<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Blog - Layer Seven Security</title>
	<atom:link href="http://www.layersevensecurity.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.layersevensecurity.com/blog/</link>
	<description></description>
	<lastBuildDate>Wed, 29 Apr 2026 20:47:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.layersevensecurity.com/wp-content/uploads/2026/02/favicon-1.png</url>
	<title>Blog - Layer Seven Security</title>
	<link>https://www.layersevensecurity.com/blog/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>From SAP Logs to Security Intelligence: Integrating SAP with Splunk</title>
		<link>https://www.layersevensecurity.com/from-sap-logs-to-security-intelligence-integrating-sap-with-splunk/</link>
		
		<dc:creator><![CDATA[Layer Seven Security]]></dc:creator>
		<pubDate>Wed, 29 Apr 2026 20:14:48 +0000</pubDate>
				<category><![CDATA[SAP-SIEM Integration]]></category>
		<guid isPermaLink="false">https://www.layersevensecurity.com/?p=17361</guid>

					<description><![CDATA[<p>Splunk is one of the world’s most widely used platforms for collecting, indexing, and analyzing data from across enterprise environments, including servers, applications, cloud services, and network devices. It is commonly used by security operations teams as a Security Information and Event Management (SIEM) platform to centralize log data, correlate events, detect threats, investigate incidents, [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/from-sap-logs-to-security-intelligence-integrating-sap-with-splunk/">From SAP Logs to Security Intelligence: Integrating SAP with Splunk</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Splunk is one of the world’s most widely used platforms for collecting, indexing, and analyzing data from across enterprise environments, including servers, applications, cloud services, and network devices. It is commonly used by security operations teams as a Security Information and Event Management (SIEM) platform to centralize log data, correlate events, detect threats, investigate incidents, and accelerate response.</p>



<p>For organizations that rely on both SAP and Splunk, integrating SAP security logs with Splunk is an important step toward achieving unified enterprise threat detection for Security Operations Centers (SOC). However, direct integration is challenging due to the complexity of multiple SAP log sources, inconsistent log formats, high raw data volumes, ongoing maintenance demands, increased storage and licensing costs, and limited native enrichment for effective cross-platform threat correlation. As a result of the challenges detailed below, SOC teams often struggle to successfully connect SAP endpoints with Splunk.</p>



<p><strong>Complexity of SAP log sources</strong></p>



<p>SAP systems generate security-relevant events across multiple logs, including the Security Audit Log, Gateway Server Log, HTTP Log, System Log, Transaction Log, Change Document Log, and Read Access Log, as well as logs for HANA, BTP, Java, and other solutions. This makes direct integration with Splunk complex, especially across large SAP landscapes.</p>



<p><strong>Lack of standardized log formats</strong></p>



<p>SAP logs differ in format, structure, and storage method. Some logs are file-based, while others are stored in SAP tables. This creates challenges for consistent parsing, normalization, and ingestion into Splunk.</p>



<p><strong>High log volume</strong></p>



<p>Large SAP environments can generate very high volumes of raw log data. Transmitting this data to Splunk can increase network bandwidth usage, storage requirements, and SIEM licensing costs.</p>



<p><strong>Integration maintenance burden</strong></p>



<p>Organizations must maintain multiple integration points between SAP systems and Splunk. This includes managing connectivity, log collection, parsing rules, data retention, and archiving.</p>



<p><strong>Limited enrichment in native SAP logs</strong></p>



<p>Many SAP logs do not include the context needed for effective correlation in Splunk, such as source IP addresses, destination IP addresses, user context, system context, or business process details.</p>



<p><strong>Difficult cross-platform correlation</strong></p>



<p>SOC teams may struggle to correlate SAP activity with non-SAP telemetry from endpoints, networks, cloud platforms, identity systems, and other enterprise security tools.</p>



<p><strong>Scalability challenges in large SAP landscapes</strong></p>



<p>The complexity increases significantly when organizations need to integrate logs from multiple SAP systems, environments, applications, and instances.</p>



<p><strong>Cost control</strong></p>



<p>Sending large volumes of raw SAP log data into Splunk can increase infrastructure, storage, and licensing costs.</p>



<p><strong>Operational noise</strong></p>



<p>Raw SAP logs can contain large amounts of low-priority or repetitive events. Without filtering, normalization, and enrichment, SOC teams may face alert fatigue and reduced detection efficiency.</p>



<p><strong>Reduced investigation efficiency</strong></p>



<p>When SAP logs are incomplete, inconsistent, or difficult to correlate, analysts may need to manually investigate events across multiple SAP tools and Splunk searches, slowing incident response.</p>



<p>A further challenge is the lack of predefined rules in Splunk to detect SAP-specific threats. Splunk may centralize SAP logs, but it does not provide the intelligence required to interpret SAP events in the logs to identify threats. As a result, SOC teams often develop and maintain their own SAP-specific detection rules, despite lacking the specialized SAP security expertise required to do so effectively. This can lead to security blind spots and reduce the ability to successfully detect SAP threats.</p>



<p>These challenges can be addressed by integrating SAP logs with Splunk using the <a href="https://www.layersevensecurity.com/cybersecurity-extension-for-sap/" target="_blank" rel="noreferrer noopener">Cybersecurity Extension for SAP </a>(CES). CES provides more than 1,200 out-of-the-box patterns for identifying threats in SAP solutions, enabling SOC teams to monitor SAP logs immediately without investing extensive time and effort in building and maintaining custom detection rules. It delivers the SAP-specific intelligence needed to interpret log activity in Splunk, while monthly updates keep detection content aligned with new threats and vulnerabilities affecting SAP solutions. CES generates and forwards alerts to Splunk in real time, and filters, normalizes, and enriches data before it reaches Splunk. This provides a simpler, faster, and more effective approach for integrating SAP security events with Splunk.</p>



<p>Data can be streamed from CES to Splunk using either the Universal Forwarder or Heavy Forwarder for Splunk. Both are software log collection agents. The Universal Forwarder is a more lightweight agent than the Heavy Forwarder and therefore consumes fewer system resources. The Heavy Forwarder can parse, transform, and even index data locally. However, these functions are not required by CES. The Heavy Forwarder requires higher resources than the Universal Forwarder. As an alternative to the Forwarders, data can be forwarded from CES to Splunk via Syslog (rsyslog). This method may be required if it is not possible to install the Universal Forwarder on the target SAP server.</p>



<p>Once the agent is installed and configured in the host for CES, it will stream data from CES to Splunk. The next step is to create an index in Splunk for CES. An index is a logical storage location where Splunk stores incoming data after it has been ingested and processed. When Splunk receives log or event data, it breaks the data into searchable events and stores them in the target index. Users can query the index to find, analyze, correlate, and report on data.</p>



<p>The final step is to install the Splunk app for the Cybersecurity Extension for SAP. Splunk apps are addons that include predefined data models, configurations, dashboards and reports for specific use-cases. They help to accelerate deployment, reduce operational effort, and improve adoption. The Splunk app for CES is installed as a .tgz package using either the Splunk Web Interface or Command Line Interface (CLI).&nbsp; Once installed, you can access the app from the Splunk App menu.</p>



