SlideShare ist ein Scribd-Unternehmen logo
1 von 30
© Panaya | An Infosys Company1
SAP Security Chat
Infosys and Panaya
© Panaya | An Infosys Company2
Today’s Speakers
Gordon Muehl
Vice President
at Infosys
Rasmi Swain, Principal
Risk Management & GRC;
Information Security at Infosys
Guy Vago
SAP Project Manager
at Panaya
Rafi Kretchmer
Vice President
at Panaya
© Panaya | An Infosys Company3
The State of SAP Security
Business practices for SAP security
Best practice to simplify security audits
The Panaya solution
Demo
© Panaya | An Infosys Company
PANAYA
POLL
1/ 4
PANAYA
© Panaya | An Infosys Company
The Importance of Safety
95%
of SAP Systems are exposed
to vulnerabilities
60%
feared an attack on their SAP
applications would be catastrophic
$4.5 Million
is the average estimated cost of SAP
systems taken offline**
24%
of worldwide ERP software
market share belongs to
SAP, double their largest
competitor***
*Based on Onapsis Research 5/2015
** Ponemon Institute Research 2/16
*** Forbes 5/2014
SAP - the ERP
Market Leader
5
© Panaya | An Infosys Company6
The Underestimated Security Threat*
*Based on Ponemon Institute Research 2/16
ERP ranked in the top
5 SAP applications
most vulnerable to
attack
75% believe SAP
platforms have at
least one and
possibly more
malware infections
70% of enterprises
skip security and
compliance audits of
their ABAP code
47% expect an
increase in attacks
against SAP
infrastructure over
the next 2 years.
Only 34% say their
companies have
visibility into the
security of SAP
Applications
© Panaya | An Infosys Company7
*Based on Ponemon Institute Research 2/16
63%
say C-level execs
underestimate the risk
associated with insecure
SAP applications
21%
of senior leadership were
aware or shared the
concern of an attack on
their SAP application
Senior Leadership and
the Security Risk
© Panaya | An Infosys Company
Security is a hassle
but it needs to be done
8
© Panaya | An Infosys Company9
What you need to secure your landscape
You need to ensure 6 areas
Access control
Application security
Infrastructure
GRC
Data Security
On-going monitoring
PANAYA© Panaya | An Infosys Company
PANAYA
POLL
2/ 4
PANAYA
© Panaya | An Infosys Company
Information Security at Infosys
© Panaya | An Infosys Company
(iCRM) - Security Solutions and Services
12
© Panaya | An Infosys Company
SAP Landscape Complexity
© Panaya | An Infosys Company14
SAP Environment -SAP R/3 and SAP Business
Suite - On-cloud
© Panaya | An Infosys Company
SAP Security Risks &
Vulnerabilities
© Panaya | An Infosys Company16
Top 10 SAP Vulnerabilities
Authentication Bypass via Verb tampering1.
Authentication Bypass via the Invoker servlet
Buffer overflow in ABAP Kernel
Code execution via TH_GREP
MMC read SESSIONID
Remote ports can
Encryption in SAPGUI
BAPI XSS/SMBRELAY
XML Blowup DOS
GUI Scripting DOS
Top 10 vulnerabilities
Source : ERPScan
Default passwords for DB access
Lack of DB patch management
Unnecessary Enabled DB features
Lack of password lockout/complexity checks
Unencrypted sensitive data transport / data
Lack or misconfigured network access control
Extensive user and group privileges
Lack or misconfigured audit
Insecure trust relations
Open additional interfaces
