SlideShare a Scribd company logo
1 of 23
Download to read offline
Cyber attacks on
your SAP S/4HANA
systems?
So you can stay relaxed.
WELCOME!
Introducing your host today:
- 2 -
TIM KRÄNZKE
CSO SAST SOLUTIONS
Fon: +49 40 88173-2735
Email: tim.kraenzke@akquinet.com
Web: sast-solutions.com
RALF KEMPF
CTO SAST SOLUTIONS
Fon: +49 40 88173-251
Email: ralf.kempf@akquinet.com
Web: sast-solutions.com
With the SAST SOLUTIONS portfolio of akquinet AG, we are your world-class provider for the holistic protection of
SAP ERP as well as S/4HANA systems - with real-time monitoring. In addition to our proprietary software suite, we
offer SAP security and compliance consulting and managed services from a single source.
Worldwide, more than 200 customers with 3.5 million SAP users currently rely on our vast expertise in protecting
their SAP systems from cyberattacks, manipulation, espionage and data theft.
Facts and figures
- 3 -SAST SOLUTIONS customers worldwide
920
305
165
325
556
796
64
845
Employees
Turnovers Mio. €
5,3
16,3
41,5
28,2
118
2002 2005 2008 2011 2014 2018 2019 2020
132
124
akquinet AG
71
You have the choice for your SAP ERP and S/4HANA systems!
SAP Security & Compliance – make or buy?!
- 5 -
SECURITY
INTELLIGENCE
SOFTWARE SUITE CONSULTING MANAGED SERVICES
Identity and User Access Management
Platform Security
Security Intelligence
Security Consulting
Authorization Consulting
SAP HANA & S/4HANA Migration
Authorization Management
Cybersecurity & Threat Detection
Data breaches and hacks from the past.
„From our project experiences we know:
every system is vulnerable. It is a question of
how difficult it is and how long it takes.
We rarely find SAP systems in which the infrastructure is hardened
in the best possible way and effective authorization management
is lived out.
Threats are almost always detected too late.
With the right concept, the probability of a successful attack
can be significantly reduced.“
Ralf Kempf
CTO SAST SOLUTIONS
- 7 -
The Early Warning System
for your SAP Landscape.
Threat Intelligence
with SAST SUITE.
NIST cybersecurity framework for improving critical infrastructure.
NIST = National Institute of Standards and Technology
- 9 -
Identify Protect Detect Respond Recover
Asset Management
Business Environment
Governance
Risk Assessment
Risk Management
Strategy
Access Control
Awareness and
Training
Data Security
Information Protection
Processes and
Procedures
Maintenance
Protective
Technologies
Anomalies and
Events
Security
Continuous
Monitoring
Detection
Processes
Response
Planning
Communications
Analysis
Mitigation
Improvements
Recovery Planning
Improvements
Communication
Your IT security is our number one concern – in real time.
All solutions from one source:
- 10 -
Use cases where SAST SUITE supports security analysts (prevention).
Identity and User Access Management
Detection of existing critical user-role-assignments
Detection and mitigation of SoD rule violations
✓
✓
- 11 -
Platform Security (Vulnerability Scans and Cybersecurity)
Vulnerability scan on OS, DB and SAP application level
Scan of ABAP code for critical pattern
✓
✓
- 12 -
Plug and Play integration
with leading SIEM
solutions
Use cases where SAST SUITE supports security analysts (detection).
Security Intelligence / SIEM / SOAR
Real time threat and attack detection for SAP systems
Monitor critical transactions, applications, log files
✓
✓
+
+ Customer-specific security and compliance policies in SAST Risk and Compliance Management
 WHAT should be checked HOW by WHOM and WHEN
 Manual and automatic tests
 Proof of inspections carried out
 Evidence collection
 Compliance status calculation
The existing SAST rules are automatically provided in a DEFAULT policy. Plug and Play.
Customer policies can be easily created and maintained by copying and using the "Drag &
Drop Policy Editor".
+
Policy-based security checks.
Your advantages:
- 13 -
Policy-based security and vulnerability scans.
Central vulnerability overview on multiple systems and areas:
- 14 -
Policy-based security and vulnerability scans.
Easy drill down for root cause analyse:
- 15 -
Realtime threat detection for SAP systems.