<p>The app parses the data from the CES index and provides preconfigured dashboards to analyze and manage results. The results are structured into three domains: Alerts, Vulnerabilities, and Security Notes. Each domain can be analyzed separately. Alerts are based on pattern matches for threat detection rules applied by CES. Rules can be tuned using exclusion rules in CES to reduce noise and false positives. They can be analyzed and filtered based on date, time, system, environment, priority, and other criteria. Vulnerabilities are system and user-related security weaknesses in SAP solutions detected by CES based on daily automated security scans using a library of 3000+ SAP-related checks. &nbsp;Security notes are relevant, unapplied security patches calculated by CES. The app tracks the implementation status of security notes across SAP systems.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="776" src="https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01-1024x776.png" alt="" class="wp-image-17362" srcset="https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01-1024x776.png 1024w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01-300x227.png 300w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01-150x114.png 150w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01-768x582.png 768w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01.png 1249w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>The app enables users to drill down from summary tiles and dashboards into detailed results for alert triage. These detailed results provide the context needed to answer the five Ws of security alerts:</p>



<p><strong>Who</strong><br>Identifies the user, service account, role, host, IP address, or system involved.</p>



<p><strong>What</strong><br>Describes the activity that occurred, such as a failed login, privilege change, suspicious command, vulnerable function call, data access, configuration change, or policy violation.</p>



<p><strong>When</strong><br>Shows when the event occurred, including the date, time, timezone, frequency, and whether the activity took place inside or outside normal operating hours.</p>



<p><strong>Where</strong><br>Identifies where the event occurred, such as the SAP system, client, application server, database, endpoint, cloud service, network segment, source location, or destination system.</p>



<p><strong>Why</strong><br>Explains the risk, business impact, and recommended investigation steps.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="831" src="https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02-1024x831.png" alt="" class="wp-image-17363" srcset="https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02-1024x831.png 1024w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02-300x244.png 300w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02-150x122.png 150w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02-768x623.png 768w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02.png 1227w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Status changes for alerts, vulnerabilities, and security notes are synchronized between CES and Splunk, ensuring that Splunk results remain current and reflect updates made by administrators in CES. Results are refreshed at regular intervals to further strengthen synchronization between the two solutions. The refresh rate can be adjusted to meet each organization’s specific requirements.</p>



<p>Integrating SAP logs with Splunk is more than a technical exercise. It is an opportunity to extend enterprise security monitoring to the systems that support an organization’s most critical business processes. By using CES to detect, filter, normalize, enrich, and forward SAP security events to Splunk, organizations can reduce integration complexity, lower operational overhead, and provide SOC teams with the SAP-specific intelligence needed to detect and respond to threats more effectively. The result is a faster, more scalable, and more actionable approach to SAP threat monitoring in Splunk.</p>
<p>The post <a href="https://www.layersevensecurity.com/from-sap-logs-to-security-intelligence-integrating-sap-with-splunk/">From SAP Logs to Security Intelligence: Integrating SAP with Splunk</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SAP Security Notes, April 2026</title>
		<link>https://www.layersevensecurity.com/sap-security-notes-april-2026/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 17:10:18 +0000</pubDate>
				<category><![CDATA[Advisories]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9398</guid>

					<description><![CDATA[<p>Hot news note 3719353 patches a critical SQL injection vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse. The vulnerability arises from insufficient authorization checks for user uploads in a specific ABAP program. The fix included in the note deactivates executable code within the ABAP program, preventing any execution pathway. With the code [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-april-2026/">SAP Security Notes, April 2026</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hot news note <a href="https://me.sap.com/notes/3719353" target="_blank" rel="noreferrer noopener">3719353</a> patches a critical SQL injection vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse. The vulnerability arises from insufficient authorization checks for user uploads in a specific ABAP program. The fix included in the note deactivates executable code within the ABAP program, preventing any execution pathway. With the code disabled, the program cannot be invoked or executed by users. Access to authorization object S_GUI with activity 60 can be restricted as a workaround.</p>



<p>Note <a href="https://me.sap.com/notes/3731908" target="_blank" rel="noreferrer noopener">3731908</a> addresses a high-risk missing authorization check in SAP ERP and S/4HANA. The vulnerability can be exploited to overwrite ABAP reports and impact the availability of the reports. Access to the vulnerable programs RGJVCORG and RGJVCORX can be restricted using authorization groups as a workaround.</p>



<p>Missing authorization checks in S/4HANA are also addressed by several lower priority security notes released in April including <a href="https://me.sap.com/notes/3703813" target="_blank" rel="noreferrer noopener">3703813</a>, <a href="https://me.sap.com/notes/3715177" target="_blank" rel="noreferrer noopener">3715177</a>,  <a href="https://me.sap.com/notes/3715097" target="_blank" rel="noreferrer noopener">3715097</a>, <a href="https://me.sap.com/notes/3711682" target="_blank" rel="noreferrer noopener">3711682</a>, <a href="https://me.sap.com/notes/3530544" target="_blank" rel="noreferrer noopener">3530544</a> and <a href="https://me.sap.com/notes/3716767" target="_blank" rel="noreferrer noopener">3716767</a>.</p>



<p>Note <a href="https://me.sap.com/notes/3692004" target="_blank" rel="noreferrer noopener">3692004</a> provides a fix for an Open Redirect vulnerability in SAP NetWeaver Application Server ABAP. The vulnerability can be exploited by attackers to redirect users to web pages through malicious URLs.</p>



<p>Note <a href="https://me.sap.com/notes/3680767" target="_blank" rel="noreferrer noopener">3680767</a> addresses an information disclosure vulnerability in SAP Human Capital Management (HCM) for SAP S/4HANA that could lead to the leakage of sensitive information.</p>



<p>Note <a href="https://me.sap.com/notes/3730639" target="_blank" rel="noreferrer noopener">3730639</a> patches an information disclosure vulnerability in SAP HANA Cockpit and HANA Database Explorer that could lead to the compromise of the mutual SSL/TLS (mTLS) for X.509 Certificates.</p>



<p>Note <a href="https://me.sap.com/notes/3719397" target="_blank" rel="noreferrer noopener">3719397</a> fixes a code injection vulnerability impacting the Web Dynpro runtime in SAP NetWeaver Application Server Java. The vulnerability can be exploited to compromise user sessions and execute arbitrary client-side code.</p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-april-2026/">SAP Security Notes, April 2026</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Now on SAP BTP: Access the Cybersecurity Extension for SAP on SAP Build Work Zone</title>
		<link>https://www.layersevensecurity.com/now-on-sap-btp-access-the-cybersecurity-extension-for-sap-on-sap-build-work-zone/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 18:36:40 +0000</pubDate>
				<category><![CDATA[SAP Cloud Security]]></category>
		<category><![CDATA[SAP Security Solutions]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9386</guid>

