At Onapsis, we’re not only solution leaders—we’re also thought leaders. Here you’ll find a growing library of materials to help you build your cyber resilience strategy. The more light we can shed on business-critical application security and compliance, the better you can drive your business forward, confidently.

Volume V: Our Crown Jewels Online – Attacks targeting SAP Web Applications

Please complete the registration form in order to download the publication. We will send you an email with your download link.

While the comment, SAP platforms are only accessible internally, was true in many organizations more than a decade ago, today, driven by modern business requirements for interconnectivity, SAP systems are very often connected to the Internet. This scenario dramatically increases the universe of possible attackers, as malicious attackers can remotely try to compromise the organization's SAP platform.

SAP provides different Web technologies, such as the Enterprise Portal, the Internet Communication Manager (ICM) and the Internet Transaction Server (ITS), which may be prone to specific security risks.

This issue analyzes possible attack vectors to SAP Web components and the mitigation measures that need to be taken in order to prevent them. This information will enable organizations to better protect their business-critical infrastructure against cyber-attacks performed over Web scenarios.

Request a
Business Risk Illustration


Prevent application downtime and costly business disruption

Request an Assessment

Eliminate resource consuming manual audit processes

Request an Assessment

Reduce vulnerabilities and misconfiguration to protect the business

Request an Assessment