The global and independent platform for the SAP community.

SAP Security: Playing it safe as best you can

Cyber security is a matter of trade-offs. There is no such thing as absolute security - no matter how much budget companies invest.
April 28, 2022
This text has been automatically translated from German to English.

In a digital business world, it can only be a matter of protecting the most relevant processes and systems as best as possible against cyber attacks in order to be able to operate one's own business securely. When companies deal with this, they quickly end up with their SAP systems. They are particularly worthy of protection because they mostly form the IT-side core of production. It therefore makes sense to start with the ERP system when it comes to cyber security.

But companies quickly come up against the first hurdle: Which components, data or processes in the SAP ecosystem form a suitable starting point? The background to this question is tricky. Many companies do not know which processes exist and how they are mapped on the software side. This kind of shadow IT quickly becomes a major problem, especially in terms of cyber security. This is why companies are required to first get to know their own SAP system landscape in detail before they define security goals and purchase suitable software solutions.

SAP security includes three scenarios

It is advisable to focus on three scenarios: Intranet security, Internet security and API security. In the first case, the focus is on the company's own SAP users. Companies should find out which employees actually work with the ERP system and whether or what user-specific privileges they have, as is the case with administrators and finance experts, for example. Only then can they define their rights and protect their devices in a targeted manner. The control options for Internet security are much more limited. Here, Internet access must be secured at the application level - regardless of whether the company's own employees or external users such as customers and partners use a Web-based application and how conscientiously companies use the options of a strong password or multi-factor authentication. The third area covers the security of interfaces through which data is made available, for example to partners.

Integration of SAP and detection solution

Only after companies have done this preliminary work is it advisable to look at tools. Ideally, companies should choose a modular solution. For example, a combined security platform based on Azure Cloud and Azure Sentinel has proven itself. The SAP Connector for Microsoft Sentinel connects the ERP system with the detection solution - regardless of whether companies operate their SAP systems in the data center or in the cloud. The connector can be linked to 16 log sources and consolidates data from complex SAP landscapes in such a way that it is available for targeted processing and meaningful analysis in the SIEM system (Security Information & Event Management) Sentinel. SAP and Microsoft have predefined around 100 use cases for this purpose, which companies can adapt as required or extend to include their own security scenarios. This enables them to scale the SIEM tool individually and to partially automate responses to alerts (Security Orchestration Automated Response, SOAR): Sentinel evaluates the data received and generates appropriate alerts in the event of anomalies.

Professional qualification is decisive

In addition to technology, qualified experts are also needed to ward off threats. Developers bring together the technical components, develop them further, and thus optimally prepare both detection and response - with the goal of detecting unauthorized access via various endpoints, from the Internet, or via the network, and triggering alarms automatically. Companies should also obtain professional Managed Detection and Response Services (MDR). Experienced security experts and data analysts with specialist knowledge monitor and evaluate incoming alarms in a Security Operations Center (SOC). Depending on the threat situation, predefined measures are automatically set in motion: block user accounts, disconnect the system from the network, stop booking, or similar. In the event of critical cyber attacks, the SOC initiates an individual incident response. In this way, companies have done their utmost to protect their SAP systems against hacker attacks and to operate their business without restriction.

Would you like to learn more about the SAP Connector for Microsoft Sentinel and the world's first and only MDR service specifically for SAP? Then register under arva.to/sapdigital22 for Timo Schlüter's presentation on SAP security.

https://e3magtp.greatsolution.dev/partners/arvato-systems-gmbh/

Write a comment

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the second time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork.

Venue

More information will follow shortly.

Event date

Wednesday, May 21, and
Thursday, May 22, 2025

Early Bird Ticket

Available until Friday, January 24, 2025
EUR 390 excl. VAT

Regular ticket

EUR 590 excl. VAT

Venue

Hotel Hilton Heidelberg
Kurfürstenanlage 1
D-69115 Heidelberg

Event date

Wednesday, March 5, and
Thursday, March 6, 2025

Tickets

Regular ticket
EUR 590 excl. VAT
Early Bird Ticket

Available until December 20, 2024

EUR 390 excl. VAT
The event is organized by the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes attendance at all presentations of the Steampunk and BTP Summit 2025, a visit to the exhibition area, participation in the evening event and catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due course.