Integrated Risk Management
Through the application of technology and automation, we'll help you manage your risks efficiently and effectively across the entire enterprise.
Identity and Access Management
We'll help you ensure everybody within your organisation has access to the right systems and data, for the right reasons, and at the right time.
Cyber & Application Security
Our experts will uncover security weaknesses within your security design and business-critical applications. Helping you protect your organisation from both internal and external threats.
Bedrock Managed Service
Scalable support and on-demand expertise that seamlessly integrates with your existing operations.
About us
A group of passionate individuals with a shared purpose to help the world's leading companies embrace best practices for GRC and risk management.
Partners
Turnkey's strategic partner network consists of selected organisations that complement our capabilities.
Corporate Social ResponsibilityCSR
We are committed to being agents for change through our Climate Action Plan, championing diversity in our workplaces, and more.
Get in touch
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Careers
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Webinars & eBooks
All of Turnkey's webinars, guides and other insights available in one place.
Blogs
Read the latest insights from our experts on GRC and risk management, covering the latest industry topics.
Press Coverage
See all the publications where Turnkey, our experts and our successes have been noted.
Key events
See the key industry conferences on GRC, SAP security and risk management which we are attending.
Case Studies
Client satisfaction is of the utmost importance to us, and we strive to constantly deliver above expectations, going the extra mile at every opportunity.
14 December 2021

False sense of security: external threat to SAP is more than you think

Did you know that only one in seven SAP customers think external attacks are the greatest threat to their SAP systems? And that half think SAP is better protected because it sits within their internal network?

These surprising misconceptions were uncovered in a recent SAP Security Report, compiled by Turnkey Consulting, Legion Star and Onapsis. For businesses that use SAP, they suggest a worrying complacency that leaves them open to considerable risk if attacked by cyber-criminals who are increasingly sophisticated and well-resourced.

In this blog, we’ll take a closer look at the scale of the problem, and what businesses can do to protect themselves against external attacks.

Why has the threat increased?

There are a number of different factors at play here, and if anything, the COVID-19 pandemic hasn’t helped matters. At face value, it might seem like the acceleration in digital transformation that so many businesses have undergone is a positive: customers are getting better, digitally-led experiences and employees are able to benefit from the flexibility of working from home.

However, the speed at which businesses have been innovating has not been matched with similar progress in security provision. With so many business-critical and public-facing systems and applications hosted in the cloud, some organizations haven’t sufficiently adjusted their security to cover their new set-up, and are at major risk as a result.

The increase in people connecting to SAP while working from home means it’s now more exposed to the public Internet than ever before. At the same time, well-known yet unpatched SAP vulnerabilities are now being targeted by cybercriminals, who are devoting more time and resources to malicious activity hoping to infiltrate the SAP estate.

Recent Onapsis research has revealed the scale of this activity, including that:

  • There are more than 300 automated exploitations, leveraging seven specific attack vectors
  • Critical SAP vulnerabilities are being weaponized within 72 hours of a patch being released
  • Unprotected SAP applications in the cloud are being compromised within three hours of their creation

"The SAP Threat Landscape has dramatically changed recently," said Sebastian Bortnik, Director of Research at Onapsis. "The Onapsis Research Labs have been at the forefront of monitoring and researching it for over a decade, and the amount of public exploits and vulnerabilities that have arisen rapidly in the last few years has been extremely concerning. Through our sensors in the Onapsis Threat Intelligence Cloud, we have confirmed that threat actors are actively exploiting those vulnerabilities in real life, confirming our troubling observations. Protecting SAP environments isn't more complex than before, but it is more relevant and requires more urgent attention now than ever before."

The impact of an external attack

Should an external attack be successful, the attacker would have full and unrestricted access to the SAP system in question, along with the underlying business data and processes. This means every piece of data within the system could be read, modified or deleted by the attacker. Potential ramifications include (but are not limited to):

  • Personal data and business-sensitive data being stolen
  • Banking details being accessed and tampered with
  • Supply chain disruption through data corruption or the installation of ransomware
  • Exfiltration of intellectual property

All of these consequences will cause major headaches around compliance, on a number of different fronts. For example, unauthorized access to protected data would breach data privacy regulations like GDPR or CCPA, even if the data isn’t exfiltrated. Additionally, changes to financial data, or a bypassing of controls leading to inaccurate reporting, would breach financial reporting regulations like Sarbanes-Oxley. 

Nabeel Nizar, CTO at Legion Star, said this about how their clients are remaining secure: "At Legion Star, we’re seeing an uptick in clients performing risk assessments to help lower their cyber insurance premiums. By addressing NIST & Cybersecurity controls for configuration & patch management, Onapsis helps clients secure & protect their intellectual property & financial data across their mission-critical applications like SAP"

Ultimately, the presence of vulnerabilities and misconfigurations that would enable unauthenticated access, or the creation of high-privileged user accounts, would represent a major deficiency in IT controls. Such a deficiency would fail an audit and violate compliance requirements for those businesses where compliance is mandated.

The knock-on impact of a violation like this could also be highly expensive, with security breaches often leading to third-party audits and financial penalties (along with potential further legal action).

In summary

The first thing organizations should do to make sure they’re better protected from external threats is to ensure their SAP systems are fully patched. Regular checks should be undertaken to see if any new patches have been released, and then promptly installed accordingly if so.

Going further, there are three other strategies that can make a significant difference to SAP security:

  • Implement a vulnerability management program for SAP: finding and remediating any vulnerabilities before threat actors have a chance to access and exploit them
  • Build application security testing into development processes: find and resolve issues in the shortest possible time, and before production, so that expensive fixes further down the line can be avoided
  • Involve security in your project lifecycle: try to bring the CISO into your SAP transformation, or your SAP estate into the CISO discussions - especially with regard to projects which change either the hosting or end-user entry points to business-critical estates.
  • Continuously monitor for internal and external threats: spotting malicious or suspicious activity earlier makes it much easier to prevent serious consequences

Download the full 2021 SAP Security Survey Report from Turnkey, Onapsis and LegionStar to see all the results from their SAP Security Survey, and further insights into how SAP customers can protect themselves from external threats.