SlideShare a Scribd company logo
1 of 46
Download to read offline
PeopleSoft Cyber Security
Neville Varnham
How Well Prepared Are You?
Some sobering thoughts…
So You Think You Are Safe?
The Cerber affiliate
scheme allows
anyone to become a
cyber extortionist -
for a price. A
ransomware-as-a-
service scheme is
enabling even the
most technically illiterate cyber criminal to extort payments
from victims infected with data-encrypting malware -- with
the developers of the service taking a significant chunk of
the ill-gotten gains. GoldenEye, Petya & Locky are similar.
I Use Passwords – I Am Safe!
 I can download, install and configure the hashcat “password
recovery” (aka cracking) software and add a decent set of word
lists in about 10 – 15 minutes.
 All I need next is an idea of what encryption algorithm has been
used:
 DES – encrypted passwords have no ID (e.g. {V1.1})
 3DES – encrypted passwords start with {V1.1}
 3DES – after key regeneration, V1.2, V1.3 etc
 AES - encrypted passwords start with {AES}
 Assume 1 billion password guesses per second in a brute force
attack
 6 char alpha-numeric password has 56.8 billion combinations –
cracked in under a minute!
 12 char alpha-numeric password will take > 100,000 years
 Password crackers don’t just use brute force!
I Trust My Users
“An undergraduate at the University of Nebraska last year was able to break into a database
associated with the university's PeopleSoft system, exposing Social Security numbers and other
sensitive information on about 654,000 students, alumni and employees. According to our sister
website Dark Reading, the university was lucky enough to detect the breach and shut it down
quickly. An IT staffer picked up on an error message that seemed like evidence of something amiss,
and a recently installed security information and event management system helped network
managers sort through system logs and collect enough evidence to allow police to get a warrant to
confiscate the computer of the student believed to have been behind the attack.”
Security Breaches Cost: Money & Reputation
Selected Terminology
Terminology – Selected Terms Only
 HARDENING - Process of identifying and fixing vulnerabilities on a
system.
 THREAT - A potential for violation of security, which exists when there
is a circumstance, capability, action, or event that could breach security
and cause harm
 THREAT ASSESSMENT - The identification of types of threats that an
organization might be exposed to.
 THREAT MODEL- Used to describe a given threat and the harm it
could do to a system if it has a vulnerability
 THREAT VECTOR - Method a threat uses to get to the target.
 HASH FUNCTIONS - (Cryptographic) hash functions are used to
generate a one way "check sum" for a larger text, which is not trivially
reversed. Can be used to create encrypted passwords.
 CPU – Critical Patch Update – set of security patches issues regularly
by Oracle http://www.oracle.com/us/support/assurance/leveraging-cpu-
wp-164638.pdf
Terminology – More Selected Terms
 Intrusion Detection System (IDS) - Network device or program that
monitors network traffic and logs/reports suspicious network activity.
 An IDS is usually installed at the edge of an organization’s
networks. Network traffic coming from outside is examined for
malicious activity. The IDS may not only examine the contents of
the traffic, it can also look for traffic with a specific signature pattern
— a sequence of packets matching the profile of a known attack.
 An intrusion prevention system (IPS) goes one step farther, and
attempts to block suspicious traffic once it has detected it.
 GPU – Graphics Processing Unit. A massively parallel board with many
CPU cores designed to run very similar operations in parallel for
graphics acceleration – but very well suited to running brute force
password cracking attempts over and over again.
Terminology – Will He Never Finish?
 Phishing [Wikipedia] – Attempt to obtain sensitive information such as
usernames, passwords, and credit card details by disguising as a
trustworthy entity in an electronic communication. [NV] Wide target
audience and low success rate.
 Spear Phishing – Something Tom Hanks got good at in “Castaway”
 Spear Phishing – A carefully crafted phishing attack targeted at key
individuals, and purporting to be from an organisation or person “the
mark” would recognise and treat as genuine.
 The Mark - Term I learned from “Hustle” for the rich stupid loser who
will be considerably less rich at the end of the episode.
How This Presentation Works
Inform – Act – Resolve
I’ll present some key information and
thoughts
Look out for this symbol:
That topic will be included in the Cedar
Security Assessment
Oracle Critical Patch Updates
Critical Patch Updates - CPUs
What are they?
How do you get notifications?
How to ensure you can act on them.
How to understand them.
How to assess the impact.
How to decide what action to take.
Terminology Of The Oracle CPU
 CVE# (or Vuln# in older advisories) The unique identifier of a
vulnerability.
 Protocol - The protocol required to attempt to exploit the vulnerability.
 Remote Exploit Without Authentication? – Can the attacker attack
the system remotely without having to supply valid login credentials.
 CVSS Version Base Risk
 The CVSS Base Score, an assessment of risk defined by the
Common Vulnerability Scoring Standard (CVSS). The "Oracle's
Use of CVSS Scoring" page explains Oracle's implementation.
 The CVSS base score assigns a numeric value between 0.0 and
10.0 to indicate the severity of the vulnerability, where 10.0
represents the highest severity. Each risk matrix is ordered using
this value, with the most severe vulnerability at the top of each risk
matrix.
 Supported Versions Affected – Actually means what version of the
Product are Oracle releasing fixes on. Typically the latest version of
PeopleTools and the previous, for a period of time.
Understanding The Attack Vectors
 Knowing how the attacker will set about gaining
unauthorized access
 Consider in conjunction with vulnerabilities
 Consider in conjunction with your deployed
architecture
 Internet-facing systems are at considerably more
risk
 Never forget internal attackers
Data Encryption
Different Types Of Encryption Configuration
 Encrypt Data at rest – database encryption
 Encrypt Data in transit – use HTTPS
 Signed Certificates and their requests
 Configuring WebLogic
 Java keystore
 REN server configuration
Data Obfuscation
 Implement Data masking/obfuscation
 Ensure production data does not exist in non-prod
environments
 Have a data obfuscation tool
 Build data obfuscation into refresh procedures for
Dev & Test environments
Password Management
Password Management Policy
 Modify all administrative and super-user passwords
 Never use default or well-known passwords
 Implement an access and password management
policy
 Use a site-specific SALT value in the encryption of
PeopleSoft passwords
 Longest available length
 Auto-generation with the largest character set
 Rotation of passwords (i.e. change them
regularly!)
 Switch on all available password controls
 Store admin passwords in a repository
PeopleSoft Hardening
Harden Your PeopleSoft Configuration
 Security Basics
 Ensure all passwords in Web Server, Application Server
and Process Scheduler configuration files are encrypted
 Enable Application Server domain authentication so that
3-tier connections to Tuxedo are protected by a
password
 Internet-facing PeopleSoft
 Place a dedicated Web & Application server in a DMZ
 Protect the Web & App server via a Reverse Proxy
Server
 Again - Think carefully about creating a Public Access
user in the web profile – especially if PeopleSoft is
internet-facing
Harden Your PeopleSoft Infrastructure
 Harden all application tiers
 Follow Oracle’s advice for security hardening the
WebLogic installation
 If using HTTPS, consider disabling HTTP within
WebLogic
 Follow Oracle’s advice for security hardening the
Tuxedo installation
 If Web & App servers are on different machines,
use Tuxedo JOLT encryption
 Use minimally-privileged Operator IDs to start
Application Servers and Process Schedulers
Further Hardening Tasks
 In the Application server configuration file suppress
SQL error messages – they can provide attackers with
useful information
 Java keystore
 Change the delivered password of the Java
keystore
 When generating signed certificate requests, use a
different key password for each environment
Don’t Forget Secure PS_HOME
 Implement segregated PS_HOME, PS_APP_HOME
and PS_CUST_HOME with differentiated security
 Enforce segregation of duties and allow
configuration management and operations to
continue without full software installation and
patch privileges.
, sweet home
Miscellaneous Hardening Tasks
 Think carefully about creating a Public Access user in
the web profile – especially if PeopleSoft is internet-
facing
 Check that the Web Profile does not have a custom
property “auditPWD” which enables debug and control
settings
 Disable <CNTRL>-J to show environment information
as this may be useful to attackers
SSO
PeopleSoft SSO
 If multi-pillar, implement PeopleSoft SSO
 Integrated accounts and passwords means less to
remember and therefore fewer passwords written
on PostIt™ sticky notes!
 Users will appreciate the ease of use
Logging For Security
Make Sure You Know What Is Going On
 Switch on detailed Web Server and App Server logging
 Get as much detail as possible about user (or
hacker) login activity
 Create reports on the logs
 Better still, think BIG DATA, machine data
 Log files are rich in data but they are not particularly
readable and can grow enormously if detailed tracing
is enabled.
 Mine those rich sources of security information with
modern Big Data tools such as Splunk
 "Why Splunk?" Video
Auditing Enhances Security
 Enable PeopleSoft Auditing of key security-sensitive
information:
 PeopleTools > Security
 Administrative pages where admin accounts and
passwords are maintained
 PeopleTools 8.54 and beyond logs successful and
unsuccessful login attempts in the PSPTLOGINAUDIT
table
 Run regular reports on this table
Customising Securely
Follow Best Practice When Customising
 Make sure your customisations follow good security
practice and do not introduce weaknesses. As a
minimum:
 Every component should have appropriate row-level
security.
 Defend against SQL injection. All user-entered data that is
part of dynamic SQL must be isolated to a bind variable.
 All user-entered HTML must be escaped.
 All hidden page fields should have the Modifiable by
HTML flag deselected with the exception of those that are
used to control the user interface.
 All user-entered file names should not contain complete or
relative paths. (Keep paths and file names distinct)
Adding Layers Of Security
Third-Party Security Products
 Consider third-party technology enhancement solutions
 Distributed Access Management
 Why is x logging in at 2am?
 Why is x logging in from a remote location
 Two-Factor/Step-Up Authentication
 Additional base password controls
 Firewall technology
Layered Security for PeopleSoft
Building Security Into Processes
Security Profiles And Their Management
Review security profiles
Minimum permissions only
Segregation Of Duties (SOD)
On-boarding and off-boarding processes
Cedar Security Solutions
So What’s To Be Done?
 Remember Perato – You could probably reduce or
eliminate 80% of your threat exposure by taking just
20% of all the possible actions.
 What is the garden peas link?
 In 1896 economist Vilfredo Pareto observed that 20% of his
garden peapods contained 80% of the peas and that 80% of
Italy was owned by 20% of the population
Implement Defence In Depth Security
Like a castle, data needs multiple rings of defence
Procurement
HR
Financials
End Users
Application
Administrators
Application
Security
Administrators
DBAs & Sys
Admins
“Hackers”
Taking The First Step
 Short, highly targeted security
assessment
 Covers the 80% of vulnerabilities
 Delivers an assessment report with
recommended actions and
estimated remedial effort
Cedar Security Assessment
The Cedar Security Assessment – Recap of
Coverage
 Degree of PeopleSoft Hardening
 Password Controls
 CPU level and current exposure
 Architecture
 Processes
The Cedar Security Assessment - Requirements
 Administrator access to the system
 PeopleSoft server access
 (Visibility of passwords)
 (Exact current versions of PeopleTools and
supporting technologies)
ools and
The Cedar Security Assessment – Duration &
Deliverables
 2-Day audit and assessment
 Remediation report listing remediation actions and
estimated effort to complete:
 Password Management
 Hardness of PeopleSoft configuration
 Encryption
 Security patching, CPUs and recommended CPU
actions
13. Neville Varnham - PeopleSoft Cyber Security

