Cloud 101CircleEventsBlog
Get 50% off the Cloud Infrastructure Security training bundle with code 'unlock50advantage'

How to Leverage the NIST Framework for a More Effective SAP Security Strategy

Published 09/13/2022

How to Leverage the NIST Framework for a More Effective SAP Security Strategy

Originally published by Onapsis here.

Business applications like SAP are responsible for running the enterprise, powering operations and fueling the global economy. Considering 77% of the world’s transactional revenue touches an SAP system and 92% of the Forbes Global 2000 uses SAP, a successful attack on unprotected SAP applications could have far-reaching consequences. However, traditional defense-in depth security models don't sufficiently protect the application layer. This means that applications like SAP are often excluded from existing cybersecurity programs. Traditionally, security and IT teams believed business applications to be “safe” from threat actors due to being on-premises, behind network protection, and therefore out of reach for attackers. That is no longer the case. Threat actors are increasingly targeting the application layer directly. These cybercriminals have the motivation, means, and expertise to identify and exploit unprotected business-critical SAP applications—and are actively doing so.

Strong Business Application Security Starts With Alignment to a Cybersecurity Framework

Alignment to a cybersecurity framework can help organizations assess and improve their ability to prevent, detect, and respond to cyberattacks. There are a number of different cybersecurity frameworks used by organizations around the world, each one of them a foundational set of best practices, standards, and guidelines to follow in order to better manage risk in an organization’s environment. National Institute of Standards and Technology (NIST) developed the NIST Cybersecurity Framework, one of the most comprehensive and adaptable cybersecurity frameworks to date. The goal of the NIST framework is to use business drivers to guide cybersecurity activities as well as consider and include cybersecurity risks as part of the organization’s overall risk management process.

An important part of the NIST Cybersecurity Framework is the focus on the application security layer, which, as noted above, has become a target for attackers. Based on this, SAP created the SAP Secure Operations Map, to provide SAP customers with a toolkit for creating a comprehensive security strategy that meets their unique needs. Securing business applications is an essential component of implementing that larger strategy of defending against threats and better managing risk across an organization.

Four Best Practices to Align Your SAP Applications With the NIST Framework

Leveraging the NIST Framework best practices can help teams eliminate blind spots and have a more secure, compliant environment for SAP systems.

1. Treat SAP applications like operational technology critical infrastructure

For many organizations, current approaches and tools don’t adequately support the application layer, making it difficult to build successful programs for these applications like they have done for other enterprise systems. Business-critical applications like SAP keep the business running, so it's essential that they are treated with the same level of urgency as other operational technology. This means having processes in place in three key areas: vulnerability management, threat detection and response, and application security testing.

2. Be thorough with SAP security hardening and patch management

Given the frequency and volume of patch releases, complexity of the patching process, and size of application landscapes, organizations have the potential to face a growing backlog of patches. A manual patch management process can have organizations stuck in a continuous loop of relying on manual efforts to identify which systems are missing which patches, which missing patches to prioritize, and whether or not patches were applied. Our recent threat intelligence report found critical SAP vulnerabilities being weaponized less than 72 hours after a patch was released. But, the time from when a vulnerability is found to when a patch is deployed is a lot longer; the average time to apply, test, and fully deploy a patch is 97 days1. Having an automated patch management process can minimize the risk of critical vulnerabilities and protect the business’ most important assets.

3. Incorporate business-critical applications completely into your vulnerability management program

Traditional vulnerability management tools don’t sufficiently support business-critical applications, resulting in reliance on manual security reviews and potentially rushing or skipping security due diligence all together. Threat actors can exploit vulnerabilities from system configurations, user settings, custom code, and missing patches to gain access to your critical SAP systems. Finding and remediating these vulnerabilities before they can be exploited is essential to protecting your SAP environment. The right application-based vulnerability management solution can provide organizations with deep visibility into the application landscape, automate assessments, and reduce remediation times for teams to achieve a greater risk reduction with less effort.

4. Build SAP security into your software development process to get ahead of introducing new vulnerabilities and risk

Application security testing enables organizations to build security into development processes to find and fix issues as quickly as possible. Fixing issues before they hit production is typically easier and less expensive, and helps avoid negative impacts to system security, compliance, performance, or availability. An application security testing tool that supports SAP systems can help narrow the gap between developers and the security team and provide visibility and security into the development lifecycle.

With a solid cybersecurity framework and a solution tailored to business applications, your organization can better secure your business applications and mitigate risk.

Share this content on your favorite social network today!