123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Service >> View Article

Why Sap Customers Need Fine Grained Visibility And Control

Profile Picture
By Author: appsian
Total Articles: 115
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

RECON and 10KBLAZE Share Similarities

Very similar to the 10KBLAZE vulnerability of 2019, the RECON vulnerability attacks the confidentiality, availability, and integrity of the SAP ERP data and processes. Both RECON and 10KBLAZE leverage a lack of visibility and control while targeting SAP data security.

The recommendations of the Cybersecurity and Infrastructure Security Agency (CISA) for SAP products users and administrators focus on the need for monitoring systems, transactions, accounts creation, and access to and usage of data. This is where many SAP ERP customers struggle as achieving fine-grained controls and visibility are complex and, at times, prohibitive with native functionality.

Fine-Grained Visibility and Control: The Second Layer of Defense
RECON and 10KBLAZE highlight the inadequacy of a single, static layer of security within SAP in combating modern-day SAP data security threats. SAP ERP customers need to add another layer of defense with an all-encompassing suite of fine-grained, risk-aware access controls, and adequate monitoring of data access and usage.

The ...
... following suggestions will help you minimize your threat surface and the risks that RECON and future vulnerabilities may pose:
In a dynamic security environment, in addition to recommended security patches (that are a must), attribute-based access controls (ABAC) are essential.

RECON and 10KBLAZE both take advantage of the vulnerabilities in SAP's open, internet-facing (think remote access) components. The implementation of data-centric, risk-aware controls using ABAC is recommended. ABAC prevents specific transactions such as user provisioning when access originates from IP addresses that are untrusted (or IP addresses outside of your whitelist), specific geographic locations, beyond work hours, mobile devices, and many other contextual attributes. Fine-grained visibility and control can be implemented to block high-risk activity, such as creating a user account (or privilege changes) when access comes from outside the corporate network, and those activities that match the patterns of RECON attacks.

Visibility into Data Access and Usage: Essential to Address Configuration Gaps

Both RECON and 10KBLAZE focus on creating unauthorized, high privilege user accounts. In this scenario, a real-time analytics solution that captures and visualizes data access and usage is needed. This is essential to monitor user provisioning activities such as user creation/deletion, and changes in role/profile. Minimizing the damage by reducing the amount of time a threat goes undetected calls for the earliest possible risk detection.
Preparing for Next Critical SAP Vulnerability by Layering Your Defenses

RECON is not the first critical vulnerability, nor will it be the last, to affect SAP. While security patches are available to ensure SAP data security, these may take time and resources to implement, leading to significant downtime for production systems. The time required to apply the patches also depends on the complexity and the components involved. Keep up to date on system updates anyway, but bugs such as RECON and 10KBLAZE serve as a reminder that patches are not enough to ensure complete SAP data security.

More About the Author

Appsian One of the leading ERP data security,compliance,implementation solutions provider that gives organizations to complete control and visibility over their ERP data.

Total Views: 177Word Count: 465See All articles From Author

Add Comment

Service Articles

1. Mosquito Nets For Windows And Doors In Hyderabad – A Smart Solution For A Pest-free Home
Author: modernscreenshyd

2. Mosquito Screen Services In Hyderabad – Keep Your Home Pest-free
Author: modernscreenshyd

3. Premier Outdoor Led Advertising Display Boards In Hyderabad
Author: ledsignsboard

4. Top Signage Board Manufacturers In Hyderabad
Author: ledsignsboard

5. Custom Cabinet & Joinery Design Melbourne Is Going To Mesmerize You!
Author: William Harvey

6. Essential Steps To Extract Blinkit Product Data From All Dark Stores
Author: Devil Brown

7. Best Astrologer In Latur
Author: Vasudev21

8. The Role Of An Artist Management Agency- Elevating Talent To Stardom
Author: Teflas

9. Global Publishings: Turning Literary Dreams Into Published Reality
Author: John Francis

10. How Hiring A Licensed And Insured Locksmith Protects You In Colorado
Author: Locksmiths Of Colorado Springs

11. Top Techniques For Driveway Cleaning In Tonbridge: A Homeowner's Guide
Author: Aqua Blasters Limited

12. Black Magic Astrologer In Amravati
Author: Vasudev21

13. Manatelugu Foundation: Leading Education And Healthcare Initiatives For A Better Hyderabad
Author: manatelugufoundation

14. Un Lavage De Tapis Pas Cher Sans Compromis Sur La Qualité
Author: Lavage tapis artisanal

15. Web Scraping Food Data From Doordash, Uber Eats, Grubhub And Instacart
Author: Devil Brown

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: