release 11i workshops 30 minute release 11i security… keeping the bad guys away session leader...

26
Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San Ramon, CA Worthington, MA Los Angeles, CA St. Louis, MO Orlando, FL www.solutionbeacon.com TRAIL to TEXAS sm

Upload: lester-cain

Post on 04-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

Release 11i Workshops

30 Minute Release 11i Security… Keeping the Bad Guys Away

Session LeaderRandy Giefer, Solution Beacon

Release 11i WorkshopsSan Ramon, CA • Worthington, MA •

Los Angeles, CA • St. Louis, MO • Orlando, FLwww.solutionbeacon.com

TRAIL to TEXAS sm

Page 2: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.2

Agenda

Welcome Presenter Introduction Presentation Overview 30 Minute R11i Security Audience Survey Questions and Answers

Page 3: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.3

30 Minute Release 11i Security “Keeping The Bad People Away” Case StudiesCase Studies

Disgruntled employee posts names, SSN, Disgruntled employee posts names, SSN, birth dates of company executives on birth dates of company executives on websitewebsite

Ex-Employee Steals CRM and Financials Ex-Employee Steals CRM and Financials Data and Provides to CompetitorData and Provides to Competitor

Employee Sells Credit History DatabaseEmployee Sells Credit History Database Employee Manipulates Payroll DataEmployee Manipulates Payroll Data Employee Sells Email Addresses to Employee Sells Email Addresses to

SpammerSpammer

Page 4: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.4

30 Minute Release 11i Security “Keeping The Bad People Away” Q. What do all of these Case Studies have Q. What do all of these Case Studies have

in in common?common?

Disgruntled EmployeeDisgruntled Employee Ex-Employee Steals CRM and Financials Ex-Employee Steals CRM and Financials

DataData Employee Sells Credit History DatabaseEmployee Sells Credit History Database Employee Manipulates Payroll DataEmployee Manipulates Payroll Data Employee Sells Email Addresses to Employee Sells Email Addresses to

SpammerSpammer

A. A firewall didn’t help!!!A. A firewall didn’t help!!!

Page 5: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.5

What Is Security?

What do you think of when What do you think of when someone mentions “security”?someone mentions “security”? Physical SecurityPhysical Security

Three G’s (Guards, Gates, Gizmos)Three G’s (Guards, Gates, Gizmos) Technology Stack SecurityTechnology Stack Security

Network (e.g. Firewalls)Network (e.g. Firewalls) Server (e.g. Antivirus)Server (e.g. Antivirus) Database ( Auditing? )Database ( Auditing? ) Application ( ? )Application ( ? )

Page 6: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.6

What Is Security?

Network / Perimeter SecurityNetwork / Perimeter Security FirewallsFirewalls Proxy ServersProxy Servers Encrypted TrafficEncrypted Traffic

Designed to keep the Designed to keep the external external bad people bad people outout

Who is keeping out the Who is keeping out the internalinternal bad people? bad people?

Page 7: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.7

Today’s Message

Internal Threats Are Real Internal Threats Are Real !!!!!!

Page 8: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.8

Fact: Internal Threats Are Real

Despite most people's fears that hackers will break into the company and destroy data or steal critical information, more often than not, security breaches come from the inside.

Page 9: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.9

Fact: Internal Threats Are Real

Gartner estimates that more than Gartner estimates that more than 70% of unauthorized access to 70% of unauthorized access to information systems is committed by information systems is committed by employees, as are more than 95% of employees, as are more than 95% of intrusions that result in significant intrusions that result in significant financial losses ... financial losses ...

The FBI is also seeing rampant insider The FBI is also seeing rampant insider hacking, which accounts for 60% to hacking, which accounts for 60% to 80% of corporate computer crimes. 80% of corporate computer crimes.

Page 10: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.10

Fact: It may Happen To You

Through 2005, 20 Percent of Through 2005, 20 Percent of Enterprises Will Experience a Serious Enterprises Will Experience a Serious Internet Security Incident – Gartner Internet Security Incident – Gartner

By 2005, 60 percent of security By 2005, 60 percent of security breach incident costs incurred by breach incident costs incurred by businesses will be financially or businesses will be financially or politically motivated – Gartner politically motivated – Gartner

Are you prepared?Are you prepared? Can you prevent becoming a Can you prevent becoming a

statistic?statistic?

Page 11: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.11

What Is Security?

Security is a PROCESS that occurs Security is a PROCESS that occurs (or doesn’t) at multiple levels.(or doesn’t) at multiple levels.

Security awareness at Security awareness at organizations varies due to:organizations varies due to: Organizational ToleranceOrganizational Tolerance Prior IncidentsPrior Incidents Business Core FunctionBusiness Core Function

Page 12: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.12

Security Is A Process

““Process” means it occurs more than Process” means it occurs more than once!once! Processes and ProceduresProcesses and Procedures Internal and External Checks and Internal and External Checks and

BalancesBalances Regular Assessments (Focus = Regular Assessments (Focus =

Improve)Improve) InternalInternal Third PartyThird Party

Audits (Focus = Identify Problems)Audits (Focus = Identify Problems)

Page 13: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.13

What Is Applications Security?In an Oracle Applications environment, it’s In an Oracle Applications environment, it’s

protection of information from:protection of information from:

Accidental Data LossAccidental Data Loss EmployeesEmployees Ex-EmployeesEx-Employees HackersHackers CompetitionCompetition

Page 14: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.14

Application Security

Part Technology, Mostly User Part Technology, Mostly User AccessAccess

User SecurityUser Security AuthenticationAuthentication Authorization Authorization Audit TrailAudit Trail

Page 15: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.15

Application Security

Audit Trail effectiveness is almost Audit Trail effectiveness is almost useless if you can’t ensure:useless if you can’t ensure: Individual accounts are usedIndividual accounts are used Individuals are who they say Individuals are who they say

they they areare

Page 16: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.16

What is 30 Minute R11i Applications Security?

