SAP Security Checklist New Updated V9
SAP Security Checklist New Updated V9
Review physical and logical network security, as this is your first Consider applying proactive retention periods, either via archiving
line of defence. or via a clean-up service like the one provided by EPI-USE Labs.
Close ports on the firewall that are not being used. Remove only the sensitive parts of data on ex-employees or
customers, or parts of a business that was divested.
Ensure that the physical backups are secure, through encryption
and/or proper access control. Design and institute security programs to ensure continuous secure
operations of SAP systems.
Transport Security: Ensure that remote access is only granted
through an encrypted means, like VPN. Encrypt data that is stored and communicated to external systems.
Cloud security: Ensure that the cloud provider infrastructure setup Secure communications between systems and parties using
is secure. Cloud service providers should ensure proper data encryption so that communication is more difficult to
isolation and logical storage segregation. intercept and decipher.
Systems should be kept up-to-date with vendor security patches. Develop a risk assessment and remediation plan, based on industry
This includes the SAP systems, which are quite often lagging behind standards like ISO 27001 and SOC2, while taking into account
in security patches. legislation like GDPR and APP. EPI-USE Labs can help with this.
Use automation where possible to create security baselines that Use automation products to conduct periodic reviews of your
can be replicated across multiple systems. system security configuration.
Read and act on the security chapter of your SAP Early Watch
Alert report and propagate the SAP Security notes through
your landscape:
Data at rest: Use storage encryption and consider preventing Use a tool such as EPI-USE Labs’ Data Secure™ to mask or scramble
the use of USBs. Ensure that archived data is encrypted and whole clients or specific data where applicable.
backups are secure.
Switch off emails in non-production systems. If testing email
Data in motion: set up network segregation/firewalls functionality in non-production systems, ensure that data is
between systems. scrambled and set to email to specific addresses only.
Data in use: unencrypted data in memory can be compromised by Perform periodic reviews of user accounts to find those that have
side-channel attacks from programs running on the same servers, not logged onto SAP systems over a certain period. Lock or expire
so ensure such data is encrypted. such accounts.
Apply two-factor authentication. This is crucial for users Perform periodic reviews of accounts to see who has access to
working remotely. which transactions, and to determine whether your users still need
to access those transactions.
Ensure that a security policy is applied to the system, such as
changing usernames and passwords. Don’t use default usernames Perform automated code reviews to ensure that custom ABAP code
or passwords. doesn’t introduce security vulnerabilities.
Segregation of Duties (SoD): locate and prevent gaps in SAP
Implement an internal security awareness and training program.
security role design that could allow users to access and exploit all
steps of a business process (for example, by being able to both
create and issue payment to a Vendor). Products such as Soterion’s
Access Risk Manager can be used to remove much of the
complexity of this task.
Data classification: Find and categorise all data in your organisation Perform an audit of roles and access rights.
(Public, Sensitive, Private, or Confidential). It is not a good approach
to try to protect all data from leakage. Rather prioritise your most Design and implement secure role designs, taking into account
sensitive data, find out where it lives, and aim to protect that. legislation like GDPR and best practices like segregation of duties.
Examples are Payroll, Personally Identifiable Information (PII) or
Mask or scramble sensitive data and thereby reduce the attack
Personal Health Information (PHI).
surface or number of places that data can be leaked from, whether
Use two-factor authentication where possible, and especially when accidentally or deliberately. EPI-USE Labs’ Data Secure™ can help
users are working remotely. with this.
Learn about current regulatory privacy policies. Remove any personal data that you do not need to keep, as this
increases your risk.
Be aware that a form of GDPR is coming to Australia soon:
Perform Data Privacy Impact Assessments (DPIA), as required by
Read this comparison of GDPR vs Australian legislation like GDPR.
Privacy Principles.
Use the proprietary Privacy Comply™ methodology to implement
Put policies and procedures in place to specify what privacy policies, standards and procedures to comply with privacy
data may be kept and for how long. legislations in multiple jurisdictions.
Proactively remove sensitive personal data that is beyond the Implement and regularly test a breach response
retention period state in your policies: and notification plan.
Train your staff members accordingly.
Set up policies and procedures similar to those of Production and
Determine which data is being held and where the apply them to non-production systems.
responsibility for this lies across the company.
Use a combination of EPI-USE Labs solutions Data Secure™, Data
“Ring fence” separate parts of the business Disclose™ and Data Retain™ where applicable:
for regulatory reasons.
Data Secure replaces sensitive data with anonymous, but fully
functional, test data – thereby removing the criminal’s ‘prize’
(your data) and the risk.
Ensure that identifiable data in non-production systems is secured, Consider a data copy and security solution that can help you to:
either through applying access control based on role
(Segregation of Duties) if the data can’t be scrambled, Maintain data compliance by scrambling and anonymising data
Scramble sensitive data. While your Dev and QA teams require fresh
test data, they do not necessarily require access to your sensitive,
private or confidential data:
Make sure that SAP* user is locked and is only unlocked in certain
circumstances (=best practice).
Keep in mind that anyone with a developer key can read data from
other clients in a system. So, for example, if there is a unit test
client on DEV, then its data is accessible to developers in the DEV
system even if they don’t have a log-on for unit test. Third parties
off-shore might also come into this category.
REQUEST
NAME:
EMAIL:
SUBMIT