Workday Hardening Guide
HCM platform hardening for security groups, integration security, and domain policies
Overview
60%+ of Fortune 500 rely on Workday for HR and financial management, processing 365 billion transactions annually. Integration System Users (ISUs) with OAuth access handle payroll, employee PII (SSN, bank accounts), and compensation data. Non-expiring refresh tokens amplify token theft risk. The 2024 Broadcom employee data breach via ransomware attack on ADP/Workday partner Business Systems House demonstrated third-party ecosystem vulnerabilities.
Intended Audience
- Security engineers hardening HCM systems
- HR technology administrators
- GRC professionals assessing HR compliance
- Third-party risk managers evaluating payroll integrations
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Workday security configurations including authentication, integration security, data privacy controls, and third-party connector hardening.
Table of Contents
- Authentication & Access Controls
- Integration System User Security
- Data Security & Privacy
- API & Integration Security
- Monitoring & Detection
- Compliance Quick Reference
1. Authentication & Access Controls
1.1 Enforce SAML SSO with MFA
Profile Level: L1 (Baseline) NIST 800-53: IA-2(1)
Description
Require SAML SSO with MFA for all Workday access, including employee self-service and administrator access.
Rationale
Why This Matters:
- Workday contains highly sensitive PII (SSN, bank accounts, salary)
- Compromised access enables payroll fraud and data theft
- Compliance requirements mandate strong authentication
ClickOps Implementation
Step 1: Configure SAML SSO
- Navigate to: Authentication Policies
- Create/Edit Authentication Policy:
- Name: “Corporate SSO”
- Authentication Type: SAML
- Identity Provider: Configure IdP metadata
Step 2: Configure Security Groups
- Assign authentication policy to all security groups
- Require MFA at IdP level for Workday application
Step 3: Disable Alternative Authentication
- Disable native password authentication
- Remove local account access (except break-glass)
1.2 Implement Role-Based Security Groups
Profile Level: L1 (Baseline) NIST 800-53: AC-3, AC-6
Description
Configure Workday security groups with least-privilege access to HR and financial data.
ClickOps Implementation
Step 1: Design Security Group Structure
Step 2: Configure Domain Security
- Navigate to: Domain Security Policies
- For each functional area:
- Define view/modify permissions
- Assign to appropriate security groups
- Enable “View” vs “Modify” separation
Step 3: Implement Segregation of Duties
- Separate payroll input from payroll approval
- Separate benefits setup from enrollment processing
- Document conflicts and implement compensating controls
1.3 Configure Session Security
Profile Level: L1 (Baseline) NIST 800-53: AC-12
Description
Configure session timeout and management policies.
ClickOps Implementation
- Navigate to: Edit Tenant Setup - Security
- Configure:
- Session timeout: 30 minutes (L1) / 15 minutes (L2)
- Concurrent sessions: Limited
- Session extension: Require re-authentication
2. Integration System User Security
2.1 Secure Integration System Users (ISUs)
Profile Level: L1 (Baseline) - CRITICAL NIST 800-53: IA-5, AC-6
Description
Harden Integration System Users that provide API access for third-party integrations.
Rationale
Why This Matters:
- ISUs access sensitive employee data programmatically
- OAuth tokens for ISUs can have long validity
- Compromised ISU = bulk data exfiltration capability
Real-World Incident:
- 2024 Broadcom Breach: Partner Business Systems House (BSH) was compromised, exposing employee data from ADP/Workday integrations
ClickOps Implementation
Step 1: Audit Existing ISUs
- Navigate to: View Integration System Users
- Document for each ISU:
- Purpose/integration
- Security groups assigned
- Data access scope
- Last activity date
Step 2: Create Purpose-Specific ISUs For each integration, create dedicated ISU.
Step 3: Restrict ISU Security Groups
- Create integration-specific security groups
- Grant minimum required domain permissions
- Document data access justification
Step 4: Configure ISU Authentication
- Navigate to: Edit Integration System User
- Configure:
- Authentication: OAuth 2.0 (not basic auth)
- Client credentials: Store securely
- Token lifetime: Minimum required
2.2 Implement OAuth Token Policies
Profile Level: L1 (Baseline) NIST 800-53: IA-5(13)
Description
Configure OAuth token policies for integration authentication.
ClickOps Implementation
Step 1: Configure OAuth Clients
- Navigate to: Register API Client
- For each integration:
- Grant type: Client Credentials (M2M)
- Scope: Minimum required APIs
- Token expiration: 1 hour access token, 7 days refresh (L1) / 24h refresh (L2)
Step 2: Rotate Client Secrets
| Integration Type | Rotation Frequency |
|---|---|
| Payroll connectors | Quarterly |
| Benefits integrations | Quarterly |
| Reporting tools | Semi-annually |
| Custom integrations | Quarterly |
Step 3: Monitor Token Usage
- Review OAuth token issuance logs
- Alert on unusual patterns
- Revoke suspicious tokens immediately
3. Data Security & Privacy
3.1 Configure Field-Level Security
Profile Level: L2 (Hardened) NIST 800-53: AC-3
Description
Restrict access to sensitive fields based on business need.
