SlideShare a Scribd company logo
1 of 36
Download to read offline
run your business safer
SEC 112
SAP HANA Security:
New technologies, new risks
Markus Schumacher
© 2015, Virtual Forge, Inc. All rights reserved.
Agenda
Virtual Forge: Who we are
Understanding HANA security
New risks in SAP HANA
5 rules to protect SAP HANA
Security, Compliance and Quality solutions
Virtual Forge:
Who we are
About Virtual Forge
Experts in SAP Security, Compliance and Quality
2001: Founded as consulting house
2008: Release of “CodeProfiler”
2013: Release of “SystemProfiler”
Patented Data and Control Flow Analysis for ABAP®
Gartner:
Magic Quadrant for Application Security Testing 2013
Named Virtual Forge the “Leading Vendor for ABAP® Security”
Cool Vendor in the SAP Ecosystem 2011
About Virtual Forge
The Key Benefits
Cost reduction
Automated process
leads to lower effort
and cost for:
-  identifying errors
(up to 95%)
-  correcting errors (up
to 70%)
-  QA effort
(up to 90%)
Improved
User Experience
Our products
are seamlessly
integrated into the
SAP environment
-  enables working in
a familiar
environment
-  Makes work
noticeably easier
Expertise
& Experience
-  more than
170 customers
-  more than
1,400 customer
projects
-  more than
2,000 product
installations
Independence
-  active member of
the SAP community
-  participating in
DSAG and ASUG
chapters
-  cooperating with
global auditing firms
Industry
recognition
-  admitted to the
Garter Magic
Quadrant for
Application Security
Testing (AST)
in 2013 and 2014
-  Chosen as one of
the top 500 cyber
security companies
to watch in 2015
Trusted Advisor for Security, Compliance and Quality
The Virtual Forge Portfolio
Security
Compliance
Quality
Code Level System Level
Virtual Forge
Professional Services help
to improve development,
operating lifecycle and
security in SAP® standards.
Virtual Forge
SystemProfiler detects
and corrects errors in
SAP system
configurations and
avoids recurrence.
SYSTEMPROFILER
Virtual Forge
CodeProfiler pinpoints
vulnerabilities in ABAP®
program codes and
corrects errors
automatically.
CODEPROFILER PROFESSIONAL
SERVICES
Entire SAP landscape
Understanding
HANA security
  HANA as a data mart
  Similar to “classic” BW architecture, HANA gathers data from (several) source systems
  HANA in a classic 3-tier architecture
  HANA replaces regular relational database
  HANA as a technical infrastructure for native applications
  New business application platform (S/4 HANA)
Understanding HANA Security
HANA deployment scenarios
Content Considerations
  Contains business critical data à espionage target
  Central to business processes à sabotage target
Technology Considerations
  Fraud possibilities
  IT / Security has little experience with HANA
Understanding HANA Security
Why is HANA important to Hackers
  HANA provides its own security functions
  Standard security features such as authentication, user/role mgt., authorization,
encryption…
  Need to be configured within HANA toolset
  Other mechanisms to integrate HANA into the general security infrastructure
  Includes Standard SAP administration tools, Network, OS and DB security tools, etc.
  Different documents deal with HANA security, e.g. HANA security overview,
HANA security admin guide, SQLScript-Reference-guide
Understanding HANA Security
What SAP says about HANA security
Security complexity rises with SAP HANA
!
New risks in
SAP HANA
Weaknesses can include XSS, SQL
injection, Directory Traversal
Risk #1: Web Applications
SAP HANA systems can easily be found
on the Internet
Unauthorized access possible
Services can be misused
SAP HANA is still vulnerable to
typical web weaknesses
Be aware of risks in privileged functions,
preventing OS command execution, etc.
Risk #2: R-Serve
R is used for statistical and advanced
data analysis
SAP HANA can be connected to R-Serve
to utilize R functions
For separate hosts, remote
functions enabled
Make sure server-side scripting is
protected against any injection
attack
Risk #3: RAM scraping
HANA makes RAM scraping attractive
for hackers
Leaves almost no footprint
Circumvents encryption
Data on SAP HANA is not
encrypted on RAM level
ABAP programming needs to be
validated for weaknesses
Risk #4: Custom Development
SAP HANA applications are accessible
through browsers
ABAP is still used for HANA in a 3-tier
or data mart scenario
Increased development complexity
Web applications need to be secured at
all levels
Risk #5: Basis security
Reality: SAP HANA runs in parallel to
existing systems
SAP HANA includes separate security
functions
Basic security features to be considered
Increased system landscape
complexity with HANA means more
security settings to keep in mind
5 rules to
protect SAP
HANA
Rule #1:
No surprise: User and role management
Secure standard users (SYSTEM, <sid>adm, etc.)
Restrict authorizations
Use Single Sign-On
Strong Password Policies
Extensive privileges compromise the entire system
!
Rule #2:
Obviously: Data encryption and security
Encrypt all sensitive data (encryption is disabled by default on SAP
HANA)
Encrypt at all levels (data at rest, secure store in the file system)
Establish key management procedures
Encryption effectively minimizes data theft
!
Rule #3:
Remember: Secure application development
Avoid http exposed packages
Use standard authentication methods
Follow development guidelines
Validate custom application security
Your code – your responsibility
!
Rule #4:
Don’t forget: Harden System settings
Ensure OS system security
Validate all other (HANA) system security settings
Secure communications for all connections
Restrict access wherever necessary
Monitor all security settings –
configuration drift is a real challenge!
Rule #5:
Not to mention: Enable auditing and logging
Enable audit log
Restrict audit authorizations
Secure access to audits and logs
Auditing enables a
forensic analysis in case of an attack!
Security,
Compliance and
Quality Solutions
  HANA can be an attractive target for hackers
  Many known and new risks apply to HANA
  Web applications
  R-Serve
  RAM-Scraping
  Custom developments
  Complexity of SAP system landscapes increases with additional
HANA scenarios
  For an optimal use of HANA, many settings need to be adjusted
Challenges to HANA Security & Quality
  Optimizing ABAP code for HANA usage (CodeProfiler)
  HANA Test Cases (HANA Readiness & Optimization)
  Automated Correction (“Quick Fix” and Bulk)
  Securing HANA configuration (SystemProfiler)
  Additional platform for SystemProfiler
  Test Cases, e.g. communication security, authorization, others
  CodeProfiler for HANA
  Eclipse and Web IDE Integration
  First HANA Code Scanner ever
Virtual Forge HANA Security Suite
Optimizing Code for HANA
Hybrid Performance Analysis for HANA
Securing HANA configuration with SystemProfiler
Scanning HANA Scripts During Development (Eclipse)
Scanning HANA Scripts During Development (Web Editor)
Reporting Dashboards
Take action:
We evaluate the current state of your SAP environment for free
Take an instant test
Visit www.virtualforge.com
ü  Summary of
findings
ü  Priorization and
classification of
vulnerabilities
ü  Specific examples
of findings
ü  Code and system
metrics
Quality
Compliance
Security
Secure
SAP®-
systems
Risk Assessment /
Penetration Test
•  SAP configuration
•  Custom code
Free
Dr. Markus Schumacher
www.virtualforge.com
@Virtual_Forge
Thank you!
Feel free to write or call for any questions and requests35
Disclaimer
© 2015 Virtual Forge Inc. All rights reserved.
SAP, R/3, SAP NetWeaver, and other SAP products and services mentioned herein as well as their
respective logos are trademarks or registered trademarks of SAP AG. All other product and service
names mentioned are the trademarks of their respective companies.
Information contained in this publication is subject to change without prior notice. It is provided by
Virtual Forge and serves informational purposes only. Virtual Forge is not liable for errors or
incomplete information in this publication. Information contained in this publication does not imply any
further liability.
Virtual Forge Terms and Conditions apply. See www.virtualforge.com for details.

More Related Content

What's hot

SAP HANA SPS08 Administration & Monitoring
SAP HANA SPS08 Administration & MonitoringSAP HANA SPS08 Administration & Monitoring
SAP HANA SPS08 Administration & Monitoring SAP Technology
 
What's New in SAP HANA SPS 11 Platform Lifecycle Management (Operations)
What's New in SAP HANA SPS 11 Platform Lifecycle Management (Operations)What's New in SAP HANA SPS 11 Platform Lifecycle Management (Operations)
What's New in SAP HANA SPS 11 Platform Lifecycle Management (Operations)SAP Technology
 
HANA SPS07 Replication
HANA SPS07 ReplicationHANA SPS07 Replication
HANA SPS07 ReplicationSAP Technology
 
What's New in SAP HANA SPS 11 Application Lifecycle Management
What's New in SAP HANA SPS 11 Application Lifecycle ManagementWhat's New in SAP HANA SPS 11 Application Lifecycle Management
What's New in SAP HANA SPS 11 Application Lifecycle ManagementSAP Technology
 
What's New in SAP HANA SPS 11 DB Control Center (Operations)
What's New in SAP HANA SPS 11 DB Control Center (Operations)What's New in SAP HANA SPS 11 DB Control Center (Operations)
What's New in SAP HANA SPS 11 DB Control Center (Operations)SAP Technology
 
SAP HANA SPS10- Scale-Out, High Availability and Disaster Recovery
SAP HANA SPS10- Scale-Out, High Availability and Disaster RecoverySAP HANA SPS10- Scale-Out, High Availability and Disaster Recovery
SAP HANA SPS10- Scale-Out, High Availability and Disaster RecoverySAP Technology
 
SAP HANA SPS10- Workload Management
SAP HANA SPS10- Workload ManagementSAP HANA SPS10- Workload Management
SAP HANA SPS10- Workload ManagementSAP Technology
 
SAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - OverviewSAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - OverviewMatthias Steiner
 
What's new on SAP HANA Workload Management
What's new on SAP HANA Workload ManagementWhat's new on SAP HANA Workload Management
What's new on SAP HANA Workload ManagementSAP Technology
 
SAP HANA – A Technical Snapshot
SAP HANA – A Technical SnapshotSAP HANA – A Technical Snapshot
SAP HANA – A Technical SnapshotDebajit Banerjee
 
What's New in SPS11 Overview
What's New in SPS11 OverviewWhat's New in SPS11 Overview
What's New in SPS11 OverviewSAP Technology
 
Sap hana client_installation_update_guide_en
Sap hana client_installation_update_guide_enSap hana client_installation_update_guide_en
Sap hana client_installation_update_guide_enShobha Nand Kumar
 
Taking it all offline with SQL Anywhere
Taking it all offline with SQL AnywhereTaking it all offline with SQL Anywhere
Taking it all offline with SQL AnywhereZendCon
 
SAP HANA SPS10- Multitenant Database Containers
SAP HANA SPS10- Multitenant Database ContainersSAP HANA SPS10- Multitenant Database Containers
SAP HANA SPS10- Multitenant Database ContainersSAP Technology
 
What's new for SAP HANA SPS 11 Dynamic Tiering
What's new for SAP HANA SPS 11 Dynamic TieringWhat's new for SAP HANA SPS 11 Dynamic Tiering
What's new for SAP HANA SPS 11 Dynamic TieringSAP Technology
 
How Do You Innovate In a Complex Work? Read How SAP and Intel Can Help
How Do You Innovate In a Complex Work? Read How SAP and Intel Can HelpHow Do You Innovate In a Complex Work? Read How SAP and Intel Can Help
How Do You Innovate In a Complex Work? Read How SAP and Intel Can HelpSAP Technology
 
SAP HANA SPS09 - SAP HANA Workload Management
SAP HANA SPS09 - SAP HANA Workload ManagementSAP HANA SPS09 - SAP HANA Workload Management
SAP HANA SPS09 - SAP HANA Workload ManagementSAP Technology
 
What's new in SAP HANA SPS 11 SQL/SQLScript
What's new in SAP HANA SPS 11 SQL/SQLScriptWhat's new in SAP HANA SPS 11 SQL/SQLScript
What's new in SAP HANA SPS 11 SQL/SQLScriptSAP Technology
 
SAP HANA SPS10- SAP HANA Remote Data Sync
SAP HANA SPS10- SAP HANA Remote Data SyncSAP HANA SPS10- SAP HANA Remote Data Sync
SAP HANA SPS10- SAP HANA Remote Data SyncSAP Technology
 

What's hot (20)

SAP HANA Overview
SAP HANA OverviewSAP HANA Overview
SAP HANA Overview
 
SAP HANA SPS08 Administration & Monitoring
SAP HANA SPS08 Administration & MonitoringSAP HANA SPS08 Administration & Monitoring
SAP HANA SPS08 Administration & Monitoring
 
What's New in SAP HANA SPS 11 Platform Lifecycle Management (Operations)
What's New in SAP HANA SPS 11 Platform Lifecycle Management (Operations)What's New in SAP HANA SPS 11 Platform Lifecycle Management (Operations)
What's New in SAP HANA SPS 11 Platform Lifecycle Management (Operations)
 
HANA SPS07 Replication
HANA SPS07 ReplicationHANA SPS07 Replication
HANA SPS07 Replication
 
What's New in SAP HANA SPS 11 Application Lifecycle Management
What's New in SAP HANA SPS 11 Application Lifecycle ManagementWhat's New in SAP HANA SPS 11 Application Lifecycle Management
What's New in SAP HANA SPS 11 Application Lifecycle Management
 
What's New in SAP HANA SPS 11 DB Control Center (Operations)
What's New in SAP HANA SPS 11 DB Control Center (Operations)What's New in SAP HANA SPS 11 DB Control Center (Operations)
What's New in SAP HANA SPS 11 DB Control Center (Operations)
 
SAP HANA SPS10- Scale-Out, High Availability and Disaster Recovery
SAP HANA SPS10- Scale-Out, High Availability and Disaster RecoverySAP HANA SPS10- Scale-Out, High Availability and Disaster Recovery
SAP HANA SPS10- Scale-Out, High Availability and Disaster Recovery
 
SAP HANA SPS10- Workload Management
SAP HANA SPS10- Workload ManagementSAP HANA SPS10- Workload Management
SAP HANA SPS10- Workload Management
 
SAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - OverviewSAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - Overview
 
What's new on SAP HANA Workload Management
What's new on SAP HANA Workload ManagementWhat's new on SAP HANA Workload Management
What's new on SAP HANA Workload Management
 
SAP HANA – A Technical Snapshot
SAP HANA – A Technical SnapshotSAP HANA – A Technical Snapshot
SAP HANA – A Technical Snapshot
 
What's New in SPS11 Overview
What's New in SPS11 OverviewWhat's New in SPS11 Overview
What's New in SPS11 Overview
 
Sap hana client_installation_update_guide_en
Sap hana client_installation_update_guide_enSap hana client_installation_update_guide_en
Sap hana client_installation_update_guide_en
 
Taking it all offline with SQL Anywhere
Taking it all offline with SQL AnywhereTaking it all offline with SQL Anywhere
Taking it all offline with SQL Anywhere
 
SAP HANA SPS10- Multitenant Database Containers
SAP HANA SPS10- Multitenant Database ContainersSAP HANA SPS10- Multitenant Database Containers
SAP HANA SPS10- Multitenant Database Containers
 
