SlideShare una empresa de Scribd logo
1 de 21
Operating System Security
Hardening for SAP HANA
Peter Schinagl
Technical Architect Global SAP Alliance
peters@suse.com
Markus Gürtler
Architect & Technical Manager SAP Linux Lab
mguertler@suse.com
2
Corporate Security
3
SUSE Linux Enterprise Server
Security Components
AppArmor
for fine-grained security tuning
Security Certifications
like FIPS, EAL4+, etc.
Security patches
and updates
over the whole product lifecycle
SUSE Firewall2
Easy to administer OS firewall
Intrusion Detection
using AIDE
OS Security Guide
covering all security topics
Linux Audit System
CAPP-compliant auditing system
+ more
4
Classification of the Hardening Guide
SUSE
Security Guide
OS Security
Hardening Guide
for SAP HANA
SAP HANA
Security Guide
Operating System genericSAP HANA specific
5
Content of the Security Guides
SAP HANA Security Guide
OS Security Hardening Guide for HANA
- Network and Communication Security
- User and Role Management
- Authentication and Single Sign-On
- Authorization
- Storage Security
- etc.
Application
Operating
System
SUSE Security Guide
- SUSE Security Features
- Authentication
- Local Security
- AppArmor & SELinux
- The Linux Audit Framework
- etc.
Operating
System
- OS Security Hardening Settings
- Local Firewall for HANA
- Minimal OS Package Selection
- Update & Patch Strategies
- etc.
6
Customized OS Security Hardening for
SAP HANA
Security Hardening Settings for HANA
SUSE Firewall for HANA
Minimal OS package selection
SUSE Security Updates
7
Security Hardening Setttings
Overview
• Covers all relevant security topics (see next slide)
• Provides for each setting
✔ Detailed description
✔ Possible impact on the system
✔ Implementation priority
• Settings based on a professional Security Audit
• Implemented and tested by a large pilot customer
8
Security Hardening Setttings
Categories
• Authentication Settings
→ User login restrictions, password policy, etc.
• System Access Settings
→ Local and remote access restrictions
• Networking Settings
→ i. e. behavior of the Linux IP stack
• Linux Service permissions
→ i. e. disallow of 'at'-jobs
• File permissions
→ Access rights of security-critical files
• Logging and Reporting
→ Behavior of the system logging, security reports, etc.
9
Security Hardening Setttings
Examples
• Prohibit root login via ssh
• Setup password strengthening
• Adjust sysctl variables (i. e. network settings)
• Adjust default umask
• Change permissions of certain system files
• Forwarding of syslog files to a central syslog server
• Configure user login restrictions via access.conf
• etc.
10
Security Hardening Setttings
Detailed Example: Prohibit login as root via ssh
Description
By default, the user “root” is allowed to remotely log in via ssh. This has two
disadvantages: First, root logins are logged, but cannot be associated with a
particular user. This is especially a disadvantage if more than one system
administrator makes changes on the system. Second, a stolen root password
allows an attacker to login directly to the system. Instead of logging in as a normal
user first, then doing “su” or a “sudo,” an attacker just requires the root password.
Procedure
Edit /etc/ssh/sshd.conf and set parameter
PermitRootLogin no
Impact
Root no longer can be used to login remotely, so that users are required to use “su”
or “sudo” to gain root access when using ssh.
Priority: high
11
SUSE Firewall for SAP HANA
Overview
• Local firewall dedicated for SAP HANA
• Predefined service definitions according to “SAP
HANA Master Guide”
• Automatic calculation of ports according to SAP HANA
Instance Numbers
• Supports multiple HANA systems & instances on one
system
• Dropped packages can be logged via syslog
• Easy configuration
→ via the file /etc/sysconfig/hana_firewall
• Available as RPM package
12
SUSE Firewall for SAP HANA
Example of a Logical Network Diagram with External Firewalls
13
SUSE Firewall for SAP HANA
Example of a Physical Network Diagram
14
SUSE Firewall for SAP HANA
Traffic Flow Example
15
Minimal OS Package Selection
Overview
• The fewer OS packages a HANA system has installed,
the less possible security holes it might have
• Just enough Operating System (JeOS) approach not
perfect for HANA
• Approached based on middle ground
→ Installation patterns “Base System” + “Minimal
System” + some additional packages
• Amount of packages reduced to ~550 from ~1200
(SLES standard installation)
• Described in SAP Note #1855805
16
Minimal OS Package Selection
Comparison between package selections
Amount of installed packages
0
200
400
600
800
1000
1200
1400
SLES Standard
Installation
Base + Minimal +
additional packages
Base + Minimal
17
SUSE Security Updates
• Security vulnerabilities are found almost every day;
Most of them are reported & fixed very quickly
• SUSE constantly provides security updates & patches
• Security updates & patches can be received via the
SUSE Linux Enterprise Server update channels
➔ We generally recommend to configure update channels
• Comparison between certain update & patch strategy
➔ Best update & patch strategy: Selective installation of only
security updates on a regular basis + installation of remaining
updates during maintenance windows
18
Availability of the Hardening Guide
• Download link
→ www.suse.com/products/sles-for-sap/resource-library/
• About the Authors
→ Developed by Markus Guertler (SUSE @ SAP Linux Lab) and
Alexander Bergmann (SUSE Maintenance & Security Team)
• Outlook
Additional and improved hardening settings
Improvements of the firewall (i. e. automatic detection of
installed HANA systems)
Further reduction of the minimal set of packages
Thank you.
19
For more information please
look at
www.suse.com
Unpublished Work of SUSE. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary and trade secret information of SUSE.
Access to this work is restricted to SUSE employees who have a need to know to perform tasks within the scope of
their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated,
abridged, condensed, expanded, collected, or adapted without the prior written consent of SUSE.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making
purchasing decisions. SUSE makes no representations or warranties with respect to the contents of this document,
and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The
development, release, and timing of features or functionality described for SUSE products remains at the sole
discretion of SUSE. Further, SUSE reserves the right to revise this document and to make changes to its content, at
any time, without obligation to notify any person or entity of such revisions or changes. All SUSE marks referenced in
this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All
third-party trademarks are the property of their respective owners.

Más contenido relacionado

La actualidad más candente

Red Hat Openshift Fundamentals.pptx
Red Hat Openshift Fundamentals.pptxRed Hat Openshift Fundamentals.pptx
Red Hat Openshift Fundamentals.pptxssuser18b1c6
 
X86平台三种不同的虚拟化之路
X86平台三种不同的虚拟化之路X86平台三种不同的虚拟化之路
X86平台三种不同的虚拟化之路Jasson wong
 
Introduction to Ansible
Introduction to AnsibleIntroduction to Ansible
Introduction to AnsibleKnoldus Inc.
 
Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Novell
 
오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례SONG INSEOB
 
Version Control System
Version Control SystemVersion Control System
Version Control Systemguptaanil
 
OpenShift Virtualization- Technical Overview.pdf
OpenShift Virtualization- Technical Overview.pdfOpenShift Virtualization- Technical Overview.pdf
OpenShift Virtualization- Technical Overview.pdfssuser1490e8
 
GIT | Distributed Version Control System
GIT | Distributed Version Control SystemGIT | Distributed Version Control System
GIT | Distributed Version Control SystemMohammad Imam Hossain
 
Red Hat OpenStack 17 저자직강+스터디그룹_1주차
Red Hat OpenStack 17 저자직강+스터디그룹_1주차Red Hat OpenStack 17 저자직강+스터디그룹_1주차
Red Hat OpenStack 17 저자직강+스터디그룹_1주차Nalee Jang
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentalsRaghu nath
 
Prometheus - basics
Prometheus - basicsPrometheus - basics
Prometheus - basicsJuraj Hantak
 
An Introduction to OpenStack Heat
An Introduction to OpenStack HeatAn Introduction to OpenStack Heat
An Introduction to OpenStack HeatMirantis
 
Jenkins를 활용한 Openshift CI/CD 구성
Jenkins를 활용한 Openshift CI/CD 구성 Jenkins를 활용한 Openshift CI/CD 구성
Jenkins를 활용한 Openshift CI/CD 구성 rockplace
 
Openstack zun,virtual kubelet
Openstack zun,virtual kubeletOpenstack zun,virtual kubelet
Openstack zun,virtual kubeletChanyeol yoon
 
Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxCon
Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxConAnatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxCon
Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxConJérôme Petazzoni
 
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge ShareAIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share.Gastón. .Bx.
 

