How To Better Protect Your Crown Jewel Data Assets From Insider Threats

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

Security Webcast for SAP User Groups

SAP UI Data Protection:


Take “crown jewel” protection to the next level
Tobias Keller, Deepak Gupta, Arun Verma – Product Management, SAP
March, 2022

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 1


Disclaimer

The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission of SAP.
Except for your obligation to protect confidential information, this presentation is not subject to your license agreement or any other service
or subscription agreement with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or any related
document, or to develop or release any functionality mentioned therein.
This presentation, or any related document and SAP's strategy and possible future developments, products and or platforms directions and
functionality are all subject to change and may be changed by SAP at any time for any reason without notice. The information in this
presentation is not a commitment, promise or legal obligation to deliver any material, code or functionality. This presentation is provided without
a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular
purpose, or non-infringement. This presentation is for informational purposes and may not be incorporated into a contract. SAP assumes no
responsibility for errors or omissions in this presentation, except if such damages were caused by SAP’s intentional or gross negligence.
All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations.
Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates,
and they should not be relied upon in making purchasing decisions.

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 2


Public
Agenda

Use cases Product demo Roadmap Q&A


Solution overview

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 3


Business Needs
addressed by the SAP UI Data Protection suite

1 Manage access to sensitive data across the organization to…


• safeguard business-critical operations
• prevent data leaks and misuse by internal employees

2 Get insight on data access activities to…


• understand user behaviors and interpret intentions
• decide on the best course of action

3 Keep an audit trail of data access to…


• comply with increasing regulatory and business
requirements
• provide evidence during an investigation

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 4


Protecting data on the UI layer:
two step approach
UI Data Security: two step approach to protect data from insiders

UI Masking UI Logging

conceal specific data – keep data accessible – and create a


unless required for tasks broad + deep log of data access

➔ induce compliant behavior


➔ make sensitive data
unavailable for data abuse ➔ identify & prove irregular data usage

Lock it… …or log it!

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 6


Scenarios

Regulatory,
legislative & Demergers/spin-offs Manipulation of data
compliance

3rd party business Prevention of


Public figures exploits
partner access

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 7


Scenarios
• Data manipulation
• “need to comply” • Example of salary changes
• GDPR, data privacy • Spin-offs: systems can’t be • Channel transactions to other
• Export restriction/ITAR (also on technically split in time accounts
data) • Prevent inappropriate • To damaged organization by
• Auditability disclosure, data manipulation creating data inconsistency:
bind energy/create cost; create
• Reporting (financial disclosure) audit problems, damage
reputation

• “VIP scenario” – exposed • Prevent exploits


persons • Segregation of duties scenario:
• 3rd party users
• E.g. “CEO” or sb’s actively prevent actions based
• Call centre agents (external) for on context e.g. magnitude
management line
customer care or internal/IT
• “public figures”: public sector • Download of weak password
• Business partners, suppliers hashes
systems with hugely sensitive
updating their master data,
and unique private information, • Attack intelligence on system
pricing, etc.
tax, dependents, criminal setup, patch levels, protective
records… mechanisms
© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 8
UI Data Protection Masking & Logging
High level solution architecture

SAP UI (user) SAP Backend System

data obfuscation authorization layer masking


(role and attribute based
original data masking rules)

Dynpro Processor Business Logic Database Layer


Request

Response

logging

alerting SAP Enterprise log analysis UIs


Threat Detection
(optional)

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 9


Key solution capabilities –
UI Data Protection Masking
Key Capabilities of SAP UI Data Protection Masking
Concealing sensitive data on the UI layer in addition to existing authorizations

Sensitive data concealed at the field and object level


Data may be obfuscated in SAP UI fields partially or fully; or access to an object blocked completely

Field and object-level obfuscation

Access to sensitive data is attribute-based, ensuring that the right users get
the right data at the right time

Attribute-based authorization

Flexibility for users to request sensitive information as required by their tasks

Reveal on-Demand

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 11


Public
Key Features of UI Data Protection Masking for SAP S/4HANA

Configurable data protection in SAP UIs “Data blocking” (GUI, UI5)


- Field level: Masking field value, disabling the field on the UI; - Control navigation and actions; remove lines from
hiding fields on the UI; Clear fields on the UI and tables
- disabling actions (such as navigation and buttons)

“Attribute based” access control Reveal On-Demand


- Rules can be defined in the policy engine - Data initially always masked; a user action triggers
authorization check and unmasking – action and
result are documented.

UI5/Fiori-application-based
UI5/Fiori-based dashboard
configuration
- monitoring UI Data Protection Masking for SAP
S/4HANA - configuration menu is offered as a Fiori-based APP

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 12


UI Data Protection Masking used by Jabil Inc. https://www.jabil.com/

JABIL Turns to UI Masking for Stronger Data Protection JABIL Deploys UI Masking – Article by SAP Insider
Interview of Jabil's Cybersecurity Architect Wilder Senior Editor Fred Donovan
Latino, hosted by SAP Insider Senior Editor Fred
Donovan https://www.sapinsideronline.com/case-
https://www.sapinsideronline.com/videos/video-qa-jabil- studies/jabil-deploys-ui-masking-to-protect-data-
turns-to-ui-masking-for-stronger-data-protection/ while-maintaining-usability/

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 13


Key solution capabilities –
UI Data Protection Logging
Key Capabilities of SAP UI Data Protection Logging
Enabling UI level data access logging with real-time alerting and analysis tools

Audit trail of logs of user actions and data accessed in SAP UIs with sensitive content

Evidence for investigative purposes

Facility for data protection responsible roles to investigate events


Critical field identifiers for fast access and retrieval of relevant logs

Fast and user-friendly analysis

Alerts for critical data accesses


Complement to logs captured by SAP Enterprise Threat Detection for correlation

Near real-time alerts

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 15


Key Features of UI Data Protection Logging for SAP S/4HANA

Versatile logging depths


Configurable logging scope in SAP UIs - Complete logging (with filter options for data reduction)
- Determine scope on application level (GUI transaction, - “Basic logging” for minimized data volumes
Fiori app…)
- Conditional logging determining whether, and how
deep, access is logged.

Data tagging for key and context


Multiple DPO responsibilities
- Group key and critical context fields with identifiers
- multiple data protection officers with different
responsibilities only get access to only the logs for - allowing fast and user-friendly analysis of logged data
which they’re responsible.

Alerting
- Near-real time notifications when certain data is
DPO cockpit and log analyser
accessed, through SAP notification framework - Fiori based, streamlined analysis UI for business users
- Near real-time through integration with - Detailed log analysis tools for technical users
SAP Enterprise Threat Detection

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 16


UIDP Masking demo
[life system demo]
UIDP Logging “slide” demo
Data Protection Officer
Analysis App
DPO Cockpit: Analysis of detailed access log (SAP GUI)

For a given selection, technical


details can be displayed in a GUI
transaction.
Per roundtrip (list on left side),
the detail log information can be
reviewed.
Besides Tags (highlighted), the
log file includes header meta
information identifying the
context of the log (i.e. concerning
the user), the explicit input, as
well as the specific output.

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 19


DPO Cockpit: Analysis of UI Logs

Exploratory analysis of
access to data types:
comprehensive overview of
data usage through field
IDs (tags)
More granular display with
additional filter criteria.

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 20


© 2016 SAP SE or an SAP affiliate company. All rights reserved. Customer 20
DPO Cockpit: Analysis of User actions and their sequence

Sequential overview of a user’s


actions in aggregated view,
indicating e.g. which critical/key
fields were displayed, and of
sensitive actions.

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 21


Further Information
Version: 2022-03-16
SAP has no obligation to pursue any course of business outlined in this document or any

UIDP Masking and Logging | Roadmap Highlights related presentation, or to develop or release any functionality mentioned therein. This
document, or any related presentation, and SAP’s strategy and possible future
developments, products, and platforms, directions, and functionality are all subject to
Key innovations change and may be changed by SAP at any time for any reason without notice. The
information in this document is not a commitment, promise, or legal obligation to deliver
any material, code, or functionality.

Recent achievements
Recent/current activities and plans Planned activities (2023) Future Direction
Future 2022
direction / 2023
(2024+)

Recently completed (2021)


▪ Reveal on Demand integration with ▪ BTP based UIDP solution with advanced ▪ Protection for Data Warehouse Cloud
UI Data Protection Masking and Logging

workflows data protection and analytical tools and BW4H

▪ Continuous improvements (PDF ▪ Extend data blocking via ABAC policies to ▪ data access prevention and
masking) – Web Dynpro ABAP transparency
– CRM Web Client UI – coverage for native BTP apps
▪ Availability with S/4H and ECC Private
Cloud Edition (RISE) – coverage for non-BTP cloud
▪ Expand UI data protection coverage (e.g.
applications
Ongoing activities (2022) SAC)
– advanced analysis tools
▪ Streamlined handling of mass log data ▪ Additional features of UIDP core – alerts,
change logs, dashboards, data ▪ Advanced data protection drawing on
▪ Block access to GUI transactions and Multi Factor Authentication
classification, etc.
Fiori apps, based on ABAC policies
▪ Data element (column based) encryption ▪ Machine Learning augmented data
▪ Embedded analytics in SAP S/4H classification
▪ Data exploit prevention (authorization
▪ Support for additional languages in the ▪ ABAC for Industry 4.0 (IoT)
changes, config changes, brute force
application (French, Japanese, Spanish)
attacks, from SOD conflicts, etc.) ▪ Dynamic consent

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 23


Public
Thank you.

Tobias Keller Further Information


Product Manager UI Data Security
[email protected] SAP UI Data Protection Community Topic page:
https://community.sap.com/topics/ui-data-protection
Deepak Gupta → Public presentation
Product Manager UI Data Security
[email protected] → UIML selected features – demo brief (7min)
Arun Verma → UIML selected features & config options – demo long (ca. 28 min)
Product Owner UI Data Protection Masking
[email protected] → UI Masking overview & FAQ blog (product team)

© 2022 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 24


Public
Follow us

www.sap.com/contactsap

© 2022 SAP SE or an SAP affiliate company. All rights reserved.


No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of
SAP SE or an SAP affiliate company.
The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its
distributors contain proprietary software components of other software vendors. National product specifications may vary.
These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or
warranty of any kind, and SAP or its affiliated companies shall not be liable for errors or omissions with respect to the materials.
The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty
statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional
warranty.
In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or
any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation,
and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platforms, directions, and
functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason
without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or
functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ
materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, and they
should not be relied upon in making purchasing decisions.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered
trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names
mentioned are the trademarks of their respective companies.
See www.sap.com/copyright for additional trademark information and notices.

You might also like