How to use the S/4HANA migration to increase your security posture
“There are a few constants in life” – a statement that also applies to the SAP user community. It has always been a challenge for SAP customers to bring their large SAP environments to a current release level. Although the vendor has done a lot in the past to simplify this, it is still not a complex undertaking. However, the S/4HANA migration comes with more stumbling blocks that facilitate a chance to rethink the current SAP Cybersecurity approach.
What is the S/4HANA migration?
In keeping with the current zeitgeist, every SAP customer is talking about S/4HANA migration or S/4HANA transformations. Although the transformation has a much broader business context, it pursues the same goals as the migration. After the project, customers intend to take full advantage of the new functions of the S/4HANA product portfolio.
Take your chance
With these – sometimes dramatic – changes that organizations undergo in a S/4HANA transformation, there is an opportunity to integrate cybersecurity thinking directly into the architecture and create a secure foundation for future processes and innovations. To paraphrase one of our partners: “Security should be built-in, instead of added on”.
Starting situation: SAP NetWeaver
Many of the customers we speak with have had SAP environments in place for several years. And so, it is no surprise many are practicing cyber hygiene but have not been able to integrate cybersecurity into their processes and architecture from the ground up. But that is no reason to bury your head in the sand. With the upcoming S4/HANA project, there is an opportunity to make up for this omission from the past.
What has changed?
I think some experienced SAP experts will ask themselves what makes this “upgrade” project different from the previous ones and what has changed that now leads to this new possibility.
In my view, there are primarily three things:
- Prioritization of cybersecurity: Management has a clear view of the challenge and supports the measures that are necessary for cyber protection.
- Innovation in SAP Cybersecurity: Today, it is possible to monitor the security-relevant actions and transactions in the SAP application with a manageable team. The level of automation provided by SecurityBridge, for example, makes it possible to respond to incidents.
- Technology shift: Due to the technological change from SAP NetWeaver to S/4HANA, the established process often must be touched. With each change, reliability and efficiency should increase. If we take a file-based interface as an example, you should aim to switch to APIs and encrypt data in transfer.
Aim high and don't settle for less.
Take the opportunity and put “cyber resilience” on the list of project goals at the very beginning of a project. Include qualified consultants or in-house security architects in all project set-up discussions. Ask how to maintain the achieved security state in the long term. Additionally, please do not forget to integrate efficient SAP Vulnerability Management in the implementation of your project. This includes:
- Vulnerability scan
- Custom code vulnerability analysis
- Threat detection
Find recent Security Advisories for SAP©
As we know, SAP (Systems, Applications, and Products in Data Processing) is a widely used enterprise resource planning (ERP) software suite that helps organizations manage various business operations. No digital system is secure by nature or by default – there will always be security challenges, and SAP is no exception.
In this article, we discuss the Top 10 vulnerabilities in SAP – how they affect the security of an SAP system, and finally, how to identify and manage them with SecurityBridge.