Maintaining SAP’s confidentiality, integrity, and availability triad
techradar.com
Cyber attackers like to target SAP systems because of their wide use—SAP platforms are used by 99 of the Fortune 100 companies and have over 280 million cloud subscribers worldwide. Attackers know this and take advantage of SAP’s vulnerabilities.
These vulnerabilities include configuration errors, access control problems, and software bugs. There are many types of weaknesses in SAP systems and different ways to deal with them. This article will look at some common vulnerabilities you must know and, importantly, how to mitigate these SAP risks.
Mitigating Risks
The risks of not dealing with potential SAP vulnerabilities are financial loss, data loss, reputational damage, and even legal liability. Reducing these risks requires minimizing the attack surface. SAP users must continuously assess and inventory the exposed services (SOAP, WebService, APIs). Any service that is not used or does not serve a current business function should be ...
Copyright of this story solely belongs to techradar.com . To see the full text click HERE