Checklist to Easily Implement Two Checklist to Easily Implement Two Types/Categories of Security: Types/Categories of Security: User Account PoliciesUser Account Policies Profile OptionsProfile Options

Quick and Easy to ImplementQuick and Easy to Implement Low Investment / High Return ValueLow Investment / High Return Value ““Big Bang for the Buck”Big Bang for the Buck”

Page 17: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.17

Best Practice: No Shared Accounts

Difficult or Impossible to Properly AuditDifficult or Impossible to Properly Audit How Hard Is It To Guess A Username?How Hard Is It To Guess A Username? Release 11Release 11ii Feature to Disallow Feature to Disallow

Multiple Logins Under Same UsernameMultiple Logins Under Same Username Uses WF Event/Subscription to Update Uses WF Event/Subscription to Update

ICX_SESSIONS TableICX_SESSIONS Table 11.5.8 MP11.5.8 MP Patches 2319967, 2128669, WF 2.6 Patches 2319967, 2128669, WF 2.6

Page 18: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.18

Best Practice: No Generic Passwords

Stay Away From ‘welcome’!!!Stay Away From ‘welcome’!!! 11.5.10 Oracle User Management 11.5.10 Oracle User Management

(UMX)(UMX) UMX – User Registration FlowUMX – User Registration Flow

Select Random PasswordSelect Random Password Random Password GeneratorRandom Password Generator

Page 19: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.19

11.5.10 Oracle User Management (UMX)

UMX leverages workflow to implement business UMX leverages workflow to implement business logic around the registration process. logic around the registration process.

Raising business events Raising business events Provide temporary storage of registration data Provide temporary storage of registration data Identity verification Identity verification Username policies Username policies Include the integration point with Oracle Include the integration point with Oracle

Approval Management Approval Management Create user accounts Create user accounts Release usernames Release usernames Assign Access Roles Assign Access Roles Maintain registration status in the UMX schema Maintain registration status in the UMX schema Launch notification workflowsLaunch notification workflows

Page 20: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.20

Profile: Signon Password Length

Signon Password Length sets the Signon Password Length sets the minimum length of an Oracle minimum length of an Oracle Applications password value. Applications password value.

Default Value = 5 charactersDefault Value = 5 characters Recommendation: At least 7 Recommendation: At least 7

characterscharacters

Page 21: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.21

Profile: Signon Password Hard to Guess The Signon Password Hard to Guess profile option sets The Signon Password Hard to Guess profile option sets

internal rules for verifying passwords to ensure that they internal rules for verifying passwords to ensure that they will be "hard to guess." will be "hard to guess."

Oracle defines a password as hard-to-guess if it follows Oracle defines a password as hard-to-guess if it follows these rules:these rules:

The password contains at least one letter and at least The password contains at least one letter and at least one number.one number.

The password does not contain repeating characters.The password does not contain repeating characters. The password does not contain the username.The password does not contain the username.

Default Value = NoDefault Value = No Recommendation = YesRecommendation = Yes

Page 22: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.22

Profile: Signon Password No Reuse

This profile option is set to the This profile option is set to the number of days that must pass number of days that must pass before a user is allowed to reuse a before a user is allowed to reuse a passwordpassword

Default Value = 0 daysDefault Value = 0 days Recommendation = 180 days or Recommendation = 180 days or

greatergreater

Page 23: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.23

Profile: Signon Password Failure Limit

Default Value = 0 attemptsDefault Value = 0 attempts Recommendation = 3Recommendation = 3 By default, there is no lockout after failed login By default, there is no lockout after failed login

attempts. This is just asking to be hacked!attempts. This is just asking to be hacked! Additional Notes:Additional Notes:

Implement an alert (periodic), custom workflow or Implement an alert (periodic), custom workflow or report to notify security administrators of a lockoutreport to notify security administrators of a lockout

FND_UNSUCCESSFUL_LOGINSFND_UNSUCCESSFUL_LOGINS 11.5.10 will raise a security exception workflow11.5.10 will raise a security exception workflow

Page 24: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.24

Profile: ICX:Session Timeout

This profile option determines the length of time This profile option determines the length of time (in minutes) of inactivity in a user's form session (in minutes) of inactivity in a user's form session before the session is before the session is disableddisabled. Note that . Note that disabled does not mean terminated or killed. disabled does not mean terminated or killed. The user is provided the opportunity to re-The user is provided the opportunity to re-authenticate and re-enable their timed-out authenticate and re-enable their timed-out session. If the re-authentication is successful, session. If the re-authentication is successful, the disabled session is re-enabled and no work the disabled session is re-enabled and no work is lost. Otherwise, the session is terminated is lost. Otherwise, the session is terminated without saving pending work. without saving pending work.

Page 25: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.25

Profile: ICX:Session Timeout (cont.)

Default value = none Default value = none Recommendation = 30 (minutes)Recommendation = 30 (minutes) Also set Also set session.timeoutsession.timeout in in

zone.propertieszone.properties Available via Patch 2012308Available via Patch 2012308

(Included in 11.5.7, FND.E)(Included in 11.5.7, FND.E)

Page 26: Release 11i Workshops 30 Minute Release 11i Security… Keeping the Bad Guys Away Session Leader Randy Giefer, Solution Beacon Release 11i Workshops San

© 2005 Solution Beacon, LLC. All Rights Reserved.26

Wrap Up

Remember: The Internal Threat Is Remember: The Internal Threat Is RealReal

Thanks to OAUG and to NorCal Thanks to OAUG and to NorCal OAUGOAUG

Thank Thank youyou for attending! for attending!Randy [email protected]