25
GRC Nordic SAP User Management webinar

GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

GRC Nordic SAP User Management webinar

Page 2: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

SAP Enterprise Threat Detection

Page 3: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

Future demands …..or current already ?

Caution / Fraud / GDPR Breach

Is your SAP Security architecture meeting the demands of today ?

Your S/4 security strategy ?

Industry requirement Joint Venture Geographical risk EspionageBusiness Risk / ReputationMergers & Acquisitions Divestments

New business Collaboration Fraud GDPR

Page 4: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

SAP Security Battlefield

Prevent

Detect

IdentityDo we really focus here ?Basis of everything

Traditional area with higheffectiveness

One cannot prevent everythingLarge data amount issues

What if we fail here ?

Will we notice anything ?

We need balance

Page 5: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

PUBLIC

Arndt Lingscheid

03, 2021

Business benefits of SAP Enterprise Threat Detection

Page 6: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

2PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission o f SAP.

Except for your obligation to protect confidential information, this presentation is not subject to your license agreement or any other service

or subscription agreement with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or any related

document, or to develop or release any functionality mentioned therein.

This presentation, or any related document and SAP's strategy and possible future developments, products and or platforms directions and

functionality are all subject to change and may be changed by SAP at any time for any reason without notice. The information in this

presentation is not a commitment, promise or legal obligation to deliver any material, code or functionality. This presentat ion is provided

without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a

particular purpose, or non-infringement. This presentation is for informational purposes and may not be incorporated into a contract. SAP

assumes no responsibility for errors or omissions in this presentation, except if such damages were caused by SAP’s intentional or gross

negligence.

All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ material ly from

expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates,

and they should not be relied upon in making purchasing decisions.

Disclaimer

Page 7: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

3PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

1. Introduction

2. Why should you care

3. What is SAP Enterprise Threat Detection

4. Security Audit Log compliance

5. NIST Framework

6. Preventing Fraud & Cyber Attacks

7. Benefits of Enterprise Threat Detection

Agenda

Page 8: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

4PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

Systems are under attack

Page 9: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

7PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

SAP Enterprise Threat Detection

Enterprise Threat Detection gives transparency in to suspicious (user) behavior and anomalies in SAP business applications to identify and stop security breaches in real-time.

Enterprise Threat Detection uses highly efficient and automated processes based on HANA technology and Machine learning to track hacker activity using SAP's predefined and easy customizable attack paths.

Stop security breaches in today’s SAP S/4HANA business applications.

• Detect threats in your SAP S/4HANA applications

to avoid financial loss, legal and reputational

damage.

• Safeguard the operation of your SAP S/4HANA.

• Reduce effort for conducting audits.

• Gain transparency and simplify the analysis of

suspicious activities,

• Identify security gaps, and understand the

impact on your business.

• Analyze huge amounts of information quickly and

to take the right decision in time.

• Increasing number of hacker attacks

• Regulatory requirements for security and

compliance controls.

• Roles and Authorizations only will not protect an

SAP S/4HANA environment.

• Perimeter and IT infrastructure security is not

sufficient to protect the SAP S/4HANA business

core.

• Analyzing the huge amount of events coming from

the SAP S/4HANA Business Applications.

• Stop security breaches in today’s SAP S/4HANA

business applications.

• SAP system Transparency with respect to

Security- and Compliance-Events.

• Correlate the complete picture of an hacker

attack, not only a few small puzzle peace’s.

• Perform forensic investigations, search for threats

and detect anomalies in SAP S/4HANA

applications.

• All audit logs available in a central instance

(manipulation save, unfiltered, normalized,

readable).

Challenge Solution Benefits

Page 10: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

8PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

Security Audit Log compliance

Solution

Benefits

Challenge

➢ Complex configuration

➢ Causes performance problems

➢ Must be filtered

➢ Direct transfer of all information belonging to the

Security Audit log to SAP Enterprise Threat Detection

➢ Cannot be read by humans

➢ Cannot be searched in an efficiant way

➢ Cannot be stored for Audit purpose

➢ Manipulation safe Audit Log

➢ No additional configuration

➢ All Security Audit Log entries are available

➢ Continuous automated analysis

➢ Manual human analysis possible

➢ Audit proof at any time

Page 11: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

9PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

Processing all SAP log events in a non-SAP SIEM solution

Solution

Benefits

Challenge➢ Tremendous costs since other SIEM solutions are licensed based on the log

volume.

➢ Log implementation projects since the semantic understanding must be

implemented in SIEM solution.

➢ Use SAP Enterprise Threat Detection.

➢ License is based on monitored users.

➢ SAP delivers the semantic understanding as pre-defined patterns.

➢ SAP Enterprise Threat Detection gives transparency to the inside of the application layer out of the box.

➢ SAP Enterprise Threat Detection saves costs analyzing a huge amount of log data.

➢ SAP Enterprise Threat Detection bridges the gap between IT infrastructure monitoring an in application monitoring of the SAP applications.

Page 12: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

10PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

SAP Enterprise Threat Detection (ETD)

and generic SIEM systems

Collect and

analyze

Collect and

analyze

Database SAP HANA

SIEM SAP ETD Application Level

SAP ETD focus onSIEM solutions focus on

Database

Operating System

Network

Continue use of proven

security incident reporting

Real time monitoring of business

critical SAP applications & data+

Integration of SAP ETD with all leading SIEM solutions (HP Arcsight, IBM Q-Radar, Splunk) available

HANA Database

Application LayerIT Infrastructure

Page 13: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

11PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

NIST Framework

Asset Management

Business

Environment

Governance

Risk Assessment

Risk Management

Strategy

Supply Chain Risk

Management

Access Control

Awareness and

Training

Data Security

Information

Maintenance

Protective

Technology

Anomalies and

Events

Continuous

Security Monitoring

Detection

Processes

Response Planning

Communications

Analysis

Mitigation

Improvements

Recovery Planning

Improvements

Communications

Protect Detect Respond Identify Recover

Page 14: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

12PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

Cybersecurity- and Compliance Solutions from SAP

based on NIST

User & Identity Management

Single Sign-On

SAP Configuration Validation

SAP Focused Run

SAP System Recommendations

ABAP test cockpit & SAP Code Vulnerability Analyzer

SAP Fortify by Micro Focus

SAP Data Custodian

Access Management

UI data protection masking & logging

Architecture & Planning services Empowerment Services Execution & Implementation Services Continuous Improvement Services Security experts

SAP Standard Tool

Cybersecurity Solution

Compliance Solution

Service & Support

SAP Enterprise Threat DetectionSAP EarlyWatch Alert Managed Service via ETD

Protect Detect Respond Identify Recover

Business Integrity Screening

Page 15: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

14PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

SAP Enterprise Threat Detection

ProtectIdentify

Page 16: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

15PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

SAP Enterprise Threat Detection

280 Day‘s(206 + 73 )

Experiencing a data breach within

two years is ~ 30 percent.

ProtectIdentify

Page 17: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

16PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

SAP Enterprise Threat Detection

Experiencing a data breach within

two years is ~ 30 percent.

When are you able

to stop a breach ?

ProtectIdentify

Page 18: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

17PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

Protect

When are you able

to stop a breech ?

SAP Enterprise Threat Detection

279 Day‘s(206 + 73 )

SAP Enterprise Threat Detection

Protect Detect Respond Identify

Page 19: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

18PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

STAD Http LogChange

documentsRead access

logSAL STAD

User change

logHttp Log

Change

documents

Discover SM59

connections

QAS PROD

RFC to change

passwd

DEV PROD

Change vendor

PROD

Outgoing payments

PRODDEV

Debugging DEV System

Preventing Fraud & Cyber Attacks

System Log

01.2020 06.2020 03.2021

Page 20: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

19PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

More than 260 SAP customers worldwide in all industries protect their SAP

landscape with SAP Enterprise Threat Detection.

Many of those companies are listed within the DAX 30, DOW 30, or come e.g.

from the defense sector. But also many small and midsize customers use ETD.

SAP Enterprise Threat Detection is supported by the world leading auditing

companies.

We have implementation partners in many regions of the world.

Partners are e.g.:

SAP Enterprise Threat Detection

• Ernst & Young,

• KPMG,

• Turnkey,

• IBS Schreiber,

• Asconsit,

• PWC,

• SAPNS2,

• Deloitte

• Accenture,

• Infosys,

• Xiting…

Page 21: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

20PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

How does SAP Enterprise Threat Detection work

Evaluate

Automatically evaluate

attack detection patterns

with real-time alerting

Investigate

Forensic analysis and modeling of

existing and new attack detection

patterns and dashboards

Integrate

Integration of SAP and

non-SAP log data

Analyze

Efficiently enrich, analyze,

and correlate logs Cybersecurity and Data

Protection

Page 22: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

21PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

• Forensic Analysis, Threat Hunting, Anomaly detection

• All SAP logs unfiltered, normalized, readable to be used by Audit

• Analysis of Read access logging logs, SOAP based web services

logs, UI Logging Logs

• Any log type can be added

• Continuous automated detection, analyze and neutralize cyber-

attacks in real time

• Real time manipulation save data transfer to Enterprise Threat

Detection

• Look at all log types and correlate the complete picture, not only a

few small puzzle peace’s

• Analysis of e.g.: What else did the user do?

• Generic approach (not based on fix test cases)

Unique benefits of Enterprise Threat Detection

Page 23: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

22PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀPartner

SAP Enterprise Threat Detection

Page 24: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

23PUBLIC© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ

Contact information:

▪ Arndt Lingscheid

▪ Solution owner GRC & Cyber Security

▪ SAP SE Dietmar-Hopp-Allee 16, 69190 Walldorf, Germany

Mobile: +49 160 90 84 11 88

Thank you.

Page 25: GRC Nordic SAP User Management · 2021. 3. 16. · NIST Framework 6. Preventing Fraud & Cyber Attacks 7. Benefits of Enterprise Threat Detection ... security incident reporting Real

© 2020 SAP SE or an SAP affiliate company. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of

SAP SE or an SAP affiliate company.

The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its

distributors contain proprietary software components of other software vendors. National product specifications may vary.

These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or

warranty of any kind, and SAP or its affiliated companies shall not be liable for errors or omissions with respect to the materials.

The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty

statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional

warranty.

In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or

any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation,

and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platforms, directions, and

functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason

without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or

functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ

materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, and they

should not be relied upon in making purchasing decisions.

SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered

trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names

mentioned are the trademarks of their respective companies.

See www.sap.com/copyright for additional trademark information and notices.

www.sap.com/contactsap

Follow us