Volume IX: Assessing and Defending SAP BusinessObjects

Implementing proper security controls for a BusinessObjects implementation is a complex process. There are a number of moving parts, complicated Access Controls, and many client access points. For those tasked with auditing an implementation it can be difficult to know where to begin.

In this white paper we discuss the BusinessObjects architecture landscape, discuss common security practices, target areas for an attacker, and make recommendations that, if not already implemented, will increase the security posture of your BusinessObjects deployment.

Volume VIII: Transport Management System – Highway to Production

In all SAP implementations there are many reasons why organizations would need to make changes and updates on a regular basis; from changes to legislation and compliance mandates to business growth, process evolution and security modifications. The Transport Management System (TMS) is the backbone for applying these changes to our SAP Systems.

Each of the systems within a landscape are defined to play a role in the TMS transport strategy: DEV, QA and PRD are some of the roles. If the TMS is not properly secured and managed, incorrect or unauthorized changes could be implemented in the productive systems running our day-to-day critical processes.

This issue explains the main components and capabilities of the TMS. This information will help organizations increase the protection of their SAP platform against cyber-attacks by gaining visibility of the risks and details of how to secure TMS.

Volume VII: Preventing Cyber-attacks Against SAP Solution Manager

By design the SAP Solution Manager is connected to all SAP systems (i.e. ERP, CRM, BI, etc), making it a critical component of any SAP implementation: if successfully exploited by an attacker, all the satellite SAP environments, and therefore their business information, could be completely compromised.

Despite its relevance, common IT security practices have traditionally overlooked this component, resulting in many insecure implementations. This issue presents key security concepts in Solution Manager, introduces an in-depth analysis of critical cyber-threats affecting it and outlines a list of mitigation techniques and countermeasures to protect SAP Solution Manager implementations.

By understanding and leveraging this information, SAP and Information Security professionals can increase the overall security level of their company’s SAP platform, better protecting their organization’s business-critical information.

Volume V: Our Crown Jewels Online – Attacks targeting SAP Web Applications

While the comment, SAP platforms are only accessible internally, was true in many organizations more than a decade ago, today, driven by modern business requirements for interconnectivity, SAP systems are very often connected to the Internet. This scenario dramatically increases the universe of possible attackers, as malicious attackers can remotely try to compromise the organization’s SAP platform.

SAP provides different Web technologies, such as the Enterprise Portal, the Internet Communication Manager (ICM) and the Internet Transaction Server (ITS), which may be prone to specific security risks.

This issue analyzes possible attack vectors to SAP Web components and the mitigation measures that need to be taken in order to prevent them. This information will enable organizations to better protect their business-critical infrastructure against cyber-attacks performed over Web scenarios.

Volume IV: The Invoker Servlet – A Dangerous Detour into SAP Java Solutions

SAP Application Servers Java, supported by the J2EE Engine, serve as the base framework for running critical solutions such as the SAP Enterprise Portal, SAP Exchange Infrastructure (XI), SAP Process Integration (PI) and SAP Mobile Infrastructure (MI). In addition, customers can also deploy their own custom Java applications on these platforms.

In December 2010, SAP released an important white-paper describing how to protect against common attacks against these applications. Among the security concepts detailed, there was one that was particularly critical: the Invoker Servlet. This functionality is subject to several threats to SAP platforms, such as the possibility of completely bypassing the authentication and authorization mechanisms.

This publication analyzes the Invoker Servlet Detour attack, identifying the root cause of this threat, how to verify whether your platform is exposed and how to mitigate it, effectively protecting your business-critical information against cyber-attacks.

Volume II: SAP Knowledge Management - The Risks of Sharing

SAP Knowledge Management (SAP KM) is a central component of the SAP Enterprise Portal, enabling the information extracted from numerous data sources within the Organization to be displayed in a single access point.

Employees, customers, vendors and business partners use this platform to interact with data provided by the company in order to fulfill their different business requirements. The business information available in SAP KM, can be highly sensitive and unauthorized access and/or manipulation of data could imply high risks for any company.

Our experience in this field indicates that due to lack of proper access-control implementations, combined with default and permissive policies, many organizations are exposing sensitive information through SAP Enterprise Portal to unauthorized parties.

This volume analyzes in detail some of the risks that affect the security of SAP Knowledge Management and presents possible solutions to mitigate those risks, allowing you to increase the security level of your SAP Enterprise Portal installation.

Volume I: The Risks of Downwards Compatibility

SAP has implemented several unique password hashing procedures in its history. While each new version has increased the security level of their hashing scheme, the requirements for backward compatibility, if not considered in the implementation phase, may provide an opportunity for attacks against users’ stored credentials. Through the exploitation of these weaknesses, malicious attackers would be able to escalate privileges over vulnerable systems and perform business processes while impersonating other users.

This SAP Security In-Depth volume details the evolution of these hashing mechanisms developed by SAP, analyzes the different risk levels of attacks targeting this sensitive information and provides practical mitigation processes to protect the company’s SAP platform.