					<description><![CDATA[<p>The Cybersecurity Extension for SAP provides an SAP Fiori user experience that is usually deployed using the embedded Fiori model. The embedded model combines backend and frontend components in the same system. The model reduces landscape complexity, removes external communication for service calls, and can improve response times and stability. From an operations perspective, the [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/now-on-sap-btp-access-the-cybersecurity-extension-for-sap-on-sap-build-work-zone/">Now on SAP BTP: Access the Cybersecurity Extension for SAP on SAP Build Work Zone</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cybersecurity Extension for SAP provides an SAP Fiori user experience that is usually deployed using the embedded Fiori model. The embedded model combines backend and frontend components in the same system. The model reduces landscape complexity, removes external communication for service calls, and can improve response times and stability. From an operations perspective, the embedded model usually means fewer systems to maintain, monitor, and secure. It also simplifies lifecycle management, because Fiori components are deployed together with the backend environment in the same system instead of being maintained on a separate hub.</p>



<p>The downside of the embedded model is that frontend applications are constrained by the limitations of backend systems. This can hold back innovation and the adoption of new capabilities in SAP Fiori applications. For example, the use of Horizon themes in SAP Fiori for a more consistent, unified user experience aligned with SAP cloud services is only possible with higher versions of SAPUI5. Solutions such as ECC cannot support Horizon themes with the embedded model.</p>



<p>SAP BTP overcomes the limitations of the embedded model by providing a separate cloud-based platform for Fiori applications that is not constrained by backend SAP systems. This not only supports improvements for the user experience, it also aligns with SAP’s strategy for a clean core by moving customizations from SAP systems to cloud extensions. A clean core leads to more stable SAP environments that are easier to maintain and upgrade.</p>



<p>Deploying Fiori applications to SAP BTP also enables organizations to benefit from services available in SAP AI Core and Generative AI Hub for AI-driven analysis, predictive capabilities, and workflows. This includes capabilities such as intelligent summaries, faster identification of unusual activity, personalized recommendations, and more intuitive, conversational user experiences.</p>



<p>In addition to the ability to deploy directly to SAP systems using the embedded approach, the Cybersecurity Extension for SAP can now also be deployed to SAP Build Work Zone running in the SAP BTP Cloud Foundry environment. The steps are summarized below and typically take around 45 minutes to perform.</p>



<p><strong>Preparation</strong></p>



<p>Prepare your SAP BTP landscape. Start by creating or confirming the subaccount in SAP BTP Cockpit. In the global account, choose Create, provide an account name, select the appropriate region, and finalize creation. Once the subaccount is created, complete the mandatory configuration. First, verify the Cloud Connector connection is properly attached to the subaccount and the connection status shows as established. Next, confirm a destination named backend is present. &nbsp;Principal Propagation is recommended as the authentication method for a trusted setup between ABAP systems and SAP BTP. Then, ensure your Cloud Foundry environment is provisioned. Create the Cloud Foundry instance (if needed) and create at least one space for deployments. Finally, validate entitlements and subscriptions for SAP Build Work Zone. At the global account level, assign the Work Zone entitlement to the target subaccount, then create (or confirm) an active subscription. As a last prep step, assign the required admin role to the operator who will configure the launchpad. For example, the Launchpad_Admin role collection.</p>



<p><strong>Installation</strong></p>



<p>The Cybersecurity Extension for SAP is delivered as an .mtar archive and is deployed via Cloud Foundry, so your workstation needs the right tools. Install the SAP (Cloud Foundry) CLI, then add the HTML5 applications repository plugin.</p>



<p>Deploy the package to the subaccount. Move the provided .mtar file into a working folder and open a command line in that directory. Log in to the correct Cloud Foundry org/space using cf login, following the prompts for credentials and selecting the target space. With the session established, deploy the archive using cf deploy. When deployment completes, confirm the HTML5 apps were created by running cf html5-list. For a second confirmation path, open SAP BTP Cockpit, navigate into the subaccount, and check the HTML5 Applications area to see the deployed artifacts reflected in the UI.</p>



<p><strong>Configuration</strong></p>



<p>In the subaccount, open the SAP Build Work Zone subscription and launch the application. If no site exists yet, create one from the Work Zone entry point. Then update the default content channel (HTML5) in Channel Manager. Next, bring in the solution content. The fastest path is importing the provided L7S content .zip via Content Manager. After the import, you should see the required bundle of objects (apps, plus a group, page, space, role, and catalog).</p>



<p>Assign access for required users. Back in the subaccount, assign the L7S role collection to the intended business users. Then, in the Work Zone Site Directory, confirm the site’s role assignment includes the expected role. Open the site and logon with a user who has the L7S role. Enabling multifactor authentication (MFA) for BTP users is recommended. This can be performed using SAP Cloud Identity Services. The Cybersecurity Extension for SAP will be available in the launchpad once you logon. See below.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://www.layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-on-SAP-BTP-01-1.png" alt="" class="wp-image-9390"/></figure>



<p>Click on the tile for the Cybersecurity Extension for SAP to launch the application and access the home screen below.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://www.layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-on-SAP-BTP-02-1.png" alt="" class="wp-image-9391"/></figure>



<p></p>
<p>The post <a href="https://www.layersevensecurity.com/now-on-sap-btp-access-the-cybersecurity-extension-for-sap-on-sap-build-work-zone/">Now on SAP BTP: Access the Cybersecurity Extension for SAP on SAP Build Work Zone</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Layer Seven Security Achieves CyberSecure Certification</title>
		<link>https://www.layersevensecurity.com/layer-seven-security-achieves-cybersecure-certification/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 19:05:52 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9378</guid>

					<description><![CDATA[<p>Layer Seven Security has successfully achieved certification under the CyberSecure Canada program, reinforcing the company’s commitment to maintaining a strong cybersecurity posture and applying recognized baseline security controls across its operations. For customers that rely on SAP systems to support business-critical processes, the certification provides independent validation that Layer Seven Security operates within a structured [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/layer-seven-security-achieves-cybersecure-certification/">Layer Seven Security Achieves CyberSecure Certification</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img decoding="async" src="https://www.layersevensecurity.com/wp-content/uploads/CyberSecure-Canada.jpg" alt="" class="wp-image-9379"/></figure>



<p>Layer Seven Security has successfully achieved certification under the <a href="https://ised-isde.canada.ca/site/cybersecure-canada/en" target="_blank" rel="noreferrer noopener">CyberSecure Canada</a> program, reinforcing the company’s commitment to maintaining a strong cybersecurity posture and applying recognized baseline security controls across its operations. For customers that rely on SAP systems to support business-critical processes, the certification provides independent validation that Layer Seven Security operates within a structured cybersecurity framework aligned with a recognized assurance program.</p>



<p>CyberSecure was established by <a href="https://ised-isde.canada.ca/site/ised/en" target="_blank" rel="noreferrer noopener">Innovation, Science and Economic Development (ISED)</a> Canada as a national cybersecurity certification program intended to improve information security through the implementation of defined baseline controls. The program is based on cybersecurity controls developed from guidance published by the <a href="https://www.cyber.gc.ca/en" target="_blank" rel="noreferrer noopener">Canadian Centre for Cyber Security</a>.</p>



<p>The controls are designed to address threat scenarios and organizational cyber risk through practical and measurable safeguards. The control areas include incident response and recovery, automated patching, endpoint protection, secure configuration of devices and systems, identity and access management, multi-factor authentication, employee cybersecurity awareness, backup protection, encryption, perimeter defence, mobile device protection, and the secure use of cloud services and outsourced information technology services. The controls establish a foundational security baseline intended to reduce the likelihood and impact of compromise, service disruption, data loss, and unauthorized access.</p>



<p>For SAP customers, the certification demonstrates that Layer Seven Security maintains robust internal security governance and operational safeguards. Certification under a government-backed national program provides assurance for vendor due diligence, third-party risk assessment, and procurement requirements.</p>



<p>For organizations that rely on Layer Seven Security to support SAP cybersecurity monitoring, compliance automation, and threat detection, the certification supports supply chain assurance and operational resilience. Certification provides customers with confidence in Layer Seven Security as a trusted cybersecurity partner operating within an independently validated control framework.</p>
<p>The post <a href="https://www.layersevensecurity.com/layer-seven-security-achieves-cybersecure-certification/">Layer Seven Security Achieves CyberSecure Certification</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SAP Security Notes, March 2026</title>
		<link>https://www.layersevensecurity.com/sap-security-notes-march-2026/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Tue, 10 Mar 2026 16:19:08 +0000</pubDate>
				<category><![CDATA[Advisories]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9374</guid>

					<description><![CDATA[<p>Hot news note 3698553 patches a critical command injection vulnerability in Apache Log4j bundled in SAP Quotation Management Insurance. The package assembly for the FS-QUO-scheduler module of the application should be updated to a secure version. As a workaround, the Java archive file log4j-1.2.17.jar. can be deleted in the {FS-QUO-scheduler}/lib directory. Hot news note 3714585 [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-march-2026/">SAP Security Notes, March 2026</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hot news note <a href="https://me.sap.com/notes/3698553" target="_blank" rel="noreferrer noopener">3698553</a> patches a critical command injection vulnerability in Apache Log4j bundled in SAP Quotation Management Insurance. The package assembly for the FS-QUO-scheduler module of the application should be updated to a secure version. As a workaround, the Java archive file log4j-1.2.17.jar. can be deleted in the {FS-QUO-scheduler}/lib directory.</p>



<p>Hot news note <a href="https://me.sap.com/notes/3714585" target="_blank" rel="noreferrer noopener">3714585</a> addresses an insecure deserialization vulnerability in SAP NetWeaver Enterprise Portal Administration. The vulnerability can lead to malicious remote code execution through the upload of user-supplied content. The fix in the note validates input before processing to secure deserialization logic. The fix is only available for NetWeaver AS Java 7.50. For earlier versions that are no longer maintained by SAP, please refer to note <a href="https://me.sap.com/notes/3660659" target="_blank" rel="noreferrer noopener">3660659</a> &#8211; Security Hardening for Insecure Deserialization in SAP NetWeaver AS Java. You can also restrict access to privileges that provide access to the vulnerable endpoint. This includes the UME group Administrators, UME role Administrator, and Portal roles super_admin_role, system_admin_role, and content_admin_role.</p>



<p>Note <a href="https://me.sap.com/notes/3719502" target="_blank" rel="noreferrer noopener">3719502</a> patches a high-risk Denial of Service (DoS) vulnerability in SAP Supply Chain Management. The note applies input validation for calls to a specific vulnerable RFM to prevent excessive resource consumption. Calls to the vulnerable RFM are monitored by the <a href="https://www.layersevensecurity.com/cybersecurity-extension-for-sap/" type="link" id="https://layersevensecurity.com/cybersecurity-extension-for-sap/" target="_blank" rel="noreferrer noopener">Cybersecurity Extension for SAP</a>.</p>



<p>The remaining 11 security notes released impact medium priority issues in various SAP products. This includes SSRF and missing authorization check vulnerabilities in SAP NetWeaver AS ABAP (notes <a href="https://me.sap.com/notes/3689080" target="_blank" rel="noreferrer noopener">3689080</a>,  <a href="https://me.sap.com/notes/3704740" target="_blank" rel="noreferrer noopener">3704740</a>, and <a href="https://me.sap.com/notes/3703856" target="_blank" rel="noreferrer noopener">3703856</a>).</p>



<p></p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-march-2026/">SAP Security Notes, March 2026</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>State-Sponsored Cyber Attacks: An Increasing Threat to SAP Solutions</title>
		<link>https://www.layersevensecurity.com/state-sponsored-cyber-attacks-an-increasing-threat-to-sap-solutions/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Wed, 25 Feb 2026 01:43:53 +0000</pubDate>
				<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[SAP Vulnerabilities]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9368</guid>

					<description><![CDATA[<p>State-sponsored cyber attacks are an increasing threat to organizations amid rising geopolitical tensions. According to the 2025 State of Information Security Report, 88% of cybersecurity and information security leaders express concern over state-sponsored cyber attacks. The concerns are driven by recent dramatic increases in the volume of threat activity attributed to state sponsored threat actors. [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/state-sponsored-cyber-attacks-an-increasing-threat-to-sap-solutions/">State-Sponsored Cyber Attacks: An Increasing Threat to SAP Solutions</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img decoding="async" src="https://www.layersevensecurity.com/wp-content/uploads/2026/02/State-Sponsored-Cyber-Attacks-An-Increasing-Threat-to-SAP-Solutions.webp" alt="" class="wp-image-9369"/></figure>



<p>State-sponsored cyber attacks are an increasing threat to organizations amid rising geopolitical tensions. According to the <a href="https://www.isms.online/the-state-of-information-security-report-2025/" target="_blank" rel="noreferrer noopener">2025 State of Information Security Report,</a> 88% of cybersecurity and information security leaders express concern over state-sponsored cyber attacks. The concerns are driven by recent dramatic increases in the volume of threat activity attributed to state sponsored threat actors.</p>



<p>According to the CrowdStrike <a href="https://go.crowdstrike.com/2025-global-threat-report.html" target="_blank" rel="noreferrer noopener">2025 Global Threat Report</a>, China-nexus threat activity increased by 150% across sectors, with 200–300% increases in key industries including financial services, media, manufacturing, and engineering. CrowdStrike also identified seven new China-nexus adversaries, indicating broader and more specialized operations. The <a href="https://go.crowdstrike.com/2026-global-threat-report.html" target="_blank" rel="noreferrer noopener">2026 Global Threat Report</a> reported a 266% increase in intrusions by state-nexus threat actors in cloud environments.</p>