La actualidad más candente (20)

Red Hat Openshift Fundamentals.pptx
Red Hat Openshift Fundamentals.pptxRed Hat Openshift Fundamentals.pptx
Red Hat Openshift Fundamentals.pptx
 
X86平台三种不同的虚拟化之路
X86平台三种不同的虚拟化之路X86平台三种不同的虚拟化之路
X86平台三种不同的虚拟化之路
 
Introduction to Ansible
Introduction to AnsibleIntroduction to Ansible
Introduction to Ansible
 
ansible why ?
ansible why ?ansible why ?
ansible why ?
 
Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)
 
오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례
 
Version Control System
Version Control SystemVersion Control System
Version Control System
 
OpenShift Virtualization- Technical Overview.pdf
OpenShift Virtualization- Technical Overview.pdfOpenShift Virtualization- Technical Overview.pdf
OpenShift Virtualization- Technical Overview.pdf
 
GIT | Distributed Version Control System
GIT | Distributed Version Control SystemGIT | Distributed Version Control System
GIT | Distributed Version Control System
 
Red Hat OpenStack 17 저자직강+스터디그룹_1주차
Red Hat OpenStack 17 저자직강+스터디그룹_1주차Red Hat OpenStack 17 저자직강+스터디그룹_1주차
Red Hat OpenStack 17 저자직강+스터디그룹_1주차
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentals
 
Prometheus - basics
Prometheus - basicsPrometheus - basics
Prometheus - basics
 
Automating with Ansible
Automating with AnsibleAutomating with Ansible
Automating with Ansible
 
An Introduction to OpenStack Heat
An Introduction to OpenStack HeatAn Introduction to OpenStack Heat
An Introduction to OpenStack Heat
 
Jenkins를 활용한 Openshift CI/CD 구성
Jenkins를 활용한 Openshift CI/CD 구성 Jenkins를 활용한 Openshift CI/CD 구성
Jenkins를 활용한 Openshift CI/CD 구성
 
Ansible - Introduction
Ansible - IntroductionAnsible - Introduction
Ansible - Introduction
 
Helm 3
Helm 3Helm 3
Helm 3
 
Openstack zun,virtual kubelet
Openstack zun,virtual kubeletOpenstack zun,virtual kubelet
Openstack zun,virtual kubelet
 
Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxCon
Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxConAnatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxCon
Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxCon
 
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge ShareAIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share
 

Destacado

System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Applicationedavid2685
 
20150314 appforofficestudy
20150314 appforofficestudy20150314 appforofficestudy
20150314 appforofficestudyhipsrinoky
 
5 saso2012-presentation
5 saso2012-presentation5 saso2012-presentation
5 saso2012-presentationAle Cignetti
 
Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating? Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating? tonivanuzzo
 
Khoa hoc internet marketing SEO DAO TAO by TTV
Khoa hoc internet marketing SEO DAO TAO by TTVKhoa hoc internet marketing SEO DAO TAO by TTV
Khoa hoc internet marketing SEO DAO TAO by TTVĐào tạo Seo
 
INSPIRED Magazine Vol 02 Issue 03
INSPIRED Magazine Vol 02 Issue 03INSPIRED Magazine Vol 02 Issue 03
INSPIRED Magazine Vol 02 Issue 03Amy Bensema
 
Прайс-лист LR 2/2015
Прайс-лист LR 2/2015Прайс-лист LR 2/2015
Прайс-лист LR 2/2015t575ae
 
FloatMagic Power Point Presentation
FloatMagic Power Point PresentationFloatMagic Power Point Presentation
FloatMagic Power Point Presentationstoneworts
 
2013 qld pga championship sponsorship invitation
2013 qld pga championship   sponsorship invitation2013 qld pga championship   sponsorship invitation
2013 qld pga championship sponsorship invitationAndrew Allpass
 
Bahsa slang amerika
Bahsa slang amerikaBahsa slang amerika
Bahsa slang amerikaMiz Endang
 
INSPIRE Past-Present-Future
INSPIRE Past-Present-FutureINSPIRE Past-Present-Future
INSPIRE Past-Present-Futuresmespire
 
безпека життєдіяльності
безпека життєдіяльностібезпека життєдіяльності
безпека життєдіяльностіlyhlszosh
 
