How GDPR Affects SAP Security Webinar
How GDPR Affects SAP Security Webinar
1. Introduction to GDPR
2. GDPR security-related requirements
3. SAP security controls for GDPR
4. GDPR security implementation plan
5. Follow-up actions
Introduction to GDPR
Key GDPR security provisions
and challenges
Drivers of GDPR 4
Privacy concerns
• cybertheft of personal data
• tracking and predicting
individual behavior
• misuse of personal data
control over their data 25 May 2018: General level playing field
Data Protection
Regulation
GDPR’s Goal 5
• Personal data
• any information relating to an identified or identifiable natural person (‘data subject’);
• Data subject
• an identifiable natural person is one who can be identified, directly or indirectly, in particular by
reference to an identifier such as a name, an identification number, location data, an online
identifier or to one or more factors specific to the physical, physiological, genetic, mental,
economic, cultural or social identity of that natural person.
• Data controller
• the natural or legal person, public authority, agency or other body which, alone or jointly with
others, determines the purposes and means of the processing of personal data;
• Data processor
• a natural or legal person, public authority, agency or other body which processes personal data
on behalf of the controller
General Data Protection Regulation, Article 4
Online Store 10
GDPR Security Provisions 11
Overview
Eliciting requirements
• HR master records:
o 0002 Personal Data
o 0004 Challenge
o 0006 Addresses
o 0009 Bank Details
o 0021 Family
o 0028 Internal Medical Services
o 0094 Residence Status
1.1 Find data 18
• Search in domains:
o RSCRDOMA: Where-Used List of Domains in Tables
o RPDINF01: Audit Information Systems – Technical Overview of Infotypes
• RFC functions
• Databases (HANA, Oracle)
• SAP services: Other security
o Gateway
controls
o Message Server
o SOAP Interface
20
1.2 Find users by S_TABU_* authorizations
1.2 Find users of transaction 21
• Find more:
1. Search for programs using data-related tables (SE80\Repository Information System\ABAP
Dictionary\Database Tables)
2. Find transactions related to the program (SE80, or table TSTC)
3. Find users having S_TCODE authorizations to run the transactions
1.3 Evaluate security controls 22
Authentication Monitoring
• Password policy • Log settings: security audit log, system log,
• Privileged users gateway, HTTP, SQL logs …
• SSO checks • CCMS settings
Overview
LEVEL SOLUTION
• Authorization objects
• Segregation of Duties
Business
• Single sign-on and password auth.
• UI Masking and Logging
• XI
• SNC
Communications
• VPN’s
• Firewalls
UI Masking
• Purpose
o masking sensitive data in SAP GUI
o logging of requests to selected data fields
• Functions
o modifies data before being displayed at the backend
side
o tracks requests for sensitive data
o configurable to what and how should be masked
o configurable who is authorized to see unmasked data
UI Masking Architecture
Article 32
Event sources
• UI Masking
• UI Logging
• Read Access Logging
• Security logs
3.1 Monitor personal data access 36
UI Logging
Transaction BP (Business Partner) Log record
• UI Logging is a non-
modifying add-on
based on SAP
NetWeaver
• UI Logging captures the
data stream between
SAP GUI and the
backend system
• Minimal impact on the
application
custom code Does your custom code have any hardcoded stuff
vulnerabilities and missing authorizations?
1. Understand your system 45
Action plan
Remediation planning
Constraints and requirements (example):
• Duration: not more than 60 days
• Vulnerability risk level: medium and higher
• Allowed remediation types: No kernel patch
Tasks:
1. Prioritizing vulnerabilities:
- ease of exploitation: availability of public exploit, need for preparation,
need for credentials with special rights, etc.;
- impact of a successful exploitation: full disclosure and OS-level access or
just revealing technical data;
- prevalence of the vulnerability in SAP systems;
- criticality of the SAP systems with the vulnerability.
2. Filtering vulnerabilities
Outcome:
• Remediation Plan
48
3. Stay compliant and detect breaches
Aggregate logs
• Threats:
• starting of critical RFC, report, transactions or web service access
• unauthorized/unsuccessful access (e.g. RFC calls, logon attempts)
• potential DDoS attack
• Attacks:
• WEB-resource attacks (XSS, SQL Injection, etc.)
• Using source code vulnerabilities
• Authentication bypass (Verb Tampering, Invoker servlet)
• Anomalies:
• first time access to personal data
• location change of users processing personal data
• unusually high traffic utilization
ERPScan GDPR Solutions 50
• ERPScan VM module
• ERPScan Code scanning module
• ERPScan SOD module
• SOD services
Contact us:
[email protected]
Phone: +31 20 8932892
Follow-up actions
Follow-up actions 52
HQ Netherlands:
Luna ArenA 238 Herikerbergweg, 1101 CM
Amsterdam
Read our blog Phone +31 20 8932892
erpscan.com/category/press-center/blog/