Recent Updates – February 2022

In Version 6.04 of the SecurityBridge Platform we introduced new capabilities and general product improvements for SAP Security, often originating from customer feedback and industry requirements.

The highlights below are just a sample of the innovations introduced with the latest release of the SecurityBridge Platform. Customers can find a complete overview in the Release Notes.

Log4j Vulnerability Scanning

Immediately after the Log4j became public SecurityBridge delivered new signatures for two existing Threat Detection Sensors (1082 and 1086) contained in the SecurityBridge Platform.

With these SecurityBridge SAP customers are secured by default against the Log4j vulnerability.

New SAP Security Baseline

The Security & Compliance Management was updated with a new security baseline that checks the requirements provided by the German SAP user group (DSAG) who provided a distinct SAP Security Recommendation Guideline.

So, this new baseline now makes the best practices and recommendations available for all SecurityBridge customers.

Action rule configuration via Settings App

The very powerful Action & Filters feature received not enough attention yet as it was only available via SAP Gui transactions. That’s why we have now brought it to the Fiori frontend.

With Action & Filters SecurityBridge users can automate actions for detected security findings. E.g. the moment a system will be opened for change, an email is sent immediately (and automatically) to the system owner.

Relevant settings are now easily accessible via the web-based editor.

Code Vulnerability Analyzer updated

We added KPI metrics to the dashboard of this Code Vulnerability Analyser app. These KPIs increase transparency and make it easier to rate the security posture of an SAP system.

... stay tuned

Our new module Violation Management is coming soon.

Posted by

Till Pleyer
Find recent Security Advisories for SAP©

SecurityBridge at the DSAG Technologietage 2023

SecurityBridge will be attending the DSAG Technologietage 2023 from March 22nd-23rd at the Congress Center Rosengarten in Mannheim.
Download the White Paper “Which cybersecurity framework is the best fit for SAP application security?” to learn more about the available frameworks, the challenges when adopting a framework, and more.
SAP Cyber risk
SAP Cybersecurity- Security News
Businesses must be more cautious to protect themselves from cyber threats as digitalization and the use of SAP systems increase. SAP S/4HANA is critical for many enterprises as it provides the foundation for business operations. As digitalization and Industry 4.0 continue to increase, SAP S/4HANA lays the foundation for many modern business scenarios. SAP systems are important for many industries and their security is a major concern, making them vulnerable to cyber attackers. This article will discuss cyber risks and how you can assess your individual and organizational SAP systems' risks. What are cyber risks?
Common SAP Patches
SAP Cybersecurity- SAP Patch Management- SAP Security Patch Day- Security News
Installing SAP patches is crucial for maintaining a robust and secure enterprise resource planning (ERP) system. SAP, one of the leading ERP systems in the world, is constantly evolving to meet the changing needs of businesses. As a result, SAP releases various patches to address issues and enhance the functionality of its software. However, installing SAP patches can present challenges for IT teams, such as ensuring minimal disruption to business operations, managing risks, and testing the non-implemented patches. This article will discuss the three most common types of SAP patches- kernel patches, snote patches, and support packs - and the best practices for installing them.
SAP interfaces
SAP Cybersecurity- SAP Interface- Security News
In this blog article, we will explore the importance of SAP interface security and discuss the various measures businesses can take to protect their systems and data. We will also examine some common threats to SAP interfaces and how to mitigate them. To safeguard your business, you need to understand the importance of SAP interface security and take steps to make your interfaces secure.