SlideShare a Scribd company logo
Highway to Production
Securing the SAP TMS
September 30th, 2014
ASUG
Sergio Abraham
sabraham@onapsis.com
Pablo Muller
pmuller@onapsis.com
2www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Disclaimer
This publication is copyright 2014 Onapsis, Inc. – All rights reserved.
This publication contains references to the products of SAP AG. SAP, R/3, xApps, xApp, SAP
NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and
services mentioned herein are trademarks or registered trademarks of SAP AG in Germany and in
several other countries all over the world.
Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions,
Web Intelligence, Xcelsius and other Business Objects products and services mentioned herein are
trademarks or registered trademarks of Business Objects in the United States and/or other countries.
SAP AG is neither the author nor the publisher of this publication and is not responsible for its content,
and SAP Group shall not be liable for errors or omissions with respect to the materials.
SAP TMS
3www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Who is Onapsis, Inc.?
 Company focused in the security of ERP systems and business-critical
infrastructure (SAP®, Siebel®, Oracle® E-Business SuiteTM, PeopleSoft®, JD Edwards® …).
 Working with Global Fortune-100 and large governmental organizations.
 What does Onapsis do?
 Innovative ERP security software (Onapsis X1, Onapsis Bizploit, Onapsis IA).
 ERP security consulting services.
 Trainings on business-critical infrastructure security.
Who are we?
 Pablo Müller, SAP Security Specialist at Onapsis.
 Sergio Abraham, SAP Security Researcher at Onapsis.
 Discovered several vulnerabilities in SAP...
 Speaker/Trainer at Ekoparty, Hubcon, SANS, ...
 Collaborator in the “SAP Security In-Depth” publication.
SAP TMS
4www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Agenda
 Introduction
 SAP TMS Concepts
 System Change Option
 TMS Users and Connections
 Common Transport Directory
 Transport Requests
 TP tool
 Controlling Transports to Production
 PFCG tool
 Authorizations
 Conclusions
SAP TMS
5www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Introduction
Attacks on SAP TMS
6www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedAttacks on SAP TMS
What is SAP?
● Largest provider of business management solutions in the world.
● More than 140.000 implementations around the globe.
● More than 90.000 customers in 120 countries.
● Used by Global Fortune-1000 companies, governmental
organizations and defense agencies to run their every-day business
processes.
● Such as Revenue / Production / Expenditure business cycles.
SALES
PRODUCTION
FINANCIAL PLANNING
INVOICING
PROCUREMENT
TREASURY
LOGISTICS
PAYROLL
BILLING
7www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedAttacks on SAP TMS
A Business-Critical Infrastructure
● ERP systems store and process the most critical business
information in the Organization.
● If the SAP platform is breached, an intruder would be able to
perform different attacks such as:
ESPIONAGE: Obtain customers/vendors/human resources
data, financial planning information, balances, profits, sales
information, manufacturing recipes, etc.
SABOTAGE: Paralyze the operation of the organization by
shutting down the SAP system, disrupting interfaces with other
systems and deleting critical information, etc.
FRAUD: Modify financial information, tamper sales and
purchase orders, create new vendors, modify vendor bank
account numbers, etc.
8www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedSAP TMS
An attacker will exploit our Achilles’ heel…
• SAP systems are built upon several layers.
• The SAP Application Layer (NetWeaver/BASIS) is common to most
modern SAP solutions, serving as the base technological framework.
Note: The Database and Operating System layers should not be forgotten!
Traditional techniques apply. Warning: reduced accountability due to SAP’s
using of single users (<sid>adm, SAPService<SID>, SAPR3,…)
Operating System
Database
SAP Business Logic
SAP Application Layer
SAP Solution
Base Infrastructure
Over 95% of the SAP systems we
evaluated were exposed to espionage,
sabotage and fraud attacks due to
vulnerabilities in the SAP Application
Layer.
Unlike SoD gaps, attackers do not need access
credentials to exploit this kind of vulnerabilities…
10www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
SAP TMS
SAP TMS
11www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
What is the SAP TMS?
● Set of tools, protocols and mechanisms engineered to
manage and control any software customization or data
changes made across SAP systems.
● Using the TMS to manage changes allows you to develop
in one system (DEV) and test in another one (QA), before
importing to production (PRD).
The final goal is to manage/control changes on the database
SAP TMS
12www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedTMS: Highway to PRD
SAP TMS Infrastructure
DEV
QA
PRD
Transport
Directory
SAP TMS
13www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
SAP TMS “concepts”
● Transport Domain
● Transport Domain Controller
● Common Transport Directory
● Transport Group
● SAP System
● SAP System role
TMS: Highway to PRD
Transport Management System - http://help.sap.com/static/saphelp_nw70ehp1/en/c4/6045377b52253de10000009b38f889/Image1.gif
The SAP System Landscape - http://help.sap.com/saphelp_nw04s/helpdata/en/de/6b0d84f34d11d3a6510000e835363f/content.htm
SAP TMS
14www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
SAP TMS “concepts” (cont.)
● Transport Routes
● Transport RFC Destinations
● TMS standard users
● TMS System queues
SAP TMS
15www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
TMS
System Change Option
SAP TMS
16www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Understand your landscape
Before setting the client/system change option it is
important to understand the landscape:
● Define the role for each system/client.
● Define transport routes.
● Select the domain controller.
● Configure the system and client change option.
SAP TMS
17www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
System Change Option
Global or System Options (Trx SE03/SE06)
Per-client options (Trx SCC4)
SAP TMS
18www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
TMS
users and connections
SAP TMS
19www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
SAP TMS RFC Connections
● After configuration, RFC connections are created connecting all the
systems in the same transport domain (full-mesh).
If the Transport Domain is configured with 3 systems, each system will have 6 “TMS” RFC Destinations.
● TMSSUP ABAP connection does not represent any potential risk as user
credentials are required in order to use it.
● TMSADM ABAP (configured with the S_A.TMSADM profile) connections
are configured with stored TMSADM credentials meaning that anyone (with the
proper authorizations) can use it to execute remote-enabled function modules.
● CALLTP_<OS> starts the TP program in the application server.
RFC Destination
TMSADM@DOMAIN.SYSTEM
TMSSUP@DOMAIN.SYSTEM
CALLTP_<OS>
SAP TMS
20www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
TMSADM authentication & authorizations
The standard user TMSADM (system type) is by default configured with a
“shared” password for all the Transport Domain.
● The new standard password is still a fixed password “$1Pa****”
● Choosing a non-standard password is the best option.
Configured with a unique and standard profile S_A.TMSADM. No additional
authorizations should be required
Authorization objects
S_DEVELOP
S_DATASET, S_PATH
S_RFC, S_RFC_ADM
S_CTS_ADMI, S_TRANSPRT
SAP TMS
21www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Live
Demonstration
SAP TMS
22www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
TMSADM authentication & authorizations
The standard user TMSADM (system type) is by default configured with a
“shared” password for all the Transport Domain.
● The new standard password is still a fixed password “$1Pa****”
● Choosing a non-standard password is the best option.
Configured with a unique and standard profile S_A.TMSADM. No additional
authorizations should be required
Authorization objects
S_DEVELOP
S_DATASET, S_PATH
S_RFC, S_RFC_ADM
S_CTS_ADMI, S_TRANSPRT
Protection / Countermeasure
 Use a strong and non-standard password for the user TMSADM
 Do not assign authorizations other than profile S_A.TMSADM, specially not
SAP_ALL (we have seen this many times).
 Apply all SAP Security Notes. Keep the systems up-to-date.
 Implement SAP Security Notes 761637, 1414256, 1515926, 1657891, 1554030,
1488406, 1486759, 1445407, 1298160 and 1298160.
Check the “References” slide for more information!
SAP TMS
23www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Common Transport
Directory
SAP TMS
24www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
CTD Security configuration
It’s a network location shared by all systems in the same
transport group. This directory will hold the TR (transport
requests). This directory is implemented as SMB or NFS
exported shares.
When implemented as NFS (most common) some
configuration issues could arise:
● Exported to any IP address.
● Exported with insecure permissions (r/w, suid).
● Exported along with configuration and binary files.
● Implemented on the least secure system (usually DEV)
ƒS
Protection / Countermeasure
 Configure the Common Transport Directory in a secure way.
 Restrict access to only the Application Servers of the SAP Systems on the same
transport group.
 Use a secure system to hold the Common Transport Directory.
 Implement SAP Security Notes 1330776 and 633814.
 Secure every SAP system as the productive systems.
Check the “References” slide for more information!
SAP TMS
25www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Transport
Requests
SAP TMS
26www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
TMS Transport requests
The transport request is the unit of data that is moved between SAP
systems. All transport requests are stored in the CTD in two files, the
“data” file and the “cofile” file. The default location is:
The cofile keeps an “activity log” of the Transport Request.
Default Location
/usr/sap/trans/data/RXXXXXX.SYS R900050.DEV
/usr/sap/trans/cofiles/KXXXXXX.SYS K900050.DEV
ZONAPSIS K EQ6 3 1 2 0 0 0 0 0 0 3 731 . 0 0 0 0 0 000
#•A
#/1/ A G D - R C T - Z RELE EX. _ _ _ _ _ CLI
ER6 f 0000 20130511133715 labsapsrv030 er6adm
ER6 e 0000 20130511133717 labsapsrv030 er6adm
EQ6 < 0000 20130511133723 labsapsrv030 er6adm
ER6 E 0000 20130511133723 labsapsrv030 er6adm
EQ6 H 0004 20130511133819 labsapsrv019 eq6adm
EQ6 A 0004 20130511134836 labsapsrv019 eq6adm
SAP TMS
27www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Data File
An example Transport request analyzed. The header is an ascii-based
portion while the rest is binary.
00000000 00 00 00 33 |...3 T0005020623|
00000010 |20130511163723er|
00000020 |6adm 731 ..|
00000030 00 00 06 d6 7c 9d 0c 23 00 40 00 00 12 |..L....|..#.@...|
00000040 1f 9d 02 bb 5c ab 5b 52 db 86 c2 ea 4d af 3a 9d |.....[R....M.:.|
00000050 b6 37 9d de e9 2a 49 99 65 23 ff ac 61 e9 a4 33 |.7...*I.e#..a..3|
00000060 06 cb e0 f5 0f c4 16 84 e5 66 87 ec d2 0d 33 89 |.........f....3.|
00000070 e9 2c 6c 9b f4 91 fa 00 7d 86 3e 53 af 7a 6c 7e |.,l.....}.>S.zl~|
00000080 16 cb 18 0c d1 7a 5a f6 68 bc c1 46 9f f4 71 2c |.....zZ.h..F..q,|
00000090 9d ef 48 0a 42 a8 84 4b be 32 bb 1b 86 53 fc db |..H.B..K.2...S..|
000000a0 e8 6e 3a 9e 84 35 ac 48 a7 12 39 95 64 5c c6 32 |.n:..5.H..9.d.2|
000000b0 a9 49 72 8d 68 08 a1 77 b8 14 4c ee ef ae 47 38 |.Ir.h..w..L...G8|
000000c0 f8 34 9d 8d 3e e0 57 58 77 8d 97 56 38 1b bd c7 |.4..>.WXw..V8...|
000000d0 1f ab da 95 a6 e2 df c7 b3 77 d8 19 87 f7 1f f1 |.........w......|
000000e0 24 c4 46 dd 0d a2 5a 86 5e d7 03 6c e0 72 b9 0c |$.F...Z.^..l.r..|
Date and time, user and version
SAP TMS
28www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Data File
After the header, there are blocks of compressed data of variable length.
00000000 20 54 30 30 30 35 30 32 30 36 32 33 |...3 T0005020623|
00000010 32 30 31 33 30 35 31 31 31 36 33 37 32 33 65 72 |20130511163723er|
00000020 36 61 64 6d 20 20 20 20 20 20 37 33 31 20 00 00 |6adm 731 ..|
00000030 10 01 4c |..L....|..#.@...|
00000040 bb 5c ab 5b 52 db 86 c2 ea 4d af 3a 9d |.....[R....M.:.|
00000050 b6 37 9d de e9 2a 49 99 65 23 ff ac 61 e9 a4 33 |.7...*I.e#..a..3|
00000060 06 cb e0 f5 0f c4 16 84 e5 66 87 ec d2 0d 33 89 |.........f....3.|
00000070 e9 2c 6c 9b f4 91 fa 00 7d 86 3e 53 af 7a 6c 7e |.,l.....}.>S.zl~|
00000080 16 cb 18 0c d1 7a 5a f6 68 bc c1 46 9f f4 71 2c |.....zZ.h..F..q,|
00000090 9d ef 48 0a 42 a8 84 4b be 32 bb 1b 86 53 fc db |..H.B..K.2...S..|
000000a0 e8 6e 3a 9e 84 35 ac 48 a7 12 39 95 64 5c c6 32 |.n:..5.H..9.d.2|
000000b0 a9 49 72 8d 68 08 a1 77 b8 14 4c ee ef ae 47 38 |.Ir.h..w..L...G8|
000000c0 f8 34 9d 8d 3e e0 57 58 77 8d 97 56 38 1b bd c7 |.4..>.WXw..V8...|
000000d0 1f ab da 95 a6 e2 df c7 b3 77 d8 19 87 f7 1f f1 |.........w......|
000000e0 24 c4 46 dd 0d a2 5a 86 5e d7 03 6c e0 72 b9 0c |$.F...Z.^..l.r..|
00 00 06 d6 7c 9d 0c 23 00 40 00 00 12 1f 9d 02
SAP TMS
29www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Data File
● Similar compression algorithms are used on other SAP components.
● Once decompressed, the protocol is purely text, separated by blocks.
The contents can be retrieved and modified ( need re-calculation of the
CRC32 checksums).
00 00 00 2a 20 2a 52 33 74 72 61 6e 73 20 76 65 ......R3trans.ve
72 73 69 6f 6e 3a 20 33 31 2e 31 30 2e 31 32 20 rsion..31.10.12.
2d 20 32 30 3a 31 32 3a 30 36 00 00 00 68 20 2a ..20.12.06...h..
53 6f 75 72 63 65 20 53 79 73 74 65 6d 20 3d 20 Source.System...
41 4d 44 2f 49 6e 74 65 6c 20 78 38 36 5f 36 34 AMD.Intel.x86.64
20 77 69 74 68 20 4c 69 6e 75 78 20 6f 6e 20 44 .with.Linux.on.D
42 4d 53 20 3d 20 41 44 41 42 41 53 20 44 20 2d BMS...ADABAS.D..
2d 2d 20 44 42 4e 41 4d 45 20 3d 20 27 27 20 2d ...DBNAME.......
2d 2d 20 53 59 53 54 45 4d 20 3d 20 27 45 52 36 ...SYSTEM....ER6
27 2e 00 00 00 41 20 2a 6c 61 6e 67 75 61 67 65 .....A..language
73 3a 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e s.ABCDEFGHIJKLMN
4f 50 51 52 53 54 55 56 57 58 59 5a 30 31 32 33 OPQRSTUVWXYZ0123
34 35 36 37 38 39 61 62 63 64 69 28 29 2c 2e 2f 456789abcdi.....
3a 3b 26 00 00 00 7a 20 2a 69 73 6f 2d 6c 61 6e ......z..iso.lan
67 75 61 67 65 73 3a 49 53 4f 2d 41 52 48 45 43 guages.ISO.ARHEC
53 44 45 45 4e 46 52 45 4c 48 55 49 54 4a 41 44 SDEENFRELHUITJAD
41 50 4c 5a 46 4e 4c 4e 4f 50 54 53 4b 52 55 45 APLZFNLNOPTSKRUE
……………
SAP TMS
30www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Dissecting Transport Requests
● The transport requests can be parsed and opened using
compression algorithms.
● If unauthorized access to the data files is achieved, then all the
information hosted on those files can be accessed and modified.
● Furthermore, “evil” transports can be specifically generated and later
transported into the target systems containing:
● New users.
● Backdoor functionality
● Any piece of information on any table.
TMS: Highway to PRDSAP TMS
