Top Banner
Copyright Authshield Labs Pvt.Ltd 2015 FOR FOR Whitepaper By Authshield Labs Pvt Ltd
20

Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Aug 02, 2015

Download

Technology

AuthShield Labs
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

FOR FOR

Whitepaper By Authshield Labs Pvt Ltd

Page 2: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

A

Table of Contents

1. Overview

2. Threats to account passwords

2.1 Social Engineering or Password Sharing

2.2 Reuse Logins

2.3 Identity thefts – Phishing

2.4 Virus, worms, Trojans

3. Protecting Mail Accounts

3.1 Two Factor Authentication: Why do you need it?

3.1.1Hard Token

3.1.2 Soft Token

3.1.3 Mobile Token

3.2 Integration Architecture for AuthShield with web

access to a Mail exchange server

3.3 Integration Architecture for AuthShield with Microsoft

Outlook

4. Features

5. Advantages of using AuthShield

6. About Us

Page 3: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

1

OVERVIEW SAP, an acronym for Systems, Applications and Products is a

German software company and one of the world’s largest ERP

solution providers. SAP ERP is used across thousands of

different industries all over the planet. 70% of the companies on

the Forbes 500 list run on an ERP that is provided by SAP

The ERP delivers a comprehensive set of integrated, cross-

functional business processes. A large number of companies

today use SAP ERP to improve productivity and insight,

alignment of strategies and operations, reduce costs and

support changing industry requirements.

With the rapid growing importance of SAP in an organization

daily work processes, it has become one of the most critical

targets for an attacker trying to harm the organization. With

organizations moving away from the security of a private

network to the cloud, new threats are constantly emerging and

evolving online.

Hundreds of organizations around the world are running

unpatched, Internet-facing versions of SAP software, exposing

them to data theft. SAP exploits are part of a thriving

underground trade, particularly as organizations in Asian

countries are exposing their systems with new SAP

deployments.

1

Page 4: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

2

OVERVIEW Access to ERP provides immediate access to complete

enterprise information as SAP databases are usually shared by

several functions in different functional units participating in the

same business process. Access to SAP may lead to leakage of

HR or financial data, corporate secrets or in certain cases even

SCADA systems.

Most of the SAP breaches are caused due to a single factor of

authentication which users use to log into SAP. As per a recent

report released in a security conference in 2013, 22% of SAP

vulnerabilities arise from Missing authorization check. In such an

environment it has become critical to secure SAP’s with Two

Factor Authentication.

1

Page 5: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

3

THREATS TO ACCOUNT PASSWORDS

2.1 Social Engineering or Password Sharing

Most people end up sharing their passwords with their friends or

colleagues. The act may be deliberate or accidental. But the fact

remains that a user seldom even remembers the number of

people the account details may have been shared with. At the

same time, passwords are not changed at frequent interval, giving

an outsider unlimited access to an account. Occasionally, users

also fall prey to common social engineering techniques and end

up revealing answers to their security questions thereby providing

intruders a chance to gain unauthorized access to the account

2.2 Reuse Logins

A user on the net usually has more than one account. Most users

end up using same or similar passwords in multiple accounts

leading to a possibility where an inadvertent leak may lead to

providing access to multiple accounts

2

Page 6: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

4

THREATS TO ACCOUNT PASSWORDS

2.3 Identity thefts – Phishing

“One Phishing attack at a Bank / Online Portal / store/ BPO etc

can lead to a loss of thousands of accounts in one step

Acquire details such as credentials to SAP and other critical

applications etc by masquerading as a trustworthy entity. Such

an information breach by authorized personnel either

intentionally or accidentally, can cause irreparable damage to an

organization.

2.4 Virus, worms, Trojans

Key loggers, remote sniffers, worms and other types of Trojans

have been used since the evolution of the internet to steal user’s

identity. Most data is accessed from stolen computers and

laptops or by hackers capturing data on unprotected networks.

"According to a survey carried out 70% of people

reuse their passwords in multiple accounts. Less

than 2% users have passwords that are complex

enough and long enough to resist a combination of

dictionary, rainbow and brute-force attacks"

2

Page 7: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

PROTECTING

5

SAP ACCOUNTS When your organization banks on you, what

do you bank on?

Prevention is always better than cure. It is truer today than ever

before when the theft is conducted on the net with no physical

threats and with less cost to the perpetrator of the crime. The

only challenge that remains is to cover ones tracks and

considering the massive flow of information on the net almost on

a daily basis, it is not much difficult either.

3

Page 8: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

6

PROTECTING SAP ACCOUNTS

3.1 Two Factor Authentication: Why do you need it? Prevention is always better than cure. It is truer today than ever

before when the theft is conducted on the net with no physical

threats and with less cost to the perpetrator of the crime. The

only challenge that remains is to cover ones tracks and

considering the massive flow of information on the net almost on

a daily basis, it is not much difficult either.

Phishers try to obtain personal information such as your

password or PIN-code by pretending to be a legitimate entity.

Using Phishing, static passwords can be easily hacked providing

fraudsters easy access your personal accounts, files and

confidential information.

AuthShield - Two Factor Authentication maps the physical

identity of the user to the server and increases the security of

financial and other critical systems. Integrating Stronger User

Authentication system not only helps prevent Online Credit Card

fraud, Card Cloning, Identity theft but also helps in the capture of

habitual cyber criminals.

