<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Blog - Layer Seven Security</title>
	<atom:link href="http://www.layersevensecurity.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.layersevensecurity.com/blog/</link>
	<description></description>
	<lastBuildDate>Wed, 13 May 2026 23:02:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.layersevensecurity.com/wp-content/uploads/2026/02/favicon-1.png</url>
	<title>Blog - Layer Seven Security</title>
	<link>https://www.layersevensecurity.com/blog/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>SAP Security Notes, May 2026</title>
		<link>https://www.layersevensecurity.com/sap-security-notes-may-2026/</link>
		
		<dc:creator><![CDATA[Layer Seven Security]]></dc:creator>
		<pubDate>Tue, 12 May 2026 16:57:28 +0000</pubDate>
				<category><![CDATA[Advisories]]></category>
		<guid isPermaLink="false">https://www.layersevensecurity.com/?p=17652</guid>

					<description><![CDATA[<p>SAP Security Note 3747787 addresses the Mini Shai-Hulud malware campaign targeting SAP-related npm packages used in SAP cloud development. The incident involved malicious versions of packages associated with SAP CAP and MTA development tooling, including mbt, @cap-js/sqlite, @cap-js/postgres, and @cap-js/db-service. The compromised packages used a malicious preinstall script that executed during npm installation, downloaded the [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-may-2026/">SAP Security Notes, May 2026</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p></p>



<p><a href="https://me.sap.com/notes/3747787" target="_blank" rel="noreferrer noopener">SAP Security Note 3747787</a> addresses the <a href="https://www.layersevensecurity.com/mini-shai-hulud-malware-targeting-the-software-supply-chain-for-sap-development-tools/" target="_blank" rel="noreferrer noopener">Mini Shai-Hulud</a> malware campaign targeting SAP-related npm packages used in SAP cloud development. The incident involved malicious versions of packages associated with SAP CAP and MTA development tooling, including mbt, @cap-js/sqlite, @cap-js/postgres, and @cap-js/db-service. The compromised packages used a malicious preinstall script that executed during npm installation, downloaded the Bun runtime, and launched an obfuscated credential-stealing payload.</p>



<p>The malware was designed to steal developer, GitHub, npm, cloud, CI/CD, and service account credentials from developer workstations and build environments. It also attempted to propagate by using stolen tokens to publish itself to other npm packages and created GitHub repositories in victim accounts as part of the exfiltration process. The payload also added persistence mechanisms through IDE and AI coding tool configuration files, including VS Code and Claude Code hooks, which could re-trigger execution when a compromised repository was opened.</p>



<p>SAP Security Note 3747787 should be treated as an urgent supply-chain security advisory for organizations using SAP CAP, SAP BTP development pipelines, MTA build tooling, or npm-based SAP development workflows. The key risk is not limited to the affected packages themselves; any system that installed the malicious versions may have exposed credentials, source code access, deployment permissions, and CI/CD secrets. Removing or downgrading the package alone may not be sufficient if persistence files or stolen credentials remain in use.</p>



<p>Recommended actions include identifying whether the affected package versions were installed in developer machines, CI/CD runners, build agents, containers, artifact repositories, or lockfiles; removing or replacing compromised versions with clean releases; searching for indicators of compromise such as suspicious GitHub repositories, unexpected commits, modified workflow files, and IDE configuration changes; and rotating all credentials that may have been exposed. Affected systems should be treated as potentially compromised, especially where privileged npm, GitHub, cloud, or deployment credentials were present.</p>



<p>In summary, SAP Security Note 3747787 responds to a targeted npm supply-chain attack against the SAP development ecosystem. The note is important because the attack affected trusted development packages, executed automatically during installation, targeted high-value developer and CI/CD credentials, and created a risk of further propagation across repositories and package ecosystems.</p>



<p><a href="https://me.sap.com/notes/3724838" target="_blank" rel="noreferrer noopener">SAP Security Note 3724838</a> patches a Hot News SQL injection vulnerability in SAP S/4HANA, specifically SAP Enterprise Search for ABAP. The vulnerability is tracked as CVE-2026-34260 and affects SAP_BASIS releases 7.51 through 7.58 and SAP_BASIS 8.16.</p>



<p>The vulnerability occurs because user-controlled input in an affected parameter is passed to the underlying database without proper validation or sanitization. As a result, an authenticated attacker could inject malicious SQL statements into database queries generated by the application. Successful exploitation may allow unauthorized access to sensitive database information and could potentially cause the application to crash.</p>



<p>The vulnerability has a high impact on confidentiality and availability. Sensitive data may be exposed through unauthorized database access, and application stability may be affected if malicious SQL causes service disruption. Integrity is not impacted, meaning the vulnerability is not expected to allow unauthorized modification of data.</p>



<p>The correction in the note validates user input before it is passed to the database, preventing malicious SQL from being executed.</p>



<p><a href="https://me.sap.com/notes/3733064" target="_blank" rel="noreferrer noopener">SAP Security Note 3733064</a> addresses a missing authentication check vulnerability in SAP Commerce Cloud configuration, tracked as CVE-2026-34263. The issue is caused by an improper Spring Security configuration with overly permissive access rules and incorrect rule ordering, which may allow unauthenticated access to sensitive configuration upload functionality.</p>



<p>The vulnerability could allow an unauthenticated attacker to upload a malicious configuration and inject code. When the malicious input is later processed by a legitimate user, it may result in arbitrary server-side code execution. This creates a serious risk to the affected SAP Commerce Cloud application because successful exploitation can compromise confidentiality, integrity, and availability.</p>



<p>The main risk is that an attacker may be able to execute unauthorized code on the server without first authenticating to the application. This could lead to unauthorized access to sensitive data, manipulation of application behavior or configuration, and disruption of system availability. The vulnerability is especially critical because it affects sensitive administrative functionality related to Backoffice configuration upload.</p>



<p>SAP has addressed the vulnerability by disabling configuration upload functionality by default, preventing unauthenticated access to the affected endpoint and reducing the risk of malicious configuration-based code execution. Organizations should apply the relevant SAP Commerce Cloud patch release as soon as possible.</p>



<p>The fix is available in the following releases: SAP Commerce Cloud 2205.49, 2211.51, and 2211-jdk21.10. Organizations should also review FAQ document 3746113 for detailed guidance on the vulnerability and required remediation actions.</p>



<p><a href="https://me.sap.com/notes/3732471" target="_blank" rel="noreferrer noopener">SAP Security Note 3732471</a> fixes a high-risk OS command injection vulnerability in SAP Forecasting &amp; Replenishment, tracked as CVE-2026-34259. The vulnerability could allow an authenticated attacker with administrative authorizations to abuse a non-remote-enabled function to execute arbitrary operating system commands.</p>



<p>The issue is caused by insufficient control over operating system commands executed through function module input parameters, including input sourced from an upstream component. Successful exploitation could allow the attacker to read, modify, or delete system data, execute unauthorized commands at the operating system level, or shut down the system.</p>



<p>This vulnerability has a severe impact because it can lead to complete compromise of confidentiality, integrity, and availability. An attacker with the required access could potentially gain control over the affected system environment, alter business-critical data, disrupt application operations, or use the compromised host as a foothold for further attacks.</p>



<p>SAP has corrected the issue by adding authorization checks and screening operating system commands before execution. Organizations using SAP Forecasting &amp; Replenishment should implement the relevant Correction Instructions or Support Packages referenced in SAP Security Note 3732471 as soon as possible to reduce the risk of OS command execution and full system compromise.</p>



<p></p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-may-2026/">SAP Security Notes, May 2026</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mini Shai-Hulud: Malware Targeting the Software Supply Chain for SAP Development Tools</title>
		<link>https://www.layersevensecurity.com/mini-shai-hulud-malware-targeting-the-software-supply-chain-for-sap-development-tools/</link>
		
		<dc:creator><![CDATA[Layer Seven Security]]></dc:creator>
		<pubDate>Fri, 01 May 2026 17:09:33 +0000</pubDate>
				<category><![CDATA[Advisories]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[SAP Cloud Security]]></category>
		<category><![CDATA[SAP Code Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.layersevensecurity.com/?p=17622</guid>

					<description><![CDATA[<p>On April 30, SAP released SAP Security Note 3747787 in response to the discovery of malicious code in npm packages connected to SAP development tools. The code is part of a malware campaign labelled Mini Shai-Hulud targeting the software supply chain for SAP cloud development. Shai-Hulud is a reference to the sandworms from the fictional [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/mini-shai-hulud-malware-targeting-the-software-supply-chain-for-sap-development-tools/">Mini Shai-Hulud: Malware Targeting the Software Supply Chain for SAP Development Tools</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>On April 30, SAP released <a href="https://me.sap.com/notes/3747787" target="_blank" rel="noreferrer noopener">SAP Security Note 3747787</a> in response to the discovery of malicious code in npm packages connected to SAP development tools. The code is part of a malware campaign labelled Mini Shai-Hulud targeting the software supply chain for SAP cloud development. Shai-Hulud is a reference to the sandworms from the fictional Dune series. The packages were available in the npm ecosystem on April 29 for approximately two to four hours.</p>



<p>The NPM ecosystem is the collection of tools, packages, and services for npm, the default package manager for Node.js. At the center of the ecosystem is the npm registry, a public repository of reusable JavaScript and TypeScript packages. Developers use npm to install libraries, frameworks, command-line tools, build utilities, and application dependencies. &nbsp;</p>



<p>Node.js is a runtime environment for JavaScript and widely used in SAP applications for cloud-native SAP extensions, integrations, APIs, and user-facing applications. It is especially common in SAP Business Technology Platform (BTP) developments. The SAP Cloud Application Programming Model (CAP) supports Node.js. Developers use Node.js to build service layers, business logic, REST/OData APIs, and extensions for SAP applications. Node.js is also often used to build side-by-side extensions for SAP S/4HANA, SAP SuccessFactors, SAP Ariba, SAP Fieldglass, and other SAP solutions on SAP BTP. Node.js applications can call SAP APIs, consume OData services, connect to SAP Integration Suite, and exchange data with SAP and non-SAP systems. Node.js modules are often packaged as Multi-Target Applications (MTA) in SAP cloud applications.</p>



