SlideShare a Scribd company logo
1 of 23
How hackers are
compromising
S/4HANA and
how you can
protect yourself
SAST WEBINAR
September 2019
Why S/4HANA is important for Attackers
Content Considerations
 S/4HANA contains business critical data  espionage target
 S/4HANA is central to business processes  sabotage target
Technology Considerations
 Fraud possibilities
 IT / Security has little experience with HANA
Complexity of security requirements increases with S/4HANA!
- 2 -
SAP HANA – a new complexity
- 3 -
http://help.sap.com/saphelp_hanaplatform/helpdata/en/37/d2573cb24e4d75a23e8577fb4f73b7/content.htm
5 ways to attack
S/4HANA

 Social Engineering – the clever manipulation
of the natural human tendency to trust
 Practical Example:
 Call random numbers, pretend to be
IT support
 Eventually someone will enter “your”
commands
Risk #1: Social Engineering
5
Social Engineering is the most effective way of hacking!
 Many different ways using known exploits
in combination with hard-/software
 No special knowledge needed
(but useful if present)
 Practical Example:
 Wi-Fi-Pineapple: easily available,
including “appstore”
 Just enter the closest Starbucks….
Risk #2: The „Classical“ Hacker
6
Hackers don‘t need specific knowledge – everything is readily available on the internet!
 Fraudulently obtaining private information
 Usually with links to websites or malicious
documents attached
 Practical Example:
 E-Mail with Login-URL for HANA System
 PHP-Script in the background catches
user name/password
Risk #3: Phishing
7
„Thanks to“ social media, targeted phishing becomes a real issue!
 S/4HANA applications work via browser
 ABAP is still in the game – combined
with other programming languages
 Increased complexity in development
 Practical Example:
 Backdoor for specific users
Risk #4: Custom Development
8
Web applications must be secured on all levels!
Custom development needs to be scanned for security vulnerabilities!
 Reality: SAP HANA runs in parallel to existing systems
 SAP HANA includes separate security
functions
 Basic security features to be considered
 Practical Example:
 e.g.: 10KBLAZE
(Message Server, SAP Gateway…)
Risk #5: 10KBLAZE – Basis Security
9
Increased system landscape complexity with HANA means more security settings to keep in
mind
!
5 rules to
protect
S/4HANA

 Ensure OS system security
 Validate all other (HANA) system security settings
 Secure communications for all connections
 Restrict access wherever necessary
Rule #1: System Hardening
11
Monitor all security settings – configuration drift is a real challenge!
Secure standard users (SYSTEM, <sid>adm, etc.)
Restrict authorizations
Use Single Sign-On
Strong Password Policies
Validate role concept for critical authorizaions and SoD conflicts
Rule #2: User and role management
12
Extensive privileges compromise the entire system!
Avoid http exposed packages
Ensure secure authentification methods
Follow development guidelines
Validate custom application security
Correct existing security weaknesses before migrating
Rule #3: Secure Application Development
13
Your code – your responsibility!
 Enable audit log
 Restrict audit authorizations
 Secure access to audits and logs
 Enrich SIEM systems with SAP log data
Rule #4: Establish Real-Time Monitoring
14
Real-Time Monitoring will not only identify threats, but will also help analyzing them!
Define risk tolerance for each system
Setting a Patch Management Policy
Implement patches as quickly as possible
Rule #5: Security Patches
15
As soon as patches are released, the hacking community knows about them!!
Securing HANA
with SAST SUITE

- 17 -
Maximum protection on all levels, thanks to SAST.
Hacker attacks
Espionage
Manipulation



Misuse of rights
Data theft
4D SAST SOLUTIONS: Comprehensive protection in real-time!
Overview of our Suite
SECURITY INTELLIGENCEPLATFORM SECURITY IDENTITY AND USER ACCESS MANAGEMENT
SAST SUITE for SAP ERP or S/4HANA
Interface Management
System Security Validation Authorization Management
Role Management
User Access Management
Download Management
Password Self Service
Risk and Compliance Management
Security Radar
Management Dashboard
Safe Go-Live Management
Code Advisor
Self-Adjusting Authorizations
Code Remediator
Superuser Management
HCM Read Access Monitoring
- 18 -
SAST SUITE for S/4HANA
Security
 Technical Security for
S/4HANA
Authorizations
 Secure and efficient role
management
Custom Code
 Cleansing and optimizing
custom code
- 19 -
SAST for S/4HANA
Technical Security
 Close your security gaps in the areas: Application server, operating system
and databases
 Best practice approach:
 Check your current security level
 Harden your system at all levels
 Set up permanent security monitoring
- 20 -
The SAST SUITE for S/4HANA secures SAP systems and
monitors them continuously and comprehensively.

SAST for S/4HANA
Securing Roles and Authorizations
 S/4HANA requires a new role concept compared to SAP ERP
 Especially for Fiori Apps roles/authorizations need to be re-designed
 With the SAST role templates, the process is significantly accelerated
 Due to our "Safe Go Live" there are no restrictions in operations
- 21 -
The SAST SUITE for S/4HANA supports you in an effective
and efficient role management

SAST for S/4HANA
Securing Custom Code
 Custom code analysis to identify existing weaknesses
 Consider context information (usage statistics) to disable obsolete code
 Reprogramming where appropriate
 Identify and migrate/optimize "vital" applications
 "Soft-Cleansing" enables code cleansing without restricting operations
- 22 -
The SAST SUITE for S/4HANA supports you in identifying
and eliminating security vulnerabilities.

QUESTIONS?
WE ANSWER. FOR SURE.
PATRICK BOCH
Product Manager SAST SOLUTIONS
Tel: +49 40 88173-2702
E-Mail: patrick.boch@akquinet.de
Web: www.sast-solutions.de
© Copyright AKQUINET AG. Alle Rechte vorbehalten. Die vorliegende Publikation ist urheberrechtlich geschützt.
Alle Rechte, insbesondere das Recht der Vervielfältigung und Verbreitung sowie die Übersetzung, bleiben vorbehalten. Kein Teil der Dokumentation darf in irgendeiner Form (durch Fotokopie, Mikrofilm oder ein anderes Verfahren) ohne vorherige schriftliche Zustimmung
von AKQUINET AG reproduziert oder unter Verwendung elektronischer Systeme verarbeitet, vervielfältigt oder verbreitet werden. Die in dieser Publikation erwähnten Bezeichnungen sind teilweise auch eingetragene Warenzeichen der jeweiligen Anbieter und unterliegen als
solche den gesetzlichen Bestimmungen. Die Informationen in dieser Publikation sind mit größter Sorgfalt zusammengestellt worden. Es kann jedoch keine Garantie für die Verwendbarkeit, Richtigkeit und Vollständigkeit übernommen werden.
Für Schäden, die aus der Anwendung der Informationen entstehen können, übernimmt die AKQUINET AG keine Haftung.

More Related Content

What's hot

SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...akquinet enterprise solutions GmbH
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]akquinet enterprise solutions GmbH
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...akquinet enterprise solutions GmbH
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...akquinet enterprise solutions GmbH
 
Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]akquinet enterprise solutions GmbH
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...akquinet enterprise solutions GmbH
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]akquinet enterprise solutions GmbH
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...akquinet enterprise solutions GmbH
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...akquinet enterprise solutions GmbH
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...akquinet enterprise solutions GmbH
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP securityERPScan
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 stepsERPScan
 
Sap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksSap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksErtunga Arsal
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 Englishguest5bd7a1
 
Security concerns in web erp
Security concerns in web erpSecurity concerns in web erp
Security concerns in web erpManoj Jhawar
 
SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015
SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015
SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015Ertunga Arsal
 
SAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection OverviewSAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection OverviewSAP Technology
 

What's hot (20)

SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...
 
Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
 
Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
Sap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksSap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless Attacks
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
 
Security concerns in web erp
Security concerns in web erpSecurity concerns in web erp
Security concerns in web erp
 
SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015
SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015
SAP Security - Real life Attacks to Business Processes - Hack in Paris 2015
 
SAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection OverviewSAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection Overview
 

Similar to Protect S/4HANA with SAST Suite Security Tools

SAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksSAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksVirtual Forge
 
Preventing Vulnerabilities in SAP HANA based Deployments
Preventing Vulnerabilities in SAP HANA based DeploymentsPreventing Vulnerabilities in SAP HANA based Deployments
Preventing Vulnerabilities in SAP HANA based DeploymentsOnapsis Inc.
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...akquinet enterprise solutions GmbH
 
Addressing Web Application Security Vulnerabilities.pdf
Addressing Web Application Security Vulnerabilities.pdfAddressing Web Application Security Vulnerabilities.pdf
Addressing Web Application Security Vulnerabilities.pdfCecilSu
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security ConfigurationsOnapsis Inc.
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsOnapsis Inc.
 