3

Page 9: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

PROTECTING SAP ACCOUNTS

AuthShield authenticates and verifies the user based on :

something only the user has (mobile phone/ land line/ hard token)

something only the user knows (user id and password)

AuthShield technology uses a dual mode of identification where along

with the user id and password, verification is done through a secure

randomly generated one time password (OTP). This is provided to the

user through -

7

3.1.1 Hard token

AuthShield’s hard token is a security device

given to authorized users who keep them in

their possession. To verify a transaction using

second factor of authentication, the device

displays a changing number that is typed in as

a password. The new number is based on a

pre defined unbreakable randomized

algorithm.

Thereby, the hard token enables the server to authenticate the digital

identity of the sender using a hardware device apart from his user

name and password.

3

Page 10: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

PROTECTING SAP ACCOUNTS

8

3.1.2 SMS Token

On verifying user information an OTP is sent to

the user’s phone via SMS/ automated call. The

One time password is generated using a

combination of multiple unbreakable encryption

algorithms. The algorithm generates an

unbreakable one time password every time the

user logs onto a DMZ (De militarized zone) as

specified by the IT architecture.

3.1.3 Mobile Token

AuthShield’s mobile token is an application

installed on smart phones which generates an

OTP for the user on the phone itself. The

password is based on a pre defined unbreakable

randomized algorithm.

3

Page 11: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

The architecture remains similar to a Hard Token except that the user

only has to carry his mobile phone. Thereby, the device enables the

server to authenticate the digital identity of the sender using a mobile

phone apart from his user name and password.

PROTECTING SAP ACCOUNTS

9

3.1.4 Soft Token

Application installed on the system generates a

One Time Password using a combination of

multiple unbreakable encryption algorithms.

3

Page 12: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

SAP LOGIN ARCHITECTURE

10

SAPGUI is a software that runs on the desktops/ laptops

(Windows, Mac, Unix etc) that allows users to access SAP

functionality in SAP applications such as SAP ERP and SAP

Business intelligence

SAP Netweaver is a service-oriented application and integration

platform that can be used for custom development and integration

with other applications and systems

Integration of Two Factor Authentication with SAP GUI

4.1.1 Architecture

4

Page 13: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

SAP LOGIN ARCHITECTURE

11

4.1.2 Process

Step 1 User clicks on SAPGUI

4

Page 14: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

SAP LOGIN ARCHITECTURE

12

4.1.2 Process

Step 2 User enters his user name and password

Step 3 On correct authentication, user is prompted to enter OTP

4

Page 15: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

SAP LOGIN ARCHITECTURE

13

Process

Step 4 User’s OTP is validated by AuthShield AAA server to

allow or deny access

4

Page 16: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

SAP LOGIN ARCHITECTURE

14

4.2 Integration of Two Factor Authentication with SAP Netweaver

4.2.1 Architecture

SAP ECE Server

(1) (2)

Access to Server

4

Page 17: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

SAP LOGIN ARCHITECTURE

4.2.2 Process

15

SAP Netweaver Authentication is done via RADIUS Protocol

User enters his User name and Passcode

The request is forwarded to the IAS server which authenticates

the request

4

Page 18: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

FEATURES

16

OS Independent Authentication Mechanism

Seamless Integration with the current business and security

architecture

Increases the log on security for Mails

99% security from Phishing attacks and identity thefts

Unbreakable encryption on the lines of those used by US

Government

Logs are maintained to fix responsibility in case of an unlawful

event

ADVANTAGES OF USING AUTHSHIELD

For Users

Using INNEFU’s two factor authentication can help prevent:

Online credit card fraud

Phishing

Card cloning

Unauthorized access to data by employees.

5

6

Page 19: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

Copyright Authshield Labs Pvt.Ltd 2015

Two Factor Authentication for SAP WHITEPAPER

ADVANTAGES OF USING AUTHSHIELD

17

For the organization

OS Independent Authentication Mechanism

Seamless Integration with the current business and security

architecture

Increases the log on security for critical applications.

According to a recent survey across ten cities in India, overwhelming 84% internet users indicated that they would like to use two factor authentications (2FA) to protect their identity

7

Page 20: Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication

ABOUT AUTHSHIELD LABS

The world today revolves around information. Information today is the

energy that plays a critical role in our personal lives and drives our

businesses. As we move further into this digital age, it has become

imperative to not just protect our information from outsiders but to also

draw intelligence from the vast amount information available to us.

Internet is the new playground for unwanted elements of society intent

on committing terrorist or espionage activities, financial frauds or

identity thefts. Keeping this in mind, it has become imperative to not

only prevent these acts but also be in a position to intercept, monitor

and block Internet communication to draw intelligence out of them.

AUTHSHIELD is a research oriented Information Security consulting

group specializing in meeting the Information Security needs of the

consumer via specialized products and services. We believe in

innovating and creating the latest technologies to combat the rapidly

growing menace of hacking and reduce dependency on human

factors. We offer a complete gamut of Information Security services

under one roof which includes our patented and patent pending

products like 99% Secure - Cyber Cafe Surveillance, Tactical Internet

Interception, Multi Factor Authentication, Link analysis and Pattern

Matching and services like complete corporate security process

management, web application security and managed security

services.

This Whitepaper is Published by

AUTHSHIELD SHIELD LABS PVT. LTD 876, 8th Floor, Aggarwal Cyber Plaza II,

Netaji Subhash Place, New Delhi, India

CONTACT :+91-11-47065866,+91-9968575471

Email :[email protected]