Use cases included with SAST SUITE:
Manipulation of users and
authorization.
Assignment of critical authorization.
Manipulation of passwords.
Miss-used critical reports and
functions modules.
Access to critical, blacklisted
transactions.
Critical changes to system
configurations.
Manipulation of critical database
tables.
Information disclosure.
Read access logging as additional
data source.
Extraction of confidential information
(GDPR).
File manipulation (parameter
configuration, transports).
Suspicious user behavior (technical
and dialog users).
Monitoring of SAP security notes.
DoS detection.
Critical transport content.
Critical remote function calls.
Login attempts of privileged
accounts.
Account sharing.
Suspicious HTTP Calls.
Miss-use of debugging and error-
analysis.
What else did the user do?
Threat hunting.
Forensic analysis.
Correlation of different account to on
person (Central Identity).
- 16 -
- 17 -
Distributed system
log data Normalize, Pseudonymize,
enrich log data
Persistence, analyze,
generate alerts
SAST Real Time Cybersecurity Monitoring.
Collect Log Data
Critical/Relevant
Events
Intelligent Log Filters
Complex Events
 Identify log sources
 Consolidate across system borders
 Filter irrelevant events
 +3500 filters in the SAST Security Radar
 Individually configurable and extensible filters
 Predefined classification of criticality
 Critical event combinations
Security Incident
 Consider business processes
 Individual risk evaluation
- 18 -
Log
Entries
Security incident ✓ Focus on individual, focused scenarios!
Rules
Our funnel approach – from events to alarms:
Developer DEV
System
Manipulates customer
report
Manipulates transport
to enable report
autostart under DDIC
Transport goes via Q to
P
Admin PROD
System
XPRA starts report
under DDIC
Developer gets
“hidden” SAP_ALL
Report changes own
code to hide activity
Developer PROD
System
Change bank data in
vendor master
AP Clerk PROD
System
Weekly payment run
Payment transferred to
wrong account
Change ABAP report Import transport Change Vendor Outgoing payment
SAST Code Advisor
detects critical code
and XPRA
SAST Security Radar
detects XPRA and hidden
SAP_ALL
SAST Security Radar
detects unapproved
vendor change
Use Case: Detection of Insider Attack.
- Klaus Brenk -
“With the help of the SAST SUITE,
we were able to significantly reduce the
probability of occurrence for critical events.
We are now in a position where
we can respond much faster
to critical events.“
Real-time monitoring of your SAP systems with SAST SUITE.
Your benefits at a glance:
Constant monitoring of configuration, authorizations and security and change logs.
+
- 21 -
+
+
+
+
+
Push-button access to the security status of entire SAP system landscape.
Integrates seamlessly into existing SIEM solutions.
Aggregated and evaluated information about security policy breaches.
Automatic alerting for critical and complex events, even by combining several events that
appear uncritical when viewed individually.
Pseudonymize user data to ensure compliance with the data protection laws of the
European Union (GDPR).
Ongoing content updates keeping all systems up-to-date.
+
- 22 -
Keep the
ball rolling
with us.
Keep the ball rolling with us…
SAST BLOG sast-blog.akquinet.com
New expert articles, practical tips, case studies, etc. every week.
SAST NEWS Registration on the website or by mail: sast@akquinet.de
Current information every 6-8 weeks.
SAST WEBINARS Were you unable to attend a live webinar?
ON DEMAND The webinar archive allows you to individually schedule when you want
to take advantage of our recommendations.
SAST WEBINARS Further topics for 2020 are available on our event page on the web.
- 23 -
DO YOU HAVE ANY QUESTIONS?
WE ANSWER. FOR SURE.
© Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright.
All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior
written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions.
The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information.
TIM KRÄNZKE
CSO SAST SOLUTIONS
Fon: +49 40 88173-2735
Email: tim.kraenzke@akquinet.com
Web: sast-solutions.com

More Related Content

What's hot

Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]akquinet enterprise solutions GmbH
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...akquinet enterprise solutions GmbH
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...akquinet enterprise solutions GmbH
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]akquinet enterprise solutions GmbH
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...akquinet enterprise solutions GmbH
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...akquinet enterprise solutions GmbH
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]akquinet enterprise solutions GmbH
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...akquinet enterprise solutions GmbH
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...akquinet enterprise solutions GmbH
 
Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP SystemsOnapsis Inc.
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 stepsERPScan
 
Sap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksSap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksErtunga Arsal
 
SAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection OverviewSAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection OverviewSAP Technology
 

What's hot (20)

Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...
 
SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
 
SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
 
SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]
 
Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP Systems
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
SAP License Audit Tips
SAP License Audit TipsSAP License Audit Tips
SAP License Audit Tips
 
Sap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hatSap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hat
 
Sap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksSap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless Attacks
 
SAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection OverviewSAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection Overview
 

Similar to Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]

SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsOWASP Delhi
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
 
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCEEASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCEAlex Himmelberg
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Product description shell control box 4 lts
Product description shell control box 4 ltsProduct description shell control box 4 lts
Product description shell control box 4 ltsmchatoramhuru
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunk
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions Thierry Matusiak
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 
Security Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceSecurity Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceMarco Casassa Mont
 
From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...Capgemini
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...Achim D. Brucker
 
Sap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depthSap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depthIgor Igoroshka
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioAVEVA
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 

Similar to Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar] (20)

SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCEEASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Product description shell control box 4 lts
Product description shell control box 4 ltsProduct description shell control box 4 lts
Product description shell control box 4 lts
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 
Security Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceSecurity Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-Service
 
IBM Operations Analytics For z Systems V2.2 - Client Long Pres
IBM Operations Analytics For z Systems V2.2 - Client Long PresIBM Operations Analytics For z Systems V2.2 - Client Long Pres
IBM Operations Analytics For z Systems V2.2 - Client Long Pres
 
From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
 
Sap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depthSap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depth
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
IP-guard Catalog
IP-guard CatalogIP-guard Catalog
IP-guard Catalog
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]