<p>The <a href="https://www.microsoft.com/en-us/corporate-responsibility/cybersecurity/microsoft-digital-defense-report-2025/" target="_blank" rel="noreferrer noopener">2025 Digital Defense Report</a> from Microsoft identified a significant escalation in Russian state-linked cyber operations directed at NATO-aligned countries, reporting a 25% year-over-year increase in activity. The report indicates that Russian threat actors are prioritizing sectors with high intelligence and geopolitical value, including government, research and academia, and IT, reflecting a sustained effort to collect intelligence, shape decision-making, and support hybrid warfare objectives.</p>



<p>The <a href="https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025" target="_blank" rel="noreferrer noopener">2025 M-Trends Report</a> from Mandiant identified a 35% increase in malware attributed to Iran-nexus threat actors and 45 new malware strands attributed primarily to state-sponsored actors.</p>



<p>A 2026 report by the Google <a href="https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base" target="_blank" rel="noreferrer noopener">Threat Intelligence Group</a> highlighted that nation state actors are not just targeting IT infrastructure within critical sectors, but often personally-identifiable information that can provide a pathway to targeting individuals.</p>



<p>The increase in nation-state cyber activity disproportionately impacts SAP environments that support mission-critical processes, store and process high-value data, and offer privileged integration paths to other critical solutions. Compromising SAP systems can enable state sponsored threat actors to perform espionage by accessing and exfiltrating sensitive data, and sabotage by interrupting the availability of critical resources. Breaches can also be used to pivot to connected systems and compromise internal and external supply chains.</p>



<p>The risks are amplified by the wide attack surface of many SAP solutions. This includes Application Programming Interfaces (APIs) that extend beyond internal network boundaries, cross-platform dependencies including database and OS platforms and middleware such as connectors, integration with federated identity providers, and internal trust relationships.</p>



<p>The risks are also increased by the volume of vulnerabilities in SAP solutions and challenges in patching SAP environments to address the root causes of vulnerabilities. According to the 2026 CrowdStrike <a href="https://www.crowdstrike.com/en-us/press-releases/2026-crowdstrike-global-threat-report/" target="_blank" rel="noreferrer noopener">Global Threat Report,</a> 42% of vulnerabilities are exploited before public disclosure. Research released in 2025 indicated that threat actors are exploiting SAP security vulnerabilities within 72 hours of disclosure. The average time to apply security notes to patch SAP vulnerabilities in organizations is typically measured in weeks and months, rather than hours and days.</p>



<p>Nation-state actors often prefer access paths that blend into legitimate administrative behavior. In SAP landscapes, this can mean abuse of:</p>



<ul class="wp-block-list">
<li>Trusted communications</li>



<li>Change management and system administration</li>



<li>Batch/background jobs</li>



<li>Transport processes</li>



<li>Service accounts</li>



<li>Remote support channels</li>
</ul>



<p>Therefore, it is critical to identify and address:</p>



<ul class="wp-block-list">
<li>Weakly governed RFC destinations, including over-privileged service users</li>



<li>Insecure, unencrypted RFC and web-based communications</li>



<li>Poorly restricted gateway registrations and access control for external program starts</li>



<li>Over-exposed ICF services</li>



<li>Unnecessary trusted system relationships</li>



<li>Excessive administrative privileges including broad RFC authorizations</li>
</ul>



<p>In order to support detection, SAP telemetry should be integrated and correlated with telemetry from other endpoints to distinguish between normal SAP events and malicious actions. Also, anomaly-based monitoring is recommended to detect unusual system and user events.</p>



<p>The <a href="https://www.layersevensecurity.com/cybersecurity-extension-for-sap/" target="_blank" rel="noreferrer noopener">Cybersecurity Extension for SAP</a> (CES) enables organizations to detect and respond to state-sponsored cyber threats in real time by combining continuous vulnerability management and threat detection for SAP solutions. CES is designed specifically for SAP landscapes (on-premise, cloud, and hybrid) and delivers real-time security intelligence to identify vulnerabilities and indicators of compromise in SAP applications and infrastructure. It monitors a broad set of SAP telemetry sources including SAP and infrastructure logs, providing security teams with deeper context than generic non-SAP specific tools that focus on network and host-level activity.</p>



<p>A key advantage for defending against advanced threats is the solution’s ability to reduce the attack surface to prevent exploitation. It performs scheduled scans for thousands of SAP vulnerabilities and misconfigurations, detects users with administrative privileges, and provides practical remediation guidance and workarounds to harden systems. CES also detects required SAP security notes including patches for Known Exploited Vulnerabilities for SAP in the CISA <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?f%5B0%5D=vendor_project%3A835" target="_blank" rel="noreferrer noopener">KEV</a> catalog.</p>



<p>CES uses both pattern matching and anomaly detection to detect indicators of compromise in SAP solutions. Alerts for security incidents are integrated with enterprise SIEM platforms for cross-network analysis and correlation, enabling SOC teams to connect SAP activity with events from firewalls, endpoints, identity systems, and other infrastructure.</p>
<p>The post <a href="https://www.layersevensecurity.com/state-sponsored-cyber-attacks-an-increasing-threat-to-sap-solutions/">State-Sponsored Cyber Attacks: An Increasing Threat to SAP Solutions</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SAP Security Notes, February 2026</title>
		<link>https://www.layersevensecurity.com/sap-security-notes-february-2026/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Wed, 11 Feb 2026 23:08:39 +0000</pubDate>
				<category><![CDATA[Advisories]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9363</guid>

					<description><![CDATA[<p>Hot news note 3697099 patches a critical code injection vulnerability in SAP S/4HANA and SAP CRM. The vulnerability can be exploited by attackers to execute arbitrary SQL statements by calling function modules using the Scripting Editor. As a workaround, the Scripting Editor can be disabled by deactivating the service CRM_IC_ISE ICF in the sap/bc/bsp/sap service [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-february-2026/">SAP Security Notes, February 2026</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hot news note <a href="https://me.sap.com/notes/3697099" target="_blank" rel="noreferrer noopener">3697099 </a>patches a critical code injection vulnerability in SAP S/4HANA and SAP CRM. The vulnerability can be exploited by attackers to execute arbitrary SQL statements by calling function modules using the Scripting Editor. As a workaround, the Scripting Editor can be disabled by deactivating the service CRM_IC_ISE ICF in the sap/bc/bsp/sap service path.</p>



<p>Hot news note <a href="https://me.sap.com/notes/3674774" target="_blank" rel="noreferrer noopener">3674774</a> addresses a critical missing authentication check impacting background RFCs in SAP NetWeaver AS ABAP. In addition to applying the recommended support package, profile parameter rfc/authCheckInPlayback should be set to the value 2 to enable stronger authorization checks for transactional (tRFC) and queued RFC (qRFC) calls.</p>



<p>Note <a href="https://me.sap.com/notes/3697567" target="_blank" rel="noreferrer noopener">3697567 </a>enhances verification procedures for the XML signatures to address an XML Signature Wrapping in NetWeaver AS ABAP. As a workaround, the vulnerable XML verification mechanisms can be avoided by disabling SAML and switching to alternative authentication methods.</p>



<p>Note <a href="https://me.sap.com/notes/3705882" target="_blank" rel="noreferrer noopener">3705882</a> patches an information disclosure vulnerability in the ST-PI Addon installed in NetWeaver AS ABAP systems. The vulnerability can be exploited to obtain sensitive system information.</p>



<p>Notes <a href="https://me.sap.com/notes/3674246" target="_blank" rel="noreferrer noopener">3674246</a>, <a href="https://me.sap.com/notes/3678282" target="_blank" rel="noreferrer noopener">3678282</a> and <a href="https://me.sap.com/notes/3654236" target="_blank" rel="noreferrer noopener">3654236 </a>address open redirect and denial of service vulnerabilities in SAP BusinessObjects.</p>



<p></p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-february-2026/">SAP Security Notes, February 2026</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital Operational Resilience Act (DORA) Compliance for SAP Solutions</title>
		<link>https://www.layersevensecurity.com/digital-operational-resilience-act-dora-compliance-for-sap-solutions/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 20:40:53 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[SAP Audit]]></category>
		<category><![CDATA[SAP Security Solutions]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9356</guid>

					<description><![CDATA[<p>The Digital Operational Resilience Act (DORA) is a regulation that mandates standards for cybersecurity and operational resilience in the financial sector within the European Union (EU). It provides standards for governing risks in Information and Communications Technology (ICT) to ensure banks, insurers, investment firms, and other financial institutions are able to deliver critical services by effectively [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/digital-operational-resilience-act-dora-compliance-for-sap-solutions/">Digital Operational Resilience Act (DORA) Compliance for SAP Solutions</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img decoding="async" width="1207" height="724" src="https://www.layersevensecurity.com/wp-content/uploads/2026/01/DORA-Compliance-for-SAP.webp" alt="" class="wp-image-9359" srcset="https://www.layersevensecurity.com/wp-content/uploads/2026/01/DORA-Compliance-for-SAP.webp 1207w, https://www.layersevensecurity.com/wp-content/uploads/2026/01/DORA-Compliance-for-SAP-300x180.webp 300w, https://www.layersevensecurity.com/wp-content/uploads/2026/01/DORA-Compliance-for-SAP-1024x614.webp 1024w, https://www.layersevensecurity.com/wp-content/uploads/2026/01/DORA-Compliance-for-SAP-768x461.webp 768w" sizes="(max-width: 1207px) 100vw, 1207px" /></figure>



<p>The <a href="https://www.eiopa.europa.eu/digital-operational-resilience-act-dora_en" target="_blank" rel="noreferrer noopener">Digital Operational Resilience Act </a>(DORA) is a regulation that mandates standards for cybersecurity and operational resilience in the financial sector within the European Union (EU). It provides standards for governing risks in Information and Communications Technology (ICT) to ensure banks, insurers, investment firms, and other financial institutions are able to deliver critical services by effectively resisting, responding and recovering from ICT disruptions. The act took effect on January 17, 2025, with oversight from the European Supervisory Authorities EBA, ESMA, and EIOPA, to define and enforce technical standards for the regulation.</p>



<p><strong>The Five Pillars of DORA</strong></p>



<p>DORA’s core objective is to support the integrity and continuity of financial services against ICT risks including cyberattacks. The regulation includes the following five pillars:</p>



<ol start="1" class="wp-block-list">
<li>Risk Management: a comprehensive governance and control framework covering ICT asset inventory, protection, detection, response, recovery, backup, logging and monitoring, change management, and resilience-by-design.</li>



<li>Incident Management and Reporting: consistent handling of ICT incidents and mandatory reporting of major incidents.</li>



<li>Operational Resilience Testing: vulnerability assessments and penetration testing focused on critical functions.</li>



<li>Third-Party Risk Management: oversight for ICT vendors and providers including outsourced services.</li>



<li>Information Sharing: mechanisms to share cyber threat information and intelligence to strengthen sector-wide resilience.</li>
</ol>



<p><strong>The Impact of DORA for SAP Solutions</strong></p>



<p>For many financial services organizations, SAP solutions support critical functions such as procurement and supplier operations, human resource management, and finance and controlling. Therefore, they are often part of the ICT fabric that must be governed, monitored, tested, and recoverable for DORA compliance. Under DORA, SAP solutions require tight integration with:</p>



<ul class="wp-block-list">
<li>ICT Risk Governance, including the definition of key risk indicators and controls testing.</li>



<li>SOC Operations, including detection, triage, and handling of incidents.</li>



<li>Service Management, including approvals, evidence, and testing for changes.</li>



<li>Supplier Management, including managing hosting providers, system integrators, and external integrations such as APIs.  </li>
</ul>



<p>DORA effectively obliges organizations to manage SAP solutions as regulated platforms, requiring baseline controls, continuous monitoring, regular patching, frequent testing, and periodic reporting.</p>



<p><strong>DORA Compliance with the Cybersecurity Extension for SAP</strong></p>



<p>The <a href="https://www.layersevensecurity.com/cybersecurity-extension-for-sap/" target="_blank" rel="noreferrer noopener">Cybersecurity Extension for SAP</a> (CES) enables organizations to comply with DORA by identifying and managing ICT risks in SAP solutions, detecting and responding to security incidents, securing third party integrations, and verifying and reporting compliance with SAP security benchmarks. The solution supports compliance with each of the five pillars in DORA for SAP systems.</p>



<p>Pillar 1 &#8211; Risk Management</p>



<ul class="wp-block-list">
<li>Continuous SAP security monitoring including the detection of security-related changes in SAP solutions.</li>



<li>SAP-specific vulnerability management including the detection of 5000+ security weaknesses in SAP.</li>



<li>Custom code security including the detection of 300+ vulnerabilities in custom ABAP programs and SAP UI5 / Fiori applications.</li>



<li>SAP patch management including the detection of relevant security notes and support packages.</li>



<li>Alignment to SAP-specific baselines and cloud hardening benchmarks including the SAP Security Baseline, security guidance for S/4HANA, and SAP RISE/ECS mandatory security requirements.</li>
</ul>



<p>Pillar 2 &#8211; Incident Management and Reporting</p>



<ul class="wp-block-list">
<li>Threat detection:  Detection and alerting for 1500+ Indicators of Compromise (IOC) in SAP solutions including application, database and host-level logs.</li>



<li>Risk-based prioritization of SAP alerts based on operational impact for rapid classification.</li>



<li>Standard operating procedures and workflows for investigating, tracking and reporting on incident investigations.</li>
</ul>



<p>Pillar 3 &#8211; Operational Resilience Testing</p>



<ul class="wp-block-list">
<li>Compliance monitoring and baseline checks to validate SAP hardening.</li>



<li>Threat detection exercises for SAP attack paths including privilege escalation, interface abuse, suspicious admin changes, and calls to critical SAP function modules, reports, services, and transactions.</li>



