{"id":1942,"date":"2022-09-27T14:20:56","date_gmt":"2022-09-27T12:20:56","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1942"},"modified":"2022-09-27T14:20:56","modified_gmt":"2022-09-27T12:20:56","slug":"sap-security-and-siem-integration-deliver-with-dashboards","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/","title":{"rendered":"SAP Security and SIEM integration: Deliver with dashboards"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1593 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-300x170.jpg\" alt=\"SAST Blog: Security dashboards\" width=\"300\" height=\"170\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-300x170.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-768x435.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg 996w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>At the DSAG Technology Days in Early May, the Vulnerability Management Working Group renewed its demand for a security dashboard, which SAP announced many years ago. In light of the current threat situation, it is advisable to stop waiting for it, particularly since good solutions from security specialists have become available in the interim, which also optimize the integration of SAP security with the overall enterprise security architecture. When it comes to end-to-end IT security, it is worthwhile to take a look at the operators of critical infrastructure (CIP) and the new German IT Security Act 2.0 (ITSA 2.0).<\/p>\n<p><!--more--><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>According to a recent study by Bitkom, the umbrella organization of the German IT industry, published August 31, attacks on German companies cause damages of 203 billion euros annually. 84 percent of respondents were affected in the past year. \u201cThe threat that cyberattacks pose to the economy has become a focus of business and politics since the Russian invasion of Ukraine and its hybrid warfare in cyberspace at the latest,\u201d said Bitkom President Achim Berg. 45 percent of companies believe that cyberattacks could threaten their commercial existence \u2013 a huge leap from nine percent in the previous year. In particular, operators of critical infrastructures have observed an increase in attacks: 87 percent of CIP companies surveyed say that attacks have increased somewhat to sharply. All the same, said Berg, the results from this year show that companies can take effective measures to defend against attacks or at least minimize the damage caused.<\/p>\n<h2><strong>The IT Security Act 2.0<\/strong><\/h2>\n<p>Government action is reflected in the new cybersecurity agenda of the German Federal Ministry of the Interior, which is primarily a declaration of intent to implement a strong security architecture, while the ITSA 2.0 that came into force this year for critical infrastructures is providing for facts on the ground. It demands procedural, directive, and reactive measures, such as security monitoring in systems and other monitoring measures to establish system hardening as a market standard. And there are specific requirements for designing the infrastructure and processes to be auditable, with biannual certification. This quality of the architecture and processes demands a rethink: Instead of continuing with business as usual, companies have to meet specific requirements. Responsibilities have been redefined and monitoring and control mechanisms must be integrated and enable real-time analysis.<\/p>\n<h2><strong>Is SAP the weakest link?<\/strong><\/h2>\n<p>SAP landscapes in particular show that the requirements of ITSA 2.0 are topical and are going in the right direction for non-CIP companies too, but understandably can\u2019t cover all vulnerabilities. The requirements for SAP S\/4HANA have changed once again, for instance: The database, user interface, gateway, applications, and authorizations have become more close-knit and access to important data has become more complex \u2013 and thus more difficult to monitor. ITSA 2.0 demands detailed business continuity planning and disaster recovery scenarios involving IDSes as \u201cstate of the art technology\u201d (\u00a7 8a). IDSes identify and substantiate attacks based on log files, which now have to be both recorded and analyzed. This will make SIEM systems indispensable for the rapid identification of cyberattacks in future, even though they usually do not suffice for SAP.<\/p>\n<h2><strong>SAP is a world of its own<\/strong><\/h2>\n<p>SIEM systems combine security information management (SIM) with security event management (SEM) to generate analyses of security alarms. Its key duties are to provide reports on security-relevant incidents and send notifications when an activity violates the predefined rule sets. The analyses use defined rules, correlation models, machine learning, and artificial intelligence to generate relations between the entries and identify anomalies. Unfortunately, this principle is hardly effective at all in SAP systems, because the specific SAP logs and analyses are not interpreted and, consequently, attack patterns are not identified or recognized. Classic SIEM tools consider IT infrastructures, not individual applications. Although it has become increasingly apparent in recent years that applications also have to be included \u2013 whether Microsoft Dynamics, a product planning tool, or an SPS in production \u2013 SAP is more of a network of its own, with its own roles and authorizations and its own security mechanisms, and also has its own nomenclature and rule sets.<\/p>\n<h2><strong>Integrating intelligent filtering <\/strong><\/h2>\n<p>This lack of SIEM integration with SAP represents a significant, ongoing risk in the security architecture. This is where companies that use SAP software have to take action. According to the latest DSAG investment report 2022, four of five SAP customers already intend to invest in improving their cybersecurity. If no access to the SAP system is gained, SIEM can identify little more than a kind of ambient noise of logs with millions of entries. Exceptions in the SAP system may appear unremarkable at the network level. The only way to identify them is to consider the application itself. These communication problems often mean that SAP systems aren\u2019t tackled seriously or are neglected \u2013 even at companies that have highly professional IT security, have deployed an SIEM system, and have excellent command of their non-SAP areas. Nonetheless, there are solutions to this critical security \u201cblind spot\u201d, because alternatives have become available to protect both worlds end-to-end.