<p>The installation of the compromised npm packages for Node.js can lead to the theft of sensitive credentials. This includes GitHub tokens, npm tokens, and cloud credentials. Mini Shai-Hulud uses public GitHub repositories for encrypted data exfiltration and may attempt to propagate through developer repositories or tooling configurations.</p>



<p>The affected packages include @cap-js/sqlite v2.2.2, @cap-js/postgres v2.2.2, @cap-js/db-service v2.10.1, and mbt v1.2.48.</p>



<p><strong>Attack Details</strong></p>



<ul class="wp-block-list">
<li>A malicious .vscode/tasks.json file is added with &#8220;runOn&#8221;: &#8220;folderOpen&#8221;, causing code to execute automatically when the folder is opened in VS Code.</li>



<li>A modified .claude/settings.json is added with a SessionStart hook that runs when a Claude Code session begins.</li>



<li>Both mechanisms download the Bun runtime and execute an obfuscated 11.2 MB JavaScript file (execution.js) with full user privileges.</li>



<li>In CI, the release pipeline is tampered with to exfiltrate npm OIDC credentials and publish trojanized packages.</li>
</ul>



<p><strong>Recommended Actions</strong></p>



<ol start="1" class="wp-block-list">
<li>Do NOT open the cds-dbs directory (cap-js/sqlite) in VS Code or Claude Code. The attack relies on automatic execution triggers that immediately run malicious code when the project is opened.</li>



<li>Verify whether your system has been impacted.<br><br>Using a shell outside of any IDE, execute:<br><br>ls path/to/cds-dbs/.claude/setup.mjs path/to/cds-dbs/.vscode/setup.mjs 2>/dev/null<br><br>If any of these files are present, treat the system as compromised and proceed with incident response steps.</li>
</ol>



<ol start="3" class="wp-block-list">
<li>Do NOT pull updates or switch branches in this repository.</li>



<li>Identify whether affected SAP npm packages or versions were installed in developer workstations, build agents, or CI/CD pipelines.</li>



<li>Remove or upgrade compromised packages to clean versions.</li>



<li>Rotate GitHub, npm, cloud, CI/CD, and service account credentials that may have been exposed.</li>



<li>Review GitHub repositories for suspicious commits, workflow changes, .vscode/tasks.json, .claude/settings.json, or unexpected dependency updates.</li>



<li>Audit CI/CD logs, npm install activity, GitHub token usage, and cloud access events around the suspected exposure window.</li>
</ol>



<p><strong>Software Supply Chain Governance</strong></p>



<p>The Mini Shai-Hulud malware campaign illustrates the growing risk of software supply chain attacks against modern SAP development environments. Rather than exploiting a vulnerability in SAP solutions directly, the campaign targets open-source npm packages used in SAP cloud development workflows, demonstrating how malicious code can enter an organization through trusted development tools, third-party libraries, and build pipelines.</p>



<p>This risk is not limited to custom SAP applications. Third-party applications that integrate with SAP solutions can also introduce exposure if they rely on compromised open-source components or libraries, potentially creating indirect paths to sensitive credentials, application data, repositories, or cloud environments. Mini Shai-Hulud reinforces the need for stronger governance over open-source dependencies, package sources, CI/CD pipelines, and developer credentials.</p>



<p>Unlike solutions that depend on open-source components, the <a href="https://www.layersevensecurity.com/cybersecurity-extension-for-sap/" target="_blank" rel="noreferrer noopener">Cybersecurity Extension for SAP</a> from Layer Seven Security is completely closed-source and does not use open-source components, making it less vulnerable to software supply chain attacks that exploit public package ecosystems.</p>
<p>The post <a href="https://www.layersevensecurity.com/mini-shai-hulud-malware-targeting-the-software-supply-chain-for-sap-development-tools/">Mini Shai-Hulud: Malware Targeting the Software Supply Chain for SAP Development Tools</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>From SAP Logs to Security Intelligence: Integrating SAP with Splunk</title>
		<link>https://www.layersevensecurity.com/from-sap-logs-to-security-intelligence-integrating-sap-with-splunk/</link>
		
		<dc:creator><![CDATA[Layer Seven Security]]></dc:creator>
		<pubDate>Wed, 29 Apr 2026 20:14:48 +0000</pubDate>
				<category><![CDATA[SAP-SIEM Integration]]></category>
		<guid isPermaLink="false">https://www.layersevensecurity.com/?p=17361</guid>

					<description><![CDATA[<p>Splunk is one of the world’s most widely used platforms for collecting, indexing, and analyzing data from across enterprise environments, including servers, applications, cloud services, and network devices. It is commonly used by security operations teams as a Security Information and Event Management (SIEM) platform to centralize log data, correlate events, detect threats, investigate incidents, [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/from-sap-logs-to-security-intelligence-integrating-sap-with-splunk/">From SAP Logs to Security Intelligence: Integrating SAP with Splunk</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Splunk is one of the world’s most widely used platforms for collecting, indexing, and analyzing data from across enterprise environments, including servers, applications, cloud services, and network devices. It is commonly used by security operations teams as a Security Information and Event Management (SIEM) platform to centralize log data, correlate events, detect threats, investigate incidents, and accelerate response.</p>



<p>For organizations that rely on both SAP and Splunk, integrating SAP security logs with Splunk is an important step toward achieving unified enterprise threat detection for Security Operations Centers (SOC). However, direct integration is challenging due to the complexity of multiple SAP log sources, inconsistent log formats, high raw data volumes, ongoing maintenance demands, increased storage and licensing costs, and limited native enrichment for effective cross-platform threat correlation. As a result of the challenges detailed below, SOC teams often struggle to successfully connect SAP endpoints with Splunk.</p>



<p><strong>Complexity of SAP log sources</strong></p>



<p>SAP systems generate security-relevant events across multiple logs, including the Security Audit Log, Gateway Server Log, HTTP Log, System Log, Transaction Log, Change Document Log, and Read Access Log, as well as logs for HANA, BTP, Java, and other solutions. This makes direct integration with Splunk complex, especially across large SAP landscapes.</p>



<p><strong>Lack of standardized log formats</strong></p>



<p>SAP logs differ in format, structure, and storage method. Some logs are file-based, while others are stored in SAP tables. This creates challenges for consistent parsing, normalization, and ingestion into Splunk.</p>



<p><strong>High log volume</strong></p>



<p>Large SAP environments can generate very high volumes of raw log data. Transmitting this data to Splunk can increase network bandwidth usage, storage requirements, and SIEM licensing costs.</p>



<p><strong>Integration maintenance burden</strong></p>



<p>Organizations must maintain multiple integration points between SAP systems and Splunk. This includes managing connectivity, log collection, parsing rules, data retention, and archiving.</p>



<p><strong>Limited enrichment in native SAP logs</strong></p>



<p>Many SAP logs do not include the context needed for effective correlation in Splunk, such as source IP addresses, destination IP addresses, user context, system context, or business process details.</p>



<p><strong>Difficult cross-platform correlation</strong></p>



<p>SOC teams may struggle to correlate SAP activity with non-SAP telemetry from endpoints, networks, cloud platforms, identity systems, and other enterprise security tools.</p>



<p><strong>Scalability challenges in large SAP landscapes</strong></p>



<p>The complexity increases significantly when organizations need to integrate logs from multiple SAP systems, environments, applications, and instances.</p>



<p><strong>Cost control</strong></p>



<p>Sending large volumes of raw SAP log data into Splunk can increase infrastructure, storage, and licensing costs.</p>



<p><strong>Operational noise</strong></p>



<p>Raw SAP logs can contain large amounts of low-priority or repetitive events. Without filtering, normalization, and enrichment, SOC teams may face alert fatigue and reduced detection efficiency.</p>



<p><strong>Reduced investigation efficiency</strong></p>



<p>When SAP logs are incomplete, inconsistent, or difficult to correlate, analysts may need to manually investigate events across multiple SAP tools and Splunk searches, slowing incident response.</p>



<p>A further challenge is the lack of predefined rules in Splunk to detect SAP-specific threats. Splunk may centralize SAP logs, but it does not provide the intelligence required to interpret SAP events in the logs to identify threats. As a result, SOC teams often develop and maintain their own SAP-specific detection rules, despite lacking the specialized SAP security expertise required to do so effectively. This can lead to security blind spots and reduce the ability to successfully detect SAP threats.</p>



<p>These challenges can be addressed by integrating SAP logs with Splunk using the <a href="https://www.layersevensecurity.com/cybersecurity-extension-for-sap/" target="_blank" rel="noreferrer noopener">Cybersecurity Extension for SAP </a>(CES). CES provides more than 1,200 out-of-the-box patterns for identifying threats in SAP solutions, enabling SOC teams to monitor SAP logs immediately without investing extensive time and effort in building and maintaining custom detection rules. It delivers the SAP-specific intelligence needed to interpret log activity in Splunk, while monthly updates keep detection content aligned with new threats and vulnerabilities affecting SAP solutions. CES generates and forwards alerts to Splunk in real time, and filters, normalizes, and enriches data before it reaches Splunk. This provides a simpler, faster, and more effective approach for integrating SAP security events with Splunk.</p>



<p>Data can be streamed from CES to Splunk using either the Universal Forwarder or Heavy Forwarder for Splunk. Both are software log collection agents. The Universal Forwarder is a more lightweight agent than the Heavy Forwarder and therefore consumes fewer system resources. The Heavy Forwarder can parse, transform, and even index data locally. However, these functions are not required by CES. The Heavy Forwarder requires higher resources than the Universal Forwarder. As an alternative to the Forwarders, data can be forwarded from CES to Splunk via Syslog (rsyslog). This method may be required if it is not possible to install the Universal Forwarder on the target SAP server.</p>



