Summary of "TCT Talks - Cyber-Attacks on SAP: Are You Prepared?"

Summary of “TCT Talks - Cyber-Attacks on SAP: Are You Prepared?”

This video features a discussion on the increasing threat of cyber-attacks targeting SAP systems and practical guidance on how organizations can improve their SAP security posture. The main speakers are Andy Bailey (Technical Team Manager at TCT), Will Dunley, and Laurel Christa, both senior SAP security consultants.

Key Technological Concepts and Analysis

SAP within Cybersecurity Layers

SAP systems form part of the application layer in an organization’s cybersecurity framework. This framework also includes:

SAP holds sensitive data such as HR records, intellectual property, and customer information, making it a prime target for attackers.

Real-World Risks and Exposure

Despite multiple outer security layers, SAP systems are often exposed to external threats. Recent high-profile attacks have demonstrated how hackers can bypass perimeter defenses and remain inside networks for months, exploiting weak or non-existent SAP security controls.

Types of Threats

Threats to SAP systems can be:

This diversity highlights the need to close as many security gaps as possible within SAP landscapes.

Vulnerability Assessment Service

TCT offers a vulnerability assessment service that includes:

  1. Accessing the productive SAP system
  2. Identifying risks and vulnerabilities
  3. Producing a non-judgmental, business-language report
  4. Conducting a workshop to explain findings and answer questions

This service helps organizations understand their current security posture and develop a roadmap toward improvement.

Business Impact of Cyber Attacks

Cyber-attacks on SAP systems can lead to severe consequences, such as:

Audit and Compliance Considerations

Organizations should align their SAP security goals with audit requirements (SOX, ISO, internal audits) and their risk appetite. Security is a continuous improvement process, aiming for pragmatic targets (e.g., 95% security effectiveness) rather than perfect security.

Simple Security “Quick Wins”

Some straightforward measures to improve SAP security include:

House Analogy for Security

Basic security measures—such as locking doors and windows—are essential before investing in sophisticated solutions. Simple, inexpensive fixes reduce the attractiveness of SAP systems to attackers.

Technical SAP Basis Security Measures

Key technical controls include:

Focus on Production Systems

Security controls and fixes should first be applied to production environments where critical data resides, then extended to development and quality systems.

Continuous Improvement and Collaboration

Security is an ongoing effort requiring cooperation between SAP security teams, basis administrators, and business stakeholders. Regular reviews, adherence to processes, and timely patching are vital.

Customer Support and Engagement

TCT emphasizes a non-judgmental, supportive approach, positioning themselves as an extension of the customer’s team. They offer assistance beyond assessments, including general security advice and ongoing support.

Product Features and Services Highlighted

Tutorials, Guides, and Recommendations Provided


Main Speakers / Sources

Category ?

Technology

Share this summary

Video