ALL >> Service >> View Article
Why Sap Customers Need Fine Grained Visibility And Control

RECON and 10KBLAZE Share Similarities
Very similar to the 10KBLAZE vulnerability of 2019, the RECON vulnerability attacks the confidentiality, availability, and integrity of the SAP ERP data and processes. Both RECON and 10KBLAZE leverage a lack of visibility and control while targeting SAP data security.
The recommendations of the Cybersecurity and Infrastructure Security Agency (CISA) for SAP products users and administrators focus on the need for monitoring systems, transactions, accounts creation, and access to and usage of data. This is where many SAP ERP customers struggle as achieving fine-grained controls and visibility are complex and, at times, prohibitive with native functionality.
Fine-Grained Visibility and Control: The Second Layer of Defense
RECON and 10KBLAZE highlight the inadequacy of a single, static layer of security within SAP in combating modern-day SAP data security threats. SAP ERP customers need to add another layer of defense with an all-encompassing suite of fine-grained, risk-aware access controls, and adequate monitoring of data access and usage.
The ...
... following suggestions will help you minimize your threat surface and the risks that RECON and future vulnerabilities may pose:
In a dynamic security environment, in addition to recommended security patches (that are a must), attribute-based access controls (ABAC) are essential.
RECON and 10KBLAZE both take advantage of the vulnerabilities in SAP's open, internet-facing (think remote access) components. The implementation of data-centric, risk-aware controls using ABAC is recommended. ABAC prevents specific transactions such as user provisioning when access originates from IP addresses that are untrusted (or IP addresses outside of your whitelist), specific geographic locations, beyond work hours, mobile devices, and many other contextual attributes. Fine-grained visibility and control can be implemented to block high-risk activity, such as creating a user account (or privilege changes) when access comes from outside the corporate network, and those activities that match the patterns of RECON attacks.
Visibility into Data Access and Usage: Essential to Address Configuration Gaps
Both RECON and 10KBLAZE focus on creating unauthorized, high privilege user accounts. In this scenario, a real-time analytics solution that captures and visualizes data access and usage is needed. This is essential to monitor user provisioning activities such as user creation/deletion, and changes in role/profile. Minimizing the damage by reducing the amount of time a threat goes undetected calls for the earliest possible risk detection.
Preparing for Next Critical SAP Vulnerability by Layering Your Defenses
RECON is not the first critical vulnerability, nor will it be the last, to affect SAP. While security patches are available to ensure SAP data security, these may take time and resources to implement, leading to significant downtime for production systems. The time required to apply the patches also depends on the complexity and the components involved. Keep up to date on system updates anyway, but bugs such as RECON and 10KBLAZE serve as a reminder that patches are not enough to ensure complete SAP data security.
Appsian One of the leading ERP data security,compliance,implementation solutions provider that gives organizations to complete control and visibility over their ERP data.
Add Comment
Service Articles
1. Evaluating Top Content Management Software In 2025: A Comprehensive OverviewAuthor: Stellanova GlobalTech
2. Bleach Manufacturers: A Guide To Bulk Sourcing & Import-export Services
Author: Lions Sales group
3. Crafting Unforgettable Corporate Events With The Best Practices & Tips
Author: Mehar MICE & Hospitality
4. The Benefits Of Expert Office Furniture Assembly For A Productive Workspace
Author: MJ Sater
5. Comprehensive London Office Cleaning Services For Businesses Of All Sizes
Author: Steve Humphrey
6. What Are The Benefits Of Lactobacillus Lactis ?
Author: vakyaprob
7. What Is Lactobacillus Lactis Used For?
Author: vakyaprob
8. Meeting The Demands Of Modern Data Centers With High Density Cooling
Author: Excool LTD
9. Calcium Feed Supplement
Author: Alicanto Vetcare
10. What Is Dry Eye And What Are Its Symptoms?
Author: Alester
11. Ndis Disability Service Providers Central Coast
Author: Classy Life:
12. Ndis Accommodation Central Coast | Sil Providers Central Coast | Sta Providers Central Coast
Author: Classy Life
13. Why Your Business Needs A Mobile App And How To Get It Right
Author: Digiprima
14. Master Cad Design With Certified Cad Training In Coimbatore
Author: CADDCbe
15. Ghost Labs
Author: Ghost Labs