31www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Live
Demonstration
SAP TMS
32www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Dissecting Transport Requests
● The transport requests can be parsed and opened using
compression algorithms.
● If unauthorized access to the data files is achieved, then all the
information hosted on those files can be accessed and even modified.
● Furthermore, “evil” transports can be specifically generated and later
transported into the target systems containing:
● New users.
● Backdoor functionality
● Any piece of information on any table.
Protection / Countermeasure
 Analyze all transport requests before being imported into PRD systems.
 Secure ALL the TMS infrastructure including Users, RFC communications and
CTD location.
 Check the “References” slide for more information!
SAP TMS
33www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
TP tool
SAP TMS
34www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
TMS TP tool
The main OS tool used by the TMS is called “TP”. This binary can be used
by command line and can be called remotely through the gateway
(External “STARTED” Server).
If the SAP Gateway ACL’s are not secured (it is secure by default only in
the latest Netweaver versions)  Any transport could be uploaded and
imported remotely into production without restrictions.
Check Bjoern Brencher’s presentation: “SAP runs SAP: RFC Gateway
Hacking and Defense” covering attacks and mitigation of SAP gateway
(References - #2)
SAP TMS
35www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedTMS: Highway to PRD
TP program regular usage
RCF Call
SAP GW
SAP Application Server
TP
The SAP Application Server uses the TP program
by calling it at the OS level and using the
“sidadm” connection to the database.
SAP R/3
SAP DB
CALLTP_<os>
SAP TMS
36www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedTMS: Highway to PRD
Calling TP through SAP Gateway
RCF Call
SAP GW
SAP Application Server
An attacker could connect to the gateway starting
the TP program remotely, also using the
“sidadm” connection to the database.
SAP R/3
SAP DB
TP
SAP TMS
37www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
TMS TP tool
The main tool related to the TMS is the “TP”. This binary was developed to
be used by command line and it can also be called remotely through the
gateway (External “STARTED” Server).
If the SAP Gateway ACL’s are not secured (it is secure by default in the
latest versions, but it is usually found miss-configured)
Any transport could be uploaded and imported remotely into
production without restrictions.
(Test can be triggered using SE37 and RFC FM TRINT_TP_INTERFACE)
Check Bjoern Brencher’s presentation: “SAP runs SAP: RFC Gateway
Hacking and Defense” covering attacks and mitigation of SAP gateway
TMS: Highway to PRD
Protection / Countermeasure
 Secure the SAP Gateway, only allowing authorized systems to start external
servers, specifically the TP server.
 Implement SAP Security Note 1371799 to restrict execution of TP through the
SAP Gateway.
 Check the “References” slide for more information!
SAP TMS
38www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedTMS: Highway to PRD
Controlling
Transports to PRD
SAP TMS
39www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Quality Assurance
Before any transport is imported into Production, changes
must be properly validated, tested and approved.
SAP has two options to enforce the approval process:
• QA Approval Procedure:
• System Admin
• User Dept.
• Request Owner
• Workflow Engine:
• Complex Tool -> Specific knowledge required
• WS71000008 is a template for transport approval workflow.
• Transports approvals are sent directly to the user SAP Business
Workplace.
Protection / Countermeasure
 Set an approval workflow for the transports involving the proper users.
 Enforce code validation by independent reviewer following the BIZEC APP1
standard.
 Define a transport schedule according to business requirements and change
types (programs, customizing or security) that allows adequate time for review.
Check the “References” slide for more information!
SAP TMS
40www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
PFCG tool
SAP TMS
41www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
PFCG tool
• Transaction to create/maintain roles and assign authorizations.
• Changes are possible regardless the Client Option settings (Table
T000).
• Only display access in Production systems must be assigned.
• Apply changes directly in Production only in emergencies using
Firefighter users, or other emergency process.
Protection / Countermeasure
 Restrict access to PFCG in Production system.
 On regular basis, perform reviews to ensure that PFCG is not assigned in
Production and that is properly assigned in Development.
 Implement a procedure for emergencies related to user access.
SAP TMS
42www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Authorizations
SAP TMS
43www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Authorizations for TMS
There are different tasks related to the Transport Management System
that should be segregated:
• TMS and System/Client Configuration.
• Transport Creation.
• Transport Release.
• Transport Import.
Protection / Countermeasure
 Define which user group should perform each of the tasks
 Assign the accesses according to the responsibilities to avoid segregation of
duties conflicts.
 Users with access to perform the actual changes to the system must not have
access to configure the TMS, and to release or import transports.
 Perform regular reviews to ensure that users have the proper access.
SAP TMS
44www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Conclusions
SAP TMS
45www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Conclusions
 If the SAP Transport Management System is not protected, an attacker
can create/modify malicious transports bypassing the Change
Control/Management mechanisms.
 These transports could have dramatic impact if deployed to Production
(espionage, sabotage, fraud).
 Use non-standard credentials for the TMSADM user and do not assign
extra authorizations.
 Place the Common Transport Directory in a secure location and properly
configured.
 Secure all the systems as ANY other Productive System
 Update the systems!!!. Use the latest versions of all SAP solutions and
components. Apply all relevant SAP Security Notes.
SAP TMS
46www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
1. CTS Security Guide
http://help.sap.com/saphelp_nw70ehp3/helpdata/en/ec/b3b638faa32d19e10000009b38f8cf/content.htm
2. SAP runs SAP: RFC Gateway Hacking and Defense by Bjoern Brencher
http://www.sapvirtualevents.com/teched/sessiondetails.aspx?sId=3399
3. Additional Information about Gateway and RFC security - Secure Configuration SAP NetWeaver Application
Server ABAP” https://websmp109.sap-ag.de/~sapdownload/011000358700000968282010E/SAP-Sec-
Rec.pdf
4. Best Practice - How to analyze and secure RFC connections
http://wiki.sdn.sap.com/wiki/display/Security/Best+Practice+-
+How+to+analyze+and+secure+RFC+connections
5. Security Settings in the SAP Gateway
http://help.sap.com/saphelp_nw73ehp1/helpdata/en/48/b2096e7895307be10000000a42189b/frameset.htm
6. Securing RFC Connections http://scn.sap.com/docs/DOC-17089
7. Onapsis X1 http://www.onapsis.com/x1
References
SAP TMS
47www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved
Questions?
Follow us! @onapsis
TMS: Highway to PRD
sabraham@onapsis.com pmuller@onapsis.com
SAP TMS
48www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedTMS: Highway to PRD
Thank you!
SAP TMS

