Pega Platform Application Security
Pega Platform Application Security
Contents
Executive summary ............................................................................................................................................ 2
Regulatory compliance .................................................................................................................................. 2
Our commitment ............................................................................................................................................ 2
Pega Application Security .................................................................................................................................. 3
OWASP Top 10 – 2017 ................................................................................................................................... 3
Security features ............................................................................................................................................ 5
Java Enterprise Edition (JEE) ........................................................................................................................ 5
Authentication ............................................................................................................................................. 5
Authorization ............................................................................................................................................... 6
Session management .................................................................................................................................. 6
Data validation ............................................................................................................................................ 6
Cryptography ............................................................................................................................................... 7
Ciphers and keys .......................................................................................................................................... 7
Data protection ............................................................................................................................................ 8
Auditing ........................................................................................................................................................ 8
Security alerts .............................................................................................................................................. 8
© Copyright 2018 Pegasystems Inc. Confidential All rights reserved. All trademarks are the property of their respective owners .
1
Pega Platform Application Security
Executive summary
The methodology and processes used by the Pega development organization ensure the
development of secure applications and provide the high degree of confidence and
sophisticated level of information assurance expected by end users. These aspects include:
Engineering security training
Mitigation of the Open Web Application Security Project (OWASP) Top 10 and other
common application security risks
Security tools
Regulatory compliance
Pega Platform™ is compliant with security standards and regulations such as PCI DSS and
HIPAA. It includes features such as protected data storage, data encryption, data access
controls, and unique user identifiers.
Our commitment
Pega is committed to providing products that enable customers to design, build, and run secure
applications with:
A Secure Software Development Life Cycle that ensures we build secure software
Note: This document does not describe how to secure your application. This document is intended to
give an overview of the Pega commitment to security with a review of the software and functionality
available to address security for enterprise business applications within Pega software. Pega Cloud
offerings and Pega Consulting Services will work with customers to derive the best security controls
for their solution, but may make recommendations based on the deployment environment and
compliance objectives that are operational in nature that are not reflected in this document.
© Copyright 2018 Pegasystems Inc. Confidential All rights reserved. All trademarks are the property of their respective owners .
2
Pega Platform Application Security
Pega Platform enables the development of secure applications with built-in protection
mechanisms and defenses against attacks and common vulnerabilities as described in
the article OWASP Top 10 – 2017: The Ten Most Critical Web Application Security Risks.
A1. Injection – Multiple safeguards are provided against all injection attack types. All
input data must pass through filters in Pega Platform. Specific injection flaws are
addressed as follows:
SQL – Built-in database access uses prepared statements with parameterized
queries as well as whitelist input validation for query data supplied by the client.
XXE – All XML parsers have external entity resolution disabled.
LDAP – Sample and out-of-the-box rules that interface to LDAP filter user-
supplied data before submitting requests.
A2. Broken Authentication – Pega Platform provides many control options for
implementing strong authentication, such as:
SAML SSO
OAuth 2
Kerberos
Password strength policies
Captcha
Multi-factor authentication
Brute force mitigation
Operator disablement
A3. Sensitive Data Exposure – Strong protection must be considered for sensitive data
in transit and at rest.
Data at rest – There are multiple options for protecting data at rest. In addition
to encryption by the data base provider, Pega Platform supports encryption of
individual database columns as well. You can supply your own key or cipher
options. The Pega Platform built-in encryption capability encrypts selected data
using the Advanced Encrypt Standard (AES).
Data in transit – Pega Platform supports transport level encryption for browser-
based sessions as well as input and output REST service calls.
© Copyright 2018 Pegasystems Inc. Confidential All rights reserved. All trademarks are the property of their respective owners .
3
Pega Platform Application Security
Data display – Access control polices determine user permissions for viewing
data. You can perform full or partial masking of sensitive data.
A4. XML External Entities (XXE) – Pega Platform uses JSON instead of XML whenever
possible. Where XML is still used, Pega employs both dynamic and static analysis tools
and techniques to identify and correct potential vulnerabilities to XXE. Finally, our
developer training courses cover this type of attack and describe how to prevent it.
A5. Broken Access Control – Pega Platform provides strong access control capabilities
that grant user access to data objects and application functions only when needed. This
is accomplished through both role-based access controls and attribute-based access
controls working in tandem.
A6. Security Misconfiguration – Customers are encouraged to take the appropriate
steps for their environment in order to make their applications more secure. Within the
Designer Studio, a security checklist with over thirty items is provided for every
application to help customers build secure applications. This checklist is a dynamic
document that tracks the progress of securing an application.
