123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Service >> View Article

Why Sap Customers Need Fine Grained Visibility And Control

Profile Picture
By Author: appsian
Total Articles: 115
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

RECON and 10KBLAZE Share Similarities

Very similar to the 10KBLAZE vulnerability of 2019, the RECON vulnerability attacks the confidentiality, availability, and integrity of the SAP ERP data and processes. Both RECON and 10KBLAZE leverage a lack of visibility and control while targeting SAP data security.

The recommendations of the Cybersecurity and Infrastructure Security Agency (CISA) for SAP products users and administrators focus on the need for monitoring systems, transactions, accounts creation, and access to and usage of data. This is where many SAP ERP customers struggle as achieving fine-grained controls and visibility are complex and, at times, prohibitive with native functionality.

Fine-Grained Visibility and Control: The Second Layer of Defense
RECON and 10KBLAZE highlight the inadequacy of a single, static layer of security within SAP in combating modern-day SAP data security threats. SAP ERP customers need to add another layer of defense with an all-encompassing suite of fine-grained, risk-aware access controls, and adequate monitoring of data access and usage.

The ...
... following suggestions will help you minimize your threat surface and the risks that RECON and future vulnerabilities may pose:
In a dynamic security environment, in addition to recommended security patches (that are a must), attribute-based access controls (ABAC) are essential.

RECON and 10KBLAZE both take advantage of the vulnerabilities in SAP's open, internet-facing (think remote access) components. The implementation of data-centric, risk-aware controls using ABAC is recommended. ABAC prevents specific transactions such as user provisioning when access originates from IP addresses that are untrusted (or IP addresses outside of your whitelist), specific geographic locations, beyond work hours, mobile devices, and many other contextual attributes. Fine-grained visibility and control can be implemented to block high-risk activity, such as creating a user account (or privilege changes) when access comes from outside the corporate network, and those activities that match the patterns of RECON attacks.

Visibility into Data Access and Usage: Essential to Address Configuration Gaps

Both RECON and 10KBLAZE focus on creating unauthorized, high privilege user accounts. In this scenario, a real-time analytics solution that captures and visualizes data access and usage is needed. This is essential to monitor user provisioning activities such as user creation/deletion, and changes in role/profile. Minimizing the damage by reducing the amount of time a threat goes undetected calls for the earliest possible risk detection.
Preparing for Next Critical SAP Vulnerability by Layering Your Defenses

RECON is not the first critical vulnerability, nor will it be the last, to affect SAP. While security patches are available to ensure SAP data security, these may take time and resources to implement, leading to significant downtime for production systems. The time required to apply the patches also depends on the complexity and the components involved. Keep up to date on system updates anyway, but bugs such as RECON and 10KBLAZE serve as a reminder that patches are not enough to ensure complete SAP data security.

More About the Author

Appsian One of the leading ERP data security,compliance,implementation solutions provider that gives organizations to complete control and visibility over their ERP data.

Total Views: 241Word Count: 465See All articles From Author

Add Comment

Service Articles

1. How Speech Therapy Supports Children With Autism Spectrum Disorder: A Comprehensive Guide
Author: seoworkzh

2. Ensure A Customer Success Story By Hiring Virtual Receptionists
Author: Eliza Garran

3. What Insights Does Uber Eats Australia Data Scraping Offer Across 10k+ Menus And Restaurant Pricing?
Author: Retail Scrape

4. Step-by-step Process Of A 3 Phase Power Conversion By A Level 2 Electrician
Author: CForce Electrical

5. B1b2 Visa Renewal Service In Hyderabad
Author: Space Visas

6. Avsi Admin Survival Guide: Sops That Keep Projects On Track
Author: office Hub Tech

7. How Medical Transcription And Ehr Integration Streamline Healthcare Documentation
Author: MOS Medical transcription Services

8. How Aberdeenshire Tree Specialists Ensure Safe And Sustainable Canopy Management
Author: Stephen Gowans

9. Transform Your Space With Quality Window Films In Auckland
Author: Tinting Experts

10. What Makes Carwale Data Scraping Vital For 78% Insights On New Car Launch And Auto Consumer Trends?
Author: Retail Scrape

11. Expert Soil Testing In Brisbane, Logan & Gold Coast | Geo Test Group
Author: Geo TestGroup

12. Beyond The Numbers: How Arn Hoxton’s Accountancy Services Enable Business Growth
Author: ARN Hoxton

13. Luxury Meets Support: Best Mattress Brands Offering Memory Foam For Back Pain
Author: Mark Jackson

14. How An Adblue Removal Solution Works: A Complete Guide For Diesel Owners
Author: Fast Lane Performance

15. Why Corporate Security Is More Important Than Ever For Melbourne Businesses
Author: Jacob william

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: