v0.1.0-draft AI Drafted

ADP Hardening Guide

HR/Finance Last updated: 2025-12-14

Payroll platform security for API connections, SSO, and data access controls

Overview

ADP processes payroll for 640,000+ companies worldwide with access to W-2 data, SSN, salary, and bank account information. The 2024 Broadcom/BSH breach and 2016 credential stuffing incident (“flowjacking”) demonstrate partner ecosystem and registration code vulnerabilities. Regional partner compromise exposed employee data; attackers used stolen W-2 data for tax fraud.

Intended Audience

  • Security engineers managing payroll systems
  • HR technology administrators
  • GRC professionals assessing payroll compliance
  • Third-party risk managers evaluating HR integrations

How to Use This Guide

  • L1 (Baseline): Essential controls for all organizations
  • L2 (Hardened): Enhanced controls for security-sensitive environments
  • L3 (Maximum Security): Strictest controls for regulated industries

Scope

This guide covers ADP security configurations including authentication, access controls, and integration security.


Table of Contents

  1. Authentication & Access Controls
  2. API & Integration Security
  3. Data Security
  4. Monitoring & Detection
  5. Compliance Quick Reference

1. Authentication & Access Controls

1.1 Enforce MFA for All Access

Profile Level: L1 (Baseline) NIST 800-53: IA-2(1)

Description

Require MFA for all ADP access, especially administrator and payroll processor accounts.

Rationale

Why This Matters:

  • ADP contains highly sensitive PII (SSN, bank accounts)
  • Payroll fraud potential is extremely high
  • 2016 “flowjacking” attack stole W-2 data via credential stuffing

Real-World Incidents:

  • 2016 Flowjacking: Attackers used stolen credentials and registration codes to steal W-2 data for tax fraud
  • 2024 BSH Breach: Regional partner compromise exposed Broadcom employee data

ClickOps Implementation

Step 1: Configure SSO with MFA

  1. Navigate to: Admin Portal → Security → Single Sign-On
  2. Configure SAML SSO with your IdP
  3. Require MFA at IdP level for ADP application

Step 2: Enable ADP-Native MFA

  1. Navigate to: Admin Portal → Security → Multi-Factor Authentication
  2. Enable: Require MFA for all users
  3. Configure authentication methods

1.2 Implement Role-Based Access

Profile Level: L1 (Baseline) NIST 800-53: AC-3, AC-6

Description

Configure ADP roles with segregation of duties for payroll functions.

ClickOps Implementation

Step 1: Define Role Structure

Role Permissions
Payroll Administrator Full payroll access (limit to 2-3)
Payroll Processor Run payroll, NO tax changes
HR Administrator Employee data, NO payroll
Employee Self-Service Own data only

Step 2: Implement Segregation of Duties

  • Separate payroll setup from payroll approval
  • Separate bank account changes from payroll processing
  • Require dual approval for large payrolls

2. API & Integration Security

2.1 Secure ADP API Connections

Profile Level: L1 (Baseline) NIST 800-53: IA-5

Description

Harden API integrations with ADP Marketplace partners.

Implementation

Step 1: Audit Connected Apps

  1. Navigate to: Admin Portal → Integrations
  2. Review all connected applications
  3. Document data access for each

Step 2: Configure OAuth Scopes

  1. Limit integrations to minimum scopes
  2. Rotate API credentials quarterly
  3. Monitor API usage

3. Data Security

3.1 Protect W-2 and Tax Data

Profile Level: L1 (Baseline) NIST 800-53: SC-28

Description

Implement controls to prevent W-2 data theft.

Implementation

  1. Restrict W-2 access to authorized personnel only
  2. Enable alerts for W-2 generation and download
  3. Audit W-2 access during tax season
  4. Configure fraud alerts for unusual W-2 patterns

4. Monitoring & Detection

4.1 Audit Logging

Profile Level: L1 (Baseline) NIST 800-53: AU-2, AU-3

Detection Focus Areas


5. Compliance Quick Reference

SOC 2 Mapping

Control ID ADP Control Guide Section
CC6.1 MFA enforcement 1.1
CC6.2 Role-based access 1.2

Appendix B: References

Official ADP Documentation:

API & Developer Tools:

Compliance Frameworks:

  • SOC 1 Type II and SOC 2 Type II reports (available to customers under NDA) — via Data Security
  • ISO 9001, ISO/IEC 27001, ISO/IEC 27701 (select services and locations)
  • PCI DSS, Sarbanes-Oxley compliance
  • OpenID Connect and OAuth 2.0 for API authentication

Security Incidents:

  • 2016 — Flowjacking / W-2 Tax Fraud: Attackers used stolen credentials and publicly available registration codes to access employee W-2 data at multiple ADP customer companies for tax fraud. ADP itself was not breached; the attack exploited the self-service registration workflow. (Norton Rose Fulbright Analysis)
  • September 2024 — BSH Partner Ransomware (Broadcom): El Dorado ransomware group compromised Business Systems House (BSH), a Middle Eastern ADP partner, exposing Broadcom employee payroll data. ADP stated only “a small subset” of clients in certain Middle Eastern countries were affected. (The Register Report)

Changelog

Date Version Maturity Changes Author
2025-12-14 0.1.0 draft Initial ADP hardening guide Claude Code (Opus 4.5)