Lowering the entry barrier for INSPIRE compliant Web Services
Lowering the entry barrier for INSPIRE compliant Web ServicesLowering the entry barrier for INSPIRE compliant Web Services
Lowering the entry barrier for INSPIRE compliant Web Servicessmespire
 
Session 60 Jennie Eriksson
Session 60 Jennie ErikssonSession 60 Jennie Eriksson
Session 60 Jennie ErikssonOccas
 

Destacado (20)

System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
20150314 appforofficestudy
20150314 appforofficestudy20150314 appforofficestudy
20150314 appforofficestudy
 
5 saso2012-presentation
5 saso2012-presentation5 saso2012-presentation
5 saso2012-presentation
 
Task 4.3 ts
Task 4.3 tsTask 4.3 ts
Task 4.3 ts
 
Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating? Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating?
 
1
11
1
 
Storyboards
StoryboardsStoryboards
Storyboards
 
Khoa hoc internet marketing SEO DAO TAO by TTV
Khoa hoc internet marketing SEO DAO TAO by TTVKhoa hoc internet marketing SEO DAO TAO by TTV
Khoa hoc internet marketing SEO DAO TAO by TTV
 
INSPIRED Magazine Vol 02 Issue 03
INSPIRED Magazine Vol 02 Issue 03INSPIRED Magazine Vol 02 Issue 03
INSPIRED Magazine Vol 02 Issue 03
 
Прайс-лист LR 2/2015
Прайс-лист LR 2/2015Прайс-лист LR 2/2015
Прайс-лист LR 2/2015
 
Exposición baltazar
Exposición baltazarExposición baltazar
Exposición baltazar
 
FloatMagic Power Point Presentation
FloatMagic Power Point PresentationFloatMagic Power Point Presentation
FloatMagic Power Point Presentation
 
2013 qld pga championship sponsorship invitation
2013 qld pga championship   sponsorship invitation2013 qld pga championship   sponsorship invitation
2013 qld pga championship sponsorship invitation
 
Bahsa slang amerika
Bahsa slang amerikaBahsa slang amerika
Bahsa slang amerika
 
INSPIRE Past-Present-Future
INSPIRE Past-Present-FutureINSPIRE Past-Present-Future
INSPIRE Past-Present-Future
 
безпека життєдіяльності
безпека життєдіяльностібезпека життєдіяльності
безпека життєдіяльності
 
Lowering the entry barrier for INSPIRE compliant Web Services
Lowering the entry barrier for INSPIRE compliant Web ServicesLowering the entry barrier for INSPIRE compliant Web Services
Lowering the entry barrier for INSPIRE compliant Web Services
 
Ljudkort
LjudkortLjudkort
Ljudkort
 
Session 60 Jennie Eriksson
Session 60 Jennie ErikssonSession 60 Jennie Eriksson
Session 60 Jennie Eriksson
 
Rpt btsk tahun 1
Rpt btsk tahun 1 Rpt btsk tahun 1
Rpt btsk tahun 1
 

Similar a OS Security Hardening for SAP HANA

Gartner Data Center Conference 2014 - When Downtime is Not an Option.
Gartner Data Center Conference 2014 - When Downtime is Not an Option.Gartner Data Center Conference 2014 - When Downtime is Not an Option.
Gartner Data Center Conference 2014 - When Downtime is Not an Option.Joe Felisky
 
SUSE, Hadoop and Big Data Update. Stephen Mogg, SUSE UK
SUSE, Hadoop and Big Data Update. Stephen Mogg, SUSE UKSUSE, Hadoop and Big Data Update. Stephen Mogg, SUSE UK
SUSE, Hadoop and Big Data Update. Stephen Mogg, SUSE UKhuguk
 
Running SAP on SUSE Cloud 2.0
Running SAP on SUSE Cloud 2.0Running SAP on SUSE Cloud 2.0
Running SAP on SUSE Cloud 2.0Dirk Oppenkowski
 
SUSE Open Stack Cloud.
SUSE Open Stack Cloud.SUSE Open Stack Cloud.
SUSE Open Stack Cloud.briggsy_uk
 
Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2
Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2
Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 WSO2
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathanaminpathan11
 
SUSE OpenStack Cloud
SUSE OpenStack CloudSUSE OpenStack Cloud
SUSE OpenStack CloudFinceptum Oy
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeYusuf Hadiwinata Sutandar
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxssuser20fcbe
 