A7. Cross Site Scripting (XSS) – Pega Platform performs whitelist input data validation
and employs XSS filters for blocking malicious characters. Data is also filtered and
encoded as necessary during output processing to disable client-side attacks. Support is
provided for configuring a Content Security Policy (CSP) as well as Cross Origin Resource
Sharing (CORS) policies for your application to defend against XSS.
A8. Insecure Deserialization – Pega Platform uses strong type checking during
deserialization to mitigate this vulnerability.
A9. Using Components with Known Vulnerabilities – Pega performs frequent security
analysis of third-party components included in Pega Platform. Commercial products
that are specifically built for this purpose are used. Pega responds immediately to
security issues discovered on-site in Pega Platform and provides fixes in the timeliest
manner possible. Pega also encourages customers to install all of the latest patches to
third-party components and to continuously monitor the security of these products to
ensure their efficacy.
A10. Insufficient Logging and Monitoring – Pega Platform provides auditing of normal
business activity as well as logging of a comprehensive set of security-related events.
Included are events related to authentication, data access, and security administration.
Custom event logging is also supported. Using a log aggregator and query functions,
patterns of suspicious behavior are detected and acted upon.
© Copyright 2018 Pegasystems Inc. Confidential All rights reserved. All trademarks are the property of their respective owners .
4
Pega Platform Application Security
Security features
Pega Platform provides a broad range of security capabilities to prevent malicious use
of, and access to, an application.
JEE specifies a set of rules to which all applications must adhere. Pega Platform is
a JEE application. The JEE container in which it runs provides a certain level of
security, including protected access to infrastructure components (such as
databases, LDAP, and file systems), authentication and authorization, secure
communications, auditing and logging, rules, failover, and fault tolerance.
Authentication
Pega Platform supports multiple types of authentication with the most common
performed external to Pega Platform. Supported authentication protocols
include SAML, OAuth 2, Kerberos, multifactor, Captcha, and so on. An
authenticated session is required to perform critical functions in the application.
Passwords or other sensitive information between the client and the application
are not exchanged other than during the initial sign-on request. Failure
messages do not leak sensitive information. Reauthentication after timeout
accepts only the original user’s credentials. User switching is not permitted.
The built-in authentication capabilities of Pega Platform provide support for the
definition of a security policy that covers a range of options. The options that are
available while configuring a security policy include:
Setting minimum password lengths
Minimum numeric, alphabetic, and special characters required in the
password
Minimum and maximum password age
Maximum unique historical passwords
Number of failed login attempts before lockout
Initial lock-out penalty in seconds
CAPTCHA authentication settings
Inactivity disablement
© Copyright 2018 Pegasystems Inc. Confidential All rights reserved. All trademarks are the property of their respective owners .
5
Pega Platform Application Security
Authorization
Session management
© Copyright 2018 Pegasystems Inc. Confidential All rights reserved. All trademarks are the property of their respective owners .
6
Pega Platform Application Security
Cryptography
Cryptography facilities for Pega Platform are based on the Java Cryptography
Extensions API. These facilities rely on cryptography providers that are
supplied by the Java JDK vendor, the Bouncy Castle JCE provider included
with Pega Platform, or an alternate provider supplied by the customer.
Cryptography facilities provide APIs that support both one-way and
reversible encryption by using either a default Pega Platform cipher or a
custom cipher.
Customers are able to supply their own ciphers or can construct an instance
of a standard cipher by using a simplified textual description. Diagnostic
tools are provided for discovering which capabilities are available in the Java
version being used.
The Pega Platform cipher uses AES 256-bit encryption and requires no
development effort to define. This cipher uses keys managed externally by
the customer in key management systems, such as Amazon Web Services
Key Management System (AWS KMS). Key rotation capabilities are fully
supported.
© Copyright 2018 Pegasystems Inc. Confidential All rights reserved. All trademarks are the property of their respective owners .
7
Pega Platform Application Security
Data protection
Pega Platform provides support for individual property and BLOB encryption.
Data is encrypted prior to storage in the database and typically is decrypted
immediately after database retrieval. Support is also provided to only
decrypt on demand. Access control policies can be defined to restrict
visibility of certain sensitive information by obfuscating or masking all or
portions of sensitive data.
Auditing
Pega Platform audits a complete list of actions, including both successful and
unsuccessful attempts to access and modify data. This auditing includes rule
changes, security policy changes, log-in failures and successes, invalid data
access attempts, and so on. Support is also provided for custom-defined
auditing. Logged data can be aggregated and used to detect patterns of
suspicious behavior.
Security alerts
© Copyright 2018 Pegasystems Inc. Confidential All rights reserved. All trademarks are the property of their respective owners .
8
Pega Platform Application Security
© Copyright 2018 Pegasystems Inc. Confidential All rights reserved. All trademarks are the property of their respective owners .
9