ERP Security 101: 5 Things Every Leader and Organization Should Be Doing to Secure ERP

Cyber Tech Talk

ON DEMAND

Traditional cybersecurity investments have focused on defending the perimeter with little attention paid to the application layer. More importantly, those applications enable the most critical business functions of your organization, such as financials, manufacturing, and the supply chain. With SAP as the core technology foundation for many large enterprises, it presents an attractive target for malicious actors. Building from basic security hygiene to advanced concepts, you can play a key role in ensuring that strategic operations and critical processes of your business are protected. Key strategies to maintain compliance and better mitigate risk across your SAP landscape.

In this session you will dive into ERP Security 101, including:

  • How and why it’s imperative to include SAP security in your overall cybersecurity strategy 
  • Fundamental concepts for SAP business-critical application cybersecurity & compliance 
  • Key strategies to maintain compliance and better mitigate risk across your SAP landscape
  • Active and elevated SAP exploitation activity identified by Onapsis Research Labs
  • CISA’s Catalog of Known Exploited Vulnerabilities and the SAP vulnerabilities highlighted as critically important to patch

Network Detection Rule Pack for Onapsis Defend

Extend Industry-Leading SAP Threat Intelligence to the Network Layer

Business-critical applications are at higher risk than ever before, as organizations struggle to keep up with unpatched vulnerabilities and threat actors launch sophisticated ERP-focused attacks. The earlier an organization can detect threat activity, the better. Monitoring for ERP threats at the network layer – before they reach the applications –provides significant advantages of foresight and speed. However, this is easier said than done, as most traditional network security products lack the threat intelligence and the rules to deliver real protection. These vendors are not SAP security experts, and any rules they may provide are primarily crowdsourced from user or amateur communities – not experts.

The Network Detection Rule Pack for Onapsis Defend solves this problem, making it easy for organizations to bring Onapsis’s industry-leading SAP threat intelligence into their existing network security technologies. In our vendor-agnostic approach, Onapsis delivers a set of regularly-updated rules that can be imported into any Snort-compatible network security product (e.g., NGFW, WAF, IDS/IPS) deployed by organizations as part of their security architecture.

Get Network-Based SAP Threat Detection from SAP’s Trusted Security Partner

  • Bring Onapsis threat intelligence into your network security technology, augmenting its ability to detect (and potentially stop) network-detectable threats to SAP 
  • Leverage rules and network security features to block malicious traffic from reaching SAP applications

Gain an Even Earlier Warning System for Critical SAP Threats

  • Get alerts for critical attacks before they even reach your SAP applications, allowing for faster response times 
  • Increase your time window for analysis and learn about new attacks and attack vectors

Deploy Across Your Defense-in-Depth Security Stack

  • Open-source Snort rules allow for broader, vendor- agnostic applicability across your network security stack
  • Supplement your threat monitoring efforts at the application layer by extending SAP threat intelligence to your network and perimeter layers to alert your SIEM

Onapsis Threat Intel Center

One-Click Access To Critical ERP Security News from the Onapsis Research Labs

While cybercrime targeting ERP systems is escalating exponentially, the cybersecurity skills shortage is only getting worse. New vulnerabilities are constantly being discovered, and threat actors are increasingly exploiting what’s unpatched, leaving resource-constrained teams struggling to keep up and understand where to focus efforts to best protect the business.

The Onapsis Threat Intel Center alleviates the knowledge burden placed on already-strained security teams with easy-to-consume research and insights on the evolving ERP threat landscape, straight from the experts at the Onapsis Research Labs. This consolidated view provides everything you need to know about high-impact threat campaigns in one place, including detailed risk analysis of the threat and your system exposure, data from our global Threat Intelligence Cloud, threat activity reports, insights, and our best  recommendations to mitigate and remediate.

Educate Your Teams to Better Respond to the Evolving ERP Threat Landscape

  • Get a high-impact, consolidated view into critical and elevated threat activity targeting vulnerable ERP systems
  • Understand the risk to help focus action on what needs immediate attention or what needs to be communicated up the chain to leadership

Get a Faster Read on Your Risk and Exposure

  • Get a more complete understanding of where you’re vulnerable across your landscape from multiple Onapsis products – all in the Onapsis Threat Intel Center
  • More easily share business risk with other  stakeholders across the company with one-click visibility into affected assets 

Jumpstart ERP Security Knowledge & Risk Mitigation Efforts

  • Security teams new to ERP applications can use the prioritized set of content to start familiarizing themselves with ERP- specific vulnerabilities, attack vectors, and business impact 
  • Organizations new to ERP vulnerability management can use the critical news and threat updates to aid prioritization efforts for mitigation and response

Cyber Tech Talk: Best Practices to Combat the Rapidly Evolving Threat Landscape for ERP Applications

ON DEMAND

ERP applications power the global economy and support the most critical and complex processes for the largest organizations in the world. We all know it, and threat actors know it too. Over the past few years, the Onapsis Research Labs have seen an accelerated increase in the threats and attacks targeting ERP applications, leading to frustrating business disruptions and significant monetary loss. Join us to learn about the latest developments in the ERP threat landscape as well as three recommended best practices to keep these ERP attacks out of our business-critical systems.

Onapsis Control: Application Security Testing for Business-Critical Applications

Accelerate and Secure Development with Automated Application Security Testing Built for SAP

Challenge

SAP Applications Are Increasingly Appealing Attack Targets for Threat Actors

These highly customizable ERP systems are cornerstones of business and financial operations, containing sensitive, proprietary, and confidential data. With digital transformation projects such as SAP RISE as well as migrations to SAP S/4HANA accelerating, any organization could have multiple application development teams – contractors, systems integrators, and internal – working simultaneously on new custom code to power the business. However, these projects introduce security flaws and elevated risk. Threat actors have taken notice and are more aggressively targeting SAP applications directly.1 The need for secure application development and testing has never been greater. Yet there is a lack of tools that sufficiently support SAP languages, components, and development environments, leading to over-reliance on time-consuming, error-prone manual code reviews.

43% of organizations are emphasizing security in the development of new applications 2
$50K+/HOUR average cost of ERP application downtime 3

The Solution

Save Time and Money Securing SAP Application Development with Onapsis Control for Code

Recognized by the Gartner Magic Quadrant for Application Security Testing three years in a row, Onapsis Control for Code provides automated application security testing for SAP applications, enabling organizations to build security into development processes to find and fix issues as quickly as possible.

  • Analyze and fix code with step-by-step guidelines
  • Gain visibility into 3rd party developed code 
  • Identify common code errors and remediate them in a mass correction with one-click fix 
  • Integrate with a wide variety of SAP development environments

Better Identify and Mitigate Application Development Risk (On Page Graphics) 

  • Reduce Time to Identify Code Vulnerabilities
    Discover risks to production earlier in the development cycle
  • Gain Visibility into Third Party Code
    Ensure contractors adhere to best practices for secure development
  • Create a Security Baseline for Code and Enable a ‘Clean’ Slate
    Remediate existing custom code prior to migrating to the cloud or an SAP RISE transformation

“We have much higher confidence that our changes won’t add risk or disrupt the business.”

–F100 Chemical Company

Build Security into Agile Development 

  • Automate Developer-Centric Application Security Testing
    Replace time-consuming manual testing with automated assessments
  • Streamline Remediation for Code in Development
    Gain step-by-step instructions to remediate complex code development errors
  • Mitigate Common Code Errors Easily
    Leverage automatic bulk code identification and remediation tool to resolve common code errors

“Reduced both our time and costs for reviewing code by almost 70%.”

– F500 Global Manufacturing Company

Improve Your App Security and Compliance

  • Integrate with Common SAP Development Environments
    Drive alignment across the organization between SAP, Development, and Security teams
  • Mitigate Security Risks That Lead to Downtime
    Prevent code issues from negatively impacting system security, compliance, performance, or availability
  • Build the Latest Threat Insights into Your Development
    Keep up with the latest security best practices from Onapsis Research Labs

“Onapsis enables us to prove our code is secure and compliant and ensures [it] meets our high standards.” 

– US Defense Health Agency


1 https://onapsis.com/active-cyberattacks-business-critical-sap-applications 
2 Ponemon Institute, Reducing Enterprise Application Security Risks: More Work Needs to Be Done; February 21
3 https://onapsis.com/active-cyberattacks-business-critical-sap-applications

Security Survey Insights Dach 2022

Insights zu aktuellen Trends im Bereich SAP-Sicherheit Statements aus der SAP-Community

ON DEMAND

In diesem kompakten Webinar möchten wir Ihnen die Ergebnisse der Security-Umfrage DACH 2022 vorstellen. Erfahren Sie welche Security-Topics andere Unternehmen vorantreiben und in welchen Bereichen grundlegend Handlungsbedarf besteht. Wir versorgen Sie mit aktuellen Zahlen und Handlungsempfehlungen.

