SlideShare a Scribd company logo
1 of 4
Download to read offline
SAP integrates and connects all aspects of your business processes and thereby often
stores data of high value such as finance, sales and personnel related data. Traditional
SAP security is mainly focused on authorization management and segregation of duties.
Why landscape security is important
SAP integrates and connects all aspects of your busi-
ness processes and thereby often stores data of high
value such as finance, sales, and personnel information.
Traditional approaches to SAP security primarily focus
on authorization management and segregation of duties.
However, with changing threats and attacker capabilities,
it is imperative to develop a broad, enterprise-wide view
on SAP security. KPMG has therefore designed a novel
approach to assess every system that facilitates or
provides input or output to your SAP business processes:
your SAP landscape.
SAPLandscapeSecurityTake control of your most valuable infrastructure
The SAP landscape typically consists of business processes
and their supporting SAP IT infrastructure. The processes
(such as Procure to Pay, Treasury, etc.) are often complex
and opaque. Furthermore, SAP systems are not secure
by default and are complex systems consisting of multiple
layers: the network, operating systems, databases, and
SAP applications. A single misconfiguration, missing patch,
or other vulnerability on any of these layers or in connecting
systems (e.g. SAP PI or custom applications) can affect the
integrity and confidentiality of your critical data.
SAP is an attractive target for cyber attacks for both
malicious insiders and external actors, such as criminals
and foreign state espionage. Given such high-profile
threats and vulnerabilities, it is clear that an integral and
thorough approach is needed to adequately secure your
SAP landscape.
KPMG’s SAP Cyber Security Assessment
KPMG has developed an SAP Landscape Cyber Security
Assessment that provides a methodology for securing
your most important assets in SAP, and a means to stay
secured. With our iterative approach, expert SAP knowl-
edge, and industry-leading tools, we present key insights
and extensive recommendations in every aspect of your
SAP landscape. This assessment will give you an in-depth
overview of your SAP landscape and improve your ability
to protect important assets against cyber attacks.
INPUT
SYSTEMS
SAP
CORE
OUTPUT
SYSTEMS
E.g. trading,
CRM, vendor
management
or plant
connectivity
systems
E.g. SWIFT
payments, HR
and payroll
financial state-
ments or deliv-
ery/logistics
systems
Operating
system
Database
Network
infrastructure
BUSINESS PROCESS
Common SAP landscape challenges
Based on our experience in assessing SAP landscapes,
enterprises typically face one or more of the following
challenges:
+	Are SAP security and infrastructure policies 			
	 aligned and effective?
+	Is the implementation of security aligned with 		
	 security in the business process?
+	Is separation between critical SAP infrastructure 		
	 and business support systems adequate?
+	What attack paths would cyber criminals be
	 able to take in the SAP landscape?
+	How can logging and monitoring be employed
	 to perform detection of possible threats?
To address these questions, KPMG has derived a
steadfast method that identifies, assesses, secures
and monitors threats.
Provide solutions and assistance to
secure the entire SAP technology
stack, and help effectively monitor
SAP security settings
SECURE
Assess existing SAP landscape for
advanced security threats using
the SAP Cyber Security Framework
and third party tools
ASSESS
Identify key components, business
critical assets and relevant threat
actors of the SAP landscape
IDENTIFY
Develop target operating model to
monitor and defend SAP landscape
against cyber threats
MONITOR
IDENTIFYNEWTHREATSANDASSETS
KPMG’s SAP Cyber Security Framework
Unique to the KPMG SAP Cyber Security Assessment is the utilization of the KPMG SAP Cyber Security Framework.
This Framework is based on the latest official SAP Secure Operations Map, good practices developed at our clients,
and years of experience. The Framework focuses on the five key topics that are most crucial to a secure SAP
landscape. KPMG’s SAP Cyber Security Framework will give you the means to develop tailored solutions to enhance
security and governance of your SAP systems.
Why KPMG
KPMG is the leading SAP security specialist with the most innovative solutions. We use both industry leading and
our own developed tools to perform SAP assessments. We have over 155,000 professionals throughout the KPMG
network and operate in over 155 countries.
Our approach has been lauded at large international clients throughout high stakes industries such as oil & gas and
fast moving consumer goods. Our team of experts has experience with some of the largest and most complex SAP
landscapes in the world. As a result, we are able to quickly identify cyber attack weaknesses in complex SAP land-
scapes, and provide you with a prioritized risk assessment. Partnering with KPMG ensures you get the KPMG quality
with understandable analysis, and effective assistance that helps your enterprise to improve. Due to this expertise and
excellent delivery, Forrester Research has named KPMG the global number 1 leader in information security consulting.
Security Compliance
• Governance Strategy
• Master Data Protection
• Auditability
• Third Party Risk & Cloud
• Risk & Compliance
• SAP GRC
• Emergency Procedures
Secure Code
• Custom Code Security
• Code Security Testing
• Security Maintenance
of SAP code
Secure Operation
• User Administration
• Password Configuration
• Authentication and Single Sign-on
• Segregation of Duties
• Access to Sensitive Tcodes
• Table Maintenance
• Security review and Monitoring
Secure Setup
• Configuration Management
• Security Patch & Notes
Management
• Communication Protocols & Security
• Data Security
Infrastructure Security
• Network Security
• Operating System Security
• Database Security (incl. Hana)
• Logging & Monitoring
• Front-end Security
© 2016 KPMG AS, a Norwegian limited liability company and a member firm of the KPMG network of independent member
firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved.
Contact us
For more information on our SAP
Landscape Assessment or KPMG’s
Cyber Security Services, please
contact us or visit us at kpmg.no
Joachim Kaland
Senior Manager
T: +47 4063 9099
E: joachim.kaland@kpmg.no
Jo Sigurd Pedersen
Director
T: +47 4063 9610
E: jo.sigurd.pedersen@kpmg.no

More Related Content

Similar to SAP Landscape Security

#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and GovernanceSAP Analytics
 
Successful SAP Implementation Checklist
Successful SAP Implementation ChecklistSuccessful SAP Implementation Checklist
Successful SAP Implementation ChecklistCygnet Infotech
 
ADR Brochure
ADR  BrochureADR  Brochure
ADR BrochurePradeep M
 
Brochure Auditing Erp System V2
Brochure   Auditing Erp System V2Brochure   Auditing Erp System V2
Brochure Auditing Erp System V2agc infotech
 
Dci Pmo+Ecm+Erp Training+Embedded Sm1
Dci Pmo+Ecm+Erp Training+Embedded Sm1Dci Pmo+Ecm+Erp Training+Embedded Sm1
Dci Pmo+Ecm+Erp Training+Embedded Sm1frankkulendran
 
Understanding the “Why” in Enterprise Application Security Strategy
Understanding the “Why” in Enterprise Application Security StrategyUnderstanding the “Why” in Enterprise Application Security Strategy
Understanding the “Why” in Enterprise Application Security StrategyPriyanka Aash
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 
BrightStar SAP Solutions Introduction
BrightStar SAP Solutions IntroductionBrightStar SAP Solutions Introduction
BrightStar SAP Solutions IntroductionVinod Shintre
 
SAP-Basis-Support-for-Global-Technology-Distributor.pdf
SAP-Basis-Support-for-Global-Technology-Distributor.pdfSAP-Basis-Support-for-Global-Technology-Distributor.pdf
SAP-Basis-Support-for-Global-Technology-Distributor.pdfAnil
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...Tunde Ogunkoya
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070retheauditors
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)ERPScan
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)ERPScan
 
Protect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAPProtect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAPTomas Martinez
 
Mann-India_SAP_Service-Offering_GRC
Mann-India_SAP_Service-Offering_GRCMann-India_SAP_Service-Offering_GRC
Mann-India_SAP_Service-Offering_GRCMann-India
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksSAP Customer Experience
 
SAP ERP IMPLEMENTATION AND Sap migration
SAP ERP IMPLEMENTATION AND Sap migrationSAP ERP IMPLEMENTATION AND Sap migration
SAP ERP IMPLEMENTATION AND Sap migrationArig
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP SystemsOnapsis Inc.
 