More Related Content

What's hot

Unbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwardsUnbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwards
Onapsis Inc.
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
Onapsis Inc.
 
Onapsis SAP Backdoors
Onapsis SAP BackdoorsOnapsis SAP Backdoors
Onapsis SAP Backdoors
Onapsis Inc.
 
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
Onapsis Inc.
 
Inception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution ManagerInception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Onapsis Inc.
 
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC) 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)Onapsis Inc.
 
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe... 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
Onapsis Inc.
 
Sap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depthSap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depth
Igor Igoroshka
 
All your SAP passwords belong to us
All your SAP passwords belong to usAll your SAP passwords belong to us
All your SAP passwords belong to us
ERPScan
 
Sap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hatSap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hat
n|u - The Open Security Community
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit
ERPScan
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
ERPScan
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)
ERPScan
 
If I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second editionIf I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second editionERPScan
 
SAP SDM Hacking
SAP SDM HackingSAP SDM Hacking
SAP SDM Hacking
ERPScan
 
Attacking SAP Mobile
Attacking SAP MobileAttacking SAP Mobile
Attacking SAP Mobile
ERPScan
 
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPBusiness breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPERPScan
 
データベースMeetup Vol3
データベースMeetup Vol3データベースMeetup Vol3
データベースMeetup Vol3
Koji Shinkubo
 
SAP (in)security: New and best
SAP (in)security: New and bestSAP (in)security: New and best
SAP (in)security: New and best
ERPScan
 
データベースMeetup vol2
データベースMeetup vol2データベースMeetup vol2
データベースMeetup vol2
Koji Shinkubo
 

What's hot (20)

Unbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwardsUnbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwards
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
Onapsis SAP Backdoors
Onapsis SAP BackdoorsOnapsis SAP Backdoors
Onapsis SAP Backdoors
 
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
 
Inception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution ManagerInception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution Manager
 
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC) 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
 
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe... 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
 
Sap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depthSap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depth
 
All your SAP passwords belong to us
All your SAP passwords belong to usAll your SAP passwords belong to us
All your SAP passwords belong to us
 
Sap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hatSap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hat
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)
 
If I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second editionIf I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second edition
 
SAP SDM Hacking
SAP SDM HackingSAP SDM Hacking
SAP SDM Hacking
 
Attacking SAP Mobile
Attacking SAP MobileAttacking SAP Mobile
Attacking SAP Mobile
 
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPBusiness breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
 
データベースMeetup Vol3
データベースMeetup Vol3データベースMeetup Vol3
データベースMeetup Vol3
 
SAP (in)security: New and best
SAP (in)security: New and bestSAP (in)security: New and best
SAP (in)security: New and best
 
データベースMeetup vol2
データベースMeetup vol2データベースMeetup vol2
データベースMeetup vol2
 

Similar to Highway to Production Securing the SAP TMS

SAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeSAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crime
Onapsis Inc.
 
CRM Fundamentals-I
CRM Fundamentals-ICRM Fundamentals-I
CRM Fundamentals-I
Srini Vasan
 
Service provider call_example
Service provider call_exampleService provider call_example
Service provider call_example
BettyPeltroche
 
Introduction to SAP Gateway and OData
Introduction to SAP Gateway and ODataIntroduction to SAP Gateway and OData
Introduction to SAP Gateway and OData
Chris Whealy
 
Introduction to OData and SAP NetWeaver Gateway.pptx
Introduction to OData and SAP NetWeaver Gateway.pptxIntroduction to OData and SAP NetWeaver Gateway.pptx
Introduction to OData and SAP NetWeaver Gateway.pptx
Richard314186
 
2009 06 worldtour_sme5_sap_fr
2009 06 worldtour_sme5_sap_fr2009 06 worldtour_sme5_sap_fr
2009 06 worldtour_sme5_sap_fr
Somayeh Jabbari
 
SAP hybris Billing & Marketing Team Event, Segovia 2016 - Altima
SAP hybris Billing & Marketing Team Event, Segovia 2016 - AltimaSAP hybris Billing & Marketing Team Event, Segovia 2016 - Altima
SAP hybris Billing & Marketing Team Event, Segovia 2016 - AltimaAntonio Priscan
 
Sap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minorsSap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minors
Cenk Ersoy
 
Cyber-attacks to SAP Systems
Cyber-attacks to SAP SystemsCyber-attacks to SAP Systems
Cyber-attacks to SAP Systems
Onapsis Inc.
 
Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP SystemsOnapsis Inc.
 
ProAppSys Software Company Overview Case studies and expertise.
ProAppSys Software Company Overview Case studies and expertise.ProAppSys Software Company Overview Case studies and expertise.
ProAppSys Software Company Overview Case studies and expertise.Pradeep Gudipati
 
01 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 200901 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 2009
altwirqi
 
01 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 200901 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 2009
cn prashanth
 
01 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 200901 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 2009Abdul Fauzan
 
Mobile pulse sept 2014
Mobile pulse sept 2014Mobile pulse sept 2014
Mobile pulse sept 2014
Bjørn Sloth
 
SAP TM Webinar 7th May 2014
SAP TM Webinar 7th May 2014SAP TM Webinar 7th May 2014
SAP TM Webinar 7th May 2014Wise Men
 

Similar to Highway to Production Securing the SAP TMS (20)

SAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeSAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crime
 
CRM Fundamentals-I
CRM Fundamentals-ICRM Fundamentals-I
CRM Fundamentals-I
 
Service provider call_example
Service provider call_exampleService provider call_example
Service provider call_example
 
Introduction to SAP Gateway and OData
Introduction to SAP Gateway and ODataIntroduction to SAP Gateway and OData
Introduction to SAP Gateway and OData
 
Introduction to OData and SAP NetWeaver Gateway.pptx
Introduction to OData and SAP NetWeaver Gateway.pptxIntroduction to OData and SAP NetWeaver Gateway.pptx
Introduction to OData and SAP NetWeaver Gateway.pptx
 
2009 06 worldtour_sme5_sap_fr
2009 06 worldtour_sme5_sap_fr2009 06 worldtour_sme5_sap_fr
2009 06 worldtour_sme5_sap_fr
 
sap introduction
sap introductionsap introduction
sap introduction
 
Sap
SapSap
Sap
 
SAP hybris Billing & Marketing Team Event, Segovia 2016 - Altima
SAP hybris Billing & Marketing Team Event, Segovia 2016 - AltimaSAP hybris Billing & Marketing Team Event, Segovia 2016 - Altima
SAP hybris Billing & Marketing Team Event, Segovia 2016 - Altima
 
Sap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minorsSap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minors
 
ImmixVegas
ImmixVegasImmixVegas
ImmixVegas
 
Cyber-attacks to SAP Systems
Cyber-attacks to SAP SystemsCyber-attacks to SAP Systems
Cyber-attacks to SAP Systems
 
ERP_Final
ERP_FinalERP_Final
ERP_Final
 
Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP Systems
 
ProAppSys Software Company Overview Case studies and expertise.
ProAppSys Software Company Overview Case studies and expertise.ProAppSys Software Company Overview Case studies and expertise.
ProAppSys Software Company Overview Case studies and expertise.
 
01 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 200901 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 2009
 
01 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 200901 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 2009
 
01 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 200901 intro erp using gbi 1.0, stefan weidner, nov 2009
01 intro erp using gbi 1.0, stefan weidner, nov 2009
 
Mobile pulse sept 2014
Mobile pulse sept 2014Mobile pulse sept 2014
Mobile pulse sept 2014
 
SAP TM Webinar 7th May 2014
SAP TM Webinar 7th May 2014SAP TM Webinar 7th May 2014
SAP TM Webinar 7th May 2014
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Highway to Production Securing the SAP TMS

  • 1. Highway to Production Securing the SAP TMS September 30th, 2014 ASUG Sergio Abraham sabraham@onapsis.com Pablo Muller pmuller@onapsis.com
  • 2. 2www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Disclaimer This publication is copyright 2014 Onapsis, Inc. – All rights reserved. This publication contains references to the products of SAP AG. SAP, R/3, xApps, xApp, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and services mentioned herein are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius and other Business Objects products and services mentioned herein are trademarks or registered trademarks of Business Objects in the United States and/or other countries. SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable for errors or omissions with respect to the materials. SAP TMS
  • 3. 3www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Who is Onapsis, Inc.?  Company focused in the security of ERP systems and business-critical infrastructure (SAP®, Siebel®, Oracle® E-Business SuiteTM, PeopleSoft®, JD Edwards® …).  Working with Global Fortune-100 and large governmental organizations.  What does Onapsis do?  Innovative ERP security software (Onapsis X1, Onapsis Bizploit, Onapsis IA).  ERP security consulting services.  Trainings on business-critical infrastructure security. Who are we?  Pablo Müller, SAP Security Specialist at Onapsis.  Sergio Abraham, SAP Security Researcher at Onapsis.  Discovered several vulnerabilities in SAP...  Speaker/Trainer at Ekoparty, Hubcon, SANS, ...  Collaborator in the “SAP Security In-Depth” publication. SAP TMS
  • 4. 4www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Agenda  Introduction  SAP TMS Concepts  System Change Option  TMS Users and Connections  Common Transport Directory  Transport Requests  TP tool  Controlling Transports to Production  PFCG tool  Authorizations  Conclusions SAP TMS
  • 5. 5www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Introduction Attacks on SAP TMS
  • 6. 6www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedAttacks on SAP TMS What is SAP? ● Largest provider of business management solutions in the world. ● More than 140.000 implementations around the globe. ● More than 90.000 customers in 120 countries. ● Used by Global Fortune-1000 companies, governmental organizations and defense agencies to run their every-day business processes. ● Such as Revenue / Production / Expenditure business cycles. SALES PRODUCTION FINANCIAL PLANNING INVOICING PROCUREMENT TREASURY LOGISTICS PAYROLL BILLING
  • 7. 7www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedAttacks on SAP TMS A Business-Critical Infrastructure ● ERP systems store and process the most critical business information in the Organization. ● If the SAP platform is breached, an intruder would be able to perform different attacks such as: ESPIONAGE: Obtain customers/vendors/human resources data, financial planning information, balances, profits, sales information, manufacturing recipes, etc. SABOTAGE: Paralyze the operation of the organization by shutting down the SAP system, disrupting interfaces with other systems and deleting critical information, etc. FRAUD: Modify financial information, tamper sales and purchase orders, create new vendors, modify vendor bank account numbers, etc.
  • 8. 8www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedSAP TMS An attacker will exploit our Achilles’ heel… • SAP systems are built upon several layers. • The SAP Application Layer (NetWeaver/BASIS) is common to most modern SAP solutions, serving as the base technological framework. Note: The Database and Operating System layers should not be forgotten! Traditional techniques apply. Warning: reduced accountability due to SAP’s using of single users (<sid>adm, SAPService<SID>, SAPR3,…) Operating System Database SAP Business Logic SAP Application Layer SAP Solution Base Infrastructure
  • 9. Over 95% of the SAP systems we evaluated were exposed to espionage, sabotage and fraud attacks due to vulnerabilities in the SAP Application Layer. Unlike SoD gaps, attackers do not need access credentials to exploit this kind of vulnerabilities…
  • 10. 10www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved SAP TMS SAP TMS
  • 11. 11www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved What is the SAP TMS? ● Set of tools, protocols and mechanisms engineered to manage and control any software customization or data changes made across SAP systems. ● Using the TMS to manage changes allows you to develop in one system (DEV) and test in another one (QA), before importing to production (PRD). The final goal is to manage/control changes on the database SAP TMS
  • 12. 12www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedTMS: Highway to PRD SAP TMS Infrastructure DEV QA PRD Transport Directory SAP TMS
  • 13. 13www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved SAP TMS “concepts” ● Transport Domain ● Transport Domain Controller ● Common Transport Directory ● Transport Group ● SAP System ● SAP System role TMS: Highway to PRD Transport Management System - http://help.sap.com/static/saphelp_nw70ehp1/en/c4/6045377b52253de10000009b38f889/Image1.gif The SAP System Landscape - http://help.sap.com/saphelp_nw04s/helpdata/en/de/6b0d84f34d11d3a6510000e835363f/content.htm SAP TMS
  • 14. 14www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved SAP TMS “concepts” (cont.) ● Transport Routes ● Transport RFC Destinations ● TMS standard users ● TMS System queues SAP TMS
  • 15. 15www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved TMS System Change Option SAP TMS
  • 16. 16www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Understand your landscape Before setting the client/system change option it is important to understand the landscape: ● Define the role for each system/client. ● Define transport routes. ● Select the domain controller. ● Configure the system and client change option. SAP TMS
  • 17. 17www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved System Change Option Global or System Options (Trx SE03/SE06) Per-client options (Trx SCC4) SAP TMS
  • 18. 18www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved TMS users and connections SAP TMS
  • 19. 19www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved SAP TMS RFC Connections ● After configuration, RFC connections are created connecting all the systems in the same transport domain (full-mesh). If the Transport Domain is configured with 3 systems, each system will have 6 “TMS” RFC Destinations. ● TMSSUP ABAP connection does not represent any potential risk as user credentials are required in order to use it. ● TMSADM ABAP (configured with the S_A.TMSADM profile) connections are configured with stored TMSADM credentials meaning that anyone (with the proper authorizations) can use it to execute remote-enabled function modules. ● CALLTP_<OS> starts the TP program in the application server. RFC Destination TMSADM@DOMAIN.SYSTEM TMSSUP@DOMAIN.SYSTEM CALLTP_<OS> SAP TMS
  • 20. 20www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved TMSADM authentication & authorizations The standard user TMSADM (system type) is by default configured with a “shared” password for all the Transport Domain. ● The new standard password is still a fixed password “$1Pa****” ● Choosing a non-standard password is the best option. Configured with a unique and standard profile S_A.TMSADM. No additional authorizations should be required Authorization objects S_DEVELOP S_DATASET, S_PATH S_RFC, S_RFC_ADM S_CTS_ADMI, S_TRANSPRT SAP TMS
  • 21. 21www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Live Demonstration SAP TMS
  • 22. 22www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved TMSADM authentication & authorizations The standard user TMSADM (system type) is by default configured with a “shared” password for all the Transport Domain. ● The new standard password is still a fixed password “$1Pa****” ● Choosing a non-standard password is the best option. Configured with a unique and standard profile S_A.TMSADM. No additional authorizations should be required Authorization objects S_DEVELOP S_DATASET, S_PATH S_RFC, S_RFC_ADM S_CTS_ADMI, S_TRANSPRT Protection / Countermeasure  Use a strong and non-standard password for the user TMSADM  Do not assign authorizations other than profile S_A.TMSADM, specially not SAP_ALL (we have seen this many times).  Apply all SAP Security Notes. Keep the systems up-to-date.  Implement SAP Security Notes 761637, 1414256, 1515926, 1657891, 1554030, 1488406, 1486759, 1445407, 1298160 and 1298160. Check the “References” slide for more information! SAP TMS
  • 23. 23www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Common Transport Directory SAP TMS
  • 24. 24www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved CTD Security configuration It’s a network location shared by all systems in the same transport group. This directory will hold the TR (transport requests). This directory is implemented as SMB or NFS exported shares. When implemented as NFS (most common) some configuration issues could arise: ● Exported to any IP address. ● Exported with insecure permissions (r/w, suid). ● Exported along with configuration and binary files. ● Implemented on the least secure system (usually DEV) ƒS Protection / Countermeasure  Configure the Common Transport Directory in a secure way.  Restrict access to only the Application Servers of the SAP Systems on the same transport group.  Use a secure system to hold the Common Transport Directory.  Implement SAP Security Notes 1330776 and 633814.  Secure every SAP system as the productive systems. Check the “References” slide for more information! SAP TMS
  • 25. 25www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Transport Requests SAP TMS
  • 26. 26www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved TMS Transport requests The transport request is the unit of data that is moved between SAP systems. All transport requests are stored in the CTD in two files, the “data” file and the “cofile” file. The default location is: The cofile keeps an “activity log” of the Transport Request. Default Location /usr/sap/trans/data/RXXXXXX.SYS R900050.DEV /usr/sap/trans/cofiles/KXXXXXX.SYS K900050.DEV ZONAPSIS K EQ6 3 1 2 0 0 0 0 0 0 3 731 . 0 0 0 0 0 000 #•A #/1/ A G D - R C T - Z RELE EX. _ _ _ _ _ CLI ER6 f 0000 20130511133715 labsapsrv030 er6adm ER6 e 0000 20130511133717 labsapsrv030 er6adm EQ6 < 0000 20130511133723 labsapsrv030 er6adm ER6 E 0000 20130511133723 labsapsrv030 er6adm EQ6 H 0004 20130511133819 labsapsrv019 eq6adm EQ6 A 0004 20130511134836 labsapsrv019 eq6adm SAP TMS
  • 27. 27www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Data File An example Transport request analyzed. The header is an ascii-based portion while the rest is binary. 00000000 00 00 00 33 |...3 T0005020623| 00000010 |20130511163723er| 00000020 |6adm 731 ..| 00000030 00 00 06 d6 7c 9d 0c 23 00 40 00 00 12 |..L....|..#.@...| 00000040 1f 9d 02 bb 5c ab 5b 52 db 86 c2 ea 4d af 3a 9d |.....[R....M.:.| 00000050 b6 37 9d de e9 2a 49 99 65 23 ff ac 61 e9 a4 33 |.7...*I.e#..a..3| 00000060 06 cb e0 f5 0f c4 16 84 e5 66 87 ec d2 0d 33 89 |.........f....3.| 00000070 e9 2c 6c 9b f4 91 fa 00 7d 86 3e 53 af 7a 6c 7e |.,l.....}.>S.zl~| 00000080 16 cb 18 0c d1 7a 5a f6 68 bc c1 46 9f f4 71 2c |.....zZ.h..F..q,| 00000090 9d ef 48 0a 42 a8 84 4b be 32 bb 1b 86 53 fc db |..H.B..K.2...S..| 000000a0 e8 6e 3a 9e 84 35 ac 48 a7 12 39 95 64 5c c6 32 |.n:..5.H..9.d.2| 000000b0 a9 49 72 8d 68 08 a1 77 b8 14 4c ee ef ae 47 38 |.Ir.h..w..L...G8| 000000c0 f8 34 9d 8d 3e e0 57 58 77 8d 97 56 38 1b bd c7 |.4..>.WXw..V8...| 000000d0 1f ab da 95 a6 e2 df c7 b3 77 d8 19 87 f7 1f f1 |.........w......| 000000e0 24 c4 46 dd 0d a2 5a 86 5e d7 03 6c e0 72 b9 0c |$.F...Z.^..l.r..| Date and time, user and version SAP TMS
  • 28. 28www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Data File After the header, there are blocks of compressed data of variable length. 00000000 20 54 30 30 30 35 30 32 30 36 32 33 |...3 T0005020623| 00000010 32 30 31 33 30 35 31 31 31 36 33 37 32 33 65 72 |20130511163723er| 00000020 36 61 64 6d 20 20 20 20 20 20 37 33 31 20 00 00 |6adm 731 ..| 00000030 10 01 4c |..L....|..#.@...| 00000040 bb 5c ab 5b 52 db 86 c2 ea 4d af 3a 9d |.....[R....M.:.| 00000050 b6 37 9d de e9 2a 49 99 65 23 ff ac 61 e9 a4 33 |.7...*I.e#..a..3| 00000060 06 cb e0 f5 0f c4 16 84 e5 66 87 ec d2 0d 33 89 |.........f....3.| 00000070 e9 2c 6c 9b f4 91 fa 00 7d 86 3e 53 af 7a 6c 7e |.,l.....}.>S.zl~| 00000080 16 cb 18 0c d1 7a 5a f6 68 bc c1 46 9f f4 71 2c |.....zZ.h..F..q,| 00000090 9d ef 48 0a 42 a8 84 4b be 32 bb 1b 86 53 fc db |..H.B..K.2...S..| 000000a0 e8 6e 3a 9e 84 35 ac 48 a7 12 39 95 64 5c c6 32 |.n:..5.H..9.d.2| 000000b0 a9 49 72 8d 68 08 a1 77 b8 14 4c ee ef ae 47 38 |.Ir.h..w..L...G8| 000000c0 f8 34 9d 8d 3e e0 57 58 77 8d 97 56 38 1b bd c7 |.4..>.WXw..V8...| 000000d0 1f ab da 95 a6 e2 df c7 b3 77 d8 19 87 f7 1f f1 |.........w......| 000000e0 24 c4 46 dd 0d a2 5a 86 5e d7 03 6c e0 72 b9 0c |$.F...Z.^..l.r..| 00 00 06 d6 7c 9d 0c 23 00 40 00 00 12 1f 9d 02 SAP TMS
  • 29. 29www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Data File ● Similar compression algorithms are used on other SAP components. ● Once decompressed, the protocol is purely text, separated by blocks. The contents can be retrieved and modified ( need re-calculation of the CRC32 checksums). 00 00 00 2a 20 2a 52 33 74 72 61 6e 73 20 76 65 ......R3trans.ve 72 73 69 6f 6e 3a 20 33 31 2e 31 30 2e 31 32 20 rsion..31.10.12. 2d 20 32 30 3a 31 32 3a 30 36 00 00 00 68 20 2a ..20.12.06...h.. 53 6f 75 72 63 65 20 53 79 73 74 65 6d 20 3d 20 Source.System... 41 4d 44 2f 49 6e 74 65 6c 20 78 38 36 5f 36 34 AMD.Intel.x86.64 20 77 69 74 68 20 4c 69 6e 75 78 20 6f 6e 20 44 .with.Linux.on.D 42 4d 53 20 3d 20 41 44 41 42 41 53 20 44 20 2d BMS...ADABAS.D.. 2d 2d 20 44 42 4e 41 4d 45 20 3d 20 27 27 20 2d ...DBNAME....... 2d 2d 20 53 59 53 54 45 4d 20 3d 20 27 45 52 36 ...SYSTEM....ER6 27 2e 00 00 00 41 20 2a 6c 61 6e 67 75 61 67 65 .....A..language 73 3a 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e s.ABCDEFGHIJKLMN 4f 50 51 52 53 54 55 56 57 58 59 5a 30 31 32 33 OPQRSTUVWXYZ0123 34 35 36 37 38 39 61 62 63 64 69 28 29 2c 2e 2f 456789abcdi..... 3a 3b 26 00 00 00 7a 20 2a 69 73 6f 2d 6c 61 6e ......z..iso.lan 67 75 61 67 65 73 3a 49 53 4f 2d 41 52 48 45 43 guages.ISO.ARHEC 53 44 45 45 4e 46 52 45 4c 48 55 49 54 4a 41 44 SDEENFRELHUITJAD 41 50 4c 5a 46 4e 4c 4e 4f 50 54 53 4b 52 55 45 APLZFNLNOPTSKRUE …………… SAP TMS
  • 30. 30www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Dissecting Transport Requests ● The transport requests can be parsed and opened using compression algorithms. ● If unauthorized access to the data files is achieved, then all the information hosted on those files can be accessed and modified. ● Furthermore, “evil” transports can be specifically generated and later transported into the target systems containing: ● New users. ● Backdoor functionality ● Any piece of information on any table. TMS: Highway to PRDSAP TMS
  • 31. 31www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Live Demonstration SAP TMS
  • 32. 32www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Dissecting Transport Requests ● The transport requests can be parsed and opened using compression algorithms. ● If unauthorized access to the data files is achieved, then all the information hosted on those files can be accessed and even modified. ● Furthermore, “evil” transports can be specifically generated and later transported into the target systems containing: ● New users. ● Backdoor functionality ● Any piece of information on any table. Protection / Countermeasure  Analyze all transport requests before being imported into PRD systems.  Secure ALL the TMS infrastructure including Users, RFC communications and CTD location.  Check the “References” slide for more information! SAP TMS
  • 33. 33www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved TP tool SAP TMS
  • 34. 34www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved TMS TP tool The main OS tool used by the TMS is called “TP”. This binary can be used by command line and can be called remotely through the gateway (External “STARTED” Server). If the SAP Gateway ACL’s are not secured (it is secure by default only in the latest Netweaver versions)  Any transport could be uploaded and imported remotely into production without restrictions. Check Bjoern Brencher’s presentation: “SAP runs SAP: RFC Gateway Hacking and Defense” covering attacks and mitigation of SAP gateway (References - #2) SAP TMS
  • 35. 35www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedTMS: Highway to PRD TP program regular usage RCF Call SAP GW SAP Application Server TP The SAP Application Server uses the TP program by calling it at the OS level and using the “sidadm” connection to the database. SAP R/3 SAP DB CALLTP_<os> SAP TMS
  • 36. 36www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedTMS: Highway to PRD Calling TP through SAP Gateway RCF Call SAP GW SAP Application Server An attacker could connect to the gateway starting the TP program remotely, also using the “sidadm” connection to the database. SAP R/3 SAP DB TP SAP TMS
  • 37. 37www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved TMS TP tool The main tool related to the TMS is the “TP”. This binary was developed to be used by command line and it can also be called remotely through the gateway (External “STARTED” Server). If the SAP Gateway ACL’s are not secured (it is secure by default in the latest versions, but it is usually found miss-configured) Any transport could be uploaded and imported remotely into production without restrictions. (Test can be triggered using SE37 and RFC FM TRINT_TP_INTERFACE) Check Bjoern Brencher’s presentation: “SAP runs SAP: RFC Gateway Hacking and Defense” covering attacks and mitigation of SAP gateway TMS: Highway to PRD Protection / Countermeasure  Secure the SAP Gateway, only allowing authorized systems to start external servers, specifically the TP server.  Implement SAP Security Note 1371799 to restrict execution of TP through the SAP Gateway.  Check the “References” slide for more information! SAP TMS
  • 38. 38www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedTMS: Highway to PRD Controlling Transports to PRD SAP TMS
  • 39. 39www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Quality Assurance Before any transport is imported into Production, changes must be properly validated, tested and approved. SAP has two options to enforce the approval process: • QA Approval Procedure: • System Admin • User Dept. • Request Owner • Workflow Engine: • Complex Tool -> Specific knowledge required • WS71000008 is a template for transport approval workflow. • Transports approvals are sent directly to the user SAP Business Workplace. Protection / Countermeasure  Set an approval workflow for the transports involving the proper users.  Enforce code validation by independent reviewer following the BIZEC APP1 standard.  Define a transport schedule according to business requirements and change types (programs, customizing or security) that allows adequate time for review. Check the “References” slide for more information! SAP TMS
  • 40. 40www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved PFCG tool SAP TMS
  • 41. 41www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved PFCG tool • Transaction to create/maintain roles and assign authorizations. • Changes are possible regardless the Client Option settings (Table T000). • Only display access in Production systems must be assigned. • Apply changes directly in Production only in emergencies using Firefighter users, or other emergency process. Protection / Countermeasure  Restrict access to PFCG in Production system.  On regular basis, perform reviews to ensure that PFCG is not assigned in Production and that is properly assigned in Development.  Implement a procedure for emergencies related to user access. SAP TMS
  • 42. 42www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Authorizations SAP TMS
  • 43. 43www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Authorizations for TMS There are different tasks related to the Transport Management System that should be segregated: • TMS and System/Client Configuration. • Transport Creation. • Transport Release. • Transport Import. Protection / Countermeasure  Define which user group should perform each of the tasks  Assign the accesses according to the responsibilities to avoid segregation of duties conflicts.  Users with access to perform the actual changes to the system must not have access to configure the TMS, and to release or import transports.  Perform regular reviews to ensure that users have the proper access. SAP TMS
  • 44. 44www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Conclusions SAP TMS
  • 45. 45www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Conclusions  If the SAP Transport Management System is not protected, an attacker can create/modify malicious transports bypassing the Change Control/Management mechanisms.  These transports could have dramatic impact if deployed to Production (espionage, sabotage, fraud).  Use non-standard credentials for the TMSADM user and do not assign extra authorizations.  Place the Common Transport Directory in a secure location and properly configured.  Secure all the systems as ANY other Productive System  Update the systems!!!. Use the latest versions of all SAP solutions and components. Apply all relevant SAP Security Notes. SAP TMS
  • 46. 46www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 1. CTS Security Guide http://help.sap.com/saphelp_nw70ehp3/helpdata/en/ec/b3b638faa32d19e10000009b38f8cf/content.htm 2. SAP runs SAP: RFC Gateway Hacking and Defense by Bjoern Brencher http://www.sapvirtualevents.com/teched/sessiondetails.aspx?sId=3399 3. Additional Information about Gateway and RFC security - Secure Configuration SAP NetWeaver Application Server ABAP” https://websmp109.sap-ag.de/~sapdownload/011000358700000968282010E/SAP-Sec- Rec.pdf 4. Best Practice - How to analyze and secure RFC connections http://wiki.sdn.sap.com/wiki/display/Security/Best+Practice+- +How+to+analyze+and+secure+RFC+connections 5. Security Settings in the SAP Gateway http://help.sap.com/saphelp_nw73ehp1/helpdata/en/48/b2096e7895307be10000000a42189b/frameset.htm 6. Securing RFC Connections http://scn.sap.com/docs/DOC-17089 7. Onapsis X1 http://www.onapsis.com/x1 References SAP TMS
  • 47. 47www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved Questions? Follow us! @onapsis TMS: Highway to PRD sabraham@onapsis.com pmuller@onapsis.com SAP TMS
  • 48. 48www.onapsis.com – © 2014 Onapsis , Inc. – All rights reservedTMS: Highway to PRD Thank you! SAP TMS