180 likes | 494 Views
Splunking PeopleSoft. Marquis Montgomery Security Architect/Team Lead, Corporate Security. AGENDA. What is PeopleSoft? Realistic PeopleSoft architectures Limitations we’re trying to mitigate Use cases & how we do it How you can do it. PeopleSoft vs PeopleTools. PeopleSoft Version
E N D
Splunking PeopleSoft Marquis Montgomery Security Architect/Team Lead, Corporate Security
AGENDA What is PeopleSoft? Realistic PeopleSoft architectures Limitations we’re trying to mitigate Use cases & how we do it How you can do it
PeopleSoft vsPeopleTools • PeopleSoft Version • Denoted by module with two numbers (HCM 9.1, SA 8.9) • PeopleTools Version • Denoted with three numbers (8.53.11) • [major release] . [minor release] . [dot release]
Basic Architecture • PeopleSoft Internet Architecture (PIA) v8 • Also called Pure Internet Architecture • 3-tier vs 2-tier • 3-tier via the web (web, app, db) • 2-tier via Application Designer (app, db)
PeopleSoft in the Enterprise PRD TST DEV STG
PeopleSoft Limitations • Generic ID’s used (and often required) for application maintenance • ‘VP1’ level ID in the application • SYSADM at the database tier (App -> DB) • Row level auditing within the application is expensive • Limited (or no) security information from Oracle about vulnerabilities • Many versions of PSFT and PTools, long upgrade cycle & patching quarterly not always possible • Widely distributed system with lots of log sources
WebLogic Use Cases 1) Table of IP to web requests (Time, IP, GET/POST, response code) 2) Breakdown by response code (200, 404, 304, etc) 3) URL history per IP 4) Portions of the app accessed the most (pageletname) 5) No app server available / no available application server domain / Jolt session pool 6) IB connector errors (free form search / troubleshooting) 7) DetectCSRF 8) Untrusted Server Certificate chain
Application Server Use Cases 1) All errors, notices, & warnings 2) Authentication failures 3) Authentication succeeded 4) Guest activity 5) LDAP Errors & failures 6) New auth token 7) password encryption notices 8) password expired 9) switch user attempt 10) Invalid user / pwd over threshold alert
Database Server Use Cases 1) Authentication success 2) Authentication failure 3) Drops, alters, rollbacks, commits • DBA activity 4) DBA activity (depending on logging) • Sensitive data selects (National ID field)
How you can do it • WebLogic • http://docs.oracle.com/cd/E12840_01/wls/docs103/logging/config_logs.html • http://docs.oracle.com/cd/E12840_01/wls/docs103/ConsoleHelp/taskhelp/logging/EnableAndConfigureHTTPLogs.html • PeopleSoft App Server • http://docs.oracle.com/cd/E12531_01/tuxedo100/ada/admon.html • Oracle DB • http://docs.oracle.com/cd/E11882_01/network.112/e16543/auditing.htm
How you can do it • Splunk PeopleSoft TA • http://splunk-base.splunk.com/apps/58502/ta-peoplesoft_architecture • CedarCrestone Oracle 10G TA • http://splunk-base.splunk.com/apps/58501/ta-cedarcrestone_oracle_10g • CedarCrestone Oracle 11G TA • http://splunk-base.splunk.com/apps/58500/ta-cedarcrestone_oracle_11g
Q&A (Thank you!)marquis.montgomery@cedarcrestone.com@trademarq