How AI Can Advance Your SAP Security Posture
Posted: Tuesday, Mar 05

i 3 Table of Contents

How AI Can Advance Your SAP Security Posture

Since the rise of ChatGPT,ย weย have seenย new use cases for artificial intelligence (AI) in todayโ€™s operationsย almost everyย day. This trend isย certainlyย alsoย impactingย the cybersecurity domain as IT threats areย increasing in alignment with theย number of cyberattacks.ย However,ย the frequency of attacksย not onlyย increased,ย but the attackย strategiesย haveย also becomeย more sophisticatedย asย the recentย MGM Grand/Caesarโ€™s breachย revealed. The question is,ย howย doย weย protect IT systems against such threats, and howย canย AIย support us in this case?

The SAP Security community is also seeking answers to this question. As an obvious first step, AI can support SIEM and other monitoring systems by finding critical activity patterns in the giant amount of event logs created every minute in todayโ€™s SAP environments. However, not every critical activity is malicious. SAP Security teams must have a good understanding of their normal state within their specific landscape, including custom development, to establish a strict regime for leveraging superuser rights and privileged user access in SAP applications. Only then can they lower the โ€œbackground noiseโ€ of accepted critical events to an extent that creates a realistic chance for identifying malicious activities.

SAP Systemโ€™s Resilience Is Often Quite Low

However, I experienced a different situation when implementingย SAPย securityย for customers. I am often surprised to see how many critical alerts and findings are popping up right after initializing event monitoring, vulnerability scan of theย SAPย system and custom code. As many customers are also challenged with monthly system patching, which causes red alerts, ourย SAPย securityย experts must often diagnose quite a low resilience level of theย SAPย system. In such cases, even simple attack scenarios would have a good chance of being successful, or worse, remain undetected.

The combination of a low resilience level and a high amount of critical monitoring events even during normal operations, makes it almost impossible for SOC teams to respond to cyberattacks promptly. Even with the usage of an AI-based approach, the number of false positives would be too high in a system landscape with such a wide attack surface like SAP, making it a challenge to be in control of the situation. Due to the complexity of underlying technologies and the variety of customizations, an SAP system is impossible to defend if not properly hardened. Therefore, I recommend system hardening as a prerequisite for any AI-driven SAP Security strategy.

AI for Detecting SAP Vulnerability Exploit Chains

A Threat Detection solution forย SAPย powered byย AIย canย be very powerful, especially for detecting cyberattacks that areย chaining multiple medium or lowย SAPย vulnerabilities. As most security remediation strategies prioritize the high and very high vulnerabilities due to resource constraints, successful attacks often exploit a chain of โ€œleftoversโ€.ย ย AI can help detect these SAP security threats, but it only can unfold its full power within a hardened SAP system and SAP Operations that embrace the principle of least user authorizations.

From SecurityBridge

Christoph Nagy
Christoph Nagy has 20 years of working experience within the SAP industry. He has utilized this knowledge as a founding member, and CEO at SecurityBridgeโ€“a global SAP security provider, serving many of the world's leading brands and now operating in the U.S. Through his efforts, the SecurityBridge Platform for SAP has become renowned as a strategic security solution for automated analysis of SAP security settings, and detection of cyber-attacks in real-time. Prior to SecurityBridge, Nagy applied his skills as a SAP technology consultant at Adidas and Audi.
Share This