Security Guide - Omnichannel Point-Of-Sale - 7.4 (5.19.0) - en
Security Guide - Omnichannel Point-Of-Sale - 7.4 (5.19.0) - en
Security Guide - Omnichannel Point-Of-Sale - 7.4 (5.19.0) - en
Security Guide
1. You may not use the SAP Material for a purpose competitive with SAP or its products unless otherwise
clearly permitted by applicable law.
2. You may not use the SAP corporate logo.
3. No use of other SAP trademarks is granted under this section. For information regarding use of SAP
trademarks, see http://www.sap.com/corporate/en/legal/trademark.html.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or
registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product
and service names mentioned are the trademarks of their respective companies.
Security Guide III
Table of contents
1 Introduction .......................................................................................................................................................... 1
2 Security of the Platform ...................................................................................................................................... 1
2.1 Security Patches ................................................................................................................................................. 1
2.2 Storage Protection .............................................................................................................................................. 2
3 User Management and Authentication .............................................................................................................. 2
3.1 Operating System Users .................................................................................................................................... 2
3.2 User Types ......................................................................................................................................................... 2
3.3 User Management .............................................................................................................................................. 3
3.4 Authentication ..................................................................................................................................................... 3
3.5 Rights.................................................................................................................................................................. 3
4 Security in the Network ....................................................................................................................................... 3
4.1 Network Security ................................................................................................................................................ 3
4.2 Additional Security Guidelines for Decentralized Store Systems ....................................................................... 4
4.2.1 Firewalls ...................................................................................................................................................... 4
4.3 Secure Communication Channels ...................................................................................................................... 4
5 Security of the Data Storage .............................................................................................................................. 5
6 Monitoring ............................................................................................................................................................ 5
7 Certification .......................................................................................................................................................... 5
Security Guide 1
1 Introduction
This document describes security-related topics for the following applications:
• confidentiality
• integrity
• availability
• and authenticity
of the data, all accesses to important information must be carried out in a controlled and traceable manner.
This Security Guide defines a framework for system and information security by explaining:
For additional information on secure operation of the POS application, refer to the PA-DSS "Implementation
Guide".
POS
For the POS system, it is recommended to install the latest security fixes and patches for the system environment
that is certified for the product. In addition to this document, please refer to the Security Guides and security
patches provided by the manufacturer of your POS system.
From a security point of view, it is very important to regularly update operating system components and web
browsers as such updates are regularly provided by the manufacturers. Such updates are almost always used to
fix current security gaps. If these updates are not performed, there is no protection against newer threats. In the
most cases, mechanisms are provided ("automatic updates") that ensure the automatic performance of security-
critical updates and the exclusive use of reliable sources. These indispensable mechanisms enable you to keep the
security of POS systems up-to-date with a low administration effort.
For additional information, refer to the security guidelines of the Security Guide:
http://service.sap.com/securityguide
Standard users that are available after the installation are (Central POS Server only):
Security Guide 3
No specific OS standard users are created for the POS Client during the installation. The security guides of the
respective operating system vendors apply.
3.4 Authentication
The authentication for users on the portal or on the POS Client is carried out by user name/password
authentication.
3.5 Rights
The Omnichannel Point-of-Sale applications use the roles provided by Storemanager. The authorization concept
integrated in Storemanager is based on an assignment of rights to users carried out according to roles. Single roles
can be maintained by the user management integrated in Storemanager. The user import interface is used to
assign the roles to users.
connect with the server LAN (Local Area Network), they are unable to make use of known errors or security gaps in
the server network services.
The individual SAP Omnichannel Point-of-Sale by GK applications communicate with the Central Services and
among each other via secure network connections.
In particular, the options below are used for the communication of the individual applications among each other:
• Devices with packet filter firewalls are very simple firewalls that provide only a limited amount of protection
with a low flexibility. These firewalls are mainly intended for the protection of private PCs and are
unsuitable for use in a store network.
• Multi-functional firewalls, often called security appliances, offer several services in addition to the firewall
functionality. They are typically used to provide secure access for remote administration. Some of these
devices can search for viruses in the network traffic or even repel spam emails. In the case of usual
requirements, they are suitable for small or medium-sized stores.
• Complex firewall systems are used when it is necessary to secure important company applications – e.g.
publicly accessible web and database servers – when a large number of users access high-performance
Internet connections or when the highest possible failure safety should be achieved by a double firewall
design.
Each firewall must be installed and configured correctly, in order to effectively provide protection. Furthermore, it
must be continually administered. The following basic rules must be fulfilled:
• Each communication between the store network and Internet must always be carried out via the firewall. It
is not allowed to bypass the firewall via modem, WLAN or mobile Internet connections.
• Regular security-related updates of the firewall software are necessary to prevent a weak point in the
firewall jeopardizing the whole store network.
• The firewall configuration and administration requires a secure connection. Internet attackers must not be
able to change or read out the firewall configuration. The access must also be limited to authorized
persons of the store network.
• The firewall configuration must be documented. This document must be updated after each modification.
The reason, time and the name of the executing employee must be noted in the event of configuration
changes.
• A correctly configured firewall only allows connections that are absolutely necessary and actually used. All
other connections are blocked.
For further information on the data storage security, please refer to the corresponding sections in the respective
security guides at http://service.sap.com/securityguide
6 Monitoring
• Security-related trace and log files, see Operation Guide
• Central monitoring, see Operation Guide
7 Certification
The Omnichannel Point-of-Sale application is certified for PA-DSS 3.2.
Contact
GK SOFTWARE SE
Waldstraße 7
08261 Schöneck
Germany
Email: [email protected]
www.gk-software.com