More Related Content

What's hot

Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
Sophisticated Attacks vs. Advanced Persistent Security
Sophisticated Attacks vs. Advanced Persistent SecuritySophisticated Attacks vs. Advanced Persistent Security
Sophisticated Attacks vs. Advanced Persistent SecurityPriyanka Aash
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Realityamiable_indian
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...wajug
 
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the HaystackAdvanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the HaystackEMC
 
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudFuture Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudSedthakit Prasanphanich
 
Webscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumWebscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumPhilippe Bogaerts
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data BreachKunal Sharma
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondJim Fenton
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam NotesVijayanand Yadla
 
Internal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guideInternal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guideDarin Fredde
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Needamiable_indian
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 

What's hot (20)

Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
Sophisticated Attacks vs. Advanced Persistent Security
Sophisticated Attacks vs. Advanced Persistent SecuritySophisticated Attacks vs. Advanced Persistent Security
Sophisticated Attacks vs. Advanced Persistent Security
 
RSA Anatomy of an Attack
RSA Anatomy of an AttackRSA Anatomy of an Attack
RSA Anatomy of an Attack
 
Chapter 2 program-security
Chapter 2 program-securityChapter 2 program-security
Chapter 2 program-security
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Reality
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the HaystackAdvanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
 
Ch03 Protecting Systems
Ch03 Protecting SystemsCh03 Protecting Systems
Ch03 Protecting Systems
 
Wm4
Wm4Wm4
Wm4
 
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudFuture Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloud
 
Webscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumWebscarab demo @ OWASP Belgium
Webscarab demo @ OWASP Belgium
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Cyber tooth
Cyber toothCyber tooth
Cyber tooth
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
 
Internal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guideInternal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guide
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 

Similar to 13. Neville Varnham - PeopleSoft Cyber Security

Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxkarthikvcyber
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingRaghav Bisht
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network securitySreerag Gopinath
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelEoin Keary
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)Wail Hassan
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practicesphanleson
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxFernandoVizer
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladiumNed Hayes
 

Similar to 13. Neville Varnham - PeopleSoft Cyber Security (20)

Windows network security
Windows network securityWindows network security
Windows network security
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat Model
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Pentesting with linux
Pentesting with linuxPentesting with linux
Pentesting with linux
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Ch11
Ch11Ch11
Ch11
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladium
 

More from Cedar Consulting

Cedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahonCedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahonCedar Consulting
 
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin GavaghanCedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin GavaghanCedar Consulting
 
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah HurleyCedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah HurleyCedar Consulting
 
Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah Hurley
Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah HurleyCedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah Hurley
Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah HurleyCedar Consulting
 
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex LightstoneCedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex LightstoneCedar Consulting
 
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell LakinCedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell LakinCedar Consulting
 
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...Cedar Consulting
 
Cedar Day 2018 - Avoid Top Payroll Errors
Cedar Day 2018 -  Avoid Top Payroll ErrorsCedar Day 2018 -  Avoid Top Payroll Errors
Cedar Day 2018 - Avoid Top Payroll ErrorsCedar Consulting
 
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR AnalyticsCedar Consulting
 
17. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 201717. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 2017Cedar Consulting
 
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.216. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2Cedar Consulting
 
15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group Story15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group StoryCedar Consulting
 
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot GridsCedar Consulting
 
11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UK11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UKCedar Consulting
 
10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to Payroll10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to PayrollCedar Consulting
 
9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto Billing9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto BillingCedar Consulting
 
8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation Impact8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation ImpactCedar Consulting
 
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment StrategyCedar Consulting
 
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...Cedar Consulting
 
6. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 20176. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 2017Cedar Consulting
 

More from Cedar Consulting (20)

Cedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahonCedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahon
 
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin GavaghanCedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
 
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah HurleyCedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
 
Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah Hurley
Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah HurleyCedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah Hurley
Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah Hurley
 
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex LightstoneCedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
 
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell LakinCedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
 
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
 
Cedar Day 2018 - Avoid Top Payroll Errors
Cedar Day 2018 -  Avoid Top Payroll ErrorsCedar Day 2018 -  Avoid Top Payroll Errors
Cedar Day 2018 - Avoid Top Payroll Errors
 
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
 
17. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 201717. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 2017
 
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.216. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2
 
15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group Story15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group Story
 
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
 
11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UK11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UK
 
10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to Payroll10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to Payroll
 
9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto Billing9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto Billing
 
8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation Impact8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation Impact
 
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
 
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
 
6. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 20176. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 2017
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

13. Neville Varnham - PeopleSoft Cyber Security

  • 1. PeopleSoft Cyber Security Neville Varnham How Well Prepared Are You?
  • 3. So You Think You Are Safe? The Cerber affiliate scheme allows anyone to become a cyber extortionist - for a price. A ransomware-as-a- service scheme is enabling even the most technically illiterate cyber criminal to extort payments from victims infected with data-encrypting malware -- with the developers of the service taking a significant chunk of the ill-gotten gains. GoldenEye, Petya & Locky are similar.
  • 4. I Use Passwords – I Am Safe!  I can download, install and configure the hashcat “password recovery” (aka cracking) software and add a decent set of word lists in about 10 – 15 minutes.  All I need next is an idea of what encryption algorithm has been used:  DES – encrypted passwords have no ID (e.g. {V1.1})  3DES – encrypted passwords start with {V1.1}  3DES – after key regeneration, V1.2, V1.3 etc  AES - encrypted passwords start with {AES}  Assume 1 billion password guesses per second in a brute force attack  6 char alpha-numeric password has 56.8 billion combinations – cracked in under a minute!  12 char alpha-numeric password will take > 100,000 years  Password crackers don’t just use brute force!
  • 5. I Trust My Users “An undergraduate at the University of Nebraska last year was able to break into a database associated with the university's PeopleSoft system, exposing Social Security numbers and other sensitive information on about 654,000 students, alumni and employees. According to our sister website Dark Reading, the university was lucky enough to detect the breach and shut it down quickly. An IT staffer picked up on an error message that seemed like evidence of something amiss, and a recently installed security information and event management system helped network managers sort through system logs and collect enough evidence to allow police to get a warrant to confiscate the computer of the student believed to have been behind the attack.”
  • 6. Security Breaches Cost: Money & Reputation
  • 8. Terminology – Selected Terms Only  HARDENING - Process of identifying and fixing vulnerabilities on a system.  THREAT - A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm  THREAT ASSESSMENT - The identification of types of threats that an organization might be exposed to.  THREAT MODEL- Used to describe a given threat and the harm it could do to a system if it has a vulnerability  THREAT VECTOR - Method a threat uses to get to the target.  HASH FUNCTIONS - (Cryptographic) hash functions are used to generate a one way "check sum" for a larger text, which is not trivially reversed. Can be used to create encrypted passwords.  CPU – Critical Patch Update – set of security patches issues regularly by Oracle http://www.oracle.com/us/support/assurance/leveraging-cpu- wp-164638.pdf
