During cyberattacks, malicious actors bypass multiple security devices in order to achieve their goal: the application layer. Thus, critical data for daily business activities are often reached through applications and professional softwares like ERPs.
The various technologies used in ERP environments generate an increasing complexity for the management of patches and vulnerabilities, which makes protecting data more and more painstaking. This situation consequently degrades the cost / benefice ratio. Indeed, companies need to cover a large attack surface in order to protect themselves from hackers that can concentrate on just one precise vector to penetrate systems.
In order to minimize this attack surface, the security of systems & applications landscapes need to follow essential best practices:
« By 2020, 100% of large enterprises will be asked to report to their board of directors on cybersecurity and technology risk at least annually, up from 40% today »
With a good knowledge of SAP systems, ArtimIS can support you in the management of these topics, in particular by applying best practices adapted to your context. Our SAP cybersecurity offering therefore addresses these four major topics.
In an organization’s IT environment, no application is not protected from risks posed by inadequate software patch management. Editors (Microsoft, SAP…) provide security updates because new vulnerabilities are regularly discovered. Once patches are published by editors, these vulnerabilities become public and their use by malicious actors is possible on unpatched systems.
Several studies performed over the last three years have revealed that there is a strong trend towards the malicious use of public vulnerabilities in ERP applications (e.g. SAP). This sensitive subject is fundamental for the cybersecurity of the company because it directly affects sensitive data and operational activities can be strongly impacted.
« Eighty-nine percent of IT security professionals expect the number of cyberattacks against ERP systems to increase – 30% of them expect a significant increase»
Cybersecurity Trends 2017 Spotlight Report, Crowd Research Partners
The increasing complexity of applications and the constant evolution of ERPs generate several problems that companies must respond to:
Faced with the problems mentioned above, many companies ignore patches in order to maintain high operational availability: this choice can have serious consequences, as several recent cases have shown.
To mitigate risks of cyber attacks, every organization needs a complete, reliable and cost-effective patch management process to ensure the stability and security of the ERP environment. SAP and other editors provide software solutions to simplify this management. With a good knowledge of SAP systems, ArtimIS can assist you in this area, in particular by implementing a patch management strategy that includes the following steps:
Federation of Identities
The evolution of companies and their application landscape generates a multiplication of user accounts. This data is therefore treated, stored and maintained in different solutions, resulting in multiple entry points for the same user. In order to secure access to these different elements, it is important to federate this identity system.
Such a multiplication of accounts generates risks such as:
It is essential to centrally track a user’s lifecycle from provisioning to deletion. This will allow users to access multiple applications with single sign-on authentication while ensuring their identity and legitimacy. Identity federation technical solutions provide uniform centralized reporting across all user accounts.
ArtimIS proposes its expertise in the federation of your identities and in the different phases of their lifecycle by implementing the appropriate solutions. The benefits of this approach are the following:
A good federation of identities is necessary for access management in the context of GRC.
see our detailed UAM offer HERE
Data access & protection
Today, security in SAP environments is no longer confined to the notion of SoD and access governance. Access to data is a major issue in information system security. Rules essential to their protection must be respected:
ArtmIS offers its services to support and implement these security mechanisms in order to guarantee a better protection of your data.
Supervision & Monitoring
A study conducted by IBM in 2019 reveals that a hacker who succeeds in penetrating a company’s IS can stay there for an average of 206 days without being detected. The attacker will thus have time to achieve any desired objective, whether it is to steal, modify data or make it inaccessible or unusable.
Intrusion detection is complex, especially in ERP environments such as SAP for the following reasons:
Studies show that the earlier a company detects an intrusion into its systems, the less financial loss. The value of early intrusion detection in an ERP system is therefore undeniable.
ArtimIS can help you implement the SAP Enterprise Threat Detection solution to protect your data:
The seniority of our consultants and our broad experience enable us to bring a pragmatic and agile approach in our project management when it comes to compliance projects.