10KBLAZE Threat Report

Based on hundreds of SAP implementation assessments and the proprietary threat intelligence of Onapsis, we estimate these exploits could affect 9 out of 10 SAP systems of more than 50,000 customers worldwide. We recommend you review and apply all relevant SAP security notes immediately.

CSA ERP Security Survey

Incidents and Misconceptions Both Increase as Critical ERP Systems Migrate

The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment along with Onapsis are happy to present the findings from the first research survey on “Enterprise Resource Planning (ERP) Applications and Cloud Adoption.” The study offers greater insight into cloud preparation and migration, the features and benefits gained, and the security and privacy challenges for ERP systems in a cloud environment.

Download this document to get key findings and misconceptions that organizations have while moving their ERP applications to the cloud.

SAP & GDPR: Keeping Your Organization Ahead of the Upcoming EU Law

With the GDPR enforcement date of May 2018 and steep fines of up to 4% of profit or €20 million looming, organizations are still struggling to understand this complicated policy and how they will adhere to it. This guide aims to provide SAP customers an overview of GDPR, how it affects them and how they can begin a plan to become compliant.

By downloading this guide, you will learn:

  • Important details about GDPR
  • How to check if your organization manages EU citizen data
  • Which SAP systems handle citizen data
  • Methods to secure data housed in SAP systems
  • How to align your SAP security with GDPR compliance mandates

An Introduction to Oracle EBS Application Security

Until recently, Oracle security was regarded as database security or application roles and profiles by the majority of the information security community. While both of these security methods are certainly necessary, many threats to-date have been overlooked by auditing and information security practices, despite the fact that these threats could lead to greater business risk. 

The technical components of business-critical applications introduce specific security concerns that, if not mitigated properly, can be subject to cyberattacks with severe impact to the business. If vulnerabilities against these systems are exploited, confidentiality, integrity and/or availability of critical business information processed and stored in these systems are at risk of being compromised from internal or external attackers. 

Download this publication and become informed with the latest information about current and future risks facing Oracle applications, allowing different actors (financial managers, information security managers, Oracle administrators, auditors, consultants and others) to better understand the techniques and tools available to assess and mitigate them.

Ponemon Report: Cybersecurity Risks to Oracle E-Business Suite of Applications

Ponemon Report

How are organizations truly managing cybersecurity risks in their Oracle E-Business Suite ecosystem? Ponemon Institute’s latest study of almost 600 global IT and IT security practitioners reveals senior level perceptions about Oracle E-Business Suite, its security challenges, and the risk of data breaches and cyberattacks. By downloading this report, you will learn:

  • Senior leadership’s perception about security risks facing Oracle E-Business Suite
  • How critical Oracle E-Business Suite is to the revenue of an organization
  • The average cost of a data breach if Oracle E-Business Suite is taken offline
  • Where the division of responsibility is perceived to lie for securing Oracle E-Business Suite
  • Perceived confidence in being able to detect a security breach in Oracle E-Business Suite

Protecting the Crown Jewels in the Pivot to Digital Transformation

For many organizations, digital transformation is not just buzzwords but a detailed outline of business and operational plans to integrate, prioritize and fully utilize the latest digital technologies available. While this plan has significant cost and productivity benefits to the organization, security is often a second priority or not in the scope of these projects. Beyond that, many organizations have not identified a plan for how they will migrate their most critical SAP and Oracle applications and workloads in a secure way, putting their crown jewels at risk.

Download this comprehensive white paper to outline key security challenges in migrating complex business-critical applications during digital transformation strategies. Also, learn key methods to ensure the business crown jewels are protected each step of the way.

The State of Enterprise Resource Planning Security in the Cloud

With ERP vendors reporting double-digit growth in cloud revenue year over year, many organizations are faced with the challenging task of planning a cloud migration of their most critical assets. Because these systems are typically more complex, and also house the organization’s critical data and processes, special precautions must be taken when building a migration plan.

The Cloud Security Alliance (CSA) ERP Security Working Group has pulled together industry experts to study this topic and offer organizations a baseline in their new white paper, “The State of Enterprise Resource Planning Security in the Cloud.” This document aims to help organizations develop best practices to secure their ERP (and other business-critical applications) when undergoing complex cloud migrations.

Volume XIV: Setup Trusted RFC in SAP GRC

In February 2017, SAP released Security Note 2413716 regarding configuration changes to secure Trusted RFC for GRC Access Control (AC) Emergency Access Management (EAM), which was a High Priority note.

The EAM module provides SAP GRC AC with the ability to determine how access can be granted in case of an emergency, however, you must set up Trusted RFC in order to do this.
In this white paper the Onapsis Research Labs will detail:

  • Key concepts of SAP GRC and Trusted RFC
  • Key risks of not configuring this in your organization
  • Steps to securely configure this High Priority note