  • 9. Terminology – More Selected Terms  Intrusion Detection System (IDS) - Network device or program that monitors network traffic and logs/reports suspicious network activity.  An IDS is usually installed at the edge of an organization’s networks. Network traffic coming from outside is examined for malicious activity. The IDS may not only examine the contents of the traffic, it can also look for traffic with a specific signature pattern — a sequence of packets matching the profile of a known attack.  An intrusion prevention system (IPS) goes one step farther, and attempts to block suspicious traffic once it has detected it.  GPU – Graphics Processing Unit. A massively parallel board with many CPU cores designed to run very similar operations in parallel for graphics acceleration – but very well suited to running brute force password cracking attempts over and over again.
  • 10. Terminology – Will He Never Finish?  Phishing [Wikipedia] – Attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity in an electronic communication. [NV] Wide target audience and low success rate.  Spear Phishing – Something Tom Hanks got good at in “Castaway”  Spear Phishing – A carefully crafted phishing attack targeted at key individuals, and purporting to be from an organisation or person “the mark” would recognise and treat as genuine.  The Mark - Term I learned from “Hustle” for the rich stupid loser who will be considerably less rich at the end of the episode.
  • 12. Inform – Act – Resolve I’ll present some key information and thoughts Look out for this symbol: That topic will be included in the Cedar Security Assessment
  • 14. Critical Patch Updates - CPUs What are they? How do you get notifications? How to ensure you can act on them. How to understand them. How to assess the impact. How to decide what action to take.
  • 15. Terminology Of The Oracle CPU  CVE# (or Vuln# in older advisories) The unique identifier of a vulnerability.  Protocol - The protocol required to attempt to exploit the vulnerability.  Remote Exploit Without Authentication? – Can the attacker attack the system remotely without having to supply valid login credentials.  CVSS Version Base Risk  The CVSS Base Score, an assessment of risk defined by the Common Vulnerability Scoring Standard (CVSS). The "Oracle's Use of CVSS Scoring" page explains Oracle's implementation.  The CVSS base score assigns a numeric value between 0.0 and 10.0 to indicate the severity of the vulnerability, where 10.0 represents the highest severity. Each risk matrix is ordered using this value, with the most severe vulnerability at the top of each risk matrix.  Supported Versions Affected – Actually means what version of the Product are Oracle releasing fixes on. Typically the latest version of PeopleTools and the previous, for a period of time.
  • 16. Understanding The Attack Vectors  Knowing how the attacker will set about gaining unauthorized access  Consider in conjunction with vulnerabilities  Consider in conjunction with your deployed architecture  Internet-facing systems are at considerably more risk  Never forget internal attackers
  • 18. Different Types Of Encryption Configuration  Encrypt Data at rest – database encryption  Encrypt Data in transit – use HTTPS  Signed Certificates and their requests  Configuring WebLogic  Java keystore  REN server configuration
  • 19. Data Obfuscation  Implement Data masking/obfuscation  Ensure production data does not exist in non-prod environments  Have a data obfuscation tool  Build data obfuscation into refresh procedures for Dev & Test environments
  • 21. Password Management Policy  Modify all administrative and super-user passwords  Never use default or well-known passwords  Implement an access and password management policy  Use a site-specific SALT value in the encryption of PeopleSoft passwords  Longest available length  Auto-generation with the largest character set  Rotation of passwords (i.e. change them regularly!)  Switch on all available password controls  Store admin passwords in a repository
  • 23. Harden Your PeopleSoft Configuration  Security Basics  Ensure all passwords in Web Server, Application Server and Process Scheduler configuration files are encrypted  Enable Application Server domain authentication so that 3-tier connections to Tuxedo are protected by a password  Internet-facing PeopleSoft  Place a dedicated Web & Application server in a DMZ  Protect the Web & App server via a Reverse Proxy Server  Again - Think carefully about creating a Public Access user in the web profile – especially if PeopleSoft is internet-facing
  • 24. Harden Your PeopleSoft Infrastructure  Harden all application tiers  Follow Oracle’s advice for security hardening the WebLogic installation  If using HTTPS, consider disabling HTTP within WebLogic  Follow Oracle’s advice for security hardening the Tuxedo installation  If Web & App servers are on different machines, use Tuxedo JOLT encryption  Use minimally-privileged Operator IDs to start Application Servers and Process Schedulers
  • 25. Further Hardening Tasks  In the Application server configuration file suppress SQL error messages – they can provide attackers with useful information  Java keystore  Change the delivered password of the Java keystore  When generating signed certificate requests, use a different key password for each environment
  • 26. Don’t Forget Secure PS_HOME  Implement segregated PS_HOME, PS_APP_HOME and PS_CUST_HOME with differentiated security  Enforce segregation of duties and allow configuration management and operations to continue without full software installation and patch privileges. , sweet home
  • 27. Miscellaneous Hardening Tasks  Think carefully about creating a Public Access user in the web profile – especially if PeopleSoft is internet- facing  Check that the Web Profile does not have a custom property “auditPWD” which enables debug and control settings  Disable <CNTRL>-J to show environment information as this may be useful to attackers
  • 28. SSO PeopleSoft SSO  If multi-pillar, implement PeopleSoft SSO  Integrated accounts and passwords means less to remember and therefore fewer passwords written on PostIt™ sticky notes!  Users will appreciate the ease of use
  • 30. Make Sure You Know What Is Going On  Switch on detailed Web Server and App Server logging  Get as much detail as possible about user (or hacker) login activity  Create reports on the logs  Better still, think BIG DATA, machine data  Log files are rich in data but they are not particularly readable and can grow enormously if detailed tracing is enabled.  Mine those rich sources of security information with modern Big Data tools such as Splunk  "Why Splunk?" Video
  • 31. Auditing Enhances Security  Enable PeopleSoft Auditing of key security-sensitive information:  PeopleTools > Security  Administrative pages where admin accounts and passwords are maintained  PeopleTools 8.54 and beyond logs successful and unsuccessful login attempts in the PSPTLOGINAUDIT table  Run regular reports on this table
  • 33. Follow Best Practice When Customising  Make sure your customisations follow good security practice and do not introduce weaknesses. As a minimum:  Every component should have appropriate row-level security.  Defend against SQL injection. All user-entered data that is part of dynamic SQL must be isolated to a bind variable.  All user-entered HTML must be escaped.  All hidden page fields should have the Modifiable by HTML flag deselected with the exception of those that are used to control the user interface.  All user-entered file names should not contain complete or relative paths. (Keep paths and file names distinct)
  • 34. Adding Layers Of Security
  • 35. Third-Party Security Products  Consider third-party technology enhancement solutions  Distributed Access Management  Why is x logging in at 2am?  Why is x logging in from a remote location  Two-Factor/Step-Up Authentication  Additional base password controls  Firewall technology
  • 36. Layered Security for PeopleSoft
  • 38. Security Profiles And Their Management Review security profiles Minimum permissions only Segregation Of Duties (SOD) On-boarding and off-boarding processes
  • 40. So What’s To Be Done?  Remember Perato – You could probably reduce or eliminate 80% of your threat exposure by taking just 20% of all the possible actions.  What is the garden peas link?  In 1896 economist Vilfredo Pareto observed that 20% of his garden peapods contained 80% of the peas and that 80% of Italy was owned by 20% of the population
  • 41. Implement Defence In Depth Security Like a castle, data needs multiple rings of defence Procurement HR Financials End Users Application Administrators Application Security Administrators DBAs & Sys Admins “Hackers”
  • 42. Taking The First Step  Short, highly targeted security assessment  Covers the 80% of vulnerabilities  Delivers an assessment report with recommended actions and estimated remedial effort Cedar Security Assessment
  • 43. The Cedar Security Assessment – Recap of Coverage  Degree of PeopleSoft Hardening  Password Controls  CPU level and current exposure  Architecture  Processes
  • 44. The Cedar Security Assessment - Requirements  Administrator access to the system  PeopleSoft server access  (Visibility of passwords)  (Exact current versions of PeopleTools and supporting technologies) ools and
  • 45. The Cedar Security Assessment – Duration & Deliverables  2-Day audit and assessment  Remediation report listing remediation actions and estimated effort to complete:  Password Management  Hardness of PeopleSoft configuration  Encryption  Security patching, CPUs and recommended CPU actions