<p>Once the agent is installed and configured in the host for CES, it will stream data from CES to Splunk. The next step is to create an index in Splunk for CES. An index is a logical storage location where Splunk stores incoming data after it has been ingested and processed. When Splunk receives log or event data, it breaks the data into searchable events and stores them in the target index. Users can query the index to find, analyze, correlate, and report on data.</p>



<p>The final step is to install the Splunk app for the Cybersecurity Extension for SAP. The app is available on <a href="https://splunkbase.splunk.com/app/8701" target="_blank" rel="noreferrer noopener">Splunkbase</a>. Splunk apps are addons that include predefined data models, configurations, dashboards and reports for specific use-cases. They help to accelerate deployment, reduce operational effort, and improve adoption. The Splunk app for CES is installed as a .tgz package using either the Splunk Web Interface or Command Line Interface (CLI).  Once installed, you can access the app from the Splunk App menu.</p>



<p>The app parses the data from the CES index and provides preconfigured dashboards to analyze and manage results. The results are structured into three domains: Alerts, Vulnerabilities, and Security Notes. Each domain can be analyzed separately. Alerts are based on pattern matches for threat detection rules applied by CES. Rules can be tuned using exclusion rules in CES to reduce noise and false positives. They can be analyzed and filtered based on date, time, system, environment, priority, and other criteria. Vulnerabilities are system and user-related security weaknesses in SAP solutions detected by CES based on daily automated security scans using a library of 3000+ SAP-related checks. &nbsp;Security notes are relevant, unapplied security patches calculated by CES. The app tracks the implementation status of security notes across SAP systems.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="776" src="https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01-1024x776.png" alt="" class="wp-image-17362" srcset="https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01-1024x776.png 1024w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01-300x227.png 300w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01-150x114.png 150w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01-768x582.png 768w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-01.png 1249w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>The app enables users to drill down from summary tiles and dashboards into detailed results for alert triage. These detailed results provide the context needed to answer the five Ws of security alerts:</p>



<p><strong>Who</strong><br>Identifies the user, service account, role, host, IP address, or system involved.</p>



<p><strong>What</strong><br>Describes the activity that occurred, such as a failed login, privilege change, suspicious command, vulnerable function call, data access, configuration change, or policy violation.</p>



<p><strong>When</strong><br>Shows when the event occurred, including the date, time, timezone, frequency, and whether the activity took place inside or outside normal operating hours.</p>



<p><strong>Where</strong><br>Identifies where the event occurred, such as the SAP system, client, application server, database, endpoint, cloud service, network segment, source location, or destination system.</p>



<p><strong>Why</strong><br>Explains the risk, business impact, and recommended investigation steps.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="831" src="https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02-1024x831.png" alt="" class="wp-image-17363" srcset="https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02-1024x831.png 1024w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02-300x244.png 300w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02-150x122.png 150w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02-768x623.png 768w, https://www.layersevensecurity.com/wp-content/uploads/Splunk-App-for-SAP-02.png 1227w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Status changes for alerts, vulnerabilities, and security notes are synchronized between CES and Splunk, ensuring that Splunk results remain current and reflect updates made by administrators in CES. Results are refreshed at regular intervals to further strengthen synchronization between the two solutions. The refresh rate can be adjusted to meet each organization’s specific requirements.</p>



<p>Integrating SAP logs with Splunk is more than a technical exercise. It is an opportunity to extend enterprise security monitoring to the systems that support an organization’s most critical business processes. By using CES to detect, filter, normalize, enrich, and forward SAP security events to Splunk, organizations can reduce integration complexity, lower operational overhead, and provide SOC teams with the SAP-specific intelligence needed to detect and respond to threats more effectively. The result is a faster, more scalable, and more actionable approach to SAP threat monitoring in Splunk.</p>
<p>The post <a href="https://www.layersevensecurity.com/from-sap-logs-to-security-intelligence-integrating-sap-with-splunk/">From SAP Logs to Security Intelligence: Integrating SAP with Splunk</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SAP Security Notes April 2026: Critical SQL Injection and High-Risk Flaws Patched</title>
		<link>https://www.layersevensecurity.com/sap-security-notes-april-2026/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 17:10:18 +0000</pubDate>
				<category><![CDATA[Advisories]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9398</guid>

					<description><![CDATA[<p>SAP&#8217;s April 2026 security update addresses a critical SQL injection vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse. This top-priority issue, detailed in Hot News note 3719353, stems from insufficient authorization checks and is fixed by deactivating the vulnerable code. Other high-risk patches were also released. The April 2026 SAP Security Patch [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-april-2026/">SAP Security Notes April 2026: Critical SQL Injection and High-Risk Flaws Patched</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>SAP&#8217;s April 2026 security update addresses a critical SQL injection vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse. This top-priority issue, detailed in Hot News note <a href="https://me.sap.com/notes/3719353" target="_blank" rel="noreferrer noopener">3719353</a>, stems from insufficient authorization checks and is fixed by deactivating the vulnerable code. Other high-risk patches were also released.</p>



<p>The April 2026 SAP Security Patch Day delivered a focused but significant set of updates, led by a critical SQL injection vulnerability. This flaw, covered by Hot News note <a href="https://me.sap.com/notes/3719353" target="_blank" rel="noreferrer noopener">3719353</a>, affects SAP Business Planning and Consolidation (BPC) and SAP Business Warehouse (BW) and is caused by an insufficient authorization check in a user upload program. The patch resolves the issue by deactivating the executable code. Additionally, a high-risk vulnerability was patched in SAP ERP and S/4HANA via note <a href="https://me.sap.com/notes/3731908" target="_blank" rel="noreferrer noopener">3731908</a>, which addresses a missing authorization check that could allow attackers to overwrite ABAP reports. The month&#8217;s updates also included several lower-priority notes for missing authorization checks in S/4HANA and patches for Open Redirect, information disclosure, and code injection vulnerabilities across the SAP landscape.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading"><strong>Key Takeaways</strong></h3>



<ul class="wp-block-list">
<li>A critical SQL injection vulnerability was patched in SAP BPC and BW (Note <a href="https://me.sap.com/notes/3719353" target="_blank" rel="noreferrer noopener">3719353</a>).</li>



<li>A high-risk authorization flaw in SAP ERP and S/4HANA could lead to report overwrites (Note <a href="https://me.sap.com/notes/3731908" target="_blank" rel="noreferrer noopener">3731908</a>).</li>



<li>Multiple lower-priority notes address missing authorization checks in S/4HANA.</li>



<li>Patches were also released for Open Redirect, information disclosure, and code injection flaws.</li>



<li>A temporary workaround for the critical SQL injection is to restrict access to authorization object S_GUI.<br><br></li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading"><strong>What Are the Most Significant Vulnerabilities for April 2026?</strong></h3>



<p>The April 2026 SAP security notes are highlighted by a critical SQL injection vulnerability and a high-risk authorization flaw. The table below summarizes the most important patches released.</p>



<figure class="wp-block-table"><table><tbody><tr><td><strong>SAP Note</strong></td><td><strong>Vulnerability Type</strong></td><td><strong>Affected SAP Product(s)</strong></td><td><strong>Risk Level</strong></td></tr><tr><td><a href="https://me.sap.com/notes/3719353" target="_blank" rel="noreferrer noopener">3719353</a></td><td>SQL Injection</td><td>SAP Business Planning and Consolidation, SAP Business Warehouse</td><td>Critical</td></tr><tr><td><a href="https://me.sap.com/notes/3731908">3731908</a></td><td>Missing Authorization Check</td><td>SAP ERP, SAP S/4HANA</td><td>High</td></tr><tr><td><a href="https://me.sap.com/notes/3692004" target="_blank" rel="noreferrer noopener">3692004</a></td><td>Open Redirect</td><td>SAP NetWeaver Application Server ABAP</td><td>Medium</td></tr><tr><td><a href="https://me.sap.com/notes/3719397" target="_blank" rel="noreferrer noopener">3719397</a></td><td>Code Injection</td><td>SAP NetWeaver Application Server Java</td><td>Medium</td></tr><tr><td><a href="https://me.sap.com/notes/3680767" target="_blank" rel="noreferrer noopener">3680767</a></td><td>Information Disclosure</td><td>SAP Human Capital Management (HCM) for S/4HANA</td><td>Medium</td></tr><tr><td><a href="https://me.sap.com/notes/3730639" target="_blank" rel="noreferrer noopener">3730639</a></td><td>Information Disclosure</td><td>SAP HANA Cockpit, HANA Database Explorer</td><td>Medium</td></tr></tbody></table></figure>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Is the Critical SQL Injection Vulnerability?</h3>



<p>Hot News note <a href="https://me.sap.com/notes/3719353" target="_blank" rel="noreferrer noopener">3719353</a> patches a critical SQL injection vulnerability found in SAP Business Planning and Consolidation and SAP Business Warehouse. The issue is caused by an insufficient authorization check for user uploads within a specific ABAP program. The official fix deactivates the executable code in the program, which prevents it from being executed by any user. As a temporary workaround, administrators can restrict access to the authorization object <strong>S_GUI</strong> with activity 60.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Other High-Risk Vulnerabilities Were Patched?</h3>



<p>Note <a href="https://me.sap.com/notes/3731908" target="_blank" rel="noreferrer noopener">3731908</a> addresses a high-risk missing authorization check in SAP ERP and S/4HANA. This vulnerability could be exploited to overwrite ABAP reports, which would impact their availability. A recommended workaround is to restrict access to the vulnerable programs, <strong>RGJVCORG</strong> and <strong>RGJVCORX</strong>, using authorization groups.</p>



<p>In addition, several other lower-priority security notes were released to fix missing authorization checks in S/4HANA, including <a href="https://me.sap.com/notes/3703813" target="_blank" rel="noreferrer noopener">3703813</a>, <a href="https://me.sap.com/notes/3715177" target="_blank" rel="noreferrer noopener">3715177</a>, <a href="https://me.sap.com/notes/3715097" target="_blank" rel="noreferrer noopener">3715097</a>, <a href="https://me.sap.com/notes/3711682" target="_blank" rel="noreferrer noopener">3711682</a>, <a href="https://me.sap.com/notes/3530544" target="_blank" rel="noreferrer noopener">3530544</a>, and <a href="https://me.sap.com/notes/3716767" target="_blank" rel="noreferrer noopener">3716767</a>.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Other Flaws Were Addressed in April 2026?</h3>



<p>SAP also released patches for several other vulnerabilities across its product suite:</p>



<ul class="wp-block-list">
<li><strong>Open Redirect:</strong> Note <a href="https://me.sap.com/notes/3692004" target="_blank" rel="noreferrer noopener">3692004</a> fixes an Open Redirect vulnerability in SAP NetWeaver Application Server ABAP that could be used to redirect users to malicious websites.</li>



<li><strong>Information Disclosure:</strong> Note <a href="https://me.sap.com/notes/3680767" target="_blank" rel="noreferrer noopener">3680767</a> addresses a flaw in SAP Human Capital Management (HCM) for S/4HANA that could leak sensitive information. A separate note, <a href="https://me.sap.com/notes/3730639" target="_blank" rel="noreferrer noopener">3730639</a>, patches an information disclosure vulnerability in SAP HANA Cockpit and HANA Database Explorer related to mTLS for X.509 Certificates.</li>



<li><strong>Code Injection:</strong> Note <a href="https://me.sap.com/notes/3719397" target="_blank" rel="noreferrer noopener">3719397</a> fixes a code injection vulnerability in the Web Dynpro runtime of SAP NetWeaver Application Server Java, which could be exploited to compromise user sessions.</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Frequently Asked Questions (FAQ)</h3>



<p><strong>What was the most critical SAP vulnerability for April 2026?</strong><br>The most critical vulnerability was a SQL injection in SAP Business Planning and Consolidation and SAP Business Warehouse, addressed by Hot News note <a href="https://me.sap.com/notes/3719353" target="_blank" rel="noreferrer noopener">3719353</a>. It resulted from insufficient authorization checks for user uploads.</p>



<p><strong>How can the critical SQL injection vulnerability be mitigated without patching?</strong><br>As a temporary workaround, administrators can restrict user access to the authorization object <strong>S_GUI</strong> with activity 60 to prevent the vulnerable upload functionality from being used.</p>



<p><strong>Which SAP products were affected by high-risk authorization issues?</strong><br>SAP ERP and SAP S/4HANA were affected by a high-risk missing authorization check (Note <a href="https://me.sap.com/notes/3731908" target="_blank" rel="noreferrer noopener">3731908</a>) that could allow for the overwriting of ABAP reports. Multiple other lower-priority authorization issues were also patched in S/4HANA.</p>



<p></p>



<script type="application/ld+json">
{
  "@context": "https://schema.org",
  "@type": "FAQPage",
  "mainEntity": [
    {
      "@type": "Question",
      "name": "What was the most critical SAP vulnerability for April 2026?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "The most critical vulnerability was a SQL injection in SAP Business Planning and Consolidation and SAP Business Warehouse, addressed by Hot News note 3719353 (https://me.sap.com/notes/3719353). It resulted from insufficient authorization checks for user uploads."
      }
    },
    {
      "@type": "Question",
      "name": "How can the critical SQL injection vulnerability be mitigated without patching?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "As a temporary workaround, administrators can restrict user access to the authorization object S_GUI with activity 60 to prevent the vulnerable upload functionality from being used."
      }
    },
    {
      "@type": "Question",
      "name": "Which SAP products were affected by high-risk authorization issues?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "SAP ERP and SAP S/4HANA were affected by a high-risk missing authorization check (Note 3731908 - https://me.sap.com/notes/3731908) that could allow for the overwriting of ABAP reports. Multiple other lower-priority authorization issues were also patched in S/4HANA."
      }
    }
  ]
}
</script>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-april-2026/">SAP Security Notes April 2026: Critical SQL Injection and High-Risk Flaws Patched</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Deploy the Cybersecurity Extension for SAP on SAP Build Work Zone</title>
		<link>https://www.layersevensecurity.com/now-on-sap-btp-access-the-cybersecurity-extension-for-sap-on-sap-build-work-zone/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 18:36:40 +0000</pubDate>
				<category><![CDATA[SAP Cloud Security]]></category>
		<category><![CDATA[SAP Security Solutions]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9386</guid>

					<description><![CDATA[<p>Deploying the Cybersecurity Extension for SAP on SAP BTP involves a three-stage process that takes approximately 45 minutes. First, prepare the SAP BTP subaccount, ensuring the Cloud Connector, destinations, and entitlements are correctly configured. Next, use the Cloud Foundry CLI to deploy the provided .mtar file. Finally, configure SAP Build Work Zone by importing the [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/now-on-sap-btp-access-the-cybersecurity-extension-for-sap-on-sap-build-work-zone/">How to Deploy the Cybersecurity Extension for SAP on SAP Build Work Zone</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Deploying the Cybersecurity Extension for SAP on SAP BTP involves a three-stage process that takes approximately 45 minutes. First, prepare the SAP BTP subaccount, ensuring the Cloud Connector, destinations, and entitlements are correctly configured. Next, use the Cloud Foundry CLI to deploy the provided .mtar file. Finally, configure SAP Build Work Zone by importing the solution content and assigning user roles.</p>



<p>Moving Fiori applications like the Cybersecurity Extension for SAP from the traditional embedded model to SAP BTP offers significant advantages. While the embedded model simplifies landscapes by keeping frontend and backend components together, it often restricts innovation due to the limitations of older backend systems like ECC. Deploying on SAP BTP decouples the frontend, enabling modern user experiences with Horizon themes, and aligns with SAP&#8217;s &#8220;clean core&#8221; strategy by externalizing customizations. This cloud-based approach also unlocks advanced capabilities from SAP AI Core and the Generative AI Hub, such as intelligent analysis and conversational interfaces. The complete process to deploy the extension on SAP BTP&#8217;s Build Work Zone is a 45-minute, three-part procedure covering landscape preparation, CLI-based installation, and final Work Zone configuration.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Key Takeaways</h3>



<ul class="wp-block-list">
<li>Deploy on SAP BTP to overcome the limitations of the traditional embedded model.</li>



<li>BTP enables modern user experiences, a &#8220;clean core&#8221; strategy, and AI integration.</li>



<li>The extension is deployed as a .mtar file using the Cloud Foundry CLI.</li>



<li>The process involves three stages: Prepare, Install, and Configure.</li>



<li>Total deployment and configuration time is approximately 45 minutes.</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Why Deploy on SAP BTP Instead of the Embedded Model?</h3>



<p>The first sentence of each paragraph should directly answer the question. The Cybersecurity Extension for SAP provides an SAP Fiori user experience that is usually deployed using the embedded Fiori model, which combines backend and frontend components in the same system. This model reduces landscape complexity, removes external communication for service calls, and can improve response times and stability. Operationally, the embedded model typically means fewer systems to maintain, monitor, and secure, and it simplifies lifecycle management.</p>



<p>However, the downside of the embedded model is that frontend applications are constrained by the limitations of backend systems. This can hold back innovation and the adoption of new capabilities in SAP Fiori applications. For example, the use of Horizon themes for a more unified user experience is only possible with higher versions of SAPUI5, which solutions like ECC cannot support with the embedded model.</p>



<p>SAP BTP overcomes these limitations by providing a separate cloud-based platform for Fiori applications. This supports user experience improvements and aligns with SAP’s strategy for a clean core by moving customizations to cloud extensions, leading to more stable SAP environments that are easier to maintain and upgrade. Deploying Fiori applications to SAP BTP also enables organizations to benefit from services available in SAP AI Core and Generative AI Hub for AI-driven analysis, predictive capabilities, and intelligent workflows.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Embedded Model vs. SAP BTP Deployment for Fiori Apps</h3>



<p>This table compares the traditional embedded approach with deploying on the SAP BTP cloud platform.</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><th class="has-text-align-left" data-align="left">Feature</th><th class="has-text-align-left" data-align="left">Embedded Model</th><th class="has-text-align-left" data-align="left">SAP BTP Deployment</th></tr><tr><td><strong>Architecture</strong></td><td>Frontend and backend on the same system.</td><td>Decoupled frontend on cloud, backend on-premise.</td></tr><tr><td><strong>User Experience</strong></td><td>Limited by backend system (e.g., no Horizon on ECC).</td><td>Supports modern themes like Horizon for a unified UX.</td></tr><tr><td><strong>Innovation</strong></td><td>Constrained by backend capabilities and release cycles.</td><td>Faster adoption of new Fiori capabilities.</td></tr><tr><td><strong>Core Strategy</strong></td><td>Leads to customizations within the core system.</td><td>Enables a &#8220;clean core&#8221; by moving extensions to the cloud.</td></tr><tr><td><strong>AI/ML Integration</strong></td><td>Difficult or impossible to integrate.</td><td>Enables use of SAP AI Core and Generative AI Hub.</td></tr><tr><td><strong>Landscape</strong></td><td>Simpler, with fewer systems to manage initially.</td><td>Aligns with modern, flexible cloud architecture.</td></tr></tbody></table></figure>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What are the prerequisites for the SAP BTP landscape?</h3>



<p>Before installing the extension, you must prepare your SAP BTP landscape, a process that takes about 45 minutes. Start by creating or confirming the subaccount in the SAP BTP Cockpit. Once the subaccount is created, complete the mandatory configuration.</p>



<ul class="wp-block-list">
<li><strong>Verify Cloud Connector:</strong> Ensure the Cloud Connector is properly attached to the subaccount and its connection status is &#8220;established&#8221;.</li>



<li><strong>Confirm Destination:</strong> Confirm a destination named <code>backend</code> is present. Principal Propagation is the recommended authentication method for a trusted setup.</li>



<li><strong>Provision Cloud Foundry:</strong> Ensure your Cloud Foundry environment is provisioned. Create the instance and at least one space for deployments.</li>



<li><strong>Validate Entitlements:</strong> At the global account level, assign the SAP Build Work Zone entitlement to the target subaccount and confirm an active subscription.</li>



<li><strong>Assign Admin Roles:</strong> Assign the required admin role, such as the <code>Launchpad_Admin</code> role collection, to the operator who will configure the launchpad.</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">How do you install the extension using the Cloud Foundry CLI?</h3>



<p>The Cybersecurity Extension for SAP is deployed as a .mtar archive via the Cloud Foundry command-line interface (CLI). First, install the SAP (Cloud Foundry) CLI on your workstation and add the HTML5 applications repository plugin.</p>



<p>Next, move the provided .mtar file into a working folder and open a command line in that directory. Log in to your Cloud Foundry organization and space by running&nbsp;<code>cf login</code>&nbsp;and following the prompts. Once the session is established, deploy the archive using the command&nbsp;<code>cf deploy</code>.</p>



<p>When the deployment completes, you can confirm the HTML5 apps were created by running&nbsp;<code>cf html5-list</code>. You can also verify the deployment visually by navigating to the HTML5 Applications area within your subaccount in the SAP BTP Cockpit.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">How do you configure SAP Build Work Zone for the extension?</h3>



<p>After installation, you must configure the SAP Build Work Zone site and user access. In your subaccount, open the SAP Build Work Zone subscription and launch the application. If no site exists, create one from the Work Zone entry point.</p>



<ul class="wp-block-list">
<li><strong>Update Content Channel:</strong> In the Channel Manager, update the default content channel (HTML5).</li>



<li><strong>Import Content:</strong> The fastest path is to use the Content Manager to import the provided L7S content .zip file. After the import, you should see a bundle of objects including apps, a group, a page, a space, a role, and a catalog.</li>



<li><strong>Assign User Access:</strong> In the subaccount, assign the <code>L7S</code> role collection to the intended business users. Then, in the Work Zone Site Directory, confirm the site’s role assignment includes this role. Enabling multifactor authentication (MFA) for users via SAP Cloud Identity Services is highly recommended.</li>
</ul>



<p>Once configured, log on to the site with a user who has the L7S role. The Cybersecurity Extension for SAP tile will be available in the launchpad.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://www.layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-on-SAP-BTP-01-1.png" alt="" class="wp-image-9390"/></figure>



<p>Clicking the tile launches the application&#8217;s home screen.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://www.layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-on-SAP-BTP-02-1.png" alt="" class="wp-image-9391"/></figure>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Frequently Asked Questions (FAQ)</h3>



<p><strong>What is the embedded Fiori deployment model?</strong><br>The embedded model is an architecture where SAP Fiori frontend components and the backend business logic reside on the same system. This approach simplifies the system landscape and reduces operational overhead but can limit the adoption of modern frontend technologies and innovations.</p>



<p><strong>How long does it take to deploy the Cybersecurity Extension to SAP BTP?</strong><br>The entire process, which includes preparing the BTP landscape, installing the extension via the CLI, and configuring the SAP Build Work Zone, typically takes around 45 minutes to complete for an experienced administrator.</p>



<p><strong>What is a &#8220;clean core&#8221; in the context of SAP?</strong><br>A &#8220;clean core&#8221; is an SAP strategy that advocates for keeping the core ERP system as standard and free of customizations as possible. Instead, custom developments and extensions are built on cloud platforms like SAP BTP, which makes the core system more stable and easier to upgrade.</p>



<p><strong>What command is used to deploy the Cybersecurity Extension?</strong><br>The extension is packaged as a .mtar file and is deployed to the SAP BTP Cloud Foundry environment using the&nbsp;<code>cf deploy</code>&nbsp;command from the SAP (Cloud Foundry) CLI.</p>



<script type="application/ld+json">
[
  {
    "@context": "https://schema.org",
    "@type": "FAQPage",
    "mainEntity": [
      {
        "@type": "Question",
        "name": "What is the embedded Fiori deployment model?",
        "acceptedAnswer": {
          "@type": "Answer",
          "text": "The embedded model is an architecture where SAP Fiori frontend components and backend business logic reside on the same system. This simplifies the system landscape and reduces operational overhead but may limit adoption of modern frontend innovations."
        }
      },
      {
        "@type": "Question",
        "name": "How long does it take to deploy the Cybersecurity Extension to SAP BTP?",
        "acceptedAnswer": {
          "@type": "Answer",
          "text": "The deployment process, including preparation, installation, and configuration, typically takes around 45 minutes for an experienced administrator."
        }
      },
      {
        "@type": "Question",
        "name": "What is a clean core in SAP?",
        "acceptedAnswer": {
          "@type": "Answer",
          "text": "A clean core is an SAP strategy that keeps the core ERP system standard and free of customizations. Extensions are built on platforms like SAP BTP, improving system stability and upgradeability."
        }
      },
      {
        "@type": "Question",
        "name": "What command is used to deploy the Cybersecurity Extension?",
        "acceptedAnswer": {
          "@type": "Answer",
          "text": "The extension is deployed as an MTAR file using the cf deploy command via the SAP Cloud Foundry CLI."
        }
      }
    ]
  },
  {
    "@context": "https://schema.org",
    "@type": "HowTo",
    "name": "How to Deploy the Cybersecurity Extension for SAP on SAP Build Work Zone",
    "description": "Step-by-step guide to deploying the Cybersecurity Extension on SAP Business Technology Platform.",
    "totalTime": "PT45M",
    "tool": [
      {
        "@type": "HowToTool",
        "name": "SAP Cloud Foundry CLI"
      }
    ],
    "step": [
      {
        "@type": "HowToSection",
        "name": "Preparation: Configure SAP BTP Landscape",
        "itemListElement": [
          {
            "@type": "HowToStep",
            "name": "Create subaccount",
            "text": "Create or confirm the subaccount in SAP BTP Cockpit."
          },
          {
            "@type": "HowToStep",
            "name": "Verify Cloud Connector",
            "text": "Ensure the Cloud Connector connection is established."
          },
          {
            "@type": "HowToStep",
            "name": "Check destination",
            "text": "Confirm a destination named backend exists with Principal Propagation."
          },
          {
            "@type": "HowToStep",
            "name": "Provision Cloud Foundry",
            "text": "Ensure the Cloud Foundry environment has at least one space."
          },
          {
            "@type": "HowToStep",
            "name": "Validate entitlements",
            "text": "Confirm SAP Build Work Zone entitlements and subscriptions."
          },
          {
            "@type": "HowToStep",
            "name": "Assign roles",
            "text": "Assign the Launchpad_Admin role collection to the administrator."
          }
        ]
      },
      {
        "@type": "HowToSection",
        "name": "Installation: Deploy via Cloud Foundry CLI",
        "itemListElement": [
          {
            "@type": "HowToStep",
            "name": "Install CLI",
            "text": "Install SAP Cloud Foundry CLI and HTML5 repository plugin."
          },
          {
            "@type": "HowToStep",
            "name": "Login",
            "text": "Log in using cf login to the correct org and space."
          },
          {
            "@type": "HowToStep",
            "name": "Deploy MTAR",
            "text": "Deploy the MTAR archive using cf deploy."
          },
          {
            "@type": "HowToStep",
            "name": "Verify deployment",
            "text": "Confirm deployment using cf html5-list or BTP Cockpit."
          }
        ]
      },
      {
        "@type": "HowToSection",
        "name": "Configuration: Set Up SAP Build Work Zone",
        "itemListElement": [
          {
            "@type": "HowToStep",
            "name": "Launch Work Zone",
            "text": "Open SAP Build Work Zone and create a site if required."
          },
          {
            "@type": "HowToStep",
            "name": "Update channel",
            "text": "Update the default HTML5 content channel in Channel Manager."
          },
          {
            "@type": "HowToStep",
            "name": "Import content",
            "text": "Import the L7S content ZIP file via Content Manager."
          },
          {
            "@type": "HowToStep",
            "name": "Assign roles to users",
            "text": "Assign the L7S role collection to business users."
          },
          {
            "@type": "HowToStep",
            "name": "Verify roles",
            "text": "Ensure the site includes the L7S role assignment."
          }
        ]
      }
    ]
  }
]
</script>
<p>The post <a href="https://www.layersevensecurity.com/now-on-sap-btp-access-the-cybersecurity-extension-for-sap-on-sap-build-work-zone/">How to Deploy the Cybersecurity Extension for SAP on SAP Build Work Zone</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Layer Seven Security Achieves CyberSecure Canada Certification</title>
		<link>https://www.layersevensecurity.com/layer-seven-security-achieves-cybersecure-certification/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 19:05:52 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9378</guid>

					<description><![CDATA[<p>Layer Seven Security has successfully achieved certification under the CyberSecure Canada program, validating its strong cybersecurity posture and the application of recognized baseline security controls. This certification provides customers, especially those who rely on SAP systems, with independent assurance that Layer Seven Security operates within a structured and nationally recognized cybersecurity framework. This certification reinforces [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/layer-seven-security-achieves-cybersecure-certification/">Layer Seven Security Achieves CyberSecure Canada Certification</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img decoding="async" src="https://www.layersevensecurity.com/wp-content/uploads/CyberSecure-Canada.jpg" alt="" class="wp-image-9379"/></figure>



