Dbs Security Patch Process
Dbs Security Patch Process
This session shows how to set up a monthly patch process based on the application System
Recommendations within the SAP Solution Manager to track down critical Security Notes which are
required for your systems.
See the integration with the Usage Procedure Logging (UPL) and the Business Process Change Analyzer
(BPCA) to identify business processes which might get affected by the implementation of security notes.
And you will get additional information about the cross-system queries of Configuration Validation which
can be used to analyze the security configuration for single systems as well as for the complete system
landscape.
Goals:
Identify required security notes for a large system landscape.
Manage work lists with notes that should be implemented.
Audit successful implementation of required security notes.
Security Notes
■ are standard SAP Notes / HotNews
■ with information about known security vulnerabilities
■ and appropriate countermeasures (correction instruction, configuration, service
pack, upgrade, manual measures)
■ whose corrections are contained in subsequently released Support Packages, if
possible
Download list
Filter
Average
of ‘typical’
month
?
?
How to identify important
SAP Security Notes
that need to be implemented?
Java patches
A patch is a code-correction for a specific version of an SAP product.
SAP System
Legal Change notes
Respond to requirements caused by changes in legal regulation
You have to apply various
types of notes and patches to HotNews
keep your SAP systems up-to- SAP customer notes with priority 1 (very high priority) to resolve or avoid
date and secure. problems that can cause the SAP system to shut down or lose data.
or (recommended)
New released Legal Change notes
You can use application System SAP notes
Recommendations in the SAP
Solution Manager to check all
relevant notes and patches for HotNews
the selected systems and easily
keep all of your systems up-to-
date. System
General SAP notes
Recommendations
© 2017 SAP SE. All rights reserved. 30
System Recommendations
Advantages & Features
Increase system security by The recommendations Integration into Change
applying up-to-date security- comprise the following notes Request Management
relevant notes exactly tailored categories: (CharM) to directly create
for the respective system
Security notes Requests for Change for the
Provides a detailed selected notes
Performance relevant notes
recommendation based on Integration with Usage
HotNews
the system release and Procedure Logging (UPL) to
already implemented SAP Legal change notes
distinguish between used and
notes Correction notes / Patch
unused code
notes (deactivated by default)
Easy-to-use filter settings Integration into Business
allow exact selection of Process Change Analyzer
system or solution (BPCA) to calculate the test
impact
Customer SAP
1. Select system to check
& update Connect to SAP Global
3. Support Backbone
2. Retrieve system
information (SP level, 5. Send information back to 4. Provide information on latest
patch level) the customer‘s SAP relevant notes (for SP level,
Solution Manager patch level)
system
Structured recommendations
for missing but relevant
Security Notes, HotNews, …
Filter
Multiple views
Export to
Excel
Status management
Integration of
Change Request
Management and
Maintenance
Optimizer
Integration with
Collect Java Patches Maintenance Optimizer
for selected Notes (MopZ)
2
1 Integration with
Collect Java Patches Maintenance Optimizer
for selected Notes (MopZ)
Prerequisites:
The SAP-OSS RFC connection needs to be set up correctly
All managed systems have to be connected to SAP Solution Manager and documented in
transaction SMSY, and they have to be assigned to a product system and to a solution
Authorization object: SM_FUNCS
Control access and visibility of tabs in System Recommendations
To collect this data automatically for the use within System Recommendations you can set up a
batch job in the „Settings“ area of System Recommendations.
Maybe you want to disable some work center views (see authorization object SM_WC_VIEW) in a copy of role
SAP_SMWORK_BASIC_CHANGE_MAN, for example CHANGE_DOC, CHANGE_REQ, LICENSE_MANAGEMENT, etc.
In a copy of role SAP_SM_SOLUTION_ALL you may want to change the visibility for solutions.
According to note 2019992 you may need to add role SAP_BI_E2E if you want to use the BW report for System
Recommendations results.
© 2017 SAP SE. All rights reserved. 46
Cross-System check for System Recommendations
Report ZSYSREC_NOTELIST @ SDN for SolMan 7.0 and 7.1
SDN
http://wiki.sdn.sap.com/wiki/display/Snippets/SAP+AGS+Security+Services+-+Tools
On the Solution Manager, start the Fiori Launchpad and navigate to the Fiori Tile Group
“SAP Engagement and Service Delivery”
How?
Start transaction “SOLMAN_WORKCENTER”
and then navigate to “SAP Engagement and ...”
or
Start the Work Center from the Easy Access menu tree
or
Add a link for the Fiori Launchpad on your Favorites.
3
Add a link on your Favorites.
2
How?
In the Advanced search you can reduce the list of SAP notes.
The SAP note status „New“ and „New version available“ are pre-selected, other could be
added manually. Keep this in mind working with the note list.
SAP notes marked “Kernel” in the corresponding field contain kernel corrections.
Release dependent SAP notes are relevant for the system they addressed to and should be
implemented.
For release independent SAP notes it is not technically possible to determine its relevance.
Check the relevance by your own.
After setting additional filters click on “Search” button.
© 2017 SAP SE. All rights reserved. 57
System Recommendations in SAP Solution Manager 7.2
Intergration with Service Marketplace
Transaction
SM30_AGSSR_STATUS
Select at least one system for which you want to install a support package patch and choose
Actions Show (JAVA) Support Package Patches
Correction notes (Type C – normal notes having ABAP correction instructions) must be specified
manually to be retrieved:
Call transaction SM30_DNOC_USERCFG_SR
In the field SYSREC_NOTE_TYPES add or remove the relevant value, i.e enter HSLPC
Transaction
SM30_AGSSR_OSDB
Mandatory configuration
(transaction SOLMAN_SETUP)
System Preparation
Infrastructure Preparation
Basic Configuration
Managed Systems
Configuration
(#) There is no special display-mode in System Recommendations. Both roles offer same functionality including
entering status and comments for notes
(*) As described in the role documentation you have to add an authorization proposal into the role menu.
© 2017 SAP SE. All rights reserved. 83
System Recommendations: Setup in SAP Solution Manager 7.2
Requires roles
If you are using a separate Fiori Hub you need to
generate the OData service for System
Recommendations using transaction
/n/IWFND/MAINT_SERVICE as described in the
Security Guide of the SAP Solution Manager (see
chapter 4.6.1 SAP Fiori Launchpad and NWBC).
→ Fiori
http://help.sap.com/solman_fiori
System Recommendations
https://help.sap.com/saphelp_smfiori_102/helpdata/en/cb/e401557f614c55e10000000a4450e5/frameset.htm
Release Notes
Changes and New Features in SAP Solution Manager 7.2 SPS 1
Changes and New Features in SAP Solution Manager 7.2 SPS 2
SAP Support Portal
https://support.sap.com/solutionmanager
SAP Solution Manager WIKI @ SCN
https://wiki.scn.sap.com/wiki/display/SM/Solution+Manager+Home
SAP Solution Manager Roadmap
https://service.sap.com/roadmaps
Product and solution roadmaps Database and Technology Platform SAP Solution
Manager.
?
?
What code do I
use anyway?
SAP Kernel
Optimize Design
Custom Code
Lifecycle
Management
Build &
Operate
Test
Deploy
Report /SDF/SHOW_UPL
Work processes
Reports
Functions ABAP
Methods Code
Inspector
Procedures
* Default setting
© 2017 SAP SE. All rights reserved. 92
SAP Usage and Procedure Logging (UPL)
Usage Analysis (local in managed system)
Solution Documentation
Once a day Assistant
System Recommendations
Week Month
etc.
BW Query 0SM_CCL_UPL_MONTH
System Recommendations
SAP CRM
DEV
TST UPL
1200
PRD 80
0
0
0
30
0
© 2017 SAP SE. All rights reserved. 97
Analysis of Object Usage in System Recommendations
Show object list for selected ABAP notes with usage data
Analysis of Results
• Zero count in PROD system
• No explicit testing required as you are not using the programs (but you still should implement the notes)
• High count in PROD system and high count in TEST system
• No explicit testing required as you are executing the programs with normal activities in test environment
• High count in PROD system and zero count in TEST system
• You might need explicit testing
SAP NetWeaver SAP_BASIS 7.01 SP10 or 7.02 SP9 (= SAP ERP 6.0 EHP4 or SAP ERP 6.0 EHP5)
ST-PI 2008_1_700 SP4 or SP5 & Note 1683134 or ST-PI 2008_1_700 SP6 or higher
Kernel 720 Patch 94 or higher according to …
SAP Note 1785251 - SCOV/UPL: Error messages in monitor (Kernel 720 Patch 410 / 721 Patch 112)
SAP Note 1822227 (to allow changing the data retention time using report /SDF/UPL_CONTROL )
SAP Note 1906451 - Technical Preparation for Custom Code Management
Based on our experience the space requirements are 2-10 MB for 14 days of data. So even data collection of
one year won´t massively affect space requirements. Nevertheless verify your individual storage settings /
database free space for a higher retention time value.
Report /SDF/CONTROL shows the status of UPL:
The UPL activation procedure was subject of continuous enhancements in the SAP Solution
Manager infrastructure. Starting with many manual steps in SAP Solution Manager 7.1 SP5 it has
finally reached a fully guided and system supported version in SAP Solution Manager 7.1 SP 11.
The SOLMAN_SETUP scenario for Custom Code Management contains all necessary steps and
UIs to handle UPL configuration end to end including job scheduling of related UPL jobs.
See
Note 1955847 - UPL: Activation Procedure and Authorization Handling in SAP Solution Manager
Additional authorizations:
• S_COV_ADM with change activity
• S_RFC for function group /SDF/SCOV_LITE
If UPL is not working ask for advice via application component SV-SMG-CCM-CDM
If SysRec does not show existing usage data, create a ticket on application component SV-SMG-SR
If report ZSYSREC_NOTELIST does not show existing usage data, send me a mail or comment on
http://scn.sap.com/community/security/blog/2011/07/18/report-zsysrecnotelist--show-results-of-system-recommendation
© 2017 SAP SE. All rights reserved. 105
System Recommendations and UPL
Combined value
Retrieve affected objects from System Recommendations
Retrieve used objects via UPL
Compare both lists
If objects from a Security Note are not in UPL list:
Note will not affect running processes
Implement Security Note without testing
?
?
Which process is
affected, where to
test for side effects?
Pain Point Which critical business processes are affected by planned changes?
SAP Solution
Approach Update Change Impact Analysis Test Planning Test Execution
Solution Architect
impacted processes
A BPCA Change
Impact Analysis is
performed using the
top objects of the
planned development
against the business
processes for risk
assessment
Process
hierarchy
Business scenario
Business
processes
Business steps
Sales
Quotation Delivery Billing
Business Scenario “Order to Cash” Order
execute
Tester starts Tester executes the process step in SAP Generated TBOM is assigned
manual test case managed System to Process Step / Business
from Tester Worklist while BPCA traces all SAP objects Process
used by the Process Step in the background
Disadvantage: less precision compared to 2. Initial: Work-Item for Business User in PRD system
dynamic TBOMs due to limit to 4 branching levels Update: Manual Testers in TST system
3. Automatic generation via automated tests (eCATT,
SAP TAO, HP QTP, …)
Example:
Process Steps and Transactions for SD
Combined value
Run BPCA to know which technical objects are used
in which process
Hand over objects affected by SAP Security Notes
from System Recommendations to BPCA
Determine affected processes
Develop suitable test cases for side effects
Challenges
A large number of systems… Complex SAP Landscape …
… Need to perform comparison of current configuration status against a defined target or
standard configuration baselines
… with minimum efforts and ASAP
© 2017 SAP SE. All rights reserved. 126
What is Configuration Validation?
The Idea behind Configuration Validation
A reporting to understand how homogeneous the configuration of systems is
Reference System Compared Systems
System 1 System N
Configuration Items
Software Packages
Configuration Items ... Configuration Items
Combined value
Run cross-system BW reporting about System
Recommendations
Validate if selected notes have reached production systems
Determine quality of patch processes
?
?
Whether to patch,
or not to patch?
Depending on the age of the system very The effort to analyze and to implement security
many Security Notes (up to hundreds) are notes, to identity the test requirements and to
relevant per system document all activities is quite high
Describes organization (responsibilities) and processes relevant for implementing security patches
Defines the mandatory timelines for published security patches and implementation of SPs
Should provide hard targets but should also allow for documented, approved exceptions
Goal: Make patching mandatory but balance security risk against operational risk
Business first
No patching at all. Only exceptions are SPs
every 2 years (or less) or one or two “Hot
News” notes a year for severe vulnerabilities
Security first
No discriminating patching policy, no
assessments, trade-offs. Security Notes are
implemented immediately regardless of priority
© 2017 SAP SE. All rights reserved. 144
Non-Trivial SAP Security Patch Policies
Business first
No patching at all. Only exceptions are SPs
every 2 years (or less) or one or two “Hot
News” notes a year for severe vulnerabilities
Security first
No discriminating patching policy, no
assessments, trade-offs. Security Notes are
implemented immediately regardless of priority
© 2017 SAP SE. All rights reserved. 145
The patching process: Actions to take
b) Special project to cover the backlog of old notes once the monthly patch process works fine
2. Classify the notes for the patching policy: Assess the security risk (i.e. priority & CVSS).
3. Classify the notes for the patching policy: Assess the implementation risk (UPL, BPCA).
3. Security Notes published by SAP must be assessed and classified by priority [Very High, High,
Medium, Low] and implementation process [Monthly, Maintenance, Project]
4. The following timelines System Class [Max] Note Priority Impl Process Deadline
apply (excerpt): Very High Very High <any> 30 days
Very High High Monthly 30 days
Very High High Maintenance 90 days
High High Project 180 days
……….
5. Exceptions are allowed for good reason but must be documented and approved by IT Security
© 2017 SAP SE. All rights reserved. 150
Sample patch process
Integrated approach with policy adoption and checks
Monthly on 2nd Within one month, three
The week after the Patch Day During next maintenance cycle
Tuesday months…
ASUG Security SIG (English) You can find the latest version of the
presentation on SAP Support Portal /sos
SAP Australia User Group, SAUG (English)
https://support.sap.com/sos
DSAG AG SAP Security Notes (German)
→ Media Library → Security Notes Webinar
The Patch Day Security Notes with ABAP corrections are supported by an impact analysis which will provide
information on which end user applications might be impacted by a given note.
This information enables customers to perform regression testing before patching the productive systems thereby
taking informed decisions and ensuring continuity of their processes.
The impact analysis is based on static analysis of dependencies performed internally at SAP on a standard
SAP system which is on the latest release. Custom coding is not supported.
The analysis currently supports dependencies related to Reports, Transactions, Remote-Enabled Functions (RFC)
and WebDynpro ABAP applications.
Testing recommendations
Obsolete code: “Solution” columns
When code is removed, it shouldn’t have been there right from the start
High probability that this code had never been used in customer production either
ABAP: Use UPL to measure object usage
Performance impact negligible
Reports /SDF/UPL_CONTROL, /SDF/SHOW_UPL
UPL functionality is contained in ST-PI components
Compare results with affected objects from advisory
Objects that are not used might be used by an attacker. But patching is easy because no testing required.
By vulnerability type:
Directory traversals: very often difficult to implement
A project approach is advisable for non-recent SP levels
Security risk depends highly on “read” vs. “write”
Missing authorization: very often fairly easy to implement
(but watch out for objects that might be missing in roles)
XSS: very often fairly easy to implement and test
Code / SQL (write) / Command injection: dangerous! – and often easy to implement
Information disclosure / SQL (read) injection:
No imminent danger to system integrity
Check “Additional comments” for implementation issues (dependent notes) and side effects
Some customers calculate time-to-patch on both implementation approach and security risk.
Frank Buchholz
SAP Active Global Support – Security Services
frank.buchholz@sap.com
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express Google App Engine, Google Apps, Google Checkout, Google Data API, Google Maps, Google Mobile Ads,
permission of SAP SE. The information contained herein may be changed without prior notice. Google Mobile Updater, Google Mobile, Google Store, Google Sync, Google Updater, Google Voice,
Google Mail, Gmail, YouTube, Dalvik and Android are trademarks or registered trademarks of Google Inc.
Some software products marketed by SAP SE and its distributors contain proprietary software components of
other software vendors. INTERMEC is a registered trademark of Intermec Technologies Corporation.
Microsoft, Windows, Excel, Outlook, PowerPoint, Silverlight, and Visual Studio are registered trademarks of Wi-Fi is a registered trademark of Wi-Fi Alliance.
Microsoft Corporation.
Bluetooth is a registered trademark of Bluetooth SIG Inc.
IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System
Motorola is a registered trademark of Motorola Trademark Holdings LLC.
z10, z10, z/VM, z/OS, OS/390, zEnterprise, PowerVM, Power Architecture, Power Systems, POWER7,
POWER6+, POWER6, POWER, PowerHA, pureScale, PowerPC, BladeCenter, System Storage, Storwize, Computop is a registered trademark of Computop Wirtschaftsinformatik GmbH.
XIV, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, AIX, Intelligent Miner, WebSphere,
Tivoli, Informix, and Smarter Planet are trademarks or registered trademarks of IBM Corporation. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork,
SAP HANA, and other SAP products and services mentioned herein as well as their respective logos are
Linux is the registered trademark of Linus Torvalds in the United States and other countries. trademarks or registered trademarks of SAP SE in Germany and other countries.
Adobe, the Adobe logo, Acrobat, PostScript, and Reader are trademarks or registered trademarks of Adobe Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web
Systems Incorporated in the United States and other countries. Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their
respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects
Oracle and Java are registered trademarks of Oracle and its affiliates.
is an SAP company.
UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group.
Sybase and Adaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other Sybase products and services
Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase Inc.
registered trademarks of Citrix Systems Inc. Sybase is an SAP company.
HTML, XML, XHTML, and W3C are trademarks or registered trademarks of W3C®, World Wide Web Crossgate, m@gic EDDY, B2B 360°, and B2B 360° Services are registered trademarks of Crossgate AG
Consortium, Massachusetts Institute of Technology. in Germany and other countries. Crossgate is an SAP company.
Apple, App Store, iBooks, iPad, iPhone, iPhoto, iPod, iTunes, Multi-Touch, Objective-C, Retina, Safari, Siri, All other product and service names mentioned are the trademarks of their respective companies. Data
and Xcode are trademarks or registered trademarks of Apple Inc. contained in this document serves informational purposes only. National product specifications may vary.
IOS is a registered trademark of Cisco Systems Inc. The information in this document is proprietary to SAP. No part of this document may be reproduced, copied,
or transmitted in any form or for any purpose without the express prior written permission of SAP SE.
RIM, BlackBerry, BBM, BlackBerry Curve, BlackBerry Bold, BlackBerry Pearl, BlackBerry Torch, BlackBerry
Storm, BlackBerry Storm2, BlackBerry PlayBook, and BlackBerry App World are trademarks or registered
trademarks of Research in Motion Limited.