<li>Daily vulnerability scanning to support risk identification and mitigation.</li>
</ul>



<p>Pillar 4 &#8211; Third-Party Risk Management</p>



<ul class="wp-block-list">
<li>Visibility into external interfaces in SAP solutions including cloud connections.</li>



<li>Evidence for SAP RISE / managed-service security requirements.</li>



<li>Accountability for system integrators against SAP security standards.</li>
</ul>



<p>Pillar 5 &#8211; Information Sharing</p>



<ul class="wp-block-list">
<li>SAP-specific security intelligence including threat detection patterns, CVEs, and zero-day vulnerabilities.</li>



<li>Standardized reporting for information sharing with cross-functional teams and sector forums.</li>
</ul>



<p>The Cybersecurity Extension for SAP supports digital resilience and DORA compliance by ensuring security for SAP solutions is measurable, monitored, and audit-ready. It provides continuous evidence evidence of SAP hardening, while strengthening operational resilience through incident detection, streamlined response, and reduced exposure to cyber risks.</p>
<p>The post <a href="https://www.layersevensecurity.com/digital-operational-resilience-act-dora-compliance-for-sap-solutions/">Digital Operational Resilience Act (DORA) Compliance for SAP Solutions</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SAP Security Notes, January 2026</title>
		<link>https://www.layersevensecurity.com/sap-security-notes-january-2026/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Wed, 14 Jan 2026 20:52:22 +0000</pubDate>
				<category><![CDATA[Advisories]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9345</guid>

					<description><![CDATA[<p>Hot news note 3687749 patches a critical SQL injection vulnerability that can be exploited to read, modify, and delete data used in the Financials component of SAP S/4HANA. The solution in the note prevents the injection of user-controlled input in SQL queries using input validation to remove the vulnerability. A workaround is also detailed in [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-january-2026/">SAP Security Notes, January 2026</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hot news note <a href="https://me.sap.com/notes/3687749" target="_blank" rel="noreferrer noopener">3687749</a> patches a critical SQL injection vulnerability that can be exploited to read, modify, and delete data used in the Financials component of SAP S/4HANA. The solution in the note prevents the injection of user-controlled input in SQL queries using input validation to remove the vulnerability. A workaround is also detailed in the note. Access to vulnerable function modules in function group FGL_BCF should be restricted using authorization object S_RFC. According to the note, the function modules are intended to be invoked only internally by the system as part of parallel processing and must not be callable via external RFC interfaces.</p>



<p>Hot news note <a href="https://me.sap.com/notes/3694242" target="_blank" rel="noreferrer noopener">3694242</a> deals with another critical vulnerability in SAP S/4HANA that can be exploited to perform arbitrary ABAP code and OS commands and bypass authorization checks. The vulnerability effectively functions as a backdoor, leading to the risk of full system compromise. The correction in the note removes the vulnerable code. Although a workaround is not included in the note, it is possible to also use authorization object S_RFC to temporarily address the vulnerability by restricting access to the affected function group.</p>



<p>Note <a href="https://me.sap.com/notes/3697979" target="_blank" rel="noreferrer noopener">3697979</a> addresses a similar critical ABAP code/OS command injection vulnerability in SAP Landscape Transformation.</p>



<p>Note <a href="https://me.sap.com/notes/3668679" target="_blank" rel="noreferrer noopener">3668679</a> patches a remote code execution vulnerability in SAP Wily Introscope Enterprise Manager. The vulnerability can be exploited to execute commands in workstations using malicious JNLP (Java Network Launch Protocol) files accessible via URLs. Wiley Enterprise Manager should be upgraded to version 10.8 SP01 Patch 2 (10.8.0.220) to remove the vulnerability.</p>



<p>Note <a href="https://me.sap.com/notes/3691059" target="_blank" rel="noreferrer noopener">3691059</a> fixes a privilege escalation vulnerability in SAP HANA that can be exploited by attackers to gain administrative access to the database. The correction in the note prevents unauthorized user switching to remove the root cause of the vulnerability.</p>



<p>Notes <a href="https://me.sap.com/notes/3675151" target="_blank" rel="noreferrer noopener">3675151</a> and <a href="https://me.sap.com/notes/3688703" target="_blank" rel="noreferrer noopener">3688703</a> deal with high-risk OS command and missing authorization check vulnerabilities in SAP NetWeaver AS ABAP.</p>



<p>Note <a href="https://me.sap.com/notes/3565506" target="_blank" rel="noreferrer noopener">3565506</a> addresses multiple vulnerabilities in the SAP Fiori Application Intercompany Balance Reconciliation. The impacted components include S4CORE in SAP S/4HANA.</p>



<p></p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-january-2026/">SAP Security Notes, January 2026</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Key Security Findings from the RISE with SAP 2025 Benchmark Report</title>
		<link>https://www.layersevensecurity.com/key-security-findings-from-the-rise-with-sap-2025-benchmark-report/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Wed, 17 Dec 2025 19:12:34 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[SAP Cloud Security]]></category>
		<category><![CDATA[SAP Security Recommendations]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9311</guid>

					<description><![CDATA[<p>SAPinsider’s RISE with SAP 2025 benchmark report, co-sponsored by Layer Seven Security, was released in December. Based on a survey of 122 SAPinsider community members conducted between August and November 2025, the study focuses on customer adoption of SAP Cloud ERP Private (formerly referenced in the survey as RISE with SAP) and the factors shaping [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/key-security-findings-from-the-rise-with-sap-2025-benchmark-report/">Key Security Findings from the RISE with SAP 2025 Benchmark Report</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1300" height="860" src="https://www.layersevensecurity.com/wp-content/uploads/2025/12/RISE-with-SAP.jpg" alt="" class="wp-image-9314" srcset="https://www.layersevensecurity.com/wp-content/uploads/2025/12/RISE-with-SAP.jpg 1300w, https://www.layersevensecurity.com/wp-content/uploads/2025/12/RISE-with-SAP-300x198.jpg 300w, https://www.layersevensecurity.com/wp-content/uploads/2025/12/RISE-with-SAP-1024x677.jpg 1024w, https://www.layersevensecurity.com/wp-content/uploads/2025/12/RISE-with-SAP-768x508.jpg 768w" sizes="(max-width: 1300px) 100vw, 1300px" /></figure>



<p>SAPinsider’s <em><a href="https://sapinsider.org/research-reports/sapinsider-benchmark-research-rise-with-sap-2025/" target="_blank" rel="noreferrer noopener">RISE with SAP 2025</a></em> benchmark report, co-sponsored by Layer Seven Security, was released in December. Based on a survey of 122 SAPinsider community members conducted between August and November 2025, the study focuses on customer adoption of SAP Cloud ERP Private (formerly referenced in the survey as RISE with SAP) and the factors shaping migration decisions. From a security standpoint, the most material finding is broad customer non-compliance with the shared model of responsibility, and more specifically, failure to implement and sustain SAP’s mandatory security hardening requirements documented in relevant SAP notes for SAP systems operating in SAP’s cloud delivery model.</p>



