{"id":1931,"date":"2022-08-08T14:36:00","date_gmt":"2022-08-08T12:36:00","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1931"},"modified":"2022-08-08T14:36:00","modified_gmt":"2022-08-08T12:36:00","slug":"protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/","title":{"rendered":"Protect your SAP systems against ransomware attacks with reliable transport analyses"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1137 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware-300x206.jpg\" alt=\"SAST Blog: Protect your SAP systems against ransomware attacks \" width=\"300\" height=\"206\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware-300x206.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Transports are an essential part of an SAP environment. They are used to transfer changes from one system to another, to implement new functions, to perform updates, and to install third-party applications. Change management in SAP is inconceivable without transports. Yet how can they be checked for security risks?<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>SAP transports can jeopardize your systems<\/strong><\/h2>\n<p>Surveys indicate that two-thirds of companies would probably not notice if security risks were deliberately or unintentionally introduced into the system via SAP transports. This is because compliance requirements can be circumvented and undesirable activities can be concealed. For example, it is possible to:<\/p>\n<ul>\n<li>Change roles or authorizations<\/li>\n<li>Assign hidden SAP_ALL<\/li>\n<li>Grant access to unauthorized users<\/li>\n<li>Manipulated or disclose data<\/li>\n<li>Execute code during import<\/li>\n<li>Introduce security vulnerabilities into production systems<\/li>\n<li>Trigger import errors or downgrades that result in costly corrections, or even delete entire production systems<\/li>\n<\/ul>\n<p>There are numerous possible security risks, which is why you should always monitor transports to SAP systems. Consider the large number of regularly transported lines of code, random checks do not provide sufficient protection in this case.<\/p>\n<h2><strong>How can SAP transports be monitored for security risks?<\/strong><\/h2>\n<p>Ideally, such vulnerabilities should be avoided during the creation or import of transports, rather than after the fact. Considering the sheer volume of data, however, manually checking the content of all transports is not a practical option. Tool-based transport analysis gives you the opportunity to reduce this effort and automate the monitoring of transports. Transports can be checked automatically for security, compliance and quality issues before they are released.<\/p>\n<h2><strong>Securing SAP transports using the Pathlock platform<\/strong><\/h2>\n<p>The software solution from the <a href=\"https:\/\/pathlock.com\/merger\/\" target=\"_blank\" rel=\"noopener\">Pathlock Group<\/a> analyzes transport content during import and transfers the results to a SIEM system. The <a href=\"https:\/\/pathlock.com\/\" target=\"_blank\" rel=\"noopener\">Pathlock<\/a> platform thus enables monitoring transports by checking them for error and critical content even before they are released for import into the SAP systems, and that in real time as well, during implementation. The automatic blocking of faulty transports enables development teams to troubleshoot problems before the quality, security, or compliance of the SAP system is compromised. It is irrelevant whether it concerns poor coding, faulty configuration or intentional tampering.<\/p>\n<p>The integration is carried out in the standard mechanisms provided by SAP such as SAP Transport Management System, SAP ChaRM, ABAP Test Cockpit, etc. without revising already established mechanisms.<\/p>\n<p>The main advantages:<\/p>\n<ul>\n<li>Implementation of statutory regulations and individual company guidelines<\/li>\n<li>Insight into the security and quality consequences of a planned shipment \u2013 including third-party shipments<\/li>\n<li>Identifying real-time security and conformity issues by integrating transportation audits into the development process<\/li>\n<li>Troubleshooting problems before they are even imported<\/li>\n<li>Decimating manual transportation validation processes<\/li>\n<li>Optimization of the Change Management processes<\/li>\n<li>Saving time in the provision of applications<\/li>\n<li>Smooth integration into standard SAP tools<\/li>\n<\/ul>\n<h2><strong>Additional measures for protection against ransomware attacks<\/strong><\/h2>\n<p>Our <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener\">SAST SOLUTIONS<\/a> \u2013 which are now also part of the Pathlock platform \u2013 provide you with full support for SAP ransomware prevention. In addition to the transport analysis, we therefore recommend a vulnerability analysis to prevent unauthorized access to your data and systems.<\/p>\n<p>Our security specialists help you with the<\/p>\n<ul>\n<li><a href=\"https:\/\/sast-solutions.com\/sap-security-consulting.html\" target=\"_blank\" rel=\"noopener\">Protection &amp; hardening of SAP systems and interfaces<\/a> against the exploitation of SAP vulnerabilities<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/sast-solutions.com\/sap-security-consulting.html\" target=\"_blank\" rel=\"noopener\">Source-code analysis and cleansing<\/a> for identifying security-relevant ABAP commands<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/sast-solutions.com\/sap-security-intelligence.html\" target=\"_blank\" rel=\"noopener\">Real-time monitoring via SAST Security Radar<\/a> and the integration of an overarching SIEM tool for the identification of anomalies in SAP systems<\/li>\n<\/ul>\n<p>If you require further information on how to protect your SAP landscapes from ransomware attacks, please visit our\u00a0<a href=\"https:\/\/sast-solutions.com\" target=\"_blank\" rel=\"noopener\">website<\/a> or <a href=\"mailto:mail@sast-solutions.de\" target=\"_blank\" rel=\"noopener\">write to us<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1783\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/rkelbert_jpg-300x300.jpg\" alt=\"Raphael Kelbert (SAST SOLUTIONS)\" width=\"300\" height=\"300\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/rkelbert_jpg-300x300.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/rkelbert_jpg-150x150.jpg 150w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/rkelbert_jpg.jpg 480w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Raphael Kelbert (Produktmanager, SAST SUITE)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Related articles on the topic:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"kmz2iVBeCs\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/\">Knock, knock! What if a hacker has already broken in when your IT auditor is at the door?<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Knock, knock! What if a hacker has already broken in when your IT auditor is at the door?&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/embed\/#?secret=EKNpnu48jd#?secret=kmz2iVBeCs\" data-secret=\"kmz2iVBeCs\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Ss8RM5mkrN\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/\">SAP Cyber Security: Five questions and answers about effectively monitoring SAP systems<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;SAP Cyber Security: Five questions and answers about effectively monitoring SAP systems&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/embed\/#?secret=5rnkbbGWIv#?secret=Ss8RM5mkrN\" data-secret=\"Ss8RM5mkrN\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Transports are an essential part of an SAP environment. They are used to transfer changes from one system to another, to implement new functions, to perform updates, and to install third-party applications. Change management in SAP is inconceivable without transports. Yet how can they be checked for security risks?<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,156,68,80,114],"class_list":["post-1931","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-attack","tag-cyber-security","tag-sap-authorizations","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to protect SAP systems from ransomware attacks<\/title>\n<meta name=\"description\" content=\"We recommend a transport analysis as well as a vulnerability analysis to prevent unauthorized access to your data and systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect SAP systems from ransomware attacks\" \/>\n<meta property=\"og:description\" content=\"We recommend a transport analysis as well as a vulnerability analysis to prevent unauthorized access to your data and systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-08T12:36:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How to protect SAP systems from ransomware attacks\" \/>\n<meta name=\"twitter:description\" content=\"We recommend a transport analysis as well as a vulnerability analysis to prevent unauthorized access to your data and systems.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Protect your SAP systems against ransomware attacks with reliable transport analyses\",\"datePublished\":\"2022-08-08T12:36:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/\"},\"wordCount\":613,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blog_SAP-Home-goes_Malware-300x206.jpg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"SAP Authorizations\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/\",\"name\":\"How to protect SAP systems from ransomware attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blog_SAP-Home-goes_Malware-300x206.jpg\",\"datePublished\":\"2022-08-08T12:36:00+00:00\",\"description\":\"We recommend a transport analysis as well as a vulnerability analysis to prevent unauthorized access to your data and systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blog_SAP-Home-goes_Malware.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blog_SAP-Home-goes_Malware.jpg\",\"width\":640,\"height\":440,\"caption\":\"SAST Blog: Protect your SAP systems against ransomware attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/08\\\/08\\\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect your SAP systems against ransomware attacks with reliable transport analyses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect SAP systems from ransomware attacks","description":"We recommend a transport analysis as well as a vulnerability analysis to prevent unauthorized access to your data and systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/","og_locale":"en_US","og_type":"article","og_title":"How to protect SAP systems from ransomware attacks","og_description":"We recommend a transport analysis as well as a vulnerability analysis to prevent unauthorized access to your data and systems.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/","og_site_name":"SAST BLOG","article_published_time":"2022-08-08T12:36:00+00:00","og_image":[{"width":640,"height":440,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"How to protect SAP systems from ransomware attacks","twitter_description":"We recommend a transport analysis as well as a vulnerability analysis to prevent unauthorized access to your data and systems.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Protect your SAP systems against ransomware attacks with reliable transport analyses","datePublished":"2022-08-08T12:36:00+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/"},"wordCount":613,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware-300x206.jpg","keywords":["Cyber Attack","Cyber Security","SAP Authorizations","SAP Security","Threat Detection"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/","url":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/","name":"How to protect SAP systems from ransomware attacks","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware-300x206.jpg","datePublished":"2022-08-08T12:36:00+00:00","description":"We recommend a transport analysis as well as a vulnerability analysis to prevent unauthorized access to your data and systems.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg","width":640,"height":440,"caption":"SAST Blog: Protect your SAP systems against ransomware attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/08\/08\/protect-your-sap-systems-against-ransomware-attacks-with-reliable-transport-analyses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Protect your SAP systems against ransomware attacks with reliable transport analyses"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1931"}],"version-history":[{"count":4,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1931\/revisions"}],"predecessor-version":[{"id":1935,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1931\/revisions\/1935"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}