Security Researcher: IT Managers Urged to Keep up with SAP Patches
Companies are vulnerable to espionage, sabotage and fraud, but often don't realize they are
SAP is working very hard on security and they are good at it, but customers need to keep upJuan Perez-EtchegoyenCTO, Onapsis
More than 95 percent of over 600 SAP systems tested by security firm Onapsis were vulnerable to espionage, sabotage and fraud, mainly because patches had not been applied, according to a researcher.
Attackers targeting SAP platforms don't need access credentials to perform these attacks, said Juan Perez-Etchegoyen, CTO of Onapsis, a U.S. security firm with research and development in Argentina, that is focused on ERP systems and business-critical infrastructure. Perez-Etchegoyen made his remarks at the Hack in the Box conference in Amsterdam on Thursday.
Global companies, governments and defense agencies use SAP to manage everyday tasks like financial planning, managing payrolls and logistics, he said. If SAP platforms are breached intruders are able to access customer data, paralyze the company by shutting down the system or modify financial information for fraud purposes, he added.
"The problem is that companies don't know the risk," Perez-Etchegoyen said, adding that SAP systems hold the data that is sensitive and important for companies.
The main reason companies that use SAP are vulnerable is because they don't apply patches, and in that way leave their systems exposed, he said.
The main reason companies that use SAP are vulnerable is because they don't apply patches, and in that way leave their systems exposed
"SAP is working very hard on security and they are good at it, but customers need to keep up," Perez-Etchegoyen emphasized. It is not always easy to keep up with the patches because most SAP implementations are highly customized, he said. This means that with every patch the IT department has to do extensive testing to make sure their systems keep working smoothly, he said.
One of the vulnerable parts of SAP implementations highlighted during his talk was the Solution Manager, a component required for every implementation and a central point for the administration of the systems, he said during his presentation.
The Solution Manager itself does not hold any business data but can be used to influence connected systems, he said, adding that the Solutions Manager typically is connected to several SAP systems the company runs. Attackers can compromise connected systems through the Solutions Manager, he said.
While most systems tested by Onapsis' penetration tests are vulnerable to attack, it is not surprising that there aren't many big SAP system breaches known to the public, according to Perez-Etchegoyen. "There are breaches," he said, but if companies know their systems have been breached they are not likely to disclose it. Bad PR is one of the reasons they won't do that, he said adding that sometimes companies just don't know they have been breached.
The most important thing that users can do to make their SAP implementations secure is to keep checking for patches and make sure their services configurations are correct, Perez-Etchegoyen said.
Optus Business has partnered Microsoft to offer enterprise and government customers an Azure enabled solution on the software giant's Cloud OS network.
Trends such as mobility, security, the Internet of Things, and Big Data all have one thing in common – they drive huge amounts of data. And to manage that volume of data, storage is critical, according to NetApp A/NZ managing director, Steve Manley.
A long forgotten community of mobile users with little interest in touch screens, apps and 4G networks are quietly paying around $1.7 billion per year to telcos more focused on wooing high spending smartphone users.
Google plans to serve most of its ads over encrypted HTTPS connections by the end of June, a move that will protect against some ad hijacking attacks and will encourage website owners to enable encryption on their Web properties.