Volume V: Our Crown Jewels Online – Attacks targeting SAP Web Applications
Please complete the registration form in order to download the publication. We will send you an email with your download link.
While the comment, SAP platforms are only accessible internally, was true in many organizations more than a decade ago, today, driven by modern business requirements for interconnectivity, SAP systems are very often connected to the Internet. This scenario dramatically increases the universe of possible attackers, as malicious attackers can remotely try to compromise the organization's SAP platform.
SAP provides different Web technologies, such as the Enterprise Portal, the Internet Communication Manager (ICM) and the Internet Transaction Server (ITS), which may be prone to specific security risks.
This issue analyzes possible attack vectors to SAP Web components and the mitigation measures that need to be taken in order to prevent them. This information will enable organizations to better protect their business-critical infrastructure against cyber-attacks performed over Web scenarios.