Top 10 vulnerabilities
Source : http://www.cvedetails.com/vendor/797/SAP.html
© Panaya | An Infosys Company
Infosys iCRM & PANAYA-
SAP Security Offering
© Panaya | An Infosys Company
Network
Server OS
Basis Controls
IT Controls
Business Process
Review
Configuration Review
IT Application
Controls
Role & Authorization
Review
Access Review
SoD Review
Authorization/
SoD Controls
Process
Controls
Infrastructure
Controls
Technical
Controls
Types of Controls in SAP
Inherent or Default controls
Default Controls – Sales order cannot be
created without a valid customer
Configurable controls
Implemented through IMG Settings.
Example- Tolerance for three way match or PO
Approval Hierarchy
Procedural Controls
IT dependent Controls: Review of Exception
reports
Security Checks
Review Configuration Settings
Procedural Controls
Exception Reports
SAP Layers of Security & Types of Controls
18
© Panaya | An Infosys Company19
Infosys-Panaya- SAP Landscape Security
offering
Governance Security Review and
Monitoring
Review of Audit Logs Change & Transport
Management
Access Control
and Roles
management
Users & Authorizations Authentication and
Single Sign on
Roles Management
SAP
Infrastructure
Security
Operating Systems and
Database Security
Network Security
( SAP Router),
Data Security
Source Code and
Custom Code
Security
Secure Maintenance of ABAP
Code & Custom code
Security
VA and PT Front End Security (
FIORI, SAP Enterprise
Portal, SAP-Gui )
SAP New
Technologies
SAP HANA appliance &
HANA Security
SAP Mobile
Middleware
( MDM, MAM, )
SAP Cloud Security
Application Security
Infrastructure Security
Identity & Access
Management
Data Security
Governance, Risk and
Compliance
Panaya Cloud Quality
Project
InfosysSecurityOfferingPanayaOffering
© Panaya | An Infosys Company
PANAYA
POLL
3/ 4
PANAYA
© Panaya | An Infosys Company
Panaya CloudQualityTM Suite
21
© Panaya | An Infosys Company
Increase ERP agility with zero riskPanaya CloudQuality™ Suite
SCOPE
TEST
ANALYZE
Any ERP Change
COLLABORATION
Functional
Security
Performance
What to fix
What to test
Manage Automate Document & Report
22
© Panaya | An Infosys Company
Train developers to
write secure code
Automate
Integrate security
in ongoing ERP
maintenance
Simplify
Security
audits
Make it simple with Panaya
23
© Panaya | An Infosys Company24
Ongoing seamless
security
Security is integrated into ongoing change management
Secure go-live!
© Panaya | An Infosys Company25
© Panaya | An Infosys Company
PANAYA
POLL
4/ 4
PANAYA
© Panaya | An Infosys Company
Established 2006, Acquired by Infosys - 2014
Quality Automation SaaS Solution for ERP
Powered by:
ERP Domain expertise
Crowd based customer insights
Proven with over 2000+ Customers
50 HANA Migrations
Over 9,000 projects
(5,000 business process implementations)
2000+ Stay-current projects (upgrade, patches)
Over 5,000,000 test scripts
27
© Panaya | An Infosys Company
Information Security at Infosys
28
© Panaya | An Infosys Company
Get your own complimentary assessment from
upload to Panaya
Code Box
ERP Health-check &
simulation of your
upgrade project
< 20 min. < 48 hrs.*
Upload Get
Run a simple ABAP
report and
* Estimate time based on business days
© Panaya | An Infosys Company

