In SAP’s patch round of February 2022, an SAP Security Note was released with a CVSS score of 10/10 named, “Request smuggling and request concatenation in SAP
Integrating Privileged Access Management into the SecurityBridge SAP Security Platform
Working with Field Experience and Customer Feedback
Our expert team is deeply engaged with our customers to understand their needs in the ever-changing cybersecurity landscape. We comprehend that companies today face continuous streams of new cyber threats, demanding increasing adaptability and resource allocation. Therefore, our product management ensures that customer feedback gets continuously translated into top-notch solutions. In addition, SecurityBridge maintains a large network of partner experts, fostering a community-driven approach to cybersecurity. Based on the customer and partner feedback, we identified the importance of controlling privileged access, such as, among others, SAP_ALL, to secure critical SAP applications.
Our CTO Ivan Mans expresses his gratitude, stating, “We thank our customers for participating in our first customer-shipment program. Their invaluable feedback has been instrumental in developing market-ready solutions in a fraction of the time it takes others in the industry.”
Privileged Access Management with SecurityBridge
With our current release, the SecurityBridge Platform introduces its new PAM feature to all existing customers at no additional charge, aligning with our strategy of continuous functional enhancement. Enabling this new function requires minimal configuration, easily done through the SAP Fiori–based WebUI. SecurityBridge admins can configure specific authorizations, which end-users can then access via the self-service app on the Fiori Launchpad.
Product Manager Holger Hügel comments, “The integration was a logical step. We already possess the monitoring capabilities through Threat Detection and Hyper Logging. Adding audit-compliant, secure Privileged Access Management was a natural evolution. Now, our platform not only identifies critical user activities in production systems but also assists in mitigating risk and reducing the attack vector with an efficient enforcement of the “least privilege principle” in user authorization management.”
Roadmap and Outlook 2024
Beyond Privileged Access Management, we have identified additional needs within the SAP customer community. Our established feedback mechanisms, coupled with ongoing collaborations with SAP and leading consulting firms, have highlighted various areas for expansion. Our new PAM solution transcends traditional cybersecurity boundaries, venturing into the broader realm of Governance, Risk, and Compliance (GRC) for SAP.
Ivan Mans finally adds, “2024 will be a landmark year for SAP cybersecurity innovation at SecurityBridge. We have evaluated, planned, and estimated multiple functions to enhance detection and audit capabilities. A significant upcoming feature is the Violation Management module.”
Find recent Security Advisories for SAP©
Leiter des Forschungslabors ist Joris Van De Vis, Director of Security Research bei SecurityBridge und Mitgründer des SAP-Sicherheits-Spezialisten Protect4S, der seit September 2013 zu SecurityBridge