<p><strong>Broad Non-Compliance with Customer Security Responsibilities</strong></p>



<p>The report identifies a significant gap between SAP’s cloud security expectations and customer execution. While SAP delivers and operates key elements of the cloud platform, customers remain accountable for critical security outcomes, including secure configuration, access controls, and compliance with SAP-defined hardening standards.</p>



<p>Two key findings stand out:</p>



<ul class="wp-block-list">
<li>Less than half (45%) of respondents are aware of and actively following the <a href="https://www.layersevensecurity.com/sap-rise-security/" target="_blank" rel="noreferrer noopener">shared responsibility model</a> for SAP Cloud ERP Private security.</li>



<li>Approximately one-third are aware of the model but do not follow it rigorously, indicating that a majority of organizations either do not fully understand or are not consistently executing their responsibilities.</li>
</ul>



<p>This is not a minor administrative gap. The report explicitly warns that failure to follow both the shared responsibility model and SAP’s mandatory hardening requirements leaves systems open to attack. For leadership teams, the implication is straightforward: cloud migration does not transfer accountability for SAP security outcomes to SAP. If required customer-side controls are not implemented and maintained, the organization bears the risk.</p>



<p><strong>Hardening Requirements Are Frequently Missed</strong></p>



<p>The report goes beyond general security awareness and points to a more specific and operational problem: customers running SAP Cloud ERP Private in SAP’s cloud delivery environment must comply with SAP’s mandatory security parameters and hardening requirements, as documented in relevant SAP notes for ABAP, HANA and Java systems and related components. This includes notes <a href="https://me.sap.com/notes/3250501" target="_blank" rel="noreferrer noopener">3250501</a>, <a href="https://me.sap.com/notes/3480723" target="_blank" rel="noreferrer noopener">3480723</a> and <a href="https://me.sap.com/notes/3381209" target="_blank" rel="noreferrer noopener">3381209</a>.</p>



<p>The report underscores that non-compliance with these requirements materially increases exposure. In business terms, required hardening defines baseline expectations for how SAP systems must be configured to reduce preventable attack paths. Failure to apply those settings—consistently and over time—creates vulnerabilities that can persist in SAP solutions.</p>



<p><strong>Compliance Is a Moving Target</strong></p>



<p>A key challenge highlighted in the report is that SAP security compliance is not static. SAP regularly updates mandatory parameters and hardening guidance in response to new threats, vulnerabilities, platform changes, and evolving best practices. As a result, a system that was compliant at go-live may drift out of compliance over time even without major architectural change.</p>



<p>This creates a practical operational risk: compliance must be managed as an ongoing discipline, not a one-time implementation deliverable. Organizations need repeatable processes to track new and updated SAP security guidance, assess its applicability, validate their current posture, and remediate gaps across their SAP landscapes.</p>



<p><strong>Business Risk of Non-Compliance: Support, Liability, and Exposure</strong></p>



<p>The consequences of non-compliance extend beyond technical risk and into contractual and legal exposure:</p>



<ul class="wp-block-list">
<li>Support risk: When hardening requirements and mandatory parameters are not implemented, incident response becomes more complicated. In high-severity security situations, customers may face delays and friction in diagnosis and remediation, and their position with SAP support can be weakened if the environment is not aligned with required security standards.</li>



<li>Legal and regulatory risk: In the event of a data breach, organizations are often required to demonstrate that they followed vendor-prescribed security requirements and reasonable security practices. If an organization cannot demonstrate compliance with SAP’s documented security hardening guidance, it can weaken the company’s defensibility, increase regulatory scrutiny, and raise the likelihood of fines, penalties, litigation, and reputational harm. Ultimately, under a shared responsibility model, the customer retains accountability—and therefore liability—for customer-controlled security controls.</li>
</ul>



<p><strong>Additional Survey Indicators Relevant to Security Posture</strong></p>



<p>Although the report is broader than security, several survey results reinforce the importance of establishing a robust cloud security operating model:</p>



<ul class="wp-block-list">
<li>80% of respondents identify comprehensive monitoring to ensure system health and security as a key requirement for their ERP transformation and innovation initiatives.</li>



<li>79% indicate the need for best-practice compliance checks that avoid outages, underscoring that organizations see compliance and stability as tightly linked.</li>
</ul>



<p>These findings align with the report’s security message: maintaining control effectiveness requires continuous monitoring and governance, not periodic reviews.</p>



<p><strong>How the Cybersecurity Extension for SAP from Layer Seven Security Addresses These Challenges</strong></p>



<p>The report’s core security finding—customer non-compliance with evolving security requirements—directly aligns with the capabilities of Layer Seven Security’s <a href="https://www.layersevensecurity.com/cybersecurity-extension-for-sap/" target="_blank" rel="noreferrer noopener">Cybersecurity Extension for SAP</a>. The solution is designed to help organizations operationalize their security responsibilities in SAP RISE / Cloud ERP environments where configuration, compliance, and threat conditions change over time.</p>



<p>At a business level, it supports three outcomes:</p>



<ol start="1" class="wp-block-list">
<li><strong>Continuous monitoring against current hardening requirements:</strong> Automated checks against SAP security baselines help identify non-compliance as SAP standards evolve, rather than relying on periodic manual reviews.</li>



<li><strong>Reduced risk from compliance drift:</strong> Ongoing visibility into configuration posture helps prevent gradual degradation of security controls due to system change, integration expansion, or operational turnover.</li>



<li><strong>Improved audit and support readiness:</strong> Continuous evidence of compliance strengthens governance, improves audit defensibility, and supports more effective engagement during incidents and escalations.</li>
</ol>



<p>This approach acknowledges the operational reality emphasized by the report: compliance is a moving target, and organizations need a sustainable mechanism to remain aligned to SAP’s required security standards.</p>



<p><strong>Key Takeaways</strong></p>



<p>The most significant security issue identified in the SAPinsider <em>RISE with SAP 2025</em> report is customer non-compliance. A majority of organizations are not fully executing their responsibilities under the shared security model, and the most consequential example is failure to comply with SAP’s mandatory hardening requirements documented in SAP notes. Because these requirements evolve over time, compliance must be treated as an ongoing operational discipline—supported by clear accountability, continuous monitoring, and repeatable remediation processes—to reduce operational, legal, and reputational risk in SAP Cloud ERP Private environments.</p>



<p>The full benchmark findings will be presented by Robert Holland, Vice President and Research Director at SAPinsider, on Tuesday, January 13, 2026. You can register for the webinar at <a href="https://sapinsider.org/webinars/layer-seven-security-sapinsider-benchmark-research-webinar-rise-with-sap-2025/" target="_blank" rel="noreferrer noopener">SAPinsider</a>.</p>
<p>The post <a href="https://www.layersevensecurity.com/key-security-findings-from-the-rise-with-sap-2025-benchmark-report/">Key Security Findings from the RISE with SAP 2025 Benchmark Report</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
