SAP Security Assessments

SAP Security Assessments

Those looking to test the security of their SAP landscape should follow a holistic approach. However, many of the most common security audits available only focus on individual aspects of security. A truly comprehensive inspection needs to cover a good deal more – particularly when it comes to an SAP system’s more sensitive data.

Secnic would help you achieve:

If you’d like to get started with an initial appraisal, SCS comprehensive SAP security audit would cover:

  • General system profile parameters: check the configuration of allowed message server hosts
  • Password guidelines: check your password security settings
  • User administration: check whether all user settings are in order (and if any users have been locked for multiple incorrect login attempts, for example)
  • Standard users: check whether the standard SAP users have been adjusted as recommended
  • Authorizations: Do any users or user groups have critical authorizations? This question can be divided into individual checks of the following:
    • General critical authorizations
    • Basis administration (general)
    • User administration
    • Job and spool administration
    • Development
    • Primary functions
  • Communication security: Are there any holes in internal or external communication interfaces?
  • Specific aspects of your SAP system’s installation
  • Database security (covers the security of the database in use)
  • Operating system security: From an SAP perspective, is your operating system sufficiently secure without hampering your ongoing operations?
  • Logging: Have the available options been configured correctly?
  • Web Application Server (WAS) security: check whether HTTPS is in use, for example
  • Safeguarding system integrity: Is your system correctly configured? (This is particularly important with regard to ongoing system changes, as often occur in production systems)

We will audit to check further facets relating to the quality, robustness, and performance of your SAP systems. SCS will address customer-specific factors, as well. The list above will already enable you to achieve a minimum standard of security, but a truly comprehensive security concept obviously needs to include a sophisticated role and authorization concept, identity and access management, encryption, the security of custom programming, and other subjects.

Risk and Compliance Management

Risk and Compliance Management

Risk and Compliance Management

Assisting organizations assess and manage risk and compliance in alignment with industry best practices and regulatory requirements such as: NIST 800-37, NIST 800-53, ISO27001, ISO22301, PCI DSS, SOX, HIPAA, NYDFS, GDPR, and other domestic and international requirements.

Today’s rapidly changing business environment requires thinking about risk in new ways. Taking an innovative approach to managing and enhancing your governance, risk and compliance (GRC) activities can help you seize opportunities, stay a step ahead of uncertainty and meet stakeholder expectations.

Secnic’s Compliance and Risk Management Solutions team can help you drive business performance and achieve success like no other. We can transform how you perceive—and capitalize on—risk.

By aligning your GRC activities to business performance drivers—with the right resources—you can transform your GRC program from a reactive, check-the-box exercise into a powerful tool able to anticipate and mitigate risk to drive business performance.

We unite perspectives with Secnic’s Internal Audit and our Controls Testing and Monitoring solutions, to guide you in a holistic approach to governance, risk and compliance that effectively coordinates across the second and third lines of defense.

Implementing a comprehensive and innovative governance, risk, and compliance (GRC) program enables organizations to address the multiple factors that are essential in managing and controlling enterprise risk. This includes factors such as:

  • Regulatory changes
  • Decentralized operating model
  • High number of control failures
  • Talent management changes

By adopting an effective GRC strategy, executives and risk leaders are able to challenge the way they think about, respond to, and manage risk. SCS help you understand the risks related to your business strategy and how to best respond to those risks. Our tailored approach to GRC integrates risk and performance management in order to create a competitive advantage in terms of risk insight and performance improvement.

SCS GRC Framework: SCS’s GRC framework takes into account our clients risk strategy based on business objectives, risk tolerance and treatment, investments and operating model to determine the overarching risk landscape and strategic enablers (i.e., people process, and technology). This holistic approach creates a structure to readily respond to new risk, compliance, and regulatory needs.

GRC Strategy Services — Implementing a GRC program Defining GRC

  • Fragmented risk and compliance functions
  • Ineffective use of ERP and GRC
  • Process standardization
  • Cost reduction

 

Road Map

Stabilize

  • Establish governance
  • Complete control rationalization/ optimization
  • Agree on long– term road map and identify “quick wins”
  • Define business requirements
  • Select GRC technology solution(s)

Optimize

  • Begin GRC technology implementation
  • Pilot key elements of the solution
  • Automate control execution and monitoring
  • Deploy continuous monitoring

Enhance and sustain

  • Continue GRC technology implementation
  • Integrate with other functions and organizations
  • Implement sustainability program
IoT Security Assessment

IoT Security Assessment

Without security, the Internet of Things will cease to exist. Security by Design – embedding security from the beginning – can minimize the risk of destroyed reputations and costly remediation. IoT companies will need to take action now to shield their solutions from cyberattacks and safeguard customer data, if they are to protect their reputation as a provider of secure devices and services.

SCS IoT Security Assessment provides a flexible framework that addresses the diversity of the IoT market, enabling companies to build secure IoT devices and solutions as laid out in the SCS IoT Security Guidelines, a comprehensive set of best practices promoting the secure end-to-end design, development and deployment of IoT solutions.

Building on the extensive expertise of the mobile industry, gained from decades of providing secure, trusted and reliable products and services, the SCS IoT Security Assessment scheme ensures Security by Design and enables companies to identify and mitigate any potential security gaps in their services, allowing the market to scale to its full potential.

The Key Attack Surface:

Attack SurfaceVulnerability
Ecosystem (general)
  • Interoperability standards
  • Data governance
  • System wide failure
  • Individual stakeholder risks
  • Implicit trust between components
  • Enrollment security
  • Decommissioning system
  • Lost access procedures
Device Memory
  • Sensitive data
  • Cleartext usernames
  • Cleartext passwords
  • Third-party credentials
  • Encryption keys
Device Physical Interfaces
  • Firmware extraction
  • User CLI
  • Admin CLI
  • Privilege escalation
  • Reset to insecure state
  • Removal of storage media
  • Tamper resistance
  • Debug port
  • UART (Serial)
  • JTAG / SWD
  • Device ID/Serial number exposure
Device Web InterfaceStandard set of web application vulnerabilities, see:
Device FirmwareSensitive data exposure (See OWASP Top 10 – A6 Sensitive data exposure):
  • Backdoor accounts
  • Hardcoded credentials
  • Encryption keys
  • Encryption (Symmetric, Asymmetric)
  • Sensitive information
  • Sensitive URL disclosure
  • Firmware version display and/or last update date
  • Vulnerable services (web, ssh, tftp, etc.)
  • Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)
  • Security related function API exposure
  • Firmware downgrade possibility
Device Network Services
  • Information disclosure
  • User CLI
  • Administrative CLI
  • Injection
  • Denial of Service
  • Unencrypted Services
  • Poorly implemented encryption
  • Test/Development Services
  • Buffer Overflow
  • UPnP
  • Vulnerable UDP Services
  • DoS
  • Device Firmware OTA update block
  • Firmware loaded over insecure channel (no TLS)
  • Replay attack
  • Lack of payload verification
  • Lack of message integrity check
  • Credential management vulnerabilities:
  • Username enumeration
  • Weak passwords
  • Account lockout
  • Known default credentials
  • Insecure password recovery mechanism
Administrative InterfaceStandard set of web application vulnerabilities, see:
  • OWASP Web Top 10
  • OWASP ASVS
  • OWASP Testing guide
  • Credential management vulnerabilities:
  • Username enumeration
  • Weak passwords
  • Account lockout
  • Known default credentials
  • Insecure password recovery mechanism
  • Security/encryption options
  • Logging options
  • Two-factor authentication
  • Check for insecure direct object references
  • Inability to wipe device
Local Data Storage
  • Unencrypted data
  • Data encrypted with discovered keys
  • Lack of data integrity checks
  • Use of static same enc/dec key
Cloud Web InterfaceStandard set of web application vulnerabilities, see:
  • OWASP Web Top 10
  • OWASP ASVS
  • OWASP Testing guide
  • Credential management vulnerabilities:
  • Username enumeration
  • Weak passwords
  • Account lockout
  • Known default credentials
  • Insecure password recovery mechanism
  • Transport encryption
  • Two-factor authentication
Third-party Backend APIs
  • Unencrypted PII sent
  • Encrypted PII sent
  • Device information leaked
  • Location leaked
Update Mechanism
  • Update sent without encryption
  • Updates not signed
  • Update location writable
  • Update verification
  • Update authentication
  • Malicious update
  • Missing update mechanism
  • No manual update mechanism
Mobile Application
  • Implicitly trusted by device or cloud
  • Username enumeration
  • Account lockout
  • Known default credentials
  • Weak passwords
  • Insecure data storage
  • Transport encryption
  • Insecure password recovery mechanism
  • Two-factor authentication
Vendor Backend APIs
  • Inherent trust of cloud or mobile application
  • Weak authentication
  • Weak access controls
  • Injection attacks
  • Hidden services
Ecosystem Communication
  • Health checks
  • Heartbeats
  • Ecosystem commands
  • Deprovisioning
  • Pushing updates
Network Traffic
  • LAN
  • LAN to Internet
  • Short range
  • Non-standard
  • Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)
  • Protocol fuzzing
Authentication/Authorization
  • Authentication/Authorization related values (session key, token, cookie, etc.) disclosure
  • Reusing of session key, token, etc.
  • Device to device authentication
  • Device to mobile Application authentication
  • Device to cloud system authentication
  • Mobile application to cloud system authentication
  • Web application to cloud system authentication
  • Lack of dynamic authentication
Privacy
  • User data disclosure
  • User/device location disclosure
  • Differential privacy
Hardware (Sensors)
  • Sensing Environment Manipulation
  • Tampering (Physically)
  • Damage (Physical)

 

 

Digital Risk Management

Digital Risk Management

Digital Risk Management (DRM) is the next evolution in enterprise risk and security for organizations that increasingly rely on digital processes to run their business.

A Business Issue

Digital risk is risk associated with digital business processes. Digital risk is a business issue, not just a technology issue. Industry leaders Secnic Consultancy Services will find that digital risk management needs to be owned by the C-suite rather than by IT.

Quantification of Digital Risk

DRM defines a foundation for managing digital risk across various business functions (line-of-business, IT, security), by relying on the quantification of the business impact of digital risk.

Business-Defined Risk Balance

DRM enables business executives and their organizations to understand the digital risk profile of their operations from a business perspective and equip them with knowledge and a decision-making framework that allows them to balance the need to protect their organization with the need to run the business.

Digital Resiliency

The ultimate objective of digital risk management is to build digital resiliency, where an organization’s systems and operations are designed to detect digital threats and respond to events to minimize business disruption and financial losses.

Goals and Objectives of a Risk and Vulnerability Assessment

Some of the more common goals and objectives of conducting a risk and vulnerability assessment are as follows:

  • Organizations can have an accurate inventory of IT assets and data assets.
  • Risks, threats, and known vulnerabilities can be identified and documented for the IT organization’s production, infrastructure, and assets.
  • Risks, threats, and known vulnerabilities can be prioritized based on impact or criticality of the IT asset or data asset that it impacts.
  • The vulnerability window can be identified and minimized according to the organization’s minimum acceptable tolerance to being vulnerable.
  • Remediation or mitigation of the identified risks, threats, and vulnerabilities can be properly budgeted and planned according to the prioritization or criticality of IT assets and data assets.
  • Com-pliancy with new information security laws, mandates, and regulations can be achieved by first conducting a risk and vulnerability assessment.
  • Identification of the gaps or voids in the organization’s IT security architecture and framework can be found with specific recommendations for closing the gaps and voids.
  • A risk and vulnerability assessment identifies the exposures, risks, threats, and vulnerabilities that the organization is subject to and assists the IT organization in justifying the cost of needed security countermeasures and solutions to mitigate the identified risks, threats, and vulnerabilities.
  • A risk and vulnerability assessment provides an IT organization with an objective assessment and recommendations to the organization’s defined goals and objectives for conducting the risk and vulnerability assessment.
  • A risk and vulnerability assessment assists IT organizations with understanding the return on investment if funds are invested in IT security infrastructure.
Block-Chain Enabled Systems Security

Block-Chain Enabled Systems Security

When a technology develops as rapidly as blockchain is evolving, many potential loopholes tend to be overlooked during implementation. As you begin to build out your blockchain infrastructure, invest thought and resources into ensuring that vulnerabilities do not creep into your system.

Here are some key problems that could derail your blockchain security:

  • Crypto key tampering
  • Block-chain permissions escalation
  • Inappropriate consensus mechanism
  • Lack of block-chain security program plan
  • Lack of block-chain integrity
  • Lack of malicious code protection
  • Misused timestamps
  • Genesis block tampering
  • Denial of service (DoS) attacks
  • Packet sniffing & MITM attacks

Do not leave your block-chain security and business reputation to chance. Talk to Secnic, the globally recognized cyber-security specialists. We will work closely with your team to assess, enable and secure your block chain life-cycle.

The Blockchain implementation

  • Nodes
    • Vulnerability Assessment and Build Review
    • Redundancy Testing
    • Synchronization Testing
    • Consensus Algorithm Testing
    • Private Keys (The Wallets)
      • Password Strength Review
      • Key Storage Review
    • Shared Ledger (The Storage)
      • Information Disclosure Checks
      • Smart Contracts (The Functionality)
        • Secure Code Review
      • The Application (The Usage)
        • API Testing
        • Web Application
        •  Mobile Application