<\/p>\n<h2><strong>Integration with SIEM <\/strong><\/h2>\n<p>Specialized<a href=\"https:\/\/sast-solutions.com\/sast-suite.html\" target=\"_blank\" rel=\"noopener\"> software tools<\/a> can extract the events from the application layer and transport and translate them in a way that is comprehensible to SIEM network monitors. Detecting attacks based on log files and analyzing network traffic require in-depth knowledge of the potential paths and patterns that such incursions can follow. Events relevant to security have to be filtered out of a sea of data and placed in the proper context. Intelligent information management is necessary in order to assess security data of this kind and integrate it in the SIEM system. As such, effective tools for risk recognition not only analyze SAP logs, but also integrate configuration and role analyses, integrate this information from SAP systems in existing SIEM systems of all kind virtually out of the box, and enable their analysis. By integrating them with the SIEM tool, you can consolidate all the security-relevant incidents detected in your SAP systems with other areas of your IT landscape.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1943\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/SAST-Security-Radar-1024x470.jpg\" alt=\"SAST Blog: SAP Security und SIEM-Integration: Durchblick mit Dashboards\" width=\"764\" height=\"351\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/SAST-Security-Radar-1024x470.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/SAST-Security-Radar-300x138.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/SAST-Security-Radar-768x352.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/SAST-Security-Radar.jpg 1208w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><br \/>\n<strong>SAP security demands expertise<\/strong><\/h2>\n<p>This is where the integrated dashboard described above plays a key role: It provides additional transparency for all systems \u2013 not only operators of critical infrastructure, but all companies with a realistic need for security, can get rated, visualized presentation and documentation of their overall security status at the touch of a button. As such, an immediate implementation of ITSA 2.0 for SAP requires the involvement of a <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener\">professional security partner<\/a>, both to effectively meet the requirements of Germany\u2019s new IT Security Act 2.0 and at the same time to improve audit compliance of SAP system landscapes. The rollout of specialized software can help implement derivations of the template roles for the specific customer organization. In normal operations, it serves to validate roles and authorizations for security and SoD, analyze usage, further optimize roles and authorizations, and implement emergency user functions for support tasks of the IT employees. Under the perspective of ITSA 2.0, a pending SAP S\/4HANA migration in particular provides an ideal opportunity to raise a company\u2019s IT security to a new level. Legacy interfaces can be cleaned up and, above all, standardized \u2013 providing enormous security gains.<\/p>\n<h2><strong>Dashboards: Visualization provides security<\/strong><\/h2>\n<p>Companies often try to start with identifying vulnerabilities through automated processes. Recognition isn\u2019t easy to learn, however, and often results in \u201coverlearning\u201d or incorrect learning, with the result that the algorithm fails to respond to actual threats. Instead, the top priority should be to automate and optimize the provisioning of information. By integrating an overarching SIEM tool, you can consolidate all the security-relevant incidents detected in your SAP S\/4HANA systems with other areas of your IT landscape. This ensures that SAP is taken into account in SIEM and companies can generate a reliable depiction of their full <a href=\"https:\/\/sast-solutions.com\/sap-security-intelligence.html\" target=\"_blank\" rel=\"noopener\">security status in real time<\/a>. Dedicated security dashboards offer a new level of transparency for the current security situation. In addition, the targeted expansion of knowledge for internal security efforts has one of the greatest impacts. After all, attack scenarios have to be truly understood in order to be managed effectively. Dashboards can clearly visualize results for security teams and enable them to identify changes to the threat situation and act upon them quickly.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1945\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/Ralf-300x214.jpg\" alt=\"Ralf Kempf (CTO SAST SOLUTIONS and Vice President ABAP Pathlock)\" width=\"300\" height=\"214\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/Ralf-300x214.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/Ralf.jpg 485w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Ralf Kempf, CTO, SAST SOLUTIONS and Vice President, ABAP Pathlock<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1946\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/kes.jpg\" alt=\"kes\" width=\"204\" height=\"130\" \/><br \/>\n<strong><span style=\"font-size: 16px;\">This article was initially published (in German) in <\/span><a style=\"font-size: 16px;\" href=\"https:\/\/www.kes.info\/archiv\/schlaglichter\/schlaglicht\/?tx_ttnews%5byear%5d=2022&amp;tx_ttnews%5bmonth%5d=09&amp;tx_ttnews%5bday%5d=16&amp;tx_ttnews%5btt_news%5d=236&amp;cHash=67780f7390041372ab17cfc0edad6850\" target=\"_blank\" rel=\"noopener\">KES<\/a><span style=\"font-size: 16px;\"> on September 16, 2022.\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>More about SIEM and Security Dashboards:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"KGHqOb6Kp3\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2022\/01\/24\/why-are-siem-tools-blind-to-sap-interesting-question-who-are-migrating-to-sap-s4hana\/\">Why are SIEM tools blind to SAP? An interesting question, and not only for operators of critical infrastructure who are migrating to SAP S\/4HANA.<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Why are SIEM tools blind to SAP? An interesting question, and not only for operators of critical infrastructure who are migrating to SAP S\/4HANA.&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2022\/01\/24\/why-are-siem-tools-blind-to-sap-interesting-question-who-are-migrating-to-sap-s4hana\/embed\/#?secret=5rRTIUVkPS#?secret=KGHqOb6Kp3\" data-secret=\"KGHqOb6Kp3\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"7clvm3kqfX\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/\">Full transparency thanks to security dashboard &#8211; how D\u00dcRR IT Service GmbH protects its SAP systems in real time<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Full transparency thanks to security dashboard &#8211; how D\u00dcRR IT Service GmbH protects its SAP systems in real time&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/embed\/#?secret=7ezk8Ck2Zg#?secret=7clvm3kqfX\" data-secret=\"7clvm3kqfX\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the DSAG Technology Days in Early May, the Vulnerability Management Working Group renewed its demand for a security dashboard, which SAP announced many years ago. In light of the current threat situation, it is advisable to stop waiting for it, particularly since good solutions from security specialists have become available in the interim, which [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[156,58,68,80,114],"class_list":["post-1942","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-security","tag-real-time-monitoring","tag-sap-authorizations","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SAP Security and SIEM integration: Deliver with dashboards<\/title>\n<meta name=\"description\" content=\"Looking the operators of critical infrastructure and the new German IT Security Act 2.0 (ITSA 2.0) a security dashboard is urgently required!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security and SIEM integration: Deliver with dashboards\" \/>\n<meta property=\"og:description\" content=\"Looking the operators of critical infrastructure and the new German IT Security Act 2.0 (ITSA 2.0) a security dashboard is urgently required!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-27T12:20:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Systemdarstellung_Sec.Dashboard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"756\" \/>\n\t<meta property=\"og:image:height\" content=\"430\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"SAP Security and SIEM integration: Deliver with dashboards\" \/>\n<meta name=\"twitter:description\" content=\"Looking the operators of critical infrastructure and the new German IT Security Act 2.0 (ITSA 2.0) a security dashboard is urgently required!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Systemdarstellung_Sec.Dashboard.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"SAP Security and SIEM integration: Deliver with dashboards\",\"datePublished\":\"2022-09-27T12:20:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/\"},\"wordCount\":1410,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/SAST-Security-Dashboard_Teaserbild-300x170.jpg\",\"keywords\":[\"Cyber Security\",\"Real-time monitoring\",\"SAP Authorizations\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/\",\"name\":\"SAP Security and SIEM integration: Deliver with dashboards\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/SAST-Security-Dashboard_Teaserbild-300x170.jpg\",\"datePublished\":\"2022-09-27T12:20:56+00:00\",\"description\":\"Looking the operators of critical infrastructure and the new German IT Security Act 2.0 (ITSA 2.0) a security dashboard is urgently required!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/SAST-Security-Dashboard_Teaserbild.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/SAST-Security-Dashboard_Teaserbild.jpg\",\"width\":996,\"height\":564,\"caption\":\"SAST Blog: Security dashboards\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/09\\\/27\\\/sap-security-and-siem-integration-deliver-with-dashboards\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security and SIEM integration: Deliver with dashboards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SAP Security and SIEM integration: Deliver with dashboards","description":"Looking the operators of critical infrastructure and the new German IT Security Act 2.0 (ITSA 2.0) a security dashboard is urgently required!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security and SIEM integration: Deliver with dashboards","og_description":"Looking the operators of critical infrastructure and the new German IT Security Act 2.0 (ITSA 2.0) a security dashboard is urgently required!","og_url":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/","og_site_name":"SAST BLOG","article_published_time":"2022-09-27T12:20:56+00:00","og_image":[{"width":756,"height":430,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Systemdarstellung_Sec.Dashboard.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"SAP Security and SIEM integration: Deliver with dashboards","twitter_description":"Looking the operators of critical infrastructure and the new German IT Security Act 2.0 (ITSA 2.0) a security dashboard is urgently required!","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Systemdarstellung_Sec.Dashboard.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"SAP Security and SIEM integration: Deliver with dashboards","datePublished":"2022-09-27T12:20:56+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/"},"wordCount":1410,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-300x170.jpg","keywords":["Cyber Security","Real-time monitoring","SAP Authorizations","SAP Security","Threat Detection"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/","url":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/","name":"SAP Security and SIEM integration: Deliver with dashboards","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-300x170.jpg","datePublished":"2022-09-27T12:20:56+00:00","description":"Looking the operators of critical infrastructure and the new German IT Security Act 2.0 (ITSA 2.0) a security dashboard is urgently required!","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg","width":996,"height":564,"caption":"SAST Blog: Security dashboards"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/09\/27\/sap-security-and-siem-integration-deliver-with-dashboards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"SAP Security and SIEM integration: Deliver with dashboards"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1942"}],"version-history":[{"count":4,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1942\/revisions"}],"predecessor-version":[{"id":1949,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1942\/revisions\/1949"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}