  • 1. Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed.
  • 2. WELCOME! Introducing your host today: - 2 - TIM KRÄNZKE CSO SAST SOLUTIONS Fon: +49 40 88173-2735 Email: tim.kraenzke@akquinet.com Web: sast-solutions.com RALF KEMPF CTO SAST SOLUTIONS Fon: +49 40 88173-251 Email: ralf.kempf@akquinet.com Web: sast-solutions.com
  • 3. With the SAST SOLUTIONS portfolio of akquinet AG, we are your world-class provider for the holistic protection of SAP ERP as well as S/4HANA systems - with real-time monitoring. In addition to our proprietary software suite, we offer SAP security and compliance consulting and managed services from a single source. Worldwide, more than 200 customers with 3.5 million SAP users currently rely on our vast expertise in protecting their SAP systems from cyberattacks, manipulation, espionage and data theft. Facts and figures - 3 -SAST SOLUTIONS customers worldwide 920 305 165 325 556 796 64 845 Employees Turnovers Mio. € 5,3 16,3 41,5 28,2 118 2002 2005 2008 2011 2014 2018 2019 2020 132 124 akquinet AG 71
  • 4. You have the choice for your SAP ERP and S/4HANA systems! SAP Security & Compliance – make or buy?! - 5 - SECURITY INTELLIGENCE SOFTWARE SUITE CONSULTING MANAGED SERVICES Identity and User Access Management Platform Security Security Intelligence Security Consulting Authorization Consulting SAP HANA & S/4HANA Migration Authorization Management Cybersecurity & Threat Detection
  • 5. Data breaches and hacks from the past.
  • 6. „From our project experiences we know: every system is vulnerable. It is a question of how difficult it is and how long it takes. We rarely find SAP systems in which the infrastructure is hardened in the best possible way and effective authorization management is lived out. Threats are almost always detected too late. With the right concept, the probability of a successful attack can be significantly reduced.“ Ralf Kempf CTO SAST SOLUTIONS - 7 -
  • 7. The Early Warning System for your SAP Landscape. Threat Intelligence with SAST SUITE.
  • 8. NIST cybersecurity framework for improving critical infrastructure. NIST = National Institute of Standards and Technology - 9 - Identify Protect Detect Respond Recover Asset Management Business Environment Governance Risk Assessment Risk Management Strategy Access Control Awareness and Training Data Security Information Protection Processes and Procedures Maintenance Protective Technologies Anomalies and Events Security Continuous Monitoring Detection Processes Response Planning Communications Analysis Mitigation Improvements Recovery Planning Improvements Communication
  • 9. Your IT security is our number one concern – in real time. All solutions from one source: - 10 -
  • 10. Use cases where SAST SUITE supports security analysts (prevention). Identity and User Access Management Detection of existing critical user-role-assignments Detection and mitigation of SoD rule violations ✓ ✓ - 11 - Platform Security (Vulnerability Scans and Cybersecurity) Vulnerability scan on OS, DB and SAP application level Scan of ABAP code for critical pattern ✓ ✓
  • 11. - 12 - Plug and Play integration with leading SIEM solutions Use cases where SAST SUITE supports security analysts (detection). Security Intelligence / SIEM / SOAR Real time threat and attack detection for SAP systems Monitor critical transactions, applications, log files ✓ ✓
  • 12. + + Customer-specific security and compliance policies in SAST Risk and Compliance Management  WHAT should be checked HOW by WHOM and WHEN  Manual and automatic tests  Proof of inspections carried out  Evidence collection  Compliance status calculation The existing SAST rules are automatically provided in a DEFAULT policy. Plug and Play. Customer policies can be easily created and maintained by copying and using the "Drag & Drop Policy Editor". + Policy-based security checks. Your advantages: - 13 -
  • 13. Policy-based security and vulnerability scans. Central vulnerability overview on multiple systems and areas: - 14 -
  • 14. Policy-based security and vulnerability scans. Easy drill down for root cause analyse: - 15 -
  • 15. Realtime threat detection for SAP systems. Use cases included with SAST SUITE: Manipulation of users and authorization. Assignment of critical authorization. Manipulation of passwords. Miss-used critical reports and functions modules. Access to critical, blacklisted transactions. Critical changes to system configurations. Manipulation of critical database tables. Information disclosure. Read access logging as additional data source. Extraction of confidential information (GDPR). File manipulation (parameter configuration, transports). Suspicious user behavior (technical and dialog users). Monitoring of SAP security notes. DoS detection. Critical transport content. Critical remote function calls. Login attempts of privileged accounts. Account sharing. Suspicious HTTP Calls. Miss-use of debugging and error- analysis. What else did the user do? Threat hunting. Forensic analysis. Correlation of different account to on person (Central Identity). - 16 -
  • 16. - 17 - Distributed system log data Normalize, Pseudonymize, enrich log data Persistence, analyze, generate alerts SAST Real Time Cybersecurity Monitoring.
  • 17. Collect Log Data Critical/Relevant Events Intelligent Log Filters Complex Events  Identify log sources  Consolidate across system borders  Filter irrelevant events  +3500 filters in the SAST Security Radar  Individually configurable and extensible filters  Predefined classification of criticality  Critical event combinations Security Incident  Consider business processes  Individual risk evaluation - 18 - Log Entries Security incident ✓ Focus on individual, focused scenarios! Rules Our funnel approach – from events to alarms:
  • 18. Developer DEV System Manipulates customer report Manipulates transport to enable report autostart under DDIC Transport goes via Q to P Admin PROD System XPRA starts report under DDIC Developer gets “hidden” SAP_ALL Report changes own code to hide activity Developer PROD System Change bank data in vendor master AP Clerk PROD System Weekly payment run Payment transferred to wrong account Change ABAP report Import transport Change Vendor Outgoing payment SAST Code Advisor detects critical code and XPRA SAST Security Radar detects XPRA and hidden SAP_ALL SAST Security Radar detects unapproved vendor change Use Case: Detection of Insider Attack.
  • 19. - Klaus Brenk - “With the help of the SAST SUITE, we were able to significantly reduce the probability of occurrence for critical events. We are now in a position where we can respond much faster to critical events.“
  • 20. Real-time monitoring of your SAP systems with SAST SUITE. Your benefits at a glance: Constant monitoring of configuration, authorizations and security and change logs. + - 21 - + + + + + Push-button access to the security status of entire SAP system landscape. Integrates seamlessly into existing SIEM solutions. Aggregated and evaluated information about security policy breaches. Automatic alerting for critical and complex events, even by combining several events that appear uncritical when viewed individually. Pseudonymize user data to ensure compliance with the data protection laws of the European Union (GDPR). Ongoing content updates keeping all systems up-to-date. +
  • 21. - 22 - Keep the ball rolling with us.
  • 22. Keep the ball rolling with us… SAST BLOG sast-blog.akquinet.com New expert articles, practical tips, case studies, etc. every week. SAST NEWS Registration on the website or by mail: sast@akquinet.de Current information every 6-8 weeks. SAST WEBINARS Were you unable to attend a live webinar? ON DEMAND The webinar archive allows you to individually schedule when you want to take advantage of our recommendations. SAST WEBINARS Further topics for 2020 are available on our event page on the web. - 23 -
  • 23. DO YOU HAVE ANY QUESTIONS? WE ANSWER. FOR SURE. © Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright. All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions. The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information. TIM KRÄNZKE CSO SAST SOLUTIONS Fon: +49 40 88173-2735 Email: tim.kraenzke@akquinet.com Web: sast-solutions.com