Skip to content

SIEM, from log evaluation to SAP attack detection

SAP SIEM

To detect attacks on SAP, you need to evaluate the security logs in SAP. While many organizations have spent the past few years protecting the perimeter, business-critical systems are now becoming the priority of security operations. In this article, we will look at what an SAP SIEM might look like and what data and processes are necessary to enable desired conclusions.  

What does SIEM stand for?

Many of our readers are already familiar with this term. SIEM is an abbreviation and stands for Security Information Event Management. The best-known vendor solutions are Splunk, IBM QRadar, and MS Sentinel, but there are many other providers. SIEMs read (security) logs from various sources and use an intelligent aggregation of the data to derive conclusions about suspicious activities or malicious user behavior.   

What data from SAP Applications needs to be collected?

Before deep diving into the process flow, we must look at which SAP logs have to be read out. SAP produces many protocols and logs that are necessary to create transparency in the business process. 

This is not easy, especially since most SIEM adapters for SAP take an all-or-nothing approach for onboarding new log sources. For example, if we took the SAP system log, all entries must be transferred, although only 5% would be necessary for SAP Security Monitoring. 

A selective transfer of the entries necessary for the correlation would also have a positive side effect on the licensing costs for the SIEM product used, given that these usually are paid according to “log volume per day”. Back to the question – which SAP logs are security-relevant? These are only the most relevant logs:  

  1. SAP Security Audit Log  
  2. SAP System log  
  3. SAP HANA audit log
  4. SAP Gateway log  
  5. SAP Java audit log  
  6. SAP Profile parameter  

For further conclusions in the Threat Monitoring for SAP process, you must transfer the user master and selectively change documents.  

Bird's-eye view of SAP SIEM

For enterprise-wide attack detection, our goal is to combine as much information as possible. This is the only way to define the attack patterns that are afterward continuously searched for. 

In the SIEM, it will combine the SAP logs with security logs from other sources: 

  • Server and Desktop OS
  • Firewall / VPN  
  • Physical infrastructure (e.g., access control systems)  
  • IPS and IDS  
  • Identity Management  
  • System Health, Performance Monitoring Information  
  • Network and accessories  
  • Anti-Virus  
  • Databases  
  •  

You must take the following steps in the SIEM process to create reliable alerts. First, you must read the data promptly. This also involves the normalization of the different source formats. Traditionally, mapping the SAP logs already presents the first challenge to customers since the event logs (e.g., CEF) can handle hardware or operating system logs better than the application logs.  

Many SIEMs try dividing the data into categories directly in the onboarding process. The customer defines these categories during the definition phase and can become a valuable tool later during processing.  

Validations must be in place to ensure the integrity of the monitoring solution including those logs that are not disabled and (or) manipulated. Especially with SAP, an insider can change the logs already in the application stack or flip a switch that prevents the output of security-relevant information.  

Once the integrity of the data is ensured, the correlation can begin. This area is extensive and can be very specific, which depends on the customer deployment scenario. As a rule, the actors are identified and then attributed. Actors can be, for example, Windows users or an SAP account. Attribution is the process responsible for assigning attributes and properties. Information about the threat actor will be enhanced, with various attributes, such as the used operating system, SAP log-on version, geo-location, and IP-Range.  

With all this information, you can now create alarms. For example, if a user who usually works at the German office and with a Windows laptop now logs in from Asia and uses a Linux system, this could lead to an alarm. Of course, to detect SAP insider attacks, the information must be specific and detailed.

SAP SIEM

Conclusion

Detection of malicious SAP activities and distinguishing them from “regular” admin activities requires defining what is normal, and which activity represents an anomaly. In-depth knowledge of SAP security is necessary for this. Critical, remote-enabled function modules, as well as database tables with sensitive content, must be known.  

Therefore, with SecurityBridge Threat Detection, we provide our customers with a simple and attractive solution and an extensive knowledge base. SecurityBridge customers have access to the largest information collection on securing SAP applications. 

Posted by

Christoph Nagy

Find recent Security Advisories for SAP©

Looking into securing your SAP landscape? This white-paper tells you the “Top Mistakes to Avoid in SAP Security“. Download it now.

SAP Cyber risk
SAP Cybersecurity- Security News
Businesses must be more cautious to protect themselves from cyber threats as digitalization and the use of SAP systems increase. SAP S/4HANA is critical for many enterprises as it provides the foundation for business operations. As digitalization and Industry 4.0 continue to increase, SAP S/4HANA lays the foundation for many modern business scenarios. SAP systems are important for many industries and their security is a major concern, making them vulnerable to cyber attackers. This article will discuss cyber risks and how you can assess your individual and organizational SAP systems' risks. What are cyber risks?
Common SAP Patches
SAP Cybersecurity- SAP Patch Management- SAP Security Patch Day- Security News
Installing SAP patches is crucial for maintaining a robust and secure enterprise resource planning (ERP) system. SAP, one of the leading ERP systems in the world, is constantly evolving to meet the changing needs of businesses. As a result, SAP releases various patches to address issues and enhance the functionality of its software. However, installing SAP patches can present challenges for IT teams, such as ensuring minimal disruption to business operations, managing risks, and testing the non-implemented patches. This article will discuss the three most common types of SAP patches- kernel patches, snote patches, and support packs - and the best practices for installing them.
SAP interfaces
SAP Cybersecurity- SAP Interface- Security News
In this blog article, we will explore the importance of SAP interface security and discuss the various measures businesses can take to protect their systems and data. We will also examine some common threats to SAP interfaces and how to mitigate them. To safeguard your business, you need to understand the importance of SAP interface security and take steps to make your interfaces secure. 
SAP security Patch day
10th January 2023 SAP response team sends some Happy New Year greeting to the SAP Security Teams, by releasing 10 SAP Security Notes.