sitNL 2012
Ciber, Eindhoven, December 8, 2012
Agenda


o   Introduction
o   SAP Security in the news
o   So how about SAP and Security, Some myths...
o   SAP Security, the problem...
o   Why bother?
o   Show me the money!!!
o   How to be safe instead of sorry
o   Bizec




© 2012 ERP Security                                2
Introduction

Who am I
   SAP Technology specialist for profit and fun
   SAP Security researcher for fun (not for profit)
   Reported over 30 vulnerabilities to SAP Security team
   Co-founder ERP Security




                                                            http://scn.sap.com/docs/DOC-8218
© 2012 ERP Security                                                                        3
We’ve all seen these...




© 2012 ERP Security       4
But this is rather new...




© 2012 ERP Security         5
So how about SAP and Security
    Some myths....
Technical Risks in SAP are basically the same as for other IT systems

Except the value of the data stored in SAP is often much higher. Yet SAP Security is still mainly
related to Segregation of Duties.

Why? Some myths
•    SAP platforms are only accessible internally

•    SAP is expensive, so it must be secure

•    SAP Security = Segregation of Duties

•    SAP systems are not targeted by hackers

•    SAP Security is SAP’s problem

•    We are compliant, so we are secure




    © 2012 ERP Security                                                                             6
SAP Security
    The problem...
The Problem                                                          Number of released SAP Security Notes 1                          2

•    Lack of awareness with customers
                                                          1000
•    Lack of Time with customers
                                                           800

•    High Complexity                                       600

                                                           400
•    Lack of Budget
                                                           200

•    Lack of good Figures                                        0
                                                                     2001 2002
                                                                               2003 2004
                                                                                         2005 2006
•    Too much focus on SoD                                                                         2007 2008
                                                                                                             2009 2010
                                                                                                                       2011 2012

•    Build on code-base back from the 80’s / 90’s.
                                                           Note1: value for 2012 is linearly extrapolated from 01.10.2012
•    Often more than 6-12 months behind with patches       Note2: December 2010 is excluded due to a one-time release of 500+ notes

•    By default many Security features are switched OFF

•    ...




    © 2012 ERP Security                                                                                                                   7
Why bother?
 The Obvious...
Why bother about SAP Security?
    •To   prevent losing business!!!
    •To   prevent bad PR
    •To   prevent losing customer confidence
    •To   prevent Legal prosecution
    •To   be in control
    •To   prevent costs of incident handling

Why bother about SAP Platform Security?
    •Because      SoD can be easily bypassed
    •Often   leaving no traces on SAP level




 © 2012 ERP Security                           8
Show me the money!!!

Some more examples of what might happen when you don’t secure your systems enough:
•    Executing of OS commands

•    Creating admin users

•    ...




    © 2012 ERP Security                                                              9
How to be safe instead of sorry

SAP Infrastructure security needs to be addressed holistically:
•    Remember there is no silver bullet

•    SAP Infrastructure security is complex and involves many disciplines, so first take a step

      back, analyze your current state of the landscape, do risk assessments, make a plan

      and execute and keep on working on it.

•    Get all parties involved, think about responsible people from Business, Risk management,

      Security Officers, DB team, OS team, Network team, SAP Basis team, SoD team, etc.

•    Teach / train users and administrators, work on general security awareness

•    Control the process, stay up-to-date, evaluate periodically.

•    Security is a process, not a state*! Embed it in the organization.




    * Bruce Schneier

    © 2012 ERP Security                                                                           10
How to be safe instead of sorry II

Some key takeaways:
•    Patch regularly (duh...). Do this for Gui components, DB, OS, SAP and network

•    Use e.g. the System Recommendations for SAP Security notes

•    Take a look at the SAP Security guides that are relevant for you

•    Read the security whitepapers 

•    At least close down some high risk components like the gateway, unnecessary

     SICF services, etc. (See the guide)

•    Check RSUSR003 and get rid of DEFAULT passwords

•    Regularly review your landscape, don’t forget the open source tools




    * Bruce Schneier

    © 2012 ERP Security                                                              11
Bizec


Bizec.
The main goals of BIZEC are:
 Raising awareness, demonstrating that ERP security must be analyzed holistically.
 Analyze current and future threats affecting these systems.
 Serve as a unique central point of knowledge and reference in this subject.
 Provide experienced feedback to global organizations, helping them to increase the security of their business-critical
  information.
 Organize events with the community to share and exchange information.




Join & contribute! www.bizec.org


© 2012 ERP Security                                                                                                        12
Questions?




© 2012 ERP Security   13
Need more info?
    Contact us...

More information
 See http://www.erp-sec.com


Contact me on
•      jvdvis@erp-sec.com
•             @jvis




    © 2012 ERP Security        14
Disclaimer

SAP, R/3, ABAP, SAP GUI, SAP NetWeaver and other SAP products and services mentioned herein as well
as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other
countries.

All other product and service names mentioned are the trademarks of their respective companies. Data
contained in this document serves informational purposes only.

The authors assume no responsibility for errors or omissions in this document. The authors do not warrant
the accuracy or completeness of the information, text, graphics, links, or other items contained within this
material. This document is provided without a warranty of any kind, either express or implied, including but
not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement.

The authors shall have no liability for damages of any kind including without limitation direct, special, indirect,
or consequential damages that may result from the use of this document.

SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and
SAP Group shall not be liable for errors or omissions with respect to the materials.

No part of this document may be reproduced without the prior written permission of ERP Security BV.
© 2012 ERP Security BV.

© 2012 ERP Security                                                                                                   15

More Related Content

PDF
Highlights SAPphire NOW 2014
PDF
sitNL Security Update from SAP TechEd 2013
PDF
Design Thinking with Field Service Engineers (VNSG UX)
PDF
SAP communties rock!
PDF
Microsoft Cyber Defense Operation Center Strategy
PDF
Operationalizing Red Teaming for Fun and Profit
PPTX
Red team Engagement
Highlights SAPphire NOW 2014
sitNL Security Update from SAP TechEd 2013
Design Thinking with Field Service Engineers (VNSG UX)
SAP communties rock!
Microsoft Cyber Defense Operation Center Strategy
Operationalizing Red Teaming for Fun and Profit
Red team Engagement

Viewers also liked (9)

PPTX
Cyber_Defense_Presentation
PDF
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
PDF
SAP HANA Cloud Security
PDF
7 Strategies for Reducing IoT Cyber Risk
PPTX
An introduction to SOC (Security Operation Center)
PDF
SAP HANA Cloud Platform - Overview
PDF
The 5 elements of IoT security
PPTX
Security Operation Center - Design & Build
PDF
7 cyber security questions for boards
Cyber_Defense_Presentation
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
SAP HANA Cloud Security
7 Strategies for Reducing IoT Cyber Risk
An introduction to SOC (Security Operation Center)
SAP HANA Cloud Platform - Overview
The 5 elements of IoT security
Security Operation Center - Design & Build
7 cyber security questions for boards
Ad

Similar to Sitnl 2012 erp security (20)

PDF
The importance of applying SAP patches (Joris van de Vis)
PPTX
Managing SAP Custom Code
PPTX
Technical presentation
PDF
Inception of the SAP Platforms Brain: Attacks on SAP Solution Manager
PDF
SAP security made easy
PDF
SAP Inside Track Frankfurt 2018 #Sitfra 2018
PDF
Unbreakable oracle er_ps_siebel_jd_edwards
PDF
Cloud Security by CK
PPT
How to get value from your multi-channel lead gen programme - Cyance
PPTX
Effective load testing_&_monitoring
PDF
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
PDF
Technical SEO Metrics - SMX West 2013 - Dave Lloyd, Adobe
PDF
IdM FinalVer
PDF
B2B Marketing Summit Lead Nurturing
PDF
Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
PPTX
Do Visualizations help during development? Using Moose while coding.
PDF
Software Development Life Cycle – Managing Risk and Measuring Security
PDF
Odoo erp or sap erp
PDF
(Oracle) DBA and Other Skills Needed in 2020
The importance of applying SAP patches (Joris van de Vis)
Managing SAP Custom Code
Technical presentation
Inception of the SAP Platforms Brain: Attacks on SAP Solution Manager
SAP security made easy
SAP Inside Track Frankfurt 2018 #Sitfra 2018
Unbreakable oracle er_ps_siebel_jd_edwards
Cloud Security by CK
How to get value from your multi-channel lead gen programme - Cyance
Effective load testing_&_monitoring
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Technical SEO Metrics - SMX West 2013 - Dave Lloyd, Adobe
IdM FinalVer
B2B Marketing Summit Lead Nurturing
Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
Do Visualizations help during development? Using Moose while coding.
Software Development Life Cycle – Managing Risk and Measuring Security
Odoo erp or sap erp
(Oracle) DBA and Other Skills Needed in 2020
Ad

More from Twan van den Broek (20)

PDF
How SAP Leonardo is empowering animal wellbeing (Leon / Harmen)
PPTX
Can you keep up with SAP Analytics Cloud? (Martijn van Foeken)
PDF
SAP Data Hub – What is it, and what’s new? (Sefan Linders)
PDF
SAP HANA SQL Data Warehousing (Sefan Linders)
PDF
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
PPTX
Beyond OData introducing the xmla model for ui5 (Roland Bouwman)
PPTX
Integrating SAPUI5 with ArcGIS Maps (Leon van Ginneken)
PDF
SQL Data Warehousing in SAP HANA (Sefan Linders)
PDF
SAP Predictive Analytics (Nico van der Hoeven)
PDF
Blockchain for the Enterprise
PPSX
DIR - A tribute to Standards and Guidelines... (Laurens van Rijn)
PDF
Building an innovation culture - Powered by diversity
PDF
SAP Leonardo / Machine Learning (Iver van de Zand)
PDF
SAP TechEd recap (Ronald Konijnenburg / Sven van Leuken)
PDF
Masterclass Mendix (Jan Penninkhof / Twan van den Broek)
PDF
Masterclass Machine Learning (Ronald Kleijn)
PDF
SAP Run Live Truck - SAP Cloud Platform use cases
PDF
Recap SAP Inside Track NL (sitNL)
PDF
Welcome at SAP Inside Track NL (sitNL)
PDF
Finding ABAP
How SAP Leonardo is empowering animal wellbeing (Leon / Harmen)
Can you keep up with SAP Analytics Cloud? (Martijn van Foeken)
SAP Data Hub – What is it, and what’s new? (Sefan Linders)
SAP HANA SQL Data Warehousing (Sefan Linders)
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
Beyond OData introducing the xmla model for ui5 (Roland Bouwman)
Integrating SAPUI5 with ArcGIS Maps (Leon van Ginneken)
SQL Data Warehousing in SAP HANA (Sefan Linders)
SAP Predictive Analytics (Nico van der Hoeven)
Blockchain for the Enterprise
DIR - A tribute to Standards and Guidelines... (Laurens van Rijn)
Building an innovation culture - Powered by diversity
SAP Leonardo / Machine Learning (Iver van de Zand)
SAP TechEd recap (Ronald Konijnenburg / Sven van Leuken)
Masterclass Mendix (Jan Penninkhof / Twan van den Broek)
Masterclass Machine Learning (Ronald Kleijn)
SAP Run Live Truck - SAP Cloud Platform use cases
Recap SAP Inside Track NL (sitNL)
Welcome at SAP Inside Track NL (sitNL)
Finding ABAP

Recently uploaded (20)

PPTX
chapter 2 entrepreneurship full lecture ppt
DOCX
FINALS-BSHhchcuvivicucucucucM-Centro.docx
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PDF
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PPT
Lecture notes on Business Research Methods
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PDF
Introduction to Generative Engine Optimization (GEO)
DOCX
Center Enamel A Strategic Partner for the Modernization of Georgia's Chemical...
PDF
Environmental Law Communication: Strategies for Advocacy (www.kiu.ac.ug)
PDF
533158074-Saudi-Arabia-Companies-List-Contact.pdf
PDF
1911 Gold Corporate Presentation Aug 2025.pdf
PDF
Booking.com The Global AI Sentiment Report 2025
PDF
Kishore Vora - Best CFO in India to watch in 2025.pdf
PPTX
operations management : demand supply ch
PDF
income tax laws notes important pakistan
PDF
Chapter 2 - AI chatbots and prompt engineering.pdf
PDF
Satish NS: Fostering Innovation and Sustainability: Haier India’s Customer-Ce...
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
chapter 2 entrepreneurship full lecture ppt
FINALS-BSHhchcuvivicucucucucM-Centro.docx
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
Solaris Resources Presentation - Corporate August 2025.pdf
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
Lecture notes on Business Research Methods
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Introduction to Generative Engine Optimization (GEO)
Center Enamel A Strategic Partner for the Modernization of Georgia's Chemical...
Environmental Law Communication: Strategies for Advocacy (www.kiu.ac.ug)
533158074-Saudi-Arabia-Companies-List-Contact.pdf
1911 Gold Corporate Presentation Aug 2025.pdf
Booking.com The Global AI Sentiment Report 2025
Kishore Vora - Best CFO in India to watch in 2025.pdf
operations management : demand supply ch
income tax laws notes important pakistan
Chapter 2 - AI chatbots and prompt engineering.pdf
Satish NS: Fostering Innovation and Sustainability: Haier India’s Customer-Ce...
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx

Sitnl 2012 erp security

  • 1. sitNL 2012 Ciber, Eindhoven, December 8, 2012
  • 2. Agenda o Introduction o SAP Security in the news o So how about SAP and Security, Some myths... o SAP Security, the problem... o Why bother? o Show me the money!!! o How to be safe instead of sorry o Bizec © 2012 ERP Security 2
  • 3. Introduction Who am I  SAP Technology specialist for profit and fun  SAP Security researcher for fun (not for profit)  Reported over 30 vulnerabilities to SAP Security team  Co-founder ERP Security http://scn.sap.com/docs/DOC-8218 © 2012 ERP Security 3
  • 4. We’ve all seen these... © 2012 ERP Security 4
  • 5. But this is rather new... © 2012 ERP Security 5
  • 6. So how about SAP and Security Some myths.... Technical Risks in SAP are basically the same as for other IT systems Except the value of the data stored in SAP is often much higher. Yet SAP Security is still mainly related to Segregation of Duties. Why? Some myths • SAP platforms are only accessible internally • SAP is expensive, so it must be secure • SAP Security = Segregation of Duties • SAP systems are not targeted by hackers • SAP Security is SAP’s problem • We are compliant, so we are secure © 2012 ERP Security 6
  • 7. SAP Security The problem... The Problem Number of released SAP Security Notes 1 2 • Lack of awareness with customers 1000 • Lack of Time with customers 800 • High Complexity 600 400 • Lack of Budget 200 • Lack of good Figures 0 2001 2002 2003 2004 2005 2006 • Too much focus on SoD 2007 2008 2009 2010 2011 2012 • Build on code-base back from the 80’s / 90’s. Note1: value for 2012 is linearly extrapolated from 01.10.2012 • Often more than 6-12 months behind with patches Note2: December 2010 is excluded due to a one-time release of 500+ notes • By default many Security features are switched OFF • ... © 2012 ERP Security 7
  • 8. Why bother? The Obvious... Why bother about SAP Security? •To prevent losing business!!! •To prevent bad PR •To prevent losing customer confidence •To prevent Legal prosecution •To be in control •To prevent costs of incident handling Why bother about SAP Platform Security? •Because SoD can be easily bypassed •Often leaving no traces on SAP level © 2012 ERP Security 8
  • 9. Show me the money!!! Some more examples of what might happen when you don’t secure your systems enough: • Executing of OS commands • Creating admin users • ... © 2012 ERP Security 9
  • 10. How to be safe instead of sorry SAP Infrastructure security needs to be addressed holistically: • Remember there is no silver bullet • SAP Infrastructure security is complex and involves many disciplines, so first take a step back, analyze your current state of the landscape, do risk assessments, make a plan and execute and keep on working on it. • Get all parties involved, think about responsible people from Business, Risk management, Security Officers, DB team, OS team, Network team, SAP Basis team, SoD team, etc. • Teach / train users and administrators, work on general security awareness • Control the process, stay up-to-date, evaluate periodically. • Security is a process, not a state*! Embed it in the organization. * Bruce Schneier © 2012 ERP Security 10
  • 11. How to be safe instead of sorry II Some key takeaways: • Patch regularly (duh...). Do this for Gui components, DB, OS, SAP and network • Use e.g. the System Recommendations for SAP Security notes • Take a look at the SAP Security guides that are relevant for you • Read the security whitepapers  • At least close down some high risk components like the gateway, unnecessary SICF services, etc. (See the guide) • Check RSUSR003 and get rid of DEFAULT passwords • Regularly review your landscape, don’t forget the open source tools * Bruce Schneier © 2012 ERP Security 11
  • 12. Bizec Bizec. The main goals of BIZEC are:  Raising awareness, demonstrating that ERP security must be analyzed holistically.  Analyze current and future threats affecting these systems.  Serve as a unique central point of knowledge and reference in this subject.  Provide experienced feedback to global organizations, helping them to increase the security of their business-critical information.  Organize events with the community to share and exchange information. Join & contribute! www.bizec.org © 2012 ERP Security 12
  • 13. Questions? © 2012 ERP Security 13
  • 14. Need more info? Contact us... More information  See http://www.erp-sec.com Contact me on • jvdvis@erp-sec.com • @jvis © 2012 ERP Security 14
  • 15. Disclaimer SAP, R/3, ABAP, SAP GUI, SAP NetWeaver and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. The authors assume no responsibility for errors or omissions in this document. The authors do not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. The authors shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of this document. SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable for errors or omissions with respect to the materials. No part of this document may be reproduced without the prior written permission of ERP Security BV. © 2012 ERP Security BV. © 2012 ERP Security 15