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (11)

How Accenture's IT Organization Drives Performance Monitoring Globally - AppS...
How Accenture's IT Organization Drives Performance Monitoring Globally - AppS...How Accenture's IT Organization Drives Performance Monitoring Globally - AppS...
How Accenture's IT Organization Drives Performance Monitoring Globally - AppS...
 
Introduction to appDynamics
Introduction to appDynamics Introduction to appDynamics
Introduction to appDynamics
 
SAP-SuccessFactors Customer Presentation
SAP-SuccessFactors Customer PresentationSAP-SuccessFactors Customer Presentation
SAP-SuccessFactors Customer Presentation
 
#askSAP Analytics Innovations Community Call: SAP Predictive Analytics
#askSAP Analytics Innovations Community Call: SAP Predictive Analytics#askSAP Analytics Innovations Community Call: SAP Predictive Analytics
#askSAP Analytics Innovations Community Call: SAP Predictive Analytics
 
Test Masters 2016 Spring Conference
Test Masters 2016 Spring ConferenceTest Masters 2016 Spring Conference
Test Masters 2016 Spring Conference
 
Keynote: Inflectra Company Vision - InflectraCon 2019
Keynote: Inflectra Company Vision - InflectraCon 2019Keynote: Inflectra Company Vision - InflectraCon 2019
Keynote: Inflectra Company Vision - InflectraCon 2019
 
Click to Disk Troubleshooting with AppDynamics and OpsDataStore - AppSphere16
Click to Disk Troubleshooting with AppDynamics and OpsDataStore - AppSphere16Click to Disk Troubleshooting with AppDynamics and OpsDataStore - AppSphere16
Click to Disk Troubleshooting with AppDynamics and OpsDataStore - AppSphere16
 
SAP Cloud For Analytics Launch Event South Africa
SAP Cloud For Analytics Launch Event South AfricaSAP Cloud For Analytics Launch Event South Africa
SAP Cloud For Analytics Launch Event South Africa
 
DevOps Toolbox: Application monitoring and insights
DevOps Toolbox: Application monitoring and insightsDevOps Toolbox: Application monitoring and insights
DevOps Toolbox: Application monitoring and insights
 
AppSphere 15 - Achieving Enterprise Agility, Superior Scalability and Deploym...
AppSphere 15 - Achieving Enterprise Agility, Superior Scalability and Deploym...AppSphere 15 - Achieving Enterprise Agility, Superior Scalability and Deploym...
AppSphere 15 - Achieving Enterprise Agility, Superior Scalability and Deploym...
 
AppSphere 15 - AppDynamics: Beyond APM - Building an Operations Center
AppSphere 15 - AppDynamics: Beyond APM - Building an Operations CenterAppSphere 15 - AppDynamics: Beyond APM - Building an Operations Center
AppSphere 15 - AppDynamics: Beyond APM - Building an Operations Center
 

Andere mochten auch

SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015
SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015
SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015
Ertunga Arsal
 
Enhancement packages for sap erp what's new in logistics and operations
Enhancement packages for sap erp what's new in logistics and operationsEnhancement packages for sap erp what's new in logistics and operations
Enhancement packages for sap erp what's new in logistics and operations
aminab
 

Andere mochten auch (17)

Sap security webinar- dach
Sap security webinar- dachSap security webinar- dach
Sap security webinar- dach
 
Behind the Magic – Your ERP Secrets Revealed
Behind the Magic – Your ERP Secrets RevealedBehind the Magic – Your ERP Secrets Revealed
Behind the Magic – Your ERP Secrets Revealed
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015
SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015
SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015
 
SAP HANA SPS08 Security
SAP HANA SPS08 SecuritySAP HANA SPS08 Security
SAP HANA SPS08 Security
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
 
Preparing for Your Oracle EBS Cloud Migration: Organizational Readiness
Preparing for Your Oracle EBS Cloud Migration: Organizational ReadinessPreparing for Your Oracle EBS Cloud Migration: Organizational Readiness
Preparing for Your Oracle EBS Cloud Migration: Organizational Readiness
 
GeneXus ERP connector para SAP ERP
GeneXus ERP connector para SAP ERPGeneXus ERP connector para SAP ERP
GeneXus ERP connector para SAP ERP
 
Enhancement packages for sap erp what's new in logistics and operations
Enhancement packages for sap erp what's new in logistics and operationsEnhancement packages for sap erp what's new in logistics and operations
Enhancement packages for sap erp what's new in logistics and operations
 
Getting the Most out of SAPPHIRE NOW + ASUG 2016
Getting the Most out of SAPPHIRE NOW + ASUG 2016Getting the Most out of SAPPHIRE NOW + ASUG 2016
Getting the Most out of SAPPHIRE NOW + ASUG 2016
 
SOCIALIZE YOUR SAP ERP THROUGH INTEGRATE D DIGITAL EXPERIENCE PLATFORMS
SOCIALIZE YOUR SAP ERP THROUGH INTEGRATE D DIGITAL EXPERIENCE PLATFORMSSOCIALIZE YOUR SAP ERP THROUGH INTEGRATE D DIGITAL EXPERIENCE PLATFORMS
SOCIALIZE YOUR SAP ERP THROUGH INTEGRATE D DIGITAL EXPERIENCE PLATFORMS
 
SAP ERP solution map
SAP ERP solution mapSAP ERP solution map
SAP ERP solution map
 
Are you putting your organization at risk?
Are you putting your organization at risk?Are you putting your organization at risk?
Are you putting your organization at risk?
 
Infosys presentation
Infosys presentationInfosys presentation
Infosys presentation
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
SAP - ERP
SAP - ERPSAP - ERP
SAP - ERP
 

Ähnlich wie SAP Security Chat Tips to Improve SAP ERP Security

Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
Onapsis Inc.
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
Tunde Ogunkoya
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
michelemanzotti
 
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis Inc.
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
Tunde Ogunkoya
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
PeterSmetny1
 

Ähnlich wie SAP Security Chat Tips to Improve SAP ERP Security (20)

SAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksSAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New Risks
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
 
SAP Mobility Update from NNIT event
SAP Mobility Update from NNIT eventSAP Mobility Update from NNIT event
SAP Mobility Update from NNIT event
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
Mobile pulse sept 2014
Mobile pulse sept 2014Mobile pulse sept 2014
Mobile pulse sept 2014
 
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Implementing access and security controls across your applications
Implementing access and security controls across your applicationsImplementing access and security controls across your applications
Implementing access and security controls across your applications
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
 
SAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeSAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crime
 
SAP S4HANA : Learn From Our Implementation Journey
SAP S4HANA : Learn From Our Implementation JourneySAP S4HANA : Learn From Our Implementation Journey
SAP S4HANA : Learn From Our Implementation Journey
 

Mehr von Panaya

Campaign overview (1)
Campaign overview (1)Campaign overview (1)
Campaign overview (1)
Panaya
 

Mehr von Panaya (16)

Comment améliorer les tests de flux transverses à vos applications métiers ?
Comment améliorer les tests de flux transverses à vos applications métiers ?Comment améliorer les tests de flux transverses à vos applications métiers ?
Comment améliorer les tests de flux transverses à vos applications métiers ?
 
Oracle on premises and oracle cloud - how to coexist webinar
Oracle on premises and oracle cloud  - how to coexist webinarOracle on premises and oracle cloud  - how to coexist webinar
Oracle on premises and oracle cloud - how to coexist webinar
 
Panaya Test Center – Auf zu postmodernem ERP Testing
Panaya Test Center – Auf zu postmodernem ERP TestingPanaya Test Center – Auf zu postmodernem ERP Testing
Panaya Test Center – Auf zu postmodernem ERP Testing
 
Practical steps to a smooth transition to hana
Practical steps to a smooth transition to hana Practical steps to a smooth transition to hana
Practical steps to a smooth transition to hana
 
S/4HANA Simple Finance - The C-Level Pleaser - UK Edition
S/4HANA Simple Finance - The C-Level Pleaser - UK EditionS/4HANA Simple Finance - The C-Level Pleaser - UK Edition
S/4HANA Simple Finance - The C-Level Pleaser - UK Edition
 
The Killer Practice for All SAP Changes
The Killer Practice for All SAP ChangesThe Killer Practice for All SAP Changes
The Killer Practice for All SAP Changes
 
SAP Nation 2.0 – A Realistic Market Perspective of S4/HANA Simplicity
SAP Nation 2.0 – A Realistic Market Perspective of S4/HANA SimplicitySAP Nation 2.0 – A Realistic Market Perspective of S4/HANA Simplicity
SAP Nation 2.0 – A Realistic Market Perspective of S4/HANA Simplicity
 
SAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA Webinar
SAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA WebinarSAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA Webinar
SAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA Webinar
 
S4 HANA Webinar
S4 HANA WebinarS4 HANA Webinar
S4 HANA Webinar
 
Campaign overview (1)
Campaign overview (1)Campaign overview (1)
Campaign overview (1)
 
Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...
Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...
Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...
 