What's new for SAP HANA SPS 11 Dynamic Tiering
What's new for SAP HANA SPS 11 Dynamic TieringWhat's new for SAP HANA SPS 11 Dynamic Tiering
What's new for SAP HANA SPS 11 Dynamic Tiering
 
How Do You Innovate In a Complex Work? Read How SAP and Intel Can Help
How Do You Innovate In a Complex Work? Read How SAP and Intel Can HelpHow Do You Innovate In a Complex Work? Read How SAP and Intel Can Help
How Do You Innovate In a Complex Work? Read How SAP and Intel Can Help
 
SAP HANA SPS09 - SAP HANA Workload Management
SAP HANA SPS09 - SAP HANA Workload ManagementSAP HANA SPS09 - SAP HANA Workload Management
SAP HANA SPS09 - SAP HANA Workload Management
 
What's new in SAP HANA SPS 11 SQL/SQLScript
What's new in SAP HANA SPS 11 SQL/SQLScriptWhat's new in SAP HANA SPS 11 SQL/SQLScript
What's new in SAP HANA SPS 11 SQL/SQLScript
 
SAP HANA SPS10- SAP HANA Remote Data Sync
SAP HANA SPS10- SAP HANA Remote Data SyncSAP HANA SPS10- SAP HANA Remote Data Sync
SAP HANA SPS10- SAP HANA Remote Data Sync
 

Viewers also liked

Stabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickelnStabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickelnVirtual Forge
 
HANA Playground Session_Latest
HANA Playground Session_LatestHANA Playground Session_Latest
HANA Playground Session_LatestAbhishek Agrawal
 
Tập san TTC số 2, tháng 9, năm 2014
Tập san TTC số 2, tháng 9, năm 2014Tập san TTC số 2, tháng 9, năm 2014
Tập san TTC số 2, tháng 9, năm 2014Tien Dao
 
Sitnl erp sec-2011
Sitnl erp sec-2011Sitnl erp sec-2011
Sitnl erp sec-2011jvandevis
 
SAP SNC – Customer Collaboration
SAP SNC – Customer CollaborationSAP SNC – Customer Collaboration
SAP SNC – Customer CollaborationVasanth S Vasanth
 
Controlling 2012 Impact of SAP HANA
Controlling 2012 Impact of SAP HANAControlling 2012 Impact of SAP HANA
Controlling 2012 Impact of SAP HANAJohn Jordan
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC ProjectERPScan
 
Hana for copa
Hana for copaHana for copa
Hana for copanc27770
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP SecurityNasir Gondal
 

Viewers also liked (17)

Las Bibliotecas virtuales
Las Bibliotecas virtuales Las Bibliotecas virtuales
Las Bibliotecas virtuales
 
Stabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickelnStabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickeln
 
IA_DEV-050314
IA_DEV-050314IA_DEV-050314
IA_DEV-050314
 
HANA Playground Session_Latest
HANA Playground Session_LatestHANA Playground Session_Latest
HANA Playground Session_Latest
 
Hana1 slt repli_sec_en
Hana1 slt repli_sec_enHana1 slt repli_sec_en
Hana1 slt repli_sec_en
 
Tập san TTC số 2, tháng 9, năm 2014
Tập san TTC số 2, tháng 9, năm 2014Tập san TTC số 2, tháng 9, năm 2014
Tập san TTC số 2, tháng 9, năm 2014
 
SAP_SEC
SAP_SECSAP_SEC
SAP_SEC
 
Sitnl erp sec-2011
Sitnl erp sec-2011Sitnl erp sec-2011
Sitnl erp sec-2011
 
Resume__SAP Sec Sch_Card
Resume__SAP Sec Sch_CardResume__SAP Sec Sch_Card
Resume__SAP Sec Sch_Card
 
SAP SNC – Customer Collaboration
SAP SNC – Customer CollaborationSAP SNC – Customer Collaboration
SAP SNC – Customer Collaboration
 
Controlling 2012 Impact of SAP HANA
Controlling 2012 Impact of SAP HANAControlling 2012 Impact of SAP HANA
Controlling 2012 Impact of SAP HANA
 
SAP HANA Cloud Security
SAP HANA Cloud SecuritySAP HANA Cloud Security
SAP HANA Cloud Security
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
Hana for copa
Hana for copaHana for copa
Hana for copa
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
SAP HANA - Understanding the Basics
SAP HANA - Understanding the Basics SAP HANA - Understanding the Basics
SAP HANA - Understanding the Basics
 
TZH300_EN_COL96
TZH300_EN_COL96TZH300_EN_COL96
TZH300_EN_COL96
 

Similar to SAP HANA Security: New Technology, New Risks

SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...akquinet enterprise solutions GmbH
 
Develop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANADevelop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANAVirtual Forge
 
Preventing Vulnerabilities in SAP HANA based Deployments
Preventing Vulnerabilities in SAP HANA based DeploymentsPreventing Vulnerabilities in SAP HANA based Deployments
Preventing Vulnerabilities in SAP HANA based DeploymentsOnapsis Inc.
 
How to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonHow to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonVirtual Forge
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP SystemsOnapsis Inc.
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...PeterSmetny1
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security ConfigurationsOnapsis Inc.
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsOnapsis Inc.
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)ERPScan
 
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...Dao Van Hang
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)ERPScan
 
Features of sap hana
Features of sap hanaFeatures of sap hana
Features of sap hanakavyagaur3
 
SAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP SecuritySAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP SecurityPanaya
 
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...Virtual Forge
 
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Symmetry™
 

Similar to SAP HANA Security: New Technology, New Risks (20)

SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
Develop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANADevelop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANA
 
Preventing Vulnerabilities in SAP HANA based Deployments
Preventing Vulnerabilities in SAP HANA based DeploymentsPreventing Vulnerabilities in SAP HANA based Deployments
Preventing Vulnerabilities in SAP HANA based Deployments
 
Null Meet Ppt
Null Meet PptNull Meet Ppt
Null Meet Ppt
 
How to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonHow to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a button
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 
Sap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hatSap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hat
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
 
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)
 
Features of sap hana
Features of sap hanaFeatures of sap hana
Features of sap hana
 
SAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP SecuritySAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP Security
 
protect4s-product-sheet
protect4s-product-sheetprotect4s-product-sheet
protect4s-product-sheet
 
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
 
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
 
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
 

More from Virtual Forge

How the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP CodeHow the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP CodeVirtual Forge
 
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...Virtual Forge
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFixVirtual Forge
 
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP InstallationenABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP InstallationenVirtual Forge
 
Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Virtual Forge
 
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...Virtual Forge
 
Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?Virtual Forge
 
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?Virtual Forge
 
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...Virtual Forge
 
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...Virtual Forge
 
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAPVirtual Forge
 
Risks of Hosted SAP Environments
Risks of Hosted SAP EnvironmentsRisks of Hosted SAP Environments
Risks of Hosted SAP EnvironmentsVirtual Forge
 
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...Virtual Forge
 
Die Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP SicherheitDie Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP SicherheitVirtual Forge
 
ABAP Code Qualität - Best Practices
ABAP Code Qualität - Best PracticesABAP Code Qualität - Best Practices
ABAP Code Qualität - Best PracticesVirtual Forge
 
Best Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and SecurityBest Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and SecurityVirtual Forge
 
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...Virtual Forge
 

More from Virtual Forge (17)

How the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP CodeHow the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP Code
 
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFix
 
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP InstallationenABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
 
Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?
 
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
 
Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?
 
