Taking a Proactive Approach to Mitigating Ransomware Part 2: Avoiding Vulnerabilities in SAP Applications

Taking a Proactive Approach to Mitigating Ransomware Part 2: Avoiding Vulnerabilities in SAP Applications

Taking a Proactive Approach to Mitigating Ransomware Part 2: Avoiding Vulnerabilities in SAP Applications

ltabo

Wed, 12/13/2023 – 17:25

In case you missed it, in the first part of this series we talked about the importance of hardening security for the application layer as part of your proactive approach to mitigating ransomware. We know exploited vulnerabilities are the most common root cause of ransomware attacks and we also know that threat actors are actively targeting SAP applications as an entry point to enterprise systems. 

Avoiding these application vulnerabilities before they can be exploited is an essential part of a proactive ransomware strategy, as recommended by NIST and SAP (in partnership with Onapsis). However, understanding your SAP attack surface and addressing these vulnerabilities is easier said than done. Consider the following challenges:

  • Which patches should you prioritize? Given the frequency of releases, complexity of the patching process, and size of app landscapes, most organizations are facing a backlog of patches combined with under-resourced teams. How do you know where to focus your efforts?
     
  • Were your patches applied completely and correctly? Patching is typically handled by application teams or sometimes a third-party service provider. How can you validate their work? 
     
  • What v

    […]
    Content was cut in order to protect the source.Please visit the source for the rest of the article.

    This article has been indexed from Security Boulevard

    Read the original article: