16
Oracle ® Hospitality OPERA Cloud Services Security Guide Release 1.20 E69079-01 June 2016

Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

  • Upload
    others

  • View
    9

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

Oracle® Hospitality OPERA Cloud Services

Security Guide Release 1.20 E69079-01

June 2016

Page 2: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

Copyright © 2016, Oracle and/or its affiliates. All rights reserved.

This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.

The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.

If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable:

U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.

This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.

This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle.

Page 3: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

iii

Contents

Preface ....................................................................................................... 1

Audience .................................................................................................................................. 1

Customer Support ................................................................................................................... 1

Related Documentation .......................................................................................................... 1

PCI Security Standards Council Reference Documents ............................................. 1

Revision History ...................................................................................................................... 2

1 OPERA Cloud Security Overview ....................................................... 3

Basic Security Considerations ............................................................................................... 3

2 OPERA Cloud Network ....................................................................... 4

OPERA Cloud Server Components ...................................................................................... 4

3 Understanding the OPERA Cloud Environment ................................. 5

4 Recommended Deployment Configurations ....................................... 6

Credit/Debit Cardholder Dataflow ..................................................................................... 6

5 OPERA Cloud Component Security .................................................... 8

Operating System Security .................................................................................................... 8

Oracle Database Security ....................................................................................................... 8

WebLogic Server Security ...................................................................................................... 8

6 Performing a Secure OPERA Cloud Installation ................................. 9

The 12 Requirements of the PCI DSS ................................................................................... 9

7 Implementing OPERA Cloud Security .............................................. 10

Appendix A: Secure Deployment Checklist .......................................... 12

Page 4: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality
Page 5: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

Preface A-1

Preface

This document provides security reference and guidance for Oracle Hospitality OPERA Cloud Services.

Audience This document is intended for:

OPERA Customers

Oracle Installers

Oracle Dealers

Oracle Customer Service

Oracle Training Personnel

MIS Personnel

Customer Support To contact Oracle Customer Support, access My Oracle Support at the following URL:

https://support.oracle.com

When contacting Customer Support, please provide the following:

Product version and program/module name

Functional and technical description of the problem (include business impact)

Detailed step-by-step instructions to re-create

Exact error message received

Screen shots of each step you take

Related Documentation

PCI Security Standards Council Reference Documents

The following documents provide additional detail for the Payment Applications - Data

Security Standard (PA-DSS) and related security programs, such as Payment Card

Industry Data Security Standard (PCI DSS) and Open Web Application Security Project

(OWASP):

PA-DSS

https://www.pcisecuritystandards.org/security_standards/index.php

PCI DSS

https://www.pcisecuritystandards.org/security_standards/index.php

Page 6: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

A-2 Preface

OWASP

http://www.owasp.org

Center for Internet Security (CIS) Benchmarks (used for OS Hardening)

https://benchmarks.cisecurity.org/downloads/multiform/

For Oracle products documentation, visit the Oracle Help Center website at

http://docs.oracle.com.

Revision History

Date Description of Change

08-Feb-2016 Initial publication.

Page 7: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

OPERA Cloud Security Overview A-3

1 OPERA Cloud Security Overview

This chapter provides an overview of Oracle Hospitality OPERA Cloud Services

(OPERA Cloud) security and explains the general principles of application

security.

Basic Security Considerations The following principles are fundamental to using any application securely:

Keep software up to date. This includes the latest product release and any

patches that apply to it.

Limit privileges as much as possible. Users should be given only the access

necessary to perform their work. Organizations should review user privileges

periodically to determine relevance to current work requirements.

Monitor system activity. Establish who should access which system

components, and how often, and monitor those components.

Install software securely. For example, use firewalls, secure protocols using

Transport Layer Security (TLS)/ Secure Sockets Layer (SSL) and secure

passwords. For more information, see Chapter 2.

Learn about and use the OPERA Cloud security features. For more

information, see Chapter 3.

Use secure development practices. For example, take advantage of existing

database security functionality instead of creating your own application

security.

Keep up to date on security information. Oracle regularly issues security-

related patch updates and security alerts. You must install all security

patches as soon as possible. For more information, visit the Oracle Critical

Patch Updates and Security Alerts website at http://www.oracle.com/technetwork/topics/security/alerts-086861.html

Page 8: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

A-4 OPERA Cloud Network

2 OPERA Cloud Network

Internet

ProcessorFirewall

Out of scope

In scope

Oracle Database Server

(Runs OPERA Database Server

software on Microsoft Windows

2012 Server, Linux Oracle 6.4)

POS Terminals

(Using Web Browser,

running Windows 8)

Firewall is boundary between

Internal network at merchant

And external public network

Oracle Web/Application Server

(Runs OPERA Application Server

software on Microsoft Windows

2012 Server, Linux Oracle 6.4)

OPERA Cloud Server Components

Oracle Linux 6.4

Windows Server 2012

Page 9: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

Understanding the OPERA Cloud Environment A-5

3 Understanding the OPERA Cloud Environment

When planning your OPERA Cloud implementation, consider the following:

Which resources need protection?

You need to protect customer data, such as credit-card numbers.

You need to protect internal data, such as proprietary source code.

You need to protect system components from being disabled by external

attacks or intentional system overloads.

Who are you protecting data from? For example, you need to protect your

subscribers’ data from other subscribers, but someone in your organization

might need to access that data to manage it. Analyze your workflows to

determine who needs access to the data; for example, it is possible that a

system administrator can manage your system components without needing

to access the system data.

What will happen if protections on a strategic resource fail? In some cases,

a fault in your security scheme is nothing more than an inconvenience. In

other cases, a fault might cause great damage to you or your customers.

Understand the security ramifications of each resource and protect it

properly.

Oracle provides functionality within the OPERA application for Personal

Information (that is passport, date of birth, and credit card). Placing this

information in fields other than the designated areas, such as Notes or

Comments fields, is open for PCI review and does not comply with PA-DSS rules

and regulations.

Page 10: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

A-6 Recommended Deployment Configurations

4 Recommended Deployment Configurations

This section describes recommended deployment configurations for OPERA

Cloud.

Credit/Debit Cardholder Dataflow

1

8

2

7

4

5

36

Data Flow Internal to Customer’s Site

Data Flow External to Customer’s Site

Merchant

Employee

POS Terminal of

OPERA

with Web Browser

OPERA Web and

Application ServerProcessor

Out of ScopeIn Scope

OPERA

Database Server

HTTPS/TLS

1.2 Tunnel

over

Internet

1. Merchant Employee swipes card data on POS terminal or enters card

data manually (when card is not present) into the POS terminal.

2. If merchant employee swipes the card, the POS Terminal sends PAN and

Track 2 encrypted data to the OPERA Application Server.

3. The OPERA Application Server sends this data to the OPERA Database

Server.

4. The OPERA Database formats the data into a request message and sends

the transaction to the Processor.

Page 11: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

Recommended Deployment Configurations A-7

5. The Processor responds with the approval or decline of the transaction.

6. The OPERA Database sends the response to the OPERA Application

Server.

7. The OPERA Application Server directs the response to the correct

terminal.

8. The terminal displays the response to the user to action if needed or to

complete the business transaction.

For more information, see Oracle® Hospitality OPERA Cloud Services PA-DSS

Implementation Guide.

Page 12: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

A-8 OPERA Cloud Component Security

5 OPERA Cloud Component Security

Use only HTTPS or Transport Layer Security (TLS) security with a certification authority

for the OPERA Cloud application.

Use IPsec network protocol to encrypt network traffic. For more information about this

protocol, see IPsec Configuration.

Operating System Security For more information on operating system security, see the following

documents:

Guide to the Secure Configuration of Red Hat Enterprise Linux 5

Hardening Tips for the Red Hat Enterprise Linux 5

Oracle Database Security See Oracle Database Security Guide.

WebLogic Server Security See Oracle Fusion Middleware Securing a Production Environment for Oracle

WebLogic Server.

Page 13: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

Performing a Secure OPERA Cloud Installation A-9

6 Performing a Secure OPERA Cloud Installation

This chapter presents planning information for your OPERA Cloud installation.

The 12 Requirements of the PCI DSS Build and Maintain a Secure Network and Systems

1. Install and maintain a firewall configuration to protect cardholder data.

2. Do not use vendor-supplied defaults for system passwords and other

security parameters.

Protect Cardholder Data

3. Protect stored cardholder data.

4. Encrypt transmission of cardholder data across open, public networks.

Maintain a Vulnerability Management Program

5. Protect all systems against malware and regularly update anti-virus

software or programs.

6. Develop and maintain secure systems and applications.

Implement Strong Access Control Measures

7. Restrict access to cardholder data by business need-to-know.

8. Identify and authenticate access to system components.

9. Restrict physical access to cardholder data.

Regularly Monitor and Test Networks

10. Track and monitor all access to network resources and cardholder data.

11. Regularly test security systems and processes.

Maintain an Information Security Policy

12. Maintain a policy that addresses information security for all personnel.

For more information, see Oracle® Hospitality OPERA Cloud Services PA-DSS

Implementation Guide.

Page 14: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

A-10 Implementing OPERA Cloud Security

7 Implementing OPERA Cloud Security

The diagram below shows the management duties performed by the Tenant

Administrator and the HGBU Application Service Manager.

Multi-tenant Identity Store Model

Page 15: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

Implementing OPERA Cloud Security A-11

The table below lists the user roles, role owners and LDAP privileges of these

roles in OPERA Cloud.

User Management – Roles & Privileges

Page 16: Oracle Hospitality OPERA Cloud Services · 2016-09-09 · OPERA Cloud Security Overview A-3 1 OPERA Cloud Security Overview This chapter provides an overview of Oracle Hospitality

A-12 Appendix A: Secure Deployment Checklist

Appendix A: Secure Deployment Checklist

The following security checklist provides guidelines that help secure your database:

Install only what is required.

Lock and expire default user accounts.

Enforce password management.

Enable data dictionary protection.

Practice the principle of least privilege.

o Grant necessary privileges only.

ii. Revoke unnecessary privileges from the PUBLIC user group.

iii. Restrict permissions on run-time facilities.

Enforce access controls effectively and authenticate clients stringently.

Restrict network access.

Apply all security patches and workarounds.

o Use a firewall.

o Never poke a hole through a firewall.

o Protect the Oracle listener.

o Monitor listener activity.

o Monitor who accesses your systems.

o Check network IP addresses.

o Encrypt network traffic.

o Harden the operating system.

For more information, see Oracle® Hospitality OPERA Cloud Services PA-DSS

Implementation Guide.