<p>Layer Seven Security has successfully achieved certification under the CyberSecure Canada program, validating its strong cybersecurity posture and the application of recognized baseline security controls. This certification provides customers, especially those who rely on SAP systems, with independent assurance that Layer Seven Security operates within a structured and nationally recognized cybersecurity framework.</p>



<p>This certification reinforces Layer Seven Security&#8217;s commitment to maintaining robust internal security governance and operational safeguards. The CyberSecure Canada program was established by Innovation, Science and Economic Development (ISED) Canada and is based on controls developed by the Canadian Centre for Cyber Security. For organizations that depend on Layer Seven Security for SAP cybersecurity, this certification supports supply chain assurance, operational resilience, and simplifies vendor due diligence, third-party risk assessment, and procurement requirements. It provides customers with confidence in Layer Seven Security as a trusted, independently validated cybersecurity partner.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Key Takeaways</h3>



<ul class="wp-block-list">
<li>Layer Seven Security is now certified under the Government of Canada&#8217;s CyberSecure program.</li>



<li>The certification validates the company&#8217;s cybersecurity framework and controls.</li>



<li>It provides special assurance for customers using SAP business-critical systems.</li>



<li>Certification aids in vendor due diligence and third-party risk assessment.</li>



<li>It demonstrates a commitment to reducing cyber risk and enhancing resilience.</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What is the CyberSecure Canada Certification?</h3>



<p>The CyberSecure Canada certification is a national program established by <a href="https://ised-isde.canada.ca/site/ised/en" target="_blank" rel="noreferrer noopener">Innovation, Science and Economic Development (ISED) Canada</a> to improve information security across the country. The program is based on a set of baseline cybersecurity controls developed by the <a href="https://www.cyber.gc.ca/en" target="_blank" rel="noreferrer noopener">Canadian Centre for Cyber Security</a>, Canada&#8217;s authority on the subject. It is designed to provide organizations with a clear framework to protect against common cyber threats and demonstrate their commitment to security.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Does This Certification Mean for SAP Customers?</h3>



<p>For customers that rely on SAP systems to support business-critical processes, the certification provides independent validation that Layer Seven Security operates within a structured cybersecurity framework. It demonstrates that the company maintains robust internal security governance and operational safeguards. This government-backed national certification provides tangible assurance for vendor due diligence, third-party risk assessment, and procurement requirements, giving SAP customers confidence in Layer Seven Security as a trusted partner.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Which Security Controls Does the Certification Cover?</h3>



<p>The certification addresses key threat scenarios and organizational cyber risk through practical and measurable safeguards. The control areas are designed to establish a foundational security baseline to reduce the likelihood and impact of compromise, service disruption, and data loss. These controls include:</p>



<ul class="wp-block-list">
<li>Incident response and recovery</li>



<li>Automated patching</li>



<li>Endpoint protection</li>



<li>Secure configuration of devices and systems</li>



<li>Identity and access management</li>



<li>Multi-factor authentication</li>



<li>Employee cybersecurity awareness</li>



<li>Backup protection and encryption</li>



<li>Perimeter defence</li>



<li>Mobile device protection</li>



<li>Secure use of cloud and outsourced IT services</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Frequently Asked Questions (FAQ)</h3>



<p><strong>What is the CyberSecure Canada program?</strong><br>CyberSecure Canada is a national cybersecurity certification program from the Government of Canada designed to help organizations improve their security posture by implementing a baseline of defined controls.</p>



<p><strong>Why is this certification important for Layer Seven Security&#8217;s customers?</strong><br>It provides independent, government-backed validation of Layer Seven Security&#8217;s internal security framework, which is crucial for vendor due diligence, third-party risk assessment, and procurement, especially for clients relying on SAP systems.</p>



<p><strong>Who developed the security controls for the CyberSecure program?</strong><br>The cybersecurity controls are developed from guidance published by the Canadian Centre for Cyber Security, which is part of the Communications Security Establishment.</p>



<script type="application/ld+json">
{
  "@context": "https://schema.org",
  "@type": "FAQPage",
  "mainEntity": [
    {
      "@type": "Question",
      "name": "What is the CyberSecure Canada program?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "CyberSecure Canada is a national cybersecurity certification program from the Government of Canada designed to help organizations improve their security posture by implementing a baseline set of controls."
      }
    },
    {
      "@type": "Question",
      "name": "Why is this certification important for Layer Seven Security customers?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "It provides independent, government-backed validation of Layer Seven Security's internal security framework, supporting vendor due diligence, third-party risk assessments, and procurement processes, especially for SAP-focused clients."
      }
    },
    {
      "@type": "Question",
      "name": "Who developed the security controls for the CyberSecure Canada program?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "The cybersecurity controls are based on guidance from the Canadian Centre for Cyber Security, part of the Communications Security Establishment."
      }
    }
  ]
}
</script>
<p>The post <a href="https://www.layersevensecurity.com/layer-seven-security-achieves-cybersecure-certification/">Layer Seven Security Achieves CyberSecure Canada Certification</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SAP Security Notes March 2026: Critical Log4j and RCE Flaws Patched</title>
		<link>https://www.layersevensecurity.com/sap-security-notes-march-2026/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Tue, 10 Mar 2026 16:19:08 +0000</pubDate>
				<category><![CDATA[Advisories]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9374</guid>

					<description><![CDATA[<p>SAP&#8217;s security notes for March 2026 address 14 vulnerabilities, including two critical &#8220;Hot News&#8221; items. The most severe patches fix a command injection vulnerability related to Apache Log4j and a remote code execution flaw in SAP NetWeaver Enterprise Portal. A high-risk Denial of Service (DoS) note for SAP Supply Chain Management was also released. This [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-march-2026/">SAP Security Notes March 2026: Critical Log4j and RCE Flaws Patched</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>SAP&#8217;s security notes for March 2026 address 14 vulnerabilities, including two critical &#8220;Hot News&#8221; items. The most severe patches fix a command injection vulnerability related to Apache Log4j and a remote code execution flaw in SAP NetWeaver Enterprise Portal. A high-risk Denial of Service (DoS) note for SAP Supply Chain Management was also released.</p>



<p>This advisory from Layer Seven Security summarizes the key patches released on March 10, 2026. The most critical vulnerabilities involve a Log4j issue in SAP Quotation Management Insurance, insecure deserialization in SAP NetWeaver, and a DoS risk in SAP SCM. These notes highlight the ongoing need for organizations to prioritize timely patching to secure their SAP landscapes from significant operational and security risks.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Key Takeaways for March 2026</h3>



<ul class="wp-block-list">
<li><strong>Critical Log4j Flaw:</strong> A command injection vulnerability in Apache Log4j bundled with SAP Quotation Management Insurance was patched under Hot News note <a href="https://me.sap.com/notes/3698553" target="_blank" rel="noreferrer noopener">3698553</a>.</li>



<li><strong>NetWeaver RCE:</strong> Hot News note <a href="https://me.sap.com/notes/3714585" target="_blank" rel="noreferrer noopener">3714585</a> addresses a critical insecure deserialization vulnerability in SAP NetWeaver Enterprise Portal that could allow remote code execution.</li>



<li><strong>High-Risk DoS:</strong> Note <a href="https://me.sap.com/notes/3719502" target="_blank" rel="noreferrer noopener">3719502</a> patches a high-risk Denial of Service vulnerability in SAP Supply Chain Management.</li>



<li><strong>Total Patches:</strong> SAP released 14 security notes, including two Hot News, one high-priority, and 11 medium-priority issues.</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Are the Critical Vulnerabilities for March 2026?</h3>



<p>SAP released two &#8220;Hot News&#8221; notes, reserved for the most critical vulnerabilities requiring immediate attention.</p>



<p>The first, note <a href="https://me.sap.com/notes/3698553" target="_blank" rel="noreferrer noopener">3698553</a>, patches a critical command injection vulnerability in Apache Log4j as bundled in SAP Quotation Management Insurance. The fix requires updating the package assembly for the FS-QUO-scheduler module to a secure version. As a temporary workaround, the log4j-1.2.17.jar file can be deleted from the {FS-QUO-scheduler}/lib directory.</p>



<p>The second, note <a href="https://me.sap.com/notes/3714585" target="_blank" rel="noreferrer noopener">3714585</a>, addresses an insecure deserialization vulnerability in SAP NetWeaver Enterprise Portal Administration. This flaw could lead to malicious remote code execution through the upload of user-supplied content. The patch, which is only available for NetWeaver AS Java 7.50, validates input before processing to secure the deserialization logic. For older, unmaintained versions, SAP refers to note <a href="https://me.sap.com/notes/3660659" target="_blank" rel="noreferrer noopener">3660659</a> for security hardening guidance. Access to roles like <strong>superadminrole</strong>, <strong>systemadminrole</strong>, and <strong>contentadminrole</strong> should also be restricted.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Was the High-Risk Vulnerability Patched?</h3>



<p>Note <a href="https://me.sap.com/notes/3719502" target="_blank" rel="noreferrer noopener">3719502</a> was released to patch a high-risk Denial of Service (DoS) vulnerability in SAP Supply Chain Management. The patch applies input validation for calls to a specific vulnerable Remote Function Module (RFM) to prevent excessive resource consumption that could render the system unavailable. The <a href="https://www.layersevensecurity.com/cybersecurity-extension-for-sap/">Cybersecurity Extension for SAP</a> provides monitoring for calls to this vulnerable RFM.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Other Vulnerabilities Were Addressed?</h3>



<p>The remaining 11 security notes address medium-priority issues across various SAP products. This includes vulnerabilities in SAP NetWeaver AS ABAP, such as Server-Side Request Forgery (SSRF) and missing authorization checks, covered in notes <a href="https://me.sap.com/notes/3689080" target="_blank" rel="noreferrer noopener">3689080</a>, <a href="https://me.sap.com/notes/3704740" target="_blank" rel="noreferrer noopener">3704740</a>, and <a href="https://me.sap.com/notes/3703856" target="_blank" rel="noreferrer noopener">3703856</a>.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Frequently Asked Questions (FAQ)</h3>



<p><strong>Q: How many SAP security notes were released in March 2026?</strong><br>A: SAP released 14 new security notes in March 2026, including two critical &#8220;Hot News&#8221; notes, one high-priority note, and 11 medium-priority notes.</p>



<p><strong>Q: What was the most critical vulnerability patched in March 2026?</strong><br>A: The most critical vulnerability was a command injection flaw in Apache Log4j bundled with SAP Quotation Management Insurance, addressed by Hot News note <a href="https://me.sap.com/notes/3698553" target="_blank" rel="noreferrer noopener">3698553</a>. This vulnerability allows for remote code execution.</p>



<p><strong>Q: Is there a patch for the NetWeaver RCE vulnerability on older versions?</strong><br>A: No, the direct patch for the insecure deserialization vulnerability (note <a href="https://me.sap.com/notes/3714585" target="_blank" rel="noreferrer noopener">3714585</a>) is only available for NetWeaver AS Java 7.50. For earlier versions, customers must apply security hardening measures as detailed in SAP note <a href="https://me.sap.com/notes/3660659" target="_blank" rel="noreferrer noopener">3660659</a>.</p>



<script type="application/ld+json">
{
  "@context": "https://schema.org",
  "@type": "FAQPage",
  "mainEntity": [
    {
      "@type": "Question",
      "name": "How many SAP security notes were released in March 2026?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "SAP released 14 new security notes in March 2026, including two critical Hot News notes, one high-priority note, and 11 medium-priority notes."
      }
    },
    {
      "@type": "Question",
      "name": "What was the most critical vulnerability patched in March 2026?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "The most critical vulnerability was a command injection flaw in Apache Log4j bundled with SAP Quotation Management Insurance, addressed by Hot News note 3698553 (https://me.sap.com/notes/3698553), which could allow remote code execution."
      }
    },
    {
      "@type": "Question",
      "name": "Is there a patch for the NetWeaver RCE vulnerability on older versions?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "No, the patch for the insecure deserialization vulnerability (note 3714585 - https://me.sap.com/notes/3714585) is only available for NetWeaver AS Java 7.50. For earlier versions, apply security hardening measures described in SAP note 3660659 (https://me.sap.com/notes/3660659)."
      }
    }
  ]
}
</script>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-march-2026/">SAP Security Notes March 2026: Critical Log4j and RCE Flaws Patched</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>State-Sponsored Cyber Attacks on SAP: A Guide to Threats and Defenses</title>
		<link>https://www.layersevensecurity.com/state-sponsored-cyber-attacks-an-increasing-threat-to-sap-solutions/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Wed, 25 Feb 2026 01:43:53 +0000</pubDate>
				<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[SAP Vulnerabilities]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9368</guid>

					<description><![CDATA[<p>State-sponsored cyber attacks are a rapidly increasing threat to SAP solutions, driven by rising geopolitical tensions. Attackers target mission-critical SAP systems for espionage and sabotage, exploiting their wide attack surface and slow enterprise patching cycles. Defending these vital systems requires specialized vulnerability management, real-time threat detection, and a focused effort to harden specific SAP configurations [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/state-sponsored-cyber-attacks-an-increasing-threat-to-sap-solutions/">State-Sponsored Cyber Attacks on SAP: A Guide to Threats and Defenses</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img decoding="async" src="https://www.layersevensecurity.com/wp-content/uploads/2026/02/State-Sponsored-Cyber-Attacks-An-Increasing-Threat-to-SAP-Solutions.webp" alt="" class="wp-image-9369"/></figure>



<p>State-sponsored cyber attacks are a rapidly increasing threat to SAP solutions, driven by rising geopolitical tensions. Attackers target mission-critical SAP systems for espionage and sabotage, exploiting their wide attack surface and slow enterprise patching cycles. Defending these vital systems requires specialized vulnerability management, real-time threat detection, and a focused effort to harden specific SAP configurations against sophisticated adversaries.</p>



<p>Amid a tense global landscape, recent threat intelligence reports paint a stark picture of escalating state-sponsored cyber operations. According to the <a href="https://www.isms.online/the-state-of-information-security-report-2025/" target="_blank" rel="noreferrer noopener">2025 State of Information Security Report</a>, 88% of security leaders are concerned about this threat. Data from CrowdStrike&#8217;s <a href="https://go.crowdstrike.com/2025-global-threat-report.html" target="_blank" rel="noreferrer noopener">2025 Global Threat Report</a> shows a 150% increase in China-nexus threat activity, while their <a href="https://go.crowdstrike.com/2026-global-threat-report.html" target="_blank" rel="noreferrer noopener">2026 report</a> noted a 266% surge in state-nexus intrusions in cloud environments. Similarly, Microsoft&#8217;s <a href="https://www.microsoft.com/en-us/corporate-responsibility/cybersecurity/microsoft-digital-defense-report-2025/" target="_blank" rel="noreferrer noopener">2025 Digital Defense Report</a> identified a 25% year-over-year increase in Russian operations against NATO-aligned countries. This heightened activity makes SAP environments, which house an organization&#8217;s most valuable data and processes, a primary target for espionage and disruption. Effective defense hinges on moving beyond generic security and adopting SAP-specific tools and practices to manage vulnerabilities and monitor for threats continuously.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Key Takeaways</h3>



<ul class="wp-block-list">
<li>State-sponsored cyber attacks are increasing, with significant growth in activity attributed to China, Russia, and Iran.</li>



<li>SAP systems are prime targets for espionage and sabotage due to their critical role and the high-value data they process.</li>



<li>Threat actors exploit SAP vulnerabilities within 72 hours of disclosure, far outpacing typical enterprise patching cycles.</li>



<li>Attackers often abuse legitimate SAP functions like RFC communications, service accounts, and transport processes to remain undetected.</li>



<li>Effective defense requires SAP-specific tools for continuous vulnerability management and real-time threat detection.</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Evidence Shows an Increase in State-Sponsored Cyber Attacks?</h3>



<p>Multiple leading cybersecurity reports confirm a dramatic rise in state-sponsored threat activity. Concerns are widespread, with the&nbsp;<a href="https://www.isms.online/the-state-of-information-security-report-2025/" target="_blank" rel="noreferrer noopener">2025 State of Information Security Report</a>&nbsp;finding that 88% of cybersecurity leaders are worried about nation-state attacks.</p>



<p>Recent intelligence provides specific figures:</p>



<ul class="wp-block-list">
<li><strong>China:</strong> CrowdStrike&#8217;s <a href="https://go.crowdstrike.com/2025-global-threat-report.html" target="_blank" rel="noreferrer noopener">2025 Global Threat Report</a> detailed a 150% increase in China-nexus threat activity across sectors, with seven new adversary groups identified.</li>



<li><strong>Russia:</strong> The <a href="https://www.microsoft.com/en-us/corporate-responsibility/cybersecurity/microsoft-digital-defense-report-2025/" target="_blank" rel="noreferrer noopener">2025 Digital Defense Report</a> from Microsoft reported a 25% year-over-year increase in Russian state-linked cyber operations targeting NATO-aligned countries, focusing on government, IT, and research sectors.</li>



<li><strong>Iran:</strong> Mandiant&#8217;s <a href="https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025" target="_blank" rel="noreferrer noopener">2025 M-Trends Report</a> identified a 35% increase in malware attributed to Iran-nexus actors.</li>



<li><strong>Cloud Environments:</strong> The CrowdStrike <a href="https://go.crowdstrike.com/2026-global-threat-report.html" target="_blank" rel="noreferrer noopener">2026 Global Threat Report</a> found a 266% increase in intrusions by state-nexus actors in cloud environments.</li>
</ul>



<p>A 2026 report from the Google&nbsp;<a href="https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base" target="_blank" rel="noreferrer noopener">Threat Intelligence Group</a>&nbsp;also highlighted that these actors are targeting not just IT infrastructure but also personally-identifiable information to compromise key individuals.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Why Are SAP Environments a Primary Target for Nation-States?</h3>



<p>SAP environments are disproportionately affected by nation-state cyber activity because they are the operational core of an organization. These systems support mission-critical processes, store vast amounts of high-value data, and provide privileged integration paths to other critical solutions. Compromising an SAP system allows state-sponsored actors to perform espionage by exfiltrating sensitive data or conduct sabotage by disrupting the availability of essential resources. Furthermore, a breached SAP system can serve as a pivot point to attack connected systems and compromise both internal and external supply chains.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Factors Amplify the Risk to SAP Solutions?</h3>



<p>The risks to SAP solutions are amplified by a combination of their inherent complexity and common security management challenges. A primary factor is the wide attack surface, which includes APIs, cross-platform dependencies (database, OS), middleware, and integrations with identity providers.</p>



<p>This risk is compounded by two critical issues:</p>



<ul class="wp-block-list">
<li><strong>Volume of Vulnerabilities:</strong> The constant discovery of new vulnerabilities in SAP solutions presents an ongoing challenge.</li>



<li><strong>Speed of Exploitation vs. Patching:</strong> Research from 2025 showed that threat actors exploit SAP vulnerabilities within 72 hours of public disclosure. In contrast, the average time for organizations to apply security patches is measured in weeks or months. This gap creates a significant window of opportunity for attackers. The 2026 CrowdStrike <a href="https://www.crowdstrike.com/en-us/press-releases/2026-crowdstrike-global-threat-report/" target="_blank" rel="noreferrer noopener">Global Threat Report</a> noted that 42% of vulnerabilities are exploited even before public disclosure.</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Attack Methods Do State-Sponsored Actors Use Against SAP?</h3>



<p>Nation-state actors often prefer attack methods that blend in with legitimate administrative behavior, making them difficult to detect. In SAP landscapes, this involves the abuse of standard system functions and processes.</p>



<p>Commonly abused access paths include:</p>



<ul class="wp-block-list">
<li>Trusted communications (RFC)</li>



<li>Change management and system administration</li>



<li>Batch/background jobs</li>



<li>Transport processes</li>



<li>Service accounts</li>



<li>Remote support channels</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">How Can Organizations Harden SAP Systems Against These Threats?</h3>



<p>To counter these tactics, it is critical to identify and address specific technical vulnerabilities within the SAP landscape. Hardening efforts should focus on restricting the functions that attackers commonly abuse. The following table outlines key attack vectors and corresponding hardening recommendations.</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><th class="has-text-align-left" data-align="left">Attack Vector</th><th class="has-text-align-left" data-align="left">Hardening Recommendation</th></tr><tr><td>Trusted Communications</td><td>Govern RFC destinations and enforce encryption for all RFC and web communications.</td></tr><tr><td>External Program Starts</td><td>Restrict gateway registrations and tighten access controls for external program execution.</td></tr><tr><td>Web Services</td><td>Reduce the exposure of ICF services to the absolute minimum required.</td></tr><tr><td>System Relationships</td><td>Eliminate unnecessary trusted system relationships between SAP systems.</td></tr><tr><td>Administrative Access</td><td>Minimize excessive administrative privileges, including broad RFC authorizations.</td></tr></tbody></table></figure>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">How Can Organizations Detect Malicious Activity in SAP?</h3>



<p>Effective detection requires integrating SAP telemetry with security data from other endpoints, such as firewalls and identity systems. This correlation helps security teams distinguish between normal SAP events and malicious actions. Anomaly-based monitoring is also highly recommended to detect unusual system and user events that could indicate a compromise.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">How Does the Cybersecurity Extension for SAP (CES) Help?</h3>



<p>The&nbsp;<a href="https://www.layersevensecurity.com/cybersecurity-extension-for-sap/" target="_blank" rel="noreferrer noopener">Cybersecurity Extension for SAP</a>&nbsp;(CES) is a specialized solution that enables organizations to detect and respond to state-sponsored threats in real time. It combines continuous vulnerability management with advanced threat detection tailored for SAP landscapes (on-premise, cloud, and hybrid). CES provides security teams with deeper context than generic tools by monitoring a broad set of SAP-specific telemetry, including application and infrastructure logs.</p>



<p>A key advantage of CES is its ability to reduce the attack surface. It performs scheduled scans for thousands of SAP vulnerabilities and misconfigurations, detects users with excessive privileges, and provides actionable remediation guidance. CES also identifies missing patches for vulnerabilities listed in the CISA <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?f%5B0%5D=vendor<em&gt;project%3A835" target="_blank" rel="noreferrer noopener">KEV</a> catalog.</p>



<p>For threat detection, CES uses both pattern matching and anomaly detection to identify indicators of compromise. Alerts are integrated with enterprise SIEM platforms, enabling SOC teams to correlate SAP activity with events across the entire network for a unified defense.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Frequently Asked Questions (FAQ)</h3>



<p><strong>Q: How quickly are SAP vulnerabilities being exploited?</strong><br>A: Research from 2025 indicates that threat actors are exploiting newly disclosed SAP security vulnerabilities within 72 hours. This rapid exploitation far outpaces typical enterprise patching timelines, which are often measured in weeks or months, creating a significant window of risk.</p>



<p><strong>Q: What kind of data are state-sponsored actors targeting?</strong><br>A: State-sponsored actors target mission-critical business data for espionage and sabotage. Additionally, a 2026 Google Threat Intelligence Group report highlighted that they also target personally-identifiable information (PII), which can be used to compromise specific individuals within an organization.</p>



<p><strong>Q: Why are generic security tools not enough for SAP?</strong><br>A: Generic security tools typically focus on network and host-level activity and lack deep context into SAP&#8217;s specific architecture. SAP-specific solutions like the <a href="/cybersecurity-extension-for-sap/">Cybersecurity Extension for SAP</a> monitor a broader set of telemetry, including application logs, to identify vulnerabilities, misconfigurations, and indicators of compromise that are unique to the SAP environment.</p>



<script type="application/ld+json">
{
  "@context": "https://schema.org",
  "@type": "FAQPage",
  "mainEntity": [
    {
      "@type": "Question",
      "name": "How quickly are SAP vulnerabilities being exploited?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "Research from 2025 indicates that threat actors can exploit newly disclosed SAP security vulnerabilities within 72 hours. This is much faster than typical enterprise patching timelines, which are often measured in weeks or months, creating a significant window of risk."
      }
    },
    {
      "@type": "Question",
      "name": "What kind of data are state-sponsored actors targeting?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "State-sponsored actors target mission-critical business data for espionage and sabotage. Reports also show they target personally identifiable information (PII), which can be used to compromise individuals within organizations."
      }
    },
    {
      "@type": "Question",
      "name": "Why are generic security tools not enough for SAP?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "Generic security tools focus mainly on network and host-level activity and lack deep visibility into SAP systems. SAP-specific solutions monitor application-level telemetry, including logs, to detect vulnerabilities, misconfigurations, and threats unique to SAP environments."
      }
    }
  ]
}
</script>
<p>The post <a href="https://www.layersevensecurity.com/state-sponsored-cyber-attacks-an-increasing-threat-to-sap-solutions/">State-Sponsored Cyber Attacks on SAP: A Guide to Threats and Defenses</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SAP Security Notes February 2026: Critical Code Injection and Authentication Flaws</title>
		<link>https://www.layersevensecurity.com/sap-security-notes-february-2026/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Wed, 11 Feb 2026 23:08:39 +0000</pubDate>
				<category><![CDATA[Advisories]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9363</guid>

					<description><![CDATA[<p>SAP&#8217;s February 2026 security update addresses several critical vulnerabilities, including a code injection flaw in SAP S/4HANA and SAP CRM, and a missing authentication check in SAP NetWeaver AS ABAP. These &#8220;Hot News&#8221; notes require immediate attention to prevent potential system compromise and unauthorized data access. The February 2026 SAP Security Notes patch day released [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-february-2026/">SAP Security Notes February 2026: Critical Code Injection and Authentication Flaws</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>SAP&#8217;s February 2026 security update addresses several critical vulnerabilities, including a code injection flaw in SAP S/4HANA and SAP CRM, and a missing authentication check in SAP NetWeaver AS ABAP. These &#8220;Hot News&#8221; notes require immediate attention to prevent potential system compromise and unauthorized data access.</p>



<p>The February 2026 SAP Security Notes patch day released a significant number of fixes, with two marked as &#8220;Hot News&#8221; due to their critical nature. The most severe is a code injection vulnerability detailed in note <a href="https://me.sap.com/notes/3697099" target="_blank" rel="noreferrer noopener">3697099</a>, affecting SAP S/4HANA and SAP CRM. This flaw allows attackers to execute arbitrary SQL statements, potentially leading to a full database compromise. The second critical issue, covered in note <a href="https://me.sap.com/notes/3674774" target="_blank" rel="noreferrer noopener">3674774</a>, is a missing authentication check for background RFCs in SAP NetWeaver AS ABAP, which could allow unauthorized function execution. Additional high-priority patches address an XML Signature Wrapping vulnerability in NetWeaver, information disclosure, and denial of service vulnerabilities in SAP BusinessObjects.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Key Takeaways</h3>



<ul class="wp-block-list">
<li>A critical code injection vulnerability in SAP S/4HANA and CRM was patched.</li>



<li>A missing authentication check in SAP NetWeaver AS ABAP for background RFCs was fixed.</li>



<li>Note <a href="https://me.sap.com/notes/3697567" target="_blank" rel="noreferrer noopener">3697567</a> addresses an XML Signature Wrapping vulnerability.</li>



<li>Patches were also released for information disclosure in the ST-PI Addon.</li>



<li>Vulnerabilities including open redirect and denial of service were fixed in SAP BusinessObjects.</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Are the Most Critical SAP Vulnerabilities for February 2026?</h3>



<p>The most critical vulnerabilities patched in February 2026 are two &#8220;Hot News&#8221; notes impacting core SAP systems. These require immediate review and patching to mitigate the risk of exploitation.</p>



<p>The first, detailed in note <a href="https://me.sap.com/notes/3697099" target="_blank" rel="noreferrer noopener">3697099</a>, is a critical code injection vulnerability in the Scripting Editor component of SAP S/4HANA and SAP CRM. It allows an attacker to execute arbitrary SQL statements by calling function modules, which could lead to a full compromise of the database. As a temporary workaround, SAP suggests deactivating the <strong>CRMICISE</strong> ICF service.</p>



<p>The second, covered by note <a href="https://me.sap.com/notes/3674774" target="_blank" rel="noreferrer noopener">3674774</a>, addresses a critical missing authentication check for background RFCs (tRFC and qRFC) in SAP NetWeaver AS ABAP. This could allow a low-privileged user to execute functions without proper authorization. To fully enable the fix, the profile parameter <strong>rfc/authCheckInPlayback</strong> must be set to the value <strong>2</strong> in addition to applying the support package.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What Other Notable SAP Patches Were Released?</h3>



<p>Beyond the two critical &#8220;Hot News&#8221; items, SAP released several other important security patches for NetWeaver and BusinessObjects.</p>



<p>Note <a href="https://me.sap.com/notes/3697567" target="_blank" rel="noreferrer noopener">3697567</a> enhances verification for XML signatures to fix an XML Signature Wrapping vulnerability in NetWeaver AS ABAP. This could prevent attackers from manipulating signed documents to gain unