SecurityBridge Unveils Its New Security Roadmap For SAP
Company Blog Details How To Decrease SAP Attack Surfaces If No Patches Are Available
- Customize their own SAP Security baselines.
- Combine information from other platform sources and the online KB.
- Obtain insights on what may be missing—new SAP severity notes.
- Jump to patch management—supplement data to a risk tool.
- Experience a 360° view of activities and detected vulnerabilities to understand the impact in SAP.
- Create incidents from a finding, containing all information to report and initiate the remediation and document the status.
Recommended AI News: Danish Retailer Søstrene Grene Selects mParticle to Bring Hygge to Omnichannel Customer Data
- Reduce the attack vectors, any connection point such as SAP Internet Communication Framework (ICF) services that are not used or needed, must be deactivated.
- Software components that do not serve a distinct purpose must be at least deactivated. For example, most SAP customers still run at least one SAP NetWeaver system where client 066 exists—this is no longer needed.
- Harden the SAP system, ensure the system is securely configured using a best practice and industry-proven security
baseline. - The recent Log4j incident and also the older RECON release, have proven that vulnerabilities exist for a long period of time without being noticed. Constant SAP system security monitoring is a key action to protect against severe damage.
Recommended AI News: Pittsburgh Drone Tech Company Provides Bridge Evaluation Resources
[To share your insights with us, please write to sghosh@martechseries.com]
Comments are closed.