SUSE Expert Days Paris 2018 – SLE 15
SUSE Expert Days Paris 2018 – SLE 15SUSE Expert Days Paris 2018 – SLE 15
SUSE Expert Days Paris 2018 – SLE 15SUSE
 
OSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerOSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerNETWAYS
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using AnsibleSonatype
 
SUSE Enterprise Storage - a Gentle Introduction
SUSE Enterprise Storage - a Gentle IntroductionSUSE Enterprise Storage - a Gentle Introduction
SUSE Enterprise Storage - a Gentle IntroductionGábor Nyers
 
Fut1112 - SLES for SAP - The road ahead
Fut1112 - SLES for SAP - The road aheadFut1112 - SLES for SAP - The road ahead
Fut1112 - SLES for SAP - The road aheadChristian Holsing
 
OpenStack: Past, Present, and Future
OpenStack: Past, Present, and FutureOpenStack: Past, Present, and Future
OpenStack: Past, Present, and FutureTesora
 
Configuration testing
Configuration testingConfiguration testing
Configuration testingfarouq umar
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 

Similar a OS Security Hardening for SAP HANA (20)

Gartner Data Center Conference 2014 - When Downtime is Not an Option.
Gartner Data Center Conference 2014 - When Downtime is Not an Option.Gartner Data Center Conference 2014 - When Downtime is Not an Option.
Gartner Data Center Conference 2014 - When Downtime is Not an Option.
 
SUSE, Hadoop and Big Data Update. Stephen Mogg, SUSE UK
SUSE, Hadoop and Big Data Update. Stephen Mogg, SUSE UKSUSE, Hadoop and Big Data Update. Stephen Mogg, SUSE UK
SUSE, Hadoop and Big Data Update. Stephen Mogg, SUSE UK
 
Running SAP on SUSE Cloud 2.0
Running SAP on SUSE Cloud 2.0Running SAP on SUSE Cloud 2.0
Running SAP on SUSE Cloud 2.0
 
SUSE Open Stack Cloud.
SUSE Open Stack Cloud.SUSE Open Stack Cloud.
SUSE Open Stack Cloud.
 
Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2
Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2
Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
 
SUSE OpenStack Cloud
SUSE OpenStack CloudSUSE OpenStack Cloud
SUSE OpenStack Cloud
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
 
Securing Windows web servers
Securing Windows web serversSecuring Windows web servers
Securing Windows web servers
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptx
 
SUSE Expert Days Paris 2018 – SLE 15
SUSE Expert Days Paris 2018 – SLE 15SUSE Expert Days Paris 2018 – SLE 15
SUSE Expert Days Paris 2018 – SLE 15
 
OSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerOSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim Werner
 
WAF in Scale
WAF in ScaleWAF in Scale
WAF in Scale
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using Ansible
 
SUSE Enterprise Storage - a Gentle Introduction
SUSE Enterprise Storage - a Gentle IntroductionSUSE Enterprise Storage - a Gentle Introduction
SUSE Enterprise Storage - a Gentle Introduction
 
Fut1112 - SLES for SAP - The road ahead
Fut1112 - SLES for SAP - The road aheadFut1112 - SLES for SAP - The road ahead
Fut1112 - SLES for SAP - The road ahead
 
OpenStack: Past, Present, and Future
OpenStack: Past, Present, and FutureOpenStack: Past, Present, and Future
OpenStack: Past, Present, and Future
 
Configuration testing
Configuration testingConfiguration testing
Configuration testing
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 

Más de Dirk Oppenkowski

SAP S/4 HANA Disaster Recovery Confidence
SAP S/4 HANA Disaster Recovery ConfidenceSAP S/4 HANA Disaster Recovery Confidence
SAP S/4 HANA Disaster Recovery ConfidenceDirk Oppenkowski
 
Automating SAP HANA System Replication
Automating SAP HANA System ReplicationAutomating SAP HANA System Replication
Automating SAP HANA System ReplicationDirk Oppenkowski
 
Strategic Choices in SAP S/4 HANA Deployment
Strategic Choices in SAP S/4 HANA DeploymentStrategic Choices in SAP S/4 HANA Deployment
Strategic Choices in SAP S/4 HANA DeploymentDirk Oppenkowski
 
SAP HANA Enterprise Cloud on SUSE Linux
SAP HANA Enterprise Cloud on SUSE LinuxSAP HANA Enterprise Cloud on SUSE Linux
SAP HANA Enterprise Cloud on SUSE LinuxDirk Oppenkowski
 
SAP HANA System Replication simplified
SAP HANA System Replication simplifiedSAP HANA System Replication simplified
SAP HANA System Replication simplifiedDirk Oppenkowski
 
Disaster Recovery for SAP HANA with SUSE Linux
Disaster Recovery for SAP HANA with SUSE LinuxDisaster Recovery for SAP HANA with SUSE Linux
Disaster Recovery for SAP HANA with SUSE LinuxDirk Oppenkowski
 
Leveraging SUSE Linux to run SAP HANA on the Amazon Web Services Cloud
Leveraging SUSE Linux to run SAP HANA on the Amazon Web Services CloudLeveraging SUSE Linux to run SAP HANA on the Amazon Web Services Cloud
Leveraging SUSE Linux to run SAP HANA on the Amazon Web Services CloudDirk Oppenkowski
 
COMPLETE Cloud – Capgemini’s Business Platform – Powered by AWS/SUSE
COMPLETE Cloud – Capgemini’s Business Platform – Powered by AWS/SUSECOMPLETE Cloud – Capgemini’s Business Platform – Powered by AWS/SUSE
COMPLETE Cloud – Capgemini’s Business Platform – Powered by AWS/SUSEDirk Oppenkowski
 
SAP HANA System Replication with SLES for SAP
SAP HANA System Replication with SLES for SAPSAP HANA System Replication with SLES for SAP
SAP HANA System Replication with SLES for SAPDirk Oppenkowski
 
Cisco and SUSE Linux: The perfect platform for SAP
Cisco and SUSE Linux: The perfect platform for SAPCisco and SUSE Linux: The perfect platform for SAP
Cisco and SUSE Linux: The perfect platform for SAPDirk Oppenkowski
 
Migrating SAP from UNIX to SUSE Linux
Migrating SAP from UNIX to SUSE LinuxMigrating SAP from UNIX to SUSE Linux
Migrating SAP from UNIX to SUSE LinuxDirk Oppenkowski
 
Trends in SAP Data Centers
Trends in SAP Data CentersTrends in SAP Data Centers
Trends in SAP Data CentersDirk Oppenkowski
 
Intel SUSE Texperts Webinar
Intel SUSE Texperts WebinarIntel SUSE Texperts Webinar
Intel SUSE Texperts WebinarDirk Oppenkowski
 
SUSE Linux Enterprise and SAP NetWeaver 7.30 HA Cluster
SUSE Linux Enterprise and SAP NetWeaver 7.30 HA Cluster SUSE Linux Enterprise and SAP NetWeaver 7.30 HA Cluster
SUSE Linux Enterprise and SAP NetWeaver 7.30 HA Cluster Dirk Oppenkowski
 
SUSE Linux Enterprise: The Open Platform for SAP
SUSE Linux Enterprise: The Open Platform for SAPSUSE Linux Enterprise: The Open Platform for SAP
SUSE Linux Enterprise: The Open Platform for SAPDirk Oppenkowski
 

Más de Dirk Oppenkowski (19)

SAP S/4 HANA Disaster Recovery Confidence
SAP S/4 HANA Disaster Recovery ConfidenceSAP S/4 HANA Disaster Recovery Confidence
SAP S/4 HANA Disaster Recovery Confidence
 
Automating SAP HANA System Replication
Automating SAP HANA System ReplicationAutomating SAP HANA System Replication
Automating SAP HANA System Replication
 
Strategic Choices in SAP S/4 HANA Deployment
Strategic Choices in SAP S/4 HANA DeploymentStrategic Choices in SAP S/4 HANA Deployment
Strategic Choices in SAP S/4 HANA Deployment
 
SAP HANA Enterprise Cloud on SUSE Linux
SAP HANA Enterprise Cloud on SUSE LinuxSAP HANA Enterprise Cloud on SUSE Linux
SAP HANA Enterprise Cloud on SUSE Linux
 
SAP HANA System Replication simplified
SAP HANA System Replication simplifiedSAP HANA System Replication simplified
SAP HANA System Replication simplified
 
Sles for sap b1
Sles for sap b1Sles for sap b1
Sles for sap b1
 
Disaster Recovery for SAP HANA with SUSE Linux
Disaster Recovery for SAP HANA with SUSE LinuxDisaster Recovery for SAP HANA with SUSE Linux
Disaster Recovery for SAP HANA with SUSE Linux
 
Leveraging SUSE Linux to run SAP HANA on the Amazon Web Services Cloud
Leveraging SUSE Linux to run SAP HANA on the Amazon Web Services CloudLeveraging SUSE Linux to run SAP HANA on the Amazon Web Services Cloud
Leveraging SUSE Linux to run SAP HANA on the Amazon Web Services Cloud
 
COMPLETE Cloud – Capgemini’s Business Platform – Powered by AWS/SUSE
COMPLETE Cloud – Capgemini’s Business Platform – Powered by AWS/SUSECOMPLETE Cloud – Capgemini’s Business Platform – Powered by AWS/SUSE
COMPLETE Cloud – Capgemini’s Business Platform – Powered by AWS/SUSE
 
SAP HANA System Replication with SLES for SAP
SAP HANA System Replication with SLES for SAPSAP HANA System Replication with SLES for SAP
SAP HANA System Replication with SLES for SAP
 
Cisco and SUSE Linux: The perfect platform for SAP
Cisco and SUSE Linux: The perfect platform for SAPCisco and SUSE Linux: The perfect platform for SAP
Cisco and SUSE Linux: The perfect platform for SAP
 
SAP on Linux
SAP on LinuxSAP on Linux
SAP on Linux
 
SAP Migrations made easy
SAP Migrations made easySAP Migrations made easy
SAP Migrations made easy
 
Sapphire Orlando 2013
Sapphire Orlando 2013Sapphire Orlando 2013
Sapphire Orlando 2013
 
Migrating SAP from UNIX to SUSE Linux
Migrating SAP from UNIX to SUSE LinuxMigrating SAP from UNIX to SUSE Linux
Migrating SAP from UNIX to SUSE Linux
 
Trends in SAP Data Centers
Trends in SAP Data CentersTrends in SAP Data Centers
Trends in SAP Data Centers
 
Intel SUSE Texperts Webinar
Intel SUSE Texperts WebinarIntel SUSE Texperts Webinar
Intel SUSE Texperts Webinar
 
SUSE Linux Enterprise and SAP NetWeaver 7.30 HA Cluster
SUSE Linux Enterprise and SAP NetWeaver 7.30 HA Cluster SUSE Linux Enterprise and SAP NetWeaver 7.30 HA Cluster
SUSE Linux Enterprise and SAP NetWeaver 7.30 HA Cluster
 
SUSE Linux Enterprise: The Open Platform for SAP
SUSE Linux Enterprise: The Open Platform for SAPSUSE Linux Enterprise: The Open Platform for SAP
SUSE Linux Enterprise: The Open Platform for SAP
 

Último

How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics
 

Último (20)