ClickOps Implementation
Step 1: Identify Sensitive Fields
Step 2: Configure Field Security
- Navigate to: Domain Security Policies
- For sensitive fields:
- Restrict “View” to specific security groups
- Enable masking where applicable
- Log all access
Step 3: Enable Data Masking
- Configure SSN masking (show last 4 only)
- Configure bank account masking
- Document unmasked access requirements
3.2 Configure Data Retention
Profile Level: L2 (Hardened) NIST 800-53: SI-12
Description
Implement data retention policies aligned with legal requirements.
ClickOps Implementation
- Navigate to: Data Retention Policies
- Configure retention by data type:
- Employment records: Per jurisdiction requirements
- Payroll data: 7 years (US)
- Performance data: 3-5 years
- Enable automated purging for expired data
4. API & Integration Security
4.1 Restrict API Scopes
Profile Level: L1 (Baseline) NIST 800-53: AC-6
Description
Limit API access to minimum required scopes.
Workday API Scopes
| Integration Need | Recommended Scopes |
|---|---|
| Payroll export | Staffing, Payroll |
| Benefits sync | Benefits, Worker Profile |
| Org chart | Organizations, Worker Profile (limited) |
| Reporting | Reports, specific report scopes |
ClickOps Implementation
- Navigate to: API Client Registration
- Select only required scopes
- Document business justification
- Review annually
4.2 Secure Workday Studio Integrations
Profile Level: L2 (Hardened) NIST 800-53: CM-7
Description
Harden custom Workday Studio integrations.
Best Practices
- Code Review:
- Review integration code before deployment
- Check for hardcoded credentials
- Validate error handling
- Credentials:
- Use ISU authentication (not embedded credentials)
- Store secrets in Workday vault
- Rotate credentials regularly
- Logging:
- Enable integration audit logging
- Monitor for failures and anomalies
- Alert on unexpected data volumes
5. Monitoring & Detection
5.1 Enable Audit Logging
Profile Level: L1 (Baseline) NIST 800-53: AU-2, AU-3
Description
Configure comprehensive audit logging for Workday operations.
ClickOps Implementation
Step 1: Configure Audit Settings
- Navigate to: Edit Tenant Setup - Audit
- Enable:
- Sign-on activity
- Data access
- Configuration changes
- Integration activity
Step 2: Export to SIEM
- Create scheduled integration to export audit logs
- Configure real-time webhooks for critical events
- Retain logs for compliance period
Detection Queries
6. Compliance Quick Reference
SOC 2 Mapping
| Control ID | Workday Control | Guide Section |
|---|---|---|
| CC6.1 | SSO enforcement | 1.1 |
| CC6.2 | Security groups | 1.2 |
| CC6.7 | Data security | 3.1 |
NIST 800-53 Mapping
| Control | Workday Control | Guide Section |
|---|---|---|
| IA-2(1) | SSO with MFA | 1.1 |
| AC-6 | ISU restrictions | 2.1 |
| AU-2 | Audit logging | 5.1 |
Appendix A: References
Official Workday Documentation:
- Workday Trust – Security
- Workday Trust – Compliance
- Workday Trust – Privacy
- Workday Documentation Portal
- Workday Community API Reference
- Workday SAML SSO with Okta
- Workday SSO with Microsoft Entra ID
API Documentation:
Compliance Frameworks:
- SOC 1, SOC 2 (all five Trust Services Criteria plus NIST CSF and NIST 800-171 via SOC 2+), ISO 27001 (continuously certified since 2010), ISO 27017, ISO 27701 – via Workday Compliance
Third-Party Security Guides:
Security Incidents:
- 2024 – Broadcom/BSH Partner Breach: Partner Business Systems House (BSH) was compromised via ransomware, exposing employee data from ADP/Workday integrations. Demonstrates third-party ecosystem vulnerability rather than a direct Workday platform compromise.
- August 2025 – CRM Social Engineering Campaign: Threat actors accessed Workday’s third-party CRM platform (Salesforce) as part of a broader social engineering campaign, stealing primarily business contact information. No access to customer Workday tenants or tenant data was reported. Discovered August 6, disclosed August 15, 2025.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-12-14 | 0.1.0 | draft | Initial Workday hardening guide | Claude Code (Opus 4.5) |