Webinar: Gartner Predicts New Challenges of SAP Change Management
Webinar: Gartner Predicts New Challenges of SAP Change ManagementWebinar: Gartner Predicts New Challenges of SAP Change Management
Webinar: Gartner Predicts New Challenges of SAP Change Management
 
SteveMo Webinar: Hit a Home Run with Formula & Analytics Tricks
SteveMo Webinar: Hit a Home Run with Formula & Analytics TricksSteveMo Webinar: Hit a Home Run with Formula & Analytics Tricks
SteveMo Webinar: Hit a Home Run with Formula & Analytics Tricks
 
SAP Fiori:Value from Enabling Mobile Access to Common SAP Function
SAP Fiori:Value from Enabling Mobile Access to Common SAP FunctionSAP Fiori:Value from Enabling Mobile Access to Common SAP Function
SAP Fiori:Value from Enabling Mobile Access to Common SAP Function
 
SAP EHP7 how to avoid the pitfalls
SAP EHP7 how to avoid the pitfallsSAP EHP7 how to avoid the pitfalls
SAP EHP7 how to avoid the pitfalls
 
ABAP Webinar
ABAP WebinarABAP Webinar
ABAP Webinar
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

SAP Security Chat Tips to Improve SAP ERP Security

  • 1. © Panaya | An Infosys Company1 SAP Security Chat Infosys and Panaya
  • 2. © Panaya | An Infosys Company2 Today’s Speakers Gordon Muehl Vice President at Infosys Rasmi Swain, Principal Risk Management & GRC; Information Security at Infosys Guy Vago SAP Project Manager at Panaya Rafi Kretchmer Vice President at Panaya
  • 3. © Panaya | An Infosys Company3 The State of SAP Security Business practices for SAP security Best practice to simplify security audits The Panaya solution Demo
  • 4. © Panaya | An Infosys Company PANAYA POLL 1/ 4 PANAYA
  • 5. © Panaya | An Infosys Company The Importance of Safety 95% of SAP Systems are exposed to vulnerabilities 60% feared an attack on their SAP applications would be catastrophic $4.5 Million is the average estimated cost of SAP systems taken offline** 24% of worldwide ERP software market share belongs to SAP, double their largest competitor*** *Based on Onapsis Research 5/2015 ** Ponemon Institute Research 2/16 *** Forbes 5/2014 SAP - the ERP Market Leader 5
  • 6. © Panaya | An Infosys Company6 The Underestimated Security Threat* *Based on Ponemon Institute Research 2/16 ERP ranked in the top 5 SAP applications most vulnerable to attack 75% believe SAP platforms have at least one and possibly more malware infections 70% of enterprises skip security and compliance audits of their ABAP code 47% expect an increase in attacks against SAP infrastructure over the next 2 years. Only 34% say their companies have visibility into the security of SAP Applications
  • 7. © Panaya | An Infosys Company7 *Based on Ponemon Institute Research 2/16 63% say C-level execs underestimate the risk associated with insecure SAP applications 21% of senior leadership were aware or shared the concern of an attack on their SAP application Senior Leadership and the Security Risk
  • 8. © Panaya | An Infosys Company Security is a hassle but it needs to be done 8
  • 9. © Panaya | An Infosys Company9 What you need to secure your landscape You need to ensure 6 areas Access control Application security Infrastructure GRC Data Security On-going monitoring
  • 10. PANAYA© Panaya | An Infosys Company PANAYA POLL 2/ 4 PANAYA
  • 11. © Panaya | An Infosys Company Information Security at Infosys
  • 12. © Panaya | An Infosys Company (iCRM) - Security Solutions and Services 12
  • 13. © Panaya | An Infosys Company SAP Landscape Complexity
  • 14. © Panaya | An Infosys Company14 SAP Environment -SAP R/3 and SAP Business Suite - On-cloud
  • 15. © Panaya | An Infosys Company SAP Security Risks & Vulnerabilities
  • 16. © Panaya | An Infosys Company16 Top 10 SAP Vulnerabilities Authentication Bypass via Verb tampering1. Authentication Bypass via the Invoker servlet Buffer overflow in ABAP Kernel Code execution via TH_GREP MMC read SESSIONID Remote ports can Encryption in SAPGUI BAPI XSS/SMBRELAY XML Blowup DOS GUI Scripting DOS Top 10 vulnerabilities Source : ERPScan Default passwords for DB access Lack of DB patch management Unnecessary Enabled DB features Lack of password lockout/complexity checks Unencrypted sensitive data transport / data Lack or misconfigured network access control Extensive user and group privileges Lack or misconfigured audit Insecure trust relations Open additional interfaces Top 10 vulnerabilities Source : http://www.cvedetails.com/vendor/797/SAP.html
  • 17. © Panaya | An Infosys Company Infosys iCRM & PANAYA- SAP Security Offering
  • 18. © Panaya | An Infosys Company Network Server OS Basis Controls IT Controls Business Process Review Configuration Review IT Application Controls Role & Authorization Review Access Review SoD Review Authorization/ SoD Controls Process Controls Infrastructure Controls Technical Controls Types of Controls in SAP Inherent or Default controls Default Controls – Sales order cannot be created without a valid customer Configurable controls Implemented through IMG Settings. Example- Tolerance for three way match or PO Approval Hierarchy Procedural Controls IT dependent Controls: Review of Exception reports Security Checks Review Configuration Settings Procedural Controls Exception Reports SAP Layers of Security & Types of Controls 18
  • 19. © Panaya | An Infosys Company19 Infosys-Panaya- SAP Landscape Security offering Governance Security Review and Monitoring Review of Audit Logs Change & Transport Management Access Control and Roles management Users & Authorizations Authentication and Single Sign on Roles Management SAP Infrastructure Security Operating Systems and Database Security Network Security ( SAP Router), Data Security Source Code and Custom Code Security Secure Maintenance of ABAP Code & Custom code Security VA and PT Front End Security ( FIORI, SAP Enterprise Portal, SAP-Gui ) SAP New Technologies SAP HANA appliance & HANA Security SAP Mobile Middleware ( MDM, MAM, ) SAP Cloud Security Application Security Infrastructure Security Identity & Access Management Data Security Governance, Risk and Compliance Panaya Cloud Quality Project InfosysSecurityOfferingPanayaOffering
  • 20. © Panaya | An Infosys Company PANAYA POLL 3/ 4 PANAYA
  • 21. © Panaya | An Infosys Company Panaya CloudQualityTM Suite 21
  • 22. © Panaya | An Infosys Company Increase ERP agility with zero riskPanaya CloudQuality™ Suite SCOPE TEST ANALYZE Any ERP Change COLLABORATION Functional Security Performance What to fix What to test Manage Automate Document & Report 22
  • 23. © Panaya | An Infosys Company Train developers to write secure code Automate Integrate security in ongoing ERP maintenance Simplify Security audits Make it simple with Panaya 23
  • 24. © Panaya | An Infosys Company24 Ongoing seamless security Security is integrated into ongoing change management Secure go-live!
  • 25. © Panaya | An Infosys Company25
  • 26. © Panaya | An Infosys Company PANAYA POLL 4/ 4 PANAYA
  • 27. © Panaya | An Infosys Company Established 2006, Acquired by Infosys - 2014 Quality Automation SaaS Solution for ERP Powered by: ERP Domain expertise Crowd based customer insights Proven with over 2000+ Customers 50 HANA Migrations Over 9,000 projects (5,000 business process implementations) 2000+ Stay-current projects (upgrade, patches) Over 5,000,000 test scripts 27
  • 28. © Panaya | An Infosys Company Information Security at Infosys 28
  • 29. © Panaya | An Infosys Company Get your own complimentary assessment from upload to Panaya Code Box ERP Health-check & simulation of your upgrade project < 20 min. < 48 hrs.* Upload Get Run a simple ABAP report and * Estimate time based on business days
  • 30. © Panaya | An Infosys Company

Hinweis der Redaktion

  1. Gordon, handles the state of security slides 4-6 Rafi will moderate 7-8 Rasmi will then talk to slides 9-14 Guy will take panaya and demo Rafi will come back at slide 23 thank guy and moderate
  2. How do you handle ABAP security in SAP system today? Have not yet secured/do not have resources for security Not concerned with ABAP security right now Currently evaluating available security tools Already have a security tool in place We will wait a few moments allow everyone to answer the question
  3. 95% of ERP Systems are exposed to vulnerabilities 60% of IT & IT security professionals feared the impact of a an attack on their SAP applications would be catastrophic The average estimated cost of SAP systems taken offline $4.5 Million
  4. Ponemon Institute Research report Feb 2016. surveyed IT & IT security practitioners involved in the security of SAP applications 75% of IT and IT security professionals think that it is likely their sap platforms have at least one and possibly more malware infections SAP ERP applications were ranked within the top 5 SAP applications most vulnerable to attack While 70 % of enterprises skip security and compliance audits of their ABAP code Only 25% of respondents were confident that they could immediately discover a SAP application breach 47% of those surveyed expect the frequency of attacks against SAP infrastructure to increase over the next 2 years. *Based on Ponemon Institute Research 2/16
  5. A Key take way from Ponemon’s research was that senior leadership values the importance of and the criticality of SAP installations to profitability. Yet, 63% say C-level executives tend to underestimate the risk associated with insecure SAP applications and only 21% of senior leadership were aware or shared the concern of an attack on their SAP application.
  6. But before we carry on, let me ask you another question…. Do you think your organization would favor A one time security project – handled by internal resources A one time security project – using staff augmentation, consultants or outsourced Ongoing security practice built into daily releases and change management One time internal project and ongoing automatic review One time aided project and ongoing automatic review
  7. Do you think your organization would favor Strict approach - Fixing all security issues and making sure no new issues are added Practical approach - Fixing only the critical security threats Trust and improve approach - Reviewing the current state and making sure no new issues are added Not sure - we need to review the issues 1st and then decide
  8. Panaya CloudQuality Suite has simplified the remediation of security issues, by streamlining the automation of code security audits into the ongoing ERP maintenance activities. Organizations no longer need to take on major security projects that require extra IT time, budgets and manpower. PCQ will provide a code quality assessment that pinpoints critical vulnerabilities in ABAP® program code, identifying core security and quality issues, guidance on how to correct and integration with development processes
  9. Manage Automation Evidence
  10. General – best practice Automate Integrate security in ongoing ERP maintenance Train developers to write secure code
  11. Guy’s visuals
  12. Would you like a Panaya representative to contact you to set up a free assessment? We will wait a few moments allow everyone to answer the question…
  13. For those of you who don’t know, Panaya is the leading organization when it comes to implementinf your SAP changes. With more that 2000 customers and 9000 projects, we know how to deliver change faster, better, safer.
  14. Landscape Health check assessment Customization and usage mapping Market trend analysis Details and accurate simulation of change impact , fix and test Alerts on Recommended Patches and security breaches Real-time reporting and project tracking Crowd wisdom insights
  15. Eliminate initial testing to identify defects Actionable, task-based plan for all code fixes and tests Automated and prioritized tasks for efficient execution Ability to work in parallel for test and development activities Tight workflow with collaboration between all project participants
  16. Automation of project assessment, plan, impact analysis, testing and validation processes to avoid human prone errors Proven and standardized processes based on the experience of thousands of projects analyzed with Panaya Machine learning algorithm continuously identifies break patterns and transforms them into best practices for the Panaya community Static code analysis of ABAP code identifies, prioritizes vulenerabilitie sand performance issues