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe... 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...Onapsis Inc.
 
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...Achim D. Brucker
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016Twan van den Broek
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioAVEVA
 
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis Inc.
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)ERPScan
 

Similar to Protect S/4HANA with SAST Suite Security Tools (20)

SAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksSAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New Risks
 
protect4s-product-sheet
protect4s-product-sheetprotect4s-product-sheet
protect4s-product-sheet
 
Preventing Vulnerabilities in SAP HANA based Deployments
Preventing Vulnerabilities in SAP HANA based DeploymentsPreventing Vulnerabilities in SAP HANA based Deployments
Preventing Vulnerabilities in SAP HANA based Deployments
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
Addressing Web Application Security Vulnerabilities.pdf
Addressing Web Application Security Vulnerabilities.pdfAddressing Web Application Security Vulnerabilities.pdf
Addressing Web Application Security Vulnerabilities.pdf
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
 
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe... 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
 
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
 
Null Meet Ppt
Null Meet PptNull Meet Ppt
Null Meet Ppt
 
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Sap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hatSap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hat
 
So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
 
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
 

Recently uploaded

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Protect S/4HANA with SAST Suite Security Tools

  • 1. How hackers are compromising S/4HANA and how you can protect yourself SAST WEBINAR September 2019
  • 2. Why S/4HANA is important for Attackers Content Considerations  S/4HANA contains business critical data  espionage target  S/4HANA is central to business processes  sabotage target Technology Considerations  Fraud possibilities  IT / Security has little experience with HANA Complexity of security requirements increases with S/4HANA! - 2 -
  • 3. SAP HANA – a new complexity - 3 - http://help.sap.com/saphelp_hanaplatform/helpdata/en/37/d2573cb24e4d75a23e8577fb4f73b7/content.htm
  • 4. 5 ways to attack S/4HANA 
  • 5.  Social Engineering – the clever manipulation of the natural human tendency to trust  Practical Example:  Call random numbers, pretend to be IT support  Eventually someone will enter “your” commands Risk #1: Social Engineering 5 Social Engineering is the most effective way of hacking!
  • 6.  Many different ways using known exploits in combination with hard-/software  No special knowledge needed (but useful if present)  Practical Example:  Wi-Fi-Pineapple: easily available, including “appstore”  Just enter the closest Starbucks…. Risk #2: The „Classical“ Hacker 6 Hackers don‘t need specific knowledge – everything is readily available on the internet!
  • 7.  Fraudulently obtaining private information  Usually with links to websites or malicious documents attached  Practical Example:  E-Mail with Login-URL for HANA System  PHP-Script in the background catches user name/password Risk #3: Phishing 7 „Thanks to“ social media, targeted phishing becomes a real issue!
  • 8.  S/4HANA applications work via browser  ABAP is still in the game – combined with other programming languages  Increased complexity in development  Practical Example:  Backdoor for specific users Risk #4: Custom Development 8 Web applications must be secured on all levels! Custom development needs to be scanned for security vulnerabilities!
  • 9.  Reality: SAP HANA runs in parallel to existing systems  SAP HANA includes separate security functions  Basic security features to be considered  Practical Example:  e.g.: 10KBLAZE (Message Server, SAP Gateway…) Risk #5: 10KBLAZE – Basis Security 9 Increased system landscape complexity with HANA means more security settings to keep in mind !
  • 11.  Ensure OS system security  Validate all other (HANA) system security settings  Secure communications for all connections  Restrict access wherever necessary Rule #1: System Hardening 11 Monitor all security settings – configuration drift is a real challenge!
  • 12. Secure standard users (SYSTEM, <sid>adm, etc.) Restrict authorizations Use Single Sign-On Strong Password Policies Validate role concept for critical authorizaions and SoD conflicts Rule #2: User and role management 12 Extensive privileges compromise the entire system!
  • 13. Avoid http exposed packages Ensure secure authentification methods Follow development guidelines Validate custom application security Correct existing security weaknesses before migrating Rule #3: Secure Application Development 13 Your code – your responsibility!
  • 14.  Enable audit log  Restrict audit authorizations  Secure access to audits and logs  Enrich SIEM systems with SAP log data Rule #4: Establish Real-Time Monitoring 14 Real-Time Monitoring will not only identify threats, but will also help analyzing them!
  • 15. Define risk tolerance for each system Setting a Patch Management Policy Implement patches as quickly as possible Rule #5: Security Patches 15 As soon as patches are released, the hacking community knows about them!!
  • 17. - 17 - Maximum protection on all levels, thanks to SAST. Hacker attacks Espionage Manipulation    Misuse of rights Data theft
  • 18. 4D SAST SOLUTIONS: Comprehensive protection in real-time! Overview of our Suite SECURITY INTELLIGENCEPLATFORM SECURITY IDENTITY AND USER ACCESS MANAGEMENT SAST SUITE for SAP ERP or S/4HANA Interface Management System Security Validation Authorization Management Role Management User Access Management Download Management Password Self Service Risk and Compliance Management Security Radar Management Dashboard Safe Go-Live Management Code Advisor Self-Adjusting Authorizations Code Remediator Superuser Management HCM Read Access Monitoring - 18 -
  • 19. SAST SUITE for S/4HANA Security  Technical Security for S/4HANA Authorizations  Secure and efficient role management Custom Code  Cleansing and optimizing custom code - 19 -
  • 20. SAST for S/4HANA Technical Security  Close your security gaps in the areas: Application server, operating system and databases  Best practice approach:  Check your current security level  Harden your system at all levels  Set up permanent security monitoring - 20 - The SAST SUITE for S/4HANA secures SAP systems and monitors them continuously and comprehensively. 
  • 21. SAST for S/4HANA Securing Roles and Authorizations  S/4HANA requires a new role concept compared to SAP ERP  Especially for Fiori Apps roles/authorizations need to be re-designed  With the SAST role templates, the process is significantly accelerated  Due to our "Safe Go Live" there are no restrictions in operations - 21 - The SAST SUITE for S/4HANA supports you in an effective and efficient role management 
  • 22. SAST for S/4HANA Securing Custom Code  Custom code analysis to identify existing weaknesses  Consider context information (usage statistics) to disable obsolete code  Reprogramming where appropriate  Identify and migrate/optimize "vital" applications  "Soft-Cleansing" enables code cleansing without restricting operations - 22 - The SAST SUITE for S/4HANA supports you in identifying and eliminating security vulnerabilities. 
  • 23. QUESTIONS? WE ANSWER. FOR SURE. PATRICK BOCH Product Manager SAST SOLUTIONS Tel: +49 40 88173-2702 E-Mail: patrick.boch@akquinet.de Web: www.sast-solutions.de © Copyright AKQUINET AG. Alle Rechte vorbehalten. Die vorliegende Publikation ist urheberrechtlich geschützt. Alle Rechte, insbesondere das Recht der Vervielfältigung und Verbreitung sowie die Übersetzung, bleiben vorbehalten. Kein Teil der Dokumentation darf in irgendeiner Form (durch Fotokopie, Mikrofilm oder ein anderes Verfahren) ohne vorherige schriftliche Zustimmung von AKQUINET AG reproduziert oder unter Verwendung elektronischer Systeme verarbeitet, vervielfältigt oder verbreitet werden. Die in dieser Publikation erwähnten Bezeichnungen sind teilweise auch eingetragene Warenzeichen der jeweiligen Anbieter und unterliegen als solche den gesetzlichen Bestimmungen. Die Informationen in dieser Publikation sind mit größter Sorgfalt zusammengestellt worden. Es kann jedoch keine Garantie für die Verwendbarkeit, Richtigkeit und Vollständigkeit übernommen werden. Für Schäden, die aus der Anwendung der Informationen entstehen können, übernimmt die AKQUINET AG keine Haftung.

Editor's Notes

  1. Brücke zu S/4 weil Login webbasiert Markus NW anmeldeseite mit PHP hinter
  2. On Premise zu Cloud migrieren: - Schnittstellen analysieren - Schnittstellen umbauen - viel Coding - Firewall öffnen SAP als Tunnel in die Cloud - DMZ - Cloud Connector - Cloud Spezialisten