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
 
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
 
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
 
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
 
Risks of Hosted SAP Environments
Risks of Hosted SAP EnvironmentsRisks of Hosted SAP Environments
Risks of Hosted SAP Environments
 
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
 
Die Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP SicherheitDie Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP Sicherheit
 
ABAP Code Qualität - Best Practices
ABAP Code Qualität - Best PracticesABAP Code Qualität - Best Practices
ABAP Code Qualität - Best Practices
 
Best Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and SecurityBest Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and Security
 
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
 

Recently uploaded

Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 

Recently uploaded (20)

Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 

SAP HANA Security: New Technology, New Risks

  • 1.
  • 2. run your business safer SEC 112 SAP HANA Security: New technologies, new risks Markus Schumacher © 2015, Virtual Forge, Inc. All rights reserved.
  • 3. Agenda Virtual Forge: Who we are Understanding HANA security New risks in SAP HANA 5 rules to protect SAP HANA Security, Compliance and Quality solutions
  • 5. About Virtual Forge Experts in SAP Security, Compliance and Quality 2001: Founded as consulting house 2008: Release of “CodeProfiler” 2013: Release of “SystemProfiler” Patented Data and Control Flow Analysis for ABAP® Gartner: Magic Quadrant for Application Security Testing 2013 Named Virtual Forge the “Leading Vendor for ABAP® Security” Cool Vendor in the SAP Ecosystem 2011
  • 6. About Virtual Forge The Key Benefits Cost reduction Automated process leads to lower effort and cost for: -  identifying errors (up to 95%) -  correcting errors (up to 70%) -  QA effort (up to 90%) Improved User Experience Our products are seamlessly integrated into the SAP environment -  enables working in a familiar environment -  Makes work noticeably easier Expertise & Experience -  more than 170 customers -  more than 1,400 customer projects -  more than 2,000 product installations Independence -  active member of the SAP community -  participating in DSAG and ASUG chapters -  cooperating with global auditing firms Industry recognition -  admitted to the Garter Magic Quadrant for Application Security Testing (AST) in 2013 and 2014 -  Chosen as one of the top 500 cyber security companies to watch in 2015
  • 7. Trusted Advisor for Security, Compliance and Quality
  • 8. The Virtual Forge Portfolio Security Compliance Quality Code Level System Level Virtual Forge Professional Services help to improve development, operating lifecycle and security in SAP® standards. Virtual Forge SystemProfiler detects and corrects errors in SAP system configurations and avoids recurrence. SYSTEMPROFILER Virtual Forge CodeProfiler pinpoints vulnerabilities in ABAP® program codes and corrects errors automatically. CODEPROFILER PROFESSIONAL SERVICES Entire SAP landscape
  • 10.   HANA as a data mart   Similar to “classic” BW architecture, HANA gathers data from (several) source systems   HANA in a classic 3-tier architecture   HANA replaces regular relational database   HANA as a technical infrastructure for native applications   New business application platform (S/4 HANA) Understanding HANA Security HANA deployment scenarios
  • 11. Content Considerations   Contains business critical data à espionage target   Central to business processes à sabotage target Technology Considerations   Fraud possibilities   IT / Security has little experience with HANA Understanding HANA Security Why is HANA important to Hackers
  • 12.   HANA provides its own security functions   Standard security features such as authentication, user/role mgt., authorization, encryption…   Need to be configured within HANA toolset   Other mechanisms to integrate HANA into the general security infrastructure   Includes Standard SAP administration tools, Network, OS and DB security tools, etc.   Different documents deal with HANA security, e.g. HANA security overview, HANA security admin guide, SQLScript-Reference-guide Understanding HANA Security What SAP says about HANA security Security complexity rises with SAP HANA !
  • 14. Weaknesses can include XSS, SQL injection, Directory Traversal Risk #1: Web Applications SAP HANA systems can easily be found on the Internet Unauthorized access possible Services can be misused SAP HANA is still vulnerable to typical web weaknesses
  • 15. Be aware of risks in privileged functions, preventing OS command execution, etc. Risk #2: R-Serve R is used for statistical and advanced data analysis SAP HANA can be connected to R-Serve to utilize R functions For separate hosts, remote functions enabled
  • 16. Make sure server-side scripting is protected against any injection attack Risk #3: RAM scraping HANA makes RAM scraping attractive for hackers Leaves almost no footprint Circumvents encryption Data on SAP HANA is not encrypted on RAM level
  • 17. ABAP programming needs to be validated for weaknesses Risk #4: Custom Development SAP HANA applications are accessible through browsers ABAP is still used for HANA in a 3-tier or data mart scenario Increased development complexity Web applications need to be secured at all levels
  • 18. Risk #5: Basis security Reality: SAP HANA runs in parallel to existing systems SAP HANA includes separate security functions Basic security features to be considered Increased system landscape complexity with HANA means more security settings to keep in mind
  • 19. 5 rules to protect SAP HANA
  • 20. Rule #1: No surprise: User and role management Secure standard users (SYSTEM, <sid>adm, etc.) Restrict authorizations Use Single Sign-On Strong Password Policies Extensive privileges compromise the entire system !
  • 21. Rule #2: Obviously: Data encryption and security Encrypt all sensitive data (encryption is disabled by default on SAP HANA) Encrypt at all levels (data at rest, secure store in the file system) Establish key management procedures Encryption effectively minimizes data theft !
  • 22. Rule #3: Remember: Secure application development Avoid http exposed packages Use standard authentication methods Follow development guidelines Validate custom application security Your code – your responsibility !
  • 23. Rule #4: Don’t forget: Harden System settings Ensure OS system security Validate all other (HANA) system security settings Secure communications for all connections Restrict access wherever necessary Monitor all security settings – configuration drift is a real challenge!
  • 24. Rule #5: Not to mention: Enable auditing and logging Enable audit log Restrict audit authorizations Secure access to audits and logs Auditing enables a forensic analysis in case of an attack!
  • 26.   HANA can be an attractive target for hackers   Many known and new risks apply to HANA   Web applications   R-Serve   RAM-Scraping   Custom developments   Complexity of SAP system landscapes increases with additional HANA scenarios   For an optimal use of HANA, many settings need to be adjusted Challenges to HANA Security & Quality
  • 27.   Optimizing ABAP code for HANA usage (CodeProfiler)   HANA Test Cases (HANA Readiness & Optimization)   Automated Correction (“Quick Fix” and Bulk)   Securing HANA configuration (SystemProfiler)   Additional platform for SystemProfiler   Test Cases, e.g. communication security, authorization, others   CodeProfiler for HANA   Eclipse and Web IDE Integration   First HANA Code Scanner ever Virtual Forge HANA Security Suite
  • 30. Securing HANA configuration with SystemProfiler
  • 31. Scanning HANA Scripts During Development (Eclipse)
  • 32. Scanning HANA Scripts During Development (Web Editor)
  • 34. Take action: We evaluate the current state of your SAP environment for free Take an instant test Visit www.virtualforge.com ü  Summary of findings ü  Priorization and classification of vulnerabilities ü  Specific examples of findings ü  Code and system metrics Quality Compliance Security Secure SAP®- systems Risk Assessment / Penetration Test •  SAP configuration •  Custom code Free
  • 35. Dr. Markus Schumacher www.virtualforge.com @Virtual_Forge Thank you! Feel free to write or call for any questions and requests35
  • 36. Disclaimer © 2015 Virtual Forge Inc. All rights reserved. SAP, R/3, SAP NetWeaver, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG. All other product and service names mentioned are the trademarks of their respective companies. Information contained in this publication is subject to change without prior notice. It is provided by Virtual Forge and serves informational purposes only. Virtual Forge is not liable for errors or incomplete information in this publication. Information contained in this publication does not imply any further liability. Virtual Forge Terms and Conditions apply. See www.virtualforge.com for details.