123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Service >> View Article

Why Sap Customers Need Fine Grained Visibility And Control

Profile Picture
By Author: appsian
Total Articles: 115
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

RECON and 10KBLAZE Share Similarities

Very similar to the 10KBLAZE vulnerability of 2019, the RECON vulnerability attacks the confidentiality, availability, and integrity of the SAP ERP data and processes. Both RECON and 10KBLAZE leverage a lack of visibility and control while targeting SAP data security.

The recommendations of the Cybersecurity and Infrastructure Security Agency (CISA) for SAP products users and administrators focus on the need for monitoring systems, transactions, accounts creation, and access to and usage of data. This is where many SAP ERP customers struggle as achieving fine-grained controls and visibility are complex and, at times, prohibitive with native functionality.

Fine-Grained Visibility and Control: The Second Layer of Defense
RECON and 10KBLAZE highlight the inadequacy of a single, static layer of security within SAP in combating modern-day SAP data security threats. SAP ERP customers need to add another layer of defense with an all-encompassing suite of fine-grained, risk-aware access controls, and adequate monitoring of data access and usage.

The ...
... following suggestions will help you minimize your threat surface and the risks that RECON and future vulnerabilities may pose:
In a dynamic security environment, in addition to recommended security patches (that are a must), attribute-based access controls (ABAC) are essential.

RECON and 10KBLAZE both take advantage of the vulnerabilities in SAP's open, internet-facing (think remote access) components. The implementation of data-centric, risk-aware controls using ABAC is recommended. ABAC prevents specific transactions such as user provisioning when access originates from IP addresses that are untrusted (or IP addresses outside of your whitelist), specific geographic locations, beyond work hours, mobile devices, and many other contextual attributes. Fine-grained visibility and control can be implemented to block high-risk activity, such as creating a user account (or privilege changes) when access comes from outside the corporate network, and those activities that match the patterns of RECON attacks.

Visibility into Data Access and Usage: Essential to Address Configuration Gaps

Both RECON and 10KBLAZE focus on creating unauthorized, high privilege user accounts. In this scenario, a real-time analytics solution that captures and visualizes data access and usage is needed. This is essential to monitor user provisioning activities such as user creation/deletion, and changes in role/profile. Minimizing the damage by reducing the amount of time a threat goes undetected calls for the earliest possible risk detection.
Preparing for Next Critical SAP Vulnerability by Layering Your Defenses

RECON is not the first critical vulnerability, nor will it be the last, to affect SAP. While security patches are available to ensure SAP data security, these may take time and resources to implement, leading to significant downtime for production systems. The time required to apply the patches also depends on the complexity and the components involved. Keep up to date on system updates anyway, but bugs such as RECON and 10KBLAZE serve as a reminder that patches are not enough to ensure complete SAP data security.

More About the Author

Appsian One of the leading ERP data security,compliance,implementation solutions provider that gives organizations to complete control and visibility over their ERP data.

Total Views: 138Word Count: 465See All articles From Author

Add Comment

Service Articles

1. Elevating Landscapes: The Role Of Tree Surgeons In Weybridge's Beauty
Author: midgard

2. Ip Pbx System
Author: Asfera

3. Diving Deep Into Seo Agencies: Exploring The Role Of Seo Experts!
Author: Aaron Peters

4. How Bank Loyalty Programs Are Revolutionizing Customer Retention Strategies
Author: William Fletcher

5. What Are The Importance And Limitations Of Ncert For Jee Mains Chemistry
Author: kishor kumar

6. Digital Marketing Services For Our Young Minds Technologies
Author: youngminds tecchology solution

7. Lore And Myths About Tarot Readers
Author: Alexis Pelloe

8. The Complete Guide To Dog Bowls: Selecting The Finest For Your Pet
Author: The Complete Guide to Dog Bowls

9. Empowering Sustainability: The Rise Of Scrap Buyers In Madhapur
Author: rsscrapbuyers

10. Unlocking Value The Role Of Scrap Buyers In Madhapur And Hyderabad
Author: rsscrapbuyers

11. Leveraging Amazon Fresh Datasets Through Grocery Data Scraping For Strategic Intelligence
Author: Productdatascrape

12. Tax Compliance Solutions 7 Essential Tips For Every Taxpayer
Author: figmentglobal

13. Elevate Your Space: The Artistry Of Italian Marble And Granite Installation Services
Author: sdlhomeservices

14. Reviving Elegance: The Essence Of Professional Marble And Granite Polishing Services
Author: sdlhomeservices

15. Transforming Event Waste Management In Michigan
Author: James Smith

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: