Incident Report Solution Brief

Onapsis SAP Incident Response Technology & Services

When you’re deep in the trenches of response and recovery for a severe material incident, every minute counts.

Trust Onapsis to deliver SAP-endorsed, critical support you need to move the line forward, faster.

Here are three key reasons why our clients recommend Onapsis for business-critical incident response:

1. The Race to Recovery and Restoration Means Nothing if You’re Compromised Again

As you recover, you need to dig deep into your SAP landscape and ensure that all potential and known exploited vulnerabilities, insecure points of ingress, and potential paths for lateral movement are mitigated in your newly recovered production systems. It’s imperative that all critical vulnerabilities are addressed, including custom SAP code, which is generally a huge gap in application security and cyber incident response playbooks.

2. Monitoring & Inspecting as You Go Is Key to Detect Anomalous Activity from External and Internal Actors

NIST recommends both point-in-time and continuous monitoring as part of a complete IR playbook as a company recovers and rebuilds…not just as preventative security measures.

As your teams work around the clock to bring systems back online, it’s imperative to monitor for any behavior, activity, sensitive data access, or misauthorizations – even if it’s a mistake or benign action by stressed and taxed teams.

3. Cybersecurity Response Teams Aren’t SAP Experts. Onapsis Is.

SAP is frequently a black box for cyber teams. During the stressful, pressure-laden period of responding to a material incident or breach, this knowledge gap is even more drastic and visible. Leveraging the right external experts acts as a force multiplier for your teams, accelerating the pace and helping achieve key milestones faster and without error.

Onapsis Webinar

Come gestisci il rischio informatico nei sistemi SAP?

ON DEMAND

Unisciti a noi per partecipare ad una sessione web esclusiva dedicata alla salvaguardia dei vostri sistemi SAP di fronte alle crescenti minacce informatiche. Sia che si utilizzi “RISE with SAP” o implementazioni “on-premise”, rimane fondamentale proteggere queste risorse critiche.

Durante il webinar “Come si gestisce il rischio informatico nei sistemi SAP?”, si enfatizzera’ l’importanza di mantenere protocolli di sicurezza rigorosi e si evidenziera’ il modello di responsabilità condivisa nella gestione efficace dei rischi di sicurezza. Otterrai informazioni sull’identificazione delle vulnerabilità all’interno degli ambienti SAP e riceverai consigli pratici per migliorare la consapevolezza della sicurezza dell’ERP.

Inoltre, ti guideremo nell’integrazione delle misure di sicurezza nel quadro più ampio delle pratiche di Infosec. Non perdete l’occasione di rafforzare le tue difese e mitigare i rischi informatici nei tuoi sistemi SAP.

Ch4tter Infographic

CH4TTER: Threat Actors Attacking SAP for Profit

Gain crucial insights into the evolving landscape of cybersecurity threats with our latest infographic and discover how sophisticated threat actors not only encrypt an organization’s data for ransom but also engage in data exfiltration, subsequently selling it on illicit markets. Download now to stay informed and protect your organization against these growing threats.

Solution Brief Onapsis Platform

Onapsis Platform: A Risk Driven Approach to SAP Application Security

Achieve SAP Cyber-Resilience While Gaining Cost and Resource Efficiencies

The Challenge

A Perfect Storm of Elevated Risk and Complexity

SAP applications are foundational, business-critical systems. Their importance and overall complexity are exploding in scale, as organizations continue to support legacy systems while simultaneously transitioning to the cloud. This sprawling SAP landscape has many owners that share responsibility across InfoSec, IT, and Basis. Too frequently, these teams lack alignment and risk-based prioritization around securing these critical applications – leading to, at best, gaps in accountability, and at worst, grossly elevated risk for the organization. Unfortunately, the SAP attack surface remains a large blindspot for InfoSec at a pivotal time. Having hit a critical inflection point, targeted SAP attacks are on the rise now that tools for and access to these critical systems are more widespread than ever before. Cybercriminal, ransomware gangs, and state-sponsored threat actor groups are moving aggressively into this space to capitalize and make a profit. The timing couldn’t be worse with additional compliance pressures on organizations, from GDPR to the US SEC rules on material incident reporting – all of which places greater responsibility and accountability on CISOs and CIOs.  

64% of ERP systems have been breached in the last 24 months 1
$4.45M Global Average Total Cost of a Data Breach 2

The Solution

The Onapsis Platform: SAP Attack Surface Management, Automation, and Compliance

Protect your most critical SAP systems with the only application security vendor in the SAP Endorsed Apps program. The Onapsis Platform combines 15+ years of cybersecurity and SAP data with automation capabilities and the in-depth threat intelligence from our Onapsis Research Labs to power our unique technology and simplify securing your complex SAP landscape.

  • Eliminate your SAP cybersecurity blindspots – from DEV to PRD
  • Align and empower your SAP and InfoSec teams
  • Reduce manual efforts and costs through security automation
  • Optimize your SAP security, minimize risk, and eliminate downtime 

Onapsis Assess: Complete SAP Vulnerability Management 

  • Get Complete Visibility into Your Entire SAP Landscape – from OnPrem to the Cloud to RISE with SAP and SAP BTP 
  • Benchmark Against Industry Peers and Map Your Security Posture with AI 
  • Identify and Remediate All Vulnerabilities, Including Issues in Custom Code 
  • Accelerate Patching with Expert Advice, Risk Prioritization, and Validation 
  • Audit Your Landscape and Eliminate Manual Efforts for Evidence Collection3

83% Reduction in Time Remediating SAP Vulnerabilities
– F500 Biopharma

Onapsis Defend: Continuous Threat Monitoring for SAP

  • See Every Threat, Suspicious Activity, and User Behavior in Real Time Across Your Landscape 
  • Protect Systems from Malicious Exploits and 0-Days (Courtesy of Pre-Patch Protection from Onapsis Research Labs) 
  • Get Instant Value Out of the Box with 2500+ Customizable Rules and Alerts 
  • Accelerate Incident Response by Integrating with SIEM/SOAR or SAP ETD 
  • Supercharge Your Network Security Stack with Onapsis Threat Rules4

75% Faster Incident Response Times
– F100 Chemicals Company

Onapsis Control: Establish Better DevSecOps for SAP

  • Eliminate Manual Reviews with Automated Scans of Millions of Lines of Code in Minutes
  • Accelerate Project Completion by Analyzing Code as You Go and Automating Fixes to Common Issues 
  • Reduce Code Repair Time and Downtime by Blocking Bad Transports 
  • Ensure the Codebase Is Clean Before Migrating to New PRD or the Cloud 
  • Scan ABAP, HANA, or Fiori-based Applications in SAP BTP for RISE with SAP Deployments 

65% Reduction in Cost for Custom Code Review
– F50 Aerospace Manufacturer


Reference

1 IDC ERP Security Report
2 IBM Cost of a Data Breach Report
3 Requires Comply Pack(s) 
4 Requires Network Detection Rule Pack

RISE Solution Brief

Onapsis Platform: RISE with SAP for Cyber-Resilience

Let Onapsis Help You Manage Your Security Responsibilities to Achieve Cost Savings and Efficiencies 

The Challenge

The RISE with SAP® program is designed to facilitate the transition to the cloud with less risk. However, that doesn’t mean zero risk for organizations and their InfoSec teams. The RISE customer owns responsibility in reducing this risk as well. Fundamentally, RISE is no different from other cloud offerings. SAP and the RISE customer operate a “shared responsibility model” for security. To move to the cloud with less risk requires joint collaborative effort from both parties in different areas of security. While SAP owns responsibility for security OF the cloud, the customer is responsible for security IN the cloud. So if SAP will not cover all security, it’s essential that RISE customers understand their responsibilities, including:

  • Quality/security of migrated or new code, all transports, & change management
  • Requesting application of “non-HotNews” Security Notes
  • All users (including third parties) their access, and behavior 
  • Security audit logging, related security issues, and incident response
  • Owning compliance and compensating controls 

Taking on these shared security responsibilities in a new environment with less control and access than before (with onPrem) creates new challenges for RISE customers that are only compounded further with accelerated project schedules, SAP landscape complexity, under-resourced teams, and ever-growing compliance pressures. 

$4.12M Average cost of a failed, delayed, scaled back digital transformation project 1
$2M Average yearly cost of fines and penalties due to non-compliance 2

The Solution

Better Manage Your RISE Security Responsibilities with Onapsis Fortunately, securing complex 

SAP landscapes during the transition to RISE and beyond doesn’t have to be complicated. That’s where Onapsis comes in. As the undisputed experts in business application security with the most prolific threat research team for SAP, Onapsis has been on the frontlines securing the world’s largest brands for over fifteen years. We have the expertise, successful track record and technology with the only cybersecurity and compliance solution endorsed by SAP to help our customers achieve both SAP cyber-resilience and cost and time savings.

With Onapsis, RISE customers can: 

  • Build in security from the start of the project 
  • Achieve SAP DevSecOps for code consistency and security to keep projects moving forward 
  • Minimize their SAP attack surface, reduce risk, and streamline compliance 
  • Continuously monitor for threats and implement compensating controls

Establish Good Code Security from the Beginning 

Eliminate Manual Reviews
Automate code security reviews wherever developers work to eliminate errors and vulnerabilities including Eclipse for SAP BTP and others 

Implement Gate Checks
Bulk scan migrated legacy code and new code and transports to prevent bad code and objects from causing issues or downtime in your RISE production environment

Validate Code from Third Parties 
Verify code security and robustness from third parties before you bring it into your production systems

“Reduced both our time and costs for reviewing code by almost 70%.”

– F500 Global Manufacturing Company

Minimize Your SAP Attack Surface & Streamline Compliance 

Prioritize and Validate Patching 
Identify which new/missing “non-HotNews” patches should be prioritized and requested from SAP and validate their successful application

Quickly Audit Configurations and User Permissions 
Ensure SAP applications and integral components, including SAP BTP, are configured securely with the right user access and authorization levels

Automate Compliance Efforts
Save valuable time by eliminating manual IT general control checks and evidence collection

“We reduced remediation time by 83%”
– F500 Bio-Pharmaceutical Company

Continuously Monitor for Threats Across New & Legacy Landscapes

Identify Suspicious User Behavior Faster 
Monitor user behavior, access, and activity for insider threats, anomalies, and potential indicators of compromise  

Detect and Mitigate Threat Actor Activity Faster 
Get the best exploit protection available, including zero-days, and empower rapid response with detailed explanations and mitigation guidance

Easily Implement Compensating
Controls Mitigate the risk of open vulnerabilities in your environment with granular monitoring and alerts to help meet regulatory requirements 


References

1 Couchbase 
2 TechRepublic