Skip to content

How to achieve SAP cyber resilience

SAP cyber resilience

A wave is sweeping through IT organizations right now. Entrenched processes are being examined for effectiveness and efficiency and scrutinized from the economical perspective. It is common for cyber-attacks on the corporate infrastructure and, if worse, the enterprise applications to trigger this. Successful exploits prove the inefficiency of established security measures in the event of an attack. Upon closer inspection, it becomes apparent that the established processes and measures do not create resilience. So, what do you need to achieve SAP cyber resilience? 

Nothing is as certain as constant change is.

In particular, the threat landscape is constantly changing. Attackers develop new methods of exploitation or discover previously unknown vulnerabilities. You must acknowledge that the SAP system settings are constantly changing – even when these changes are part of the change management process. To establish SAP Cyber Resilience, you must develop procedures that capture any change, analyze the security impact, and enable prompt upgrades. You must ensure a reaction to changes in the threat situation and the security posture. 

A relic of the past

When it comes to SAP, an occasional check, as part of an IT security audit, is taken as an opportunity to adjust the hardening of the SAP systems and to question the basic security architecture. A one-time assessment of SAP security affairs cannot be reliable for resolving the identified problems. During the next test, at the latest, you will notice that new vulnerabilities or problems that were solved reappear. 

Active management of the security posture

You must establish active management of security postures for SAP applications to achieve resilience against cyber-attacks. For that purpose, you must frequently validate your IT landscape, SAP systems’ configuration, and evaluate the user management and authorization assignments. Detecting deviations from the designated security baseline can lead to a timely reaction. With constant compliance to security requirements, the first step toward SAP Cyber resilience is done. The SecurityBridge Security & Compliance Management helps you define a security policy for all relevant SAP system parameters, critical authorizations, and access control lists (ACL) and constantly verify that the present configuration complies with your standard. However, an essential building block is still missing.

Winning team: Periodic + Real Time

SAP Cyber resilience

If you intend to implement an effective security monitoring program to detect cyber-attacks, you will need to track all transactions performed in the SAP application. To illustrate the challenge: Depending on the number of users, processes, and interfaces, SAP systems process between 1,000 and several million transactions per minute. It is helpful to work with detection patterns to capture the relevant transactions. SecurityBridge Threat Detection refines this with intelligent anomaly detection.

Anatomy of an SAP attack

A real-life example illustrates why periodic checks and real-time monitoring are so important. Because we do not want to publish instructions here, we only described the process briefly. The attacker uses a vulnerability residing unpatched within the SAP transport management system (STMS) to elevate an account to which the threat actor has access to God-Mode (e.g., SAP_ALL). Later, once the malicious transport gets imported and the credentials are active, the attacker gains access and opens the system changeability. In parallel, the attacker also disables the security audit logging. Now the attacker creates persistence by changing some system parameters that can be set dynamically. This is done without leaving relevant log entries. 

Importance of SAP cyber resilience

Had the attacked systems been immune to SAP cyber-attacks, the attack would not have been possible. Because then, the vulnerability in SAP STMS, which was fixed in October 2021, would have been patched already. Read also: SecurityBridge identified software supply chain vulnerability in SAP Transport System. Even if the attacker could have exploited the vulnerability, the unauthorized allocation of administration rights would trigger detection as an anomaly in real-time monitoring and, if activated, would have been removed via automatic rule. This would have stopped the attack or, at least, allowed for a short response. However, if the attacker managed to modify the system and disable relevant logs, things could get tricky. The hacker could have installed a backdoor, allowing them to return later. This is when the periodic vulnerability analysis comes into the picture. Because, even if the hacker had achieved persistence, the likelihood of detecting and eliminating the vulnerable configuration or code adjustment increases with testing the security settings and the custom code base. 

Posted by

Christoph Nagy

Find recent Security Advisories for SAP©

Looking into securing your SAP landscape? This white-paper tells you the “Top Mistakes to Avoid in SAP Security“. Download it now.

SAP Cyber risk
SAP Cybersecurity- Security News
Businesses must be more cautious to protect themselves from cyber threats as digitalization and the use of SAP systems increase. SAP S/4HANA is critical for many enterprises as it provides the foundation for business operations. As digitalization and Industry 4.0 continue to increase, SAP S/4HANA lays the foundation for many modern business scenarios. SAP systems are important for many industries and their security is a major concern, making them vulnerable to cyber attackers. This article will discuss cyber risks and how you can assess your individual and organizational SAP systems' risks. What are cyber risks?
Common SAP Patches
SAP Cybersecurity- SAP Patch Management- SAP Security Patch Day- Security News
Installing SAP patches is crucial for maintaining a robust and secure enterprise resource planning (ERP) system. SAP, one of the leading ERP systems in the world, is constantly evolving to meet the changing needs of businesses. As a result, SAP releases various patches to address issues and enhance the functionality of its software. However, installing SAP patches can present challenges for IT teams, such as ensuring minimal disruption to business operations, managing risks, and testing the non-implemented patches. This article will discuss the three most common types of SAP patches- kernel patches, snote patches, and support packs - and the best practices for installing them.
SAP interfaces
SAP Cybersecurity- SAP Interface- Security News
In this blog article, we will explore the importance of SAP interface security and discuss the various measures businesses can take to protect their systems and data. We will also examine some common threats to SAP interfaces and how to mitigate them. To safeguard your business, you need to understand the importance of SAP interface security and take steps to make your interfaces secure. 
SAP security Patch day
10th January 2023 SAP response team sends some Happy New Year greeting to the SAP Security Teams, by releasing 10 SAP Security Notes.