Wir kläre Fragen wie:

  • Was ist bedeutet Cybersecurity für Unternehmen?
  • Welche Schwerpunkte stehen im Jahr 2022 im Vordergrund?
  • Was sind Treiber zur Verbesserung der Security?
  • Wird der Zero-Trust Ansatz bereits umgesetzt?
  • Wie oft werden SAP-Systeme angegriffen?
Onapsis Webinar

Customer Spotlight: How Dow Chemical Leverages Onapsis for Harmonized, Proactive Security & Compliance

ON DEMAND

Traditionally, cybersecurity and compliance have been two very separate functions where oftentimes the misalignment has been emphasized more than alignment toward a common goal. Add in the complexities of the compliance landscape and ever growing threats to business-critical applications, and defenders have a difficult challenge to solve with limited resources.

Onapsis customer, Dow Chemical, discusses their journey and best practices utilizing The Onapsis Platform and how they solve these challenges–bringing their cybersecurity and compliance functions together in harmony.

Watch this session to gain an understanding of how to:

  • Harmonize and remove barriers between security and compliance/audit teams for a holistic assessment of organizational risk
  • Save budget and resources by identifying opportunities where one solution can support both cybersecurity and compliance/audit efforts
  • Develop a proactive approach to ERP by securing the application layer–vital protection for business continuity and threat remediation for faster response to zero days
  • Navigate the current regulatory landscape and save hundreds of hours with automation of critical governance activities (i.e. ICFR/SOX)”

A leading European technology trading group mitigates SAP Cyber security risks with managed service from 1DigitalTrust

Industry: European Technology
Company Size: 900 employees

Customer Success Story

One of Europe’s leading technology trading groups within products and systems for industrial applications has secured its SAP systems all over Europe with an Onapsis cybersecurity solution delivered by 1DigitalTrust as a managed service to avoid expensive downtime to its business. 

With 3,3 billion SEK in yearly turnover and 36 business units in 14 countries, the organisation employs more than 900 people who serve more than 30,000 customers and 400 suppliers. With that customer and supplier base, it is business critical for the company to have a well-functioning and secure SAP system that will not be exposed to cyberattacks. 

Recently, the company saw how one of their competitors was hit by a ransomware attack. The company wanted to ensure that this would not happen to them. 

As a global company, it has its own resources as well as external ones distributed across different locations. That called for a structured approach to prevent security holes in the global SAP system.

“We have been able to reduce our risks significantly with the SAP Cyber security managed service from 1DigitalTrust. The costs have been planned, and we have been able to stay within the budget for mitigating the risks.”

CFO at the Company

Mitigating SAP Risks

To stay secure, 1DigitalTrust has implemented an SAP cybersecurity managed service at the company’s SAP installation. 1DigitalTrust did the installation and delivers security services, as the company does not have dedicated inhouse SAP cybersecurity resources. As a security service partner, 1DigitalTrust continuously monitors the systems. Every month, the company and 1DigitalTrust go through the current risks and plan how to mitigate the risks.  

Known Security Costs

One of the advantages for the company is that they now have experts at hand to help with mitigating all the risks. Furthermore, the company’s costs for ensuring SAP Cyber security are known. Everything concerning the monitoring and related infrastructure is included in the fee and is taken care of by 1DigitalTrust. Time to resolution for any risks has been faster than anticipated. After the initial work to remove all critical risks within the first months, the work is now more operational. When new critical risks occur, which they unfortunately will from time to time, the company has easy access to resources, and risks will be mitigated by 1DigitalTrust as soon as a solution is available.

Solution: Business Critical Cybersecurity from Onapsis

The solution from 1DigitalTrust is based on the Onapsis Platform, which focuses on the unique cyber security challenges of business-critical applications such as SAP and Oracle. Currently, the Onapsis Platform protects business-critical applications and data for over 300 global enterprises, including 20% of the Fortune 100. The Onapsis Platform also delivers timely and impactful threat intelligence to SAP and their customers to help mitigate vulnerabilities.

“We now have a structured process to evaluate and mitigate risks in SAP. That enables us to quickly and efficiently determine when and how to mitigate the risks together with the experts from 1DigitalTrust.” 

ERP Manager at the Customer

Results

  • 77 % of C-level executives (CTO, CIO, etc.) are concerned about security, when considering moving ERP applications to the cloud.
  • In 64% of the cases, ERP downtime cost per hour is higher than 50,000 USD.
  • In 74% of surveyed organizations, ERP applications are currently accessible from the Internet.

Despite efforts to patch, 62% of the respondents said that their applications have critical vulnerabilities.


Every second a large organization experiences a security breach related to their ERP system.