Similar to SAP Landscape Security (20)

#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
 
Successful SAP Implementation Checklist
Successful SAP Implementation ChecklistSuccessful SAP Implementation Checklist
Successful SAP Implementation Checklist
 
ADR Brochure
ADR  BrochureADR  Brochure
ADR Brochure
 
Brochure Auditing Erp System V2
Brochure   Auditing Erp System V2Brochure   Auditing Erp System V2
Brochure Auditing Erp System V2
 
Dci Pmo+Ecm+Erp Training+Embedded Sm1
Dci Pmo+Ecm+Erp Training+Embedded Sm1Dci Pmo+Ecm+Erp Training+Embedded Sm1
Dci Pmo+Ecm+Erp Training+Embedded Sm1
 
Understanding the “Why” in Enterprise Application Security Strategy
Understanding the “Why” in Enterprise Application Security StrategyUnderstanding the “Why” in Enterprise Application Security Strategy
Understanding the “Why” in Enterprise Application Security Strategy
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 
BrightStar SAP Solutions Introduction
BrightStar SAP Solutions IntroductionBrightStar SAP Solutions Introduction
BrightStar SAP Solutions Introduction
 
SAP-Basis-Support-for-Global-Technology-Distributor.pdf
SAP-Basis-Support-for-Global-Technology-Distributor.pdfSAP-Basis-Support-for-Global-Technology-Distributor.pdf
SAP-Basis-Support-for-Global-Technology-Distributor.pdf
 
GRC IMPRIVA
GRC IMPRIVAGRC IMPRIVA
GRC IMPRIVA
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
Protect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAPProtect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAP
 
Mann-India_SAP_Service-Offering_GRC
Mann-India_SAP_Service-Offering_GRCMann-India_SAP_Service-Offering_GRC
Mann-India_SAP_Service-Offering_GRC
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
SAP ERP IMPLEMENTATION AND Sap migration
SAP ERP IMPLEMENTATION AND Sap migrationSAP ERP IMPLEMENTATION AND Sap migration
SAP ERP IMPLEMENTATION AND Sap migration
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 

SAP Landscape Security

  • 1. SAP integrates and connects all aspects of your business processes and thereby often stores data of high value such as finance, sales and personnel related data. Traditional SAP security is mainly focused on authorization management and segregation of duties. Why landscape security is important SAP integrates and connects all aspects of your busi- ness processes and thereby often stores data of high value such as finance, sales, and personnel information. Traditional approaches to SAP security primarily focus on authorization management and segregation of duties. However, with changing threats and attacker capabilities, it is imperative to develop a broad, enterprise-wide view on SAP security. KPMG has therefore designed a novel approach to assess every system that facilitates or provides input or output to your SAP business processes: your SAP landscape. SAPLandscapeSecurityTake control of your most valuable infrastructure The SAP landscape typically consists of business processes and their supporting SAP IT infrastructure. The processes (such as Procure to Pay, Treasury, etc.) are often complex and opaque. Furthermore, SAP systems are not secure by default and are complex systems consisting of multiple layers: the network, operating systems, databases, and SAP applications. A single misconfiguration, missing patch, or other vulnerability on any of these layers or in connecting systems (e.g. SAP PI or custom applications) can affect the integrity and confidentiality of your critical data. SAP is an attractive target for cyber attacks for both malicious insiders and external actors, such as criminals and foreign state espionage. Given such high-profile threats and vulnerabilities, it is clear that an integral and thorough approach is needed to adequately secure your SAP landscape. KPMG’s SAP Cyber Security Assessment KPMG has developed an SAP Landscape Cyber Security Assessment that provides a methodology for securing your most important assets in SAP, and a means to stay secured. With our iterative approach, expert SAP knowl- edge, and industry-leading tools, we present key insights and extensive recommendations in every aspect of your SAP landscape. This assessment will give you an in-depth overview of your SAP landscape and improve your ability to protect important assets against cyber attacks. INPUT SYSTEMS SAP CORE OUTPUT SYSTEMS E.g. trading, CRM, vendor management or plant connectivity systems E.g. SWIFT payments, HR and payroll financial state- ments or deliv- ery/logistics systems Operating system Database Network infrastructure BUSINESS PROCESS
  • 2. Common SAP landscape challenges Based on our experience in assessing SAP landscapes, enterprises typically face one or more of the following challenges: + Are SAP security and infrastructure policies aligned and effective? + Is the implementation of security aligned with security in the business process? + Is separation between critical SAP infrastructure and business support systems adequate? + What attack paths would cyber criminals be able to take in the SAP landscape? + How can logging and monitoring be employed to perform detection of possible threats? To address these questions, KPMG has derived a steadfast method that identifies, assesses, secures and monitors threats. Provide solutions and assistance to secure the entire SAP technology stack, and help effectively monitor SAP security settings SECURE Assess existing SAP landscape for advanced security threats using the SAP Cyber Security Framework and third party tools ASSESS Identify key components, business critical assets and relevant threat actors of the SAP landscape IDENTIFY Develop target operating model to monitor and defend SAP landscape against cyber threats MONITOR IDENTIFYNEWTHREATSANDASSETS
  • 3. KPMG’s SAP Cyber Security Framework Unique to the KPMG SAP Cyber Security Assessment is the utilization of the KPMG SAP Cyber Security Framework. This Framework is based on the latest official SAP Secure Operations Map, good practices developed at our clients, and years of experience. The Framework focuses on the five key topics that are most crucial to a secure SAP landscape. KPMG’s SAP Cyber Security Framework will give you the means to develop tailored solutions to enhance security and governance of your SAP systems. Why KPMG KPMG is the leading SAP security specialist with the most innovative solutions. We use both industry leading and our own developed tools to perform SAP assessments. We have over 155,000 professionals throughout the KPMG network and operate in over 155 countries. Our approach has been lauded at large international clients throughout high stakes industries such as oil & gas and fast moving consumer goods. Our team of experts has experience with some of the largest and most complex SAP landscapes in the world. As a result, we are able to quickly identify cyber attack weaknesses in complex SAP land- scapes, and provide you with a prioritized risk assessment. Partnering with KPMG ensures you get the KPMG quality with understandable analysis, and effective assistance that helps your enterprise to improve. Due to this expertise and excellent delivery, Forrester Research has named KPMG the global number 1 leader in information security consulting. Security Compliance • Governance Strategy • Master Data Protection • Auditability • Third Party Risk & Cloud • Risk & Compliance • SAP GRC • Emergency Procedures Secure Code • Custom Code Security • Code Security Testing • Security Maintenance of SAP code Secure Operation • User Administration • Password Configuration • Authentication and Single Sign-on • Segregation of Duties • Access to Sensitive Tcodes • Table Maintenance • Security review and Monitoring Secure Setup • Configuration Management • Security Patch & Notes Management • Communication Protocols & Security • Data Security Infrastructure Security • Network Security • Operating System Security • Database Security (incl. Hana) • Logging & Monitoring • Front-end Security
  • 4. © 2016 KPMG AS, a Norwegian limited liability company and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. Contact us For more information on our SAP Landscape Assessment or KPMG’s Cyber Security Services, please contact us or visit us at kpmg.no Joachim Kaland Senior Manager T: +47 4063 9099 E: joachim.kaland@kpmg.no Jo Sigurd Pedersen Director T: +47 4063 9610 E: jo.sigurd.pedersen@kpmg.no