How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024
 

OS Security Hardening for SAP HANA

  • 1. Operating System Security Hardening for SAP HANA Peter Schinagl Technical Architect Global SAP Alliance peters@suse.com Markus Gürtler Architect & Technical Manager SAP Linux Lab mguertler@suse.com
  • 3. 3 SUSE Linux Enterprise Server Security Components AppArmor for fine-grained security tuning Security Certifications like FIPS, EAL4+, etc. Security patches and updates over the whole product lifecycle SUSE Firewall2 Easy to administer OS firewall Intrusion Detection using AIDE OS Security Guide covering all security topics Linux Audit System CAPP-compliant auditing system + more
  • 4. 4 Classification of the Hardening Guide SUSE Security Guide OS Security Hardening Guide for SAP HANA SAP HANA Security Guide Operating System genericSAP HANA specific
  • 5. 5 Content of the Security Guides SAP HANA Security Guide OS Security Hardening Guide for HANA - Network and Communication Security - User and Role Management - Authentication and Single Sign-On - Authorization - Storage Security - etc. Application Operating System SUSE Security Guide - SUSE Security Features - Authentication - Local Security - AppArmor & SELinux - The Linux Audit Framework - etc. Operating System - OS Security Hardening Settings - Local Firewall for HANA - Minimal OS Package Selection - Update & Patch Strategies - etc.
  • 6. 6 Customized OS Security Hardening for SAP HANA Security Hardening Settings for HANA SUSE Firewall for HANA Minimal OS package selection SUSE Security Updates
  • 7. 7 Security Hardening Setttings Overview • Covers all relevant security topics (see next slide) • Provides for each setting ✔ Detailed description ✔ Possible impact on the system ✔ Implementation priority • Settings based on a professional Security Audit • Implemented and tested by a large pilot customer
  • 8. 8 Security Hardening Setttings Categories • Authentication Settings → User login restrictions, password policy, etc. • System Access Settings → Local and remote access restrictions • Networking Settings → i. e. behavior of the Linux IP stack • Linux Service permissions → i. e. disallow of 'at'-jobs • File permissions → Access rights of security-critical files • Logging and Reporting → Behavior of the system logging, security reports, etc.
  • 9. 9 Security Hardening Setttings Examples • Prohibit root login via ssh • Setup password strengthening • Adjust sysctl variables (i. e. network settings) • Adjust default umask • Change permissions of certain system files • Forwarding of syslog files to a central syslog server • Configure user login restrictions via access.conf • etc.
  • 10. 10 Security Hardening Setttings Detailed Example: Prohibit login as root via ssh Description By default, the user “root” is allowed to remotely log in via ssh. This has two disadvantages: First, root logins are logged, but cannot be associated with a particular user. This is especially a disadvantage if more than one system administrator makes changes on the system. Second, a stolen root password allows an attacker to login directly to the system. Instead of logging in as a normal user first, then doing “su” or a “sudo,” an attacker just requires the root password. Procedure Edit /etc/ssh/sshd.conf and set parameter PermitRootLogin no Impact Root no longer can be used to login remotely, so that users are required to use “su” or “sudo” to gain root access when using ssh. Priority: high
  • 11. 11 SUSE Firewall for SAP HANA Overview • Local firewall dedicated for SAP HANA • Predefined service definitions according to “SAP HANA Master Guide” • Automatic calculation of ports according to SAP HANA Instance Numbers • Supports multiple HANA systems & instances on one system • Dropped packages can be logged via syslog • Easy configuration → via the file /etc/sysconfig/hana_firewall • Available as RPM package
  • 12. 12 SUSE Firewall for SAP HANA Example of a Logical Network Diagram with External Firewalls
  • 13. 13 SUSE Firewall for SAP HANA Example of a Physical Network Diagram
  • 14. 14 SUSE Firewall for SAP HANA Traffic Flow Example
  • 15. 15 Minimal OS Package Selection Overview • The fewer OS packages a HANA system has installed, the less possible security holes it might have • Just enough Operating System (JeOS) approach not perfect for HANA • Approached based on middle ground → Installation patterns “Base System” + “Minimal System” + some additional packages • Amount of packages reduced to ~550 from ~1200 (SLES standard installation) • Described in SAP Note #1855805
  • 16. 16 Minimal OS Package Selection Comparison between package selections Amount of installed packages 0 200 400 600 800 1000 1200 1400 SLES Standard Installation Base + Minimal + additional packages Base + Minimal
  • 17. 17 SUSE Security Updates • Security vulnerabilities are found almost every day; Most of them are reported & fixed very quickly • SUSE constantly provides security updates & patches • Security updates & patches can be received via the SUSE Linux Enterprise Server update channels ➔ We generally recommend to configure update channels • Comparison between certain update & patch strategy ➔ Best update & patch strategy: Selective installation of only security updates on a regular basis + installation of remaining updates during maintenance windows
  • 18. 18 Availability of the Hardening Guide • Download link → www.suse.com/products/sles-for-sap/resource-library/ • About the Authors → Developed by Markus Guertler (SUSE @ SAP Linux Lab) and Alexander Bergmann (SUSE Maintenance & Security Team) • Outlook Additional and improved hardening settings Improvements of the firewall (i. e. automatic detection of installed HANA systems) Further reduction of the minimal set of packages
  • 19. Thank you. 19 For more information please look at www.suse.com
  • 20.
  • 21. Unpublished Work of SUSE. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary and trade secret information of SUSE. Access to this work is restricted to SUSE employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of SUSE. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. SUSE makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for SUSE products remains at the sole discretion of SUSE. Further, SUSE reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All SUSE marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.