Recent Updates – February 2022

In Version 6.04 of the SecurityBridge Platform we introduced new capabilities and general product improvements for SAP Security, often originating from customer feedback and industry requirements.

The highlights below are just a sample of the innovations introduced with the latest release of the SecurityBridge Platform. Customers can find a complete overview in the Release Notes.

Log4j Vulnerability Scanning

Immediately after the Log4j became public SecurityBridge delivered new signatures for two existing Threat Detection Sensors (1082 and 1086) contained in the SecurityBridge Platform.

With these SecurityBridge SAP customers are secured by default against the Log4j vulnerability.

New SAP Security Baseline

The Security & Compliance Management was updated with a new security baseline that checks the requirements provided by the German SAP user group (DSAG) who provided a distinct SAP Security Recommendation Guideline.

So, this new baseline now makes the best practices and recommendations available for all SecurityBridge customers.

Action rule configuration via Settings App

The very powerful Action & Filters feature received not enough attention yet as it was only available via SAP Gui transactions. That’s why we have now brought it to the Fiori frontend.

With Action & Filters SecurityBridge users can automate actions for detected security findings. E.g. the moment a system will be opened for change, an email is sent immediately (and automatically) to the system owner.

Relevant settings are now easily accessible via the web-based editor.

Code Vulnerability Analyzer updated

We added KPI metrics to the dashboard of this Code Vulnerability Analyser app. These KPIs increase transparency and make it easier to rate the security posture of an SAP system.

... stay tuned

Our new module Violation Management is coming soon.

Posted by

Till Pleyer
Share on linkedin
Share on twitter
Share on email
Find recent Security Advisories for SAP©

Webinar: Why is SAP Security Patching not like Windows Updates?

The webinar, taking place on 05.10.2022, is all about SAP Patch Management and its challenges. The German-speaking SAP User Group (DSAG) and the American colleagues of ASUG asked why SAP security patching cannot be as simple and effective as, for example, Windows updates.
Download the White Paper “YOUR ROAD TO SAP SECURITY” to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.
Webinar SAP patch
The webinar, taking place on 05.10.2022, is all about SAP Patch Management and its challenges. The German-speaking SAP User Group (DSAG) and the American colleagues of ASUG asked why SAP security patching cannot be as simple and effective as, for example, Windows updates.
S/4HANA migration
SAP Cybersecurity- SAP Security Automation- Security News
“There are a few constants in life” – a statement that also applies to the SAP user community. It has always been a challenge for SAP customers to bring their large SAP environments to a current release level. Although the vendor has done a lot in the past to simplify this, it is still not a complex undertaking.
SecurityBridge
Here at SecurityBridge, we are extremely lucky to have a team full of amazing professionals. Thanks to our team, we have achieved extraordinary things in the past couple of years. With that in mind, we thought it was time for us to start introducing you to the team that drives everything behind the scenes. And we couldn't have chosen a better example to start with than our very own, Harish Dahima! Read on and learn all about Harish's life as a Senior Product Developer, his role, and life at SecurityBridge.
SAP Cloud Connector
SAP Cloud Security- SAP Cybersecurity- Security News
Every organization constantly faces the challenge of minimizing the attack surface that an adversary could use to perform malicious operations. To do this, administrators must install the deployed components and understand them in detail to identify risks and proactively mitigate or prevent those. Today we are looking at what is necessary to protect the SAP Cloud Connector.