SAP applications contain large amounts of sensitive data. From protected personal information to privileged financial data, this data always harbors risks that companies must deal with, because SAP ERP does not have any built-in masking functions for custom-tailored anonymization in views. As such, the unchecked disclosure of data represents a potential leak, opening up a huge target for potential exploitation. Although add-ons and solutions from SAP and third parties are available to tackle this problem, significant challenges still remain. This is where the concept of attribute-based data masking comes in.
SAP Notes are SAP’s standard tool for supplying coding corrections. Alongside a description of the issue from a business perspective, they also include the technical solution. Security considerations also make them increasingly important for any SAP system landscape, as they provide a regular and prompt means of closing critical vulnerabilities in SAP systems, for example. The SAP Netweaver Download Service offers a number of advantages in relation to SAP Notes.
At the DSAG Technology Days in Early May, the Vulnerability Management Working Group renewed its demand for a security dashboard, which SAP announced many years ago. In light of the current threat situation, it is advisable to stop waiting for it, particularly since good solutions from security specialists have become available in the interim, which also optimize the integration of SAP security with the overall enterprise security architecture. When it comes to end-to-end IT security, it is worthwhile to take a look at the operators of critical infrastructure (CIP) and the new German IT Security Act 2.0 (ITSA 2.0).
Expert Insights sat down with our Pathlock’s Chief Marketing Officer, Mike Puterbaugh, in an exclusive interview to discuss how organizations can leverage application security and controls automation not only to improve their resilience against cyberthreats, but also to enable business performance.
Read the full interview at: https://lnkd.in/gKPZxqZM
Transports are an essential part of an SAP environment. They are used to transfer changes from one system to another, to implement new functions, to perform updates, and to install third-party applications. Change management in SAP is inconceivable without transports. Yet how can they be checked for security risks?
In the current Digital Defense Report, Brad Smith, President of Microsoft, called for international collaboration and coalitions for a “new form of collective defense” as a comprehensive strategy against the full spectrum of destructive cyberattacks, espionage, and interference. One of the first and largest of these cyber warfare initiatives is the Pathlock Group, formed from seven leading IT security firms and now the global market leader in access orchestration and application security for mission-critical applications. One of these firms is the Hamburg-based SAST SOLUTIONS, an IT security specialist.
Pathlock’s Vice President of Product Strategy and Customer Experience, David Vincent, recently appeared on Security Guy TV to talk about how effective preventive controls and security measures at the data and transaction level play an important part in securing ERP systems. He also takes a deep dive into the important difference between data security and data privacy.
SAST SOLUTIONS, your Hamburg-based specialist for SAP Security and Access Governance, is now part of the new Pathlock Group, a one-of-a-kind alliance of international providers of access governance and application security solutions. The alliance’s objective is to lift the understanding and scope of end-to-end security to a new level. Our CEO Bodo Kahl and CTO Ralf Kempf talk about the perspectives that will be opening up to SAST SOLUTIONS and its customers.
An end-to-end security strategy must also include regular checks, maintenance, and protection of authorizations, installations, and proprietary developments against internal and external threats – especially in an SAP landscape. But what roles do project organization and project management play when it comes to improving SAP security?
Every month, SAP publishes a collection of new and updated SAP Notes involving vulnerabilities in the SAP software on patch day. It’s a key date in the calendar for everyone concerned about security and the subsequent system patching is often very work-intensive and time-consuming. But where do the reports come from and how does SAP find out about them? Does the software vendor intentionally search for vulnerabilities to correct?