Scripting (XSS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Session Riding: Cross Site Request Forgery (XSRF) . . . . . . . . . . . . . . . . . . . . . File Uploads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Virus Scanning for Uploaded Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Upload of Attachments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cookie Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Secure Cookie Attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HttpOnly Attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Application Cookie Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Session Fixation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fast Session Timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Distributed Denial-of-Service Attacks (DDOS) . . . . . . . . . . . . . . . . . . . . . . . . . URL Session Rewriting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ZIP Bombs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Autocompletion Attribute of UI Components . . . . . . . . . . . . . . . . . . . . . . . . . Clickjacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
78 78 79 79 79 81 81 81 82 83 85 85 86 86 86 86 87 87 88 88 88 88 89 89
Security for Additional Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Integrating Payment Service Providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Securing the Communication Between the Back-End System and SAP NetWeaver MDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Other Security-Relevant Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . Security-Relevant Module Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Web Channel Builder (WECB) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Web Channel Builder Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Application Preview in Web Channel Builder . . . . . . . . . . . . . . . . . . . . . . . . . . Web Channel Builder Password Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Web Channel Builder Logon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 93 93 93 94 95 95
6/118
CUSTOMER
2013-02-07
12.2.5 12.3 12.3.1 12.3.2 12.3.3 12.3.4 12.3.5 12.3.6 12.4 12.4.1 12.5 12.5.1 12.6 12.6.1 12.6.2 12.6.3 12.6.4 12.6.5 12.6.6 12.6.7 12.6.8 12.6.9 Chapter 13 Chapter 14 14.1 14.2 14.3 Chapter 15 15.1 15.1.1 15.1.2 15.2 15.3 15.4
Web Channel Builder Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Web Channel User Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 User Management Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Self-Registration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Forgotten Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Guest User Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Digitally-Signed E-Mails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Web Channel Administration Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Restricting Access to the Administration Area of Web Channel Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Security-Relevant Information for Other Web Channel Modules . . . . . . . . . . 98 Java Cart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Additional Security Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 JavaScript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 AJAX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Theme Server Location and HTTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Search Engine Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Web Application ID (WEC-APPID) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Error Page and Runtime Error Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 URL Parameter wec-debug . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Exception Hierarchy and Mapping to Error Pages . . . . . . . . . . . . . . . . . . . . . . 101 Dynamic UI Help Texts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Payment Card Security According to PCI-DSS . . . . . . . . . . . . . . . . . . . . . 103 Security Logging and Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Web Channel Log and Trace Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Session Trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Excluding Sensitive Data from Session Tracing . . . . . . . . . . . . . . . . . . . . . . . Web Service Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Authentication Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Communication Channel Security: Force HTTPS . . . . . . . . . . . . . . . . . . . . . Error Handling: Project Stage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Logging and Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 105 105 106 107 107 107 108 109 109 110
2013-02-07
CUSTOMER
7/118
8/118
CUSTOMER
2013-02-07
1 1.1
1 Introduction
CAUTION
This guide does not replace the administration or operation guides that are available for productive operations. This document is not included as part of the installation guides, configuration guides, technical operation manuals, or upgrade guides. Such guides are only relevant for a certain phase of the software lifecycle, whereas security guides provide information that is relevant for all lifecycle phases.
Authenticated users are not required to perform User Administration and restrictions on the activities. Authentication Data Storage Security Other Security-Relevant Information Broken authentication The account credentials and session tokens may Network and Communication and session management not be properly protected. As a result, attackers Security can overcome authentication restrictions to access passwords, keys, session cookies, or other tokens and assume other users identities. Storage that is not secure Data stored in the files is not protected Data Storage Security accordingly.
2013-02-07
CUSTOMER
9/118
1 1.1
Attack Type
Distributed denial-ofDDOS attacks service (DDOS) Cross-site request forgery Cross-site request forgery, also known as a oneattack click attack or session riding and abbreviated as CSRF (pronounced sea-surf) or XSRF, is a type of malicious violation of a Web site whereby unauthorized commands are transmitted from a user that the Web site trusts. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser. For more information, see https://www.owasp.org/index.php/CrossSite_Request_Forgery_(CSRF). Cross-site scripting Cross-site scripting (XSS) attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted Web sites. Cross-site scripting attacks occur when an attacker uses a Web application to send malicious code, generally in the form of a browser side script, to a different end user. For more information, see https://www.owasp.org/ index.php/Cross-site_Scripting_(XSS). Session Fixation Session fixation is an attack that permits an attacker to hijack a valid user session. The attack explores a limitation in the way the Web application manages the session ID, more specifically the vulnerable Web application. When authenticating a user, it doesnt assign a new session ID, making it possible to use an existing session ID. The attack consists of inducing a user to authenticate himself with a known session ID, and then hijacking the user-validated session by the knowledge of the used session ID. The attacker has to provide a legitimate Web application session ID and try to make the victim's browser use it. The session fixation attack is a class of session hijacking, which steals the established session between the client and the Web server after the user logs in. Instead, the session fixation attack fixes an established session on the victim's browser, so the attack starts before the user logs in. For more information, see https:// www.owasp.org/index.php/Session_fixation.
To assist you in securing Web Channel scenarios and applications, we provide this security guide.
10/118
CUSTOMER
2013-02-07
1 1.2
2013-02-07
CUSTOMER
11/118
1 1.2
,l Other Security-Relevant Information This section contains information about Web Channel application security that was not covered in the previous sections. ,l Payment Card Security According to PCI-DSS This section provides information about payment card security. ,l Security Logging and Tracing This section provides an overview of the trace and log files that contain security-relevant information, for example, so you can reproduce activities if a security breach occurs. ,l Web Service Security This section provides security information relevant for Web Channel Web services. ,l Security Checklist This section provides an overview of the tasks required to ensure Web Channel application security.
12/118
CUSTOMER
2013-02-07
2 2.1
SAP NetWeaver AS Java/ABAP SAP CRM SAP ERP SAP NetWeaver MDM Product Catalog
SAP NetWeaver SAP Business Suite SAP Business Suite SAP NetWeaver SAP
Applications Applications
http://service.sap.com/securityguide
http://service.sap.com/securityguide
NetWeaver MDM
For a complete list of the available SAP Security Guides, see SAP Service Marketplace at http:// service.sap.com/securityguide.
2013-02-07
CUSTOMER
13/118
2 2.3
SAP Note
Composite Security Note: AS Java Audit Information System Encryption of payment cards in SD and customer master
You can also find a list of security-relevant SAP Hot News and SAP Notes on SAP Service Marketplace at http://service.sap.com/securitynotes.
Security Security Guides Related SAP Notes Released Platforms Network Security SAP Solution Manager
14/118
CUSTOMER
2013-02-07
The figure below shows an overview of the technical system landscape for Web Channel.
Web Channel applications are deployed to SAP NetWeaver AS Java and run in the Web Container of SAP NetWeaver AS Java. Different back-end systems can be used to run the business logic. Standard Web Channel supports the SAP CRM or SAP ERP back ends. The SAP NetWeaver MDM server provides the product catalog functionality.
2013-02-07
CUSTOMER
15/118
The Web Channel UI is based on Java Server Faces 2.0, with Apache MyFaces 2.1.7 and Velocity templates being used for UI rendering.. AJAX capabilities are provided using jQuery library. Web Channel applications can run in different Web browsers. Web Channel applications are called via HTTP and HTTPS. Connections to the back-end system are built via RFC using the SAP Java Connector (JCo). The destination information is maintained in the destination service of SAP NetWeaver AS Java. Web Channel Builder (WECB) is used to configure Web Channel applications. To allow application support and monitoring, each Web Channel application provides an Administration area. For more information about the technical system landscape, see the resources listed in the following table:
Topic Guide/Tool Quick Link to the SAP Service Marketplace
http://service.sap.com/wec-inst
Technical description for Web Channel and Master Guide the underlying components such as SAP NetWeaver Installation Guide for Web Channel Installation Guide High availability High Availability for SAP Solutions Technical landscape design Security See applicable documents
http://service.sap.com/wec-inst http://sdn.sap.com/irj/sdn/ha
16/118
CUSTOMER
2013-02-07
4 4.1
Security Aspects of Data, Data Flow, and Processes General Data Flow of Web Channel Applications
Uo(R5&-`Data Flow for Web Channel Applications with SAP CRM Back End
The table below shows the security aspect to be considered for the process step and what mechanism applies:
Step Description Security Measure
1 2
3 4 5 6
Communication protocol HTTPS RFC based on destination using the current SAP NetWeaver AS Java User Management Engine (UME) user User Type: Dialog User SNC Not applicable Not applicable Communication protocol HTTPS Communication protocol HTTPS
2013-02-07
CUSTOMER
17/118
4 4.2
Security Aspects of Data, Data Flow, and Processes Data and Data Flow of Specific Web Channel Functionality