It’s clear that many factors are working together to put the applications at the heart of your business at risk, but how much and in what ways? How can you identify and understand the business impact of the issues within your environment?
One of the most common tasks an SAP Basis administrator must do is confirm their SAP systems are not missing SAP Security Notes to ensure their systems are not exposed to known vulnerabilities.
SAP code is mostly written in ABAP, and it is an integral part of securing your SAP systems. ABAP developers often struggle to keep up with new and increasing changes and requirements in the fields of code security and code quality, leading to major vulnerabilities or misconfigurations within your SAP system.
Today, SAP released its monthly patch updates with several fixes, including 23 new SAP Security Notes, 2 HotNews Notes and 5 High Priority Notes.
Transports are considered an essential part of the SAP environment for day-to-day business. Used to transfer SAP content from one system to another, transports carry incredibly sensitive data, and even a secure production system can be compromised.
How do you define downtime? In the world of IT, downtime is defined as “time during which a machine, especially a computer, is out of action or unavailable for use.” In a pre-cloud or pre-SAAS era, that definition provided an acceptable description of what actually took place. Then, everything changed.
If you caught my third episode of Frugé-ology on the Onapsis LinkedIn page, then you were lucky enough to see my barbecue sauce in live-action on some freshly made burnt ends. Like the language of food, in order to become an influential CISO, you must be able to speak the language of your business.
During the SAP system lifecycle (installation, upgrade, maintenance), Basis Administrators must validate that system security setting, logging and parameters are configured correctly. This can be an extremely time-consuming task as the SAP landscape is not static; new configurations, programs, clients, instances and systems are constantly being added, all while system and client refreshes are occurring and impacting system settings.
Subscribe to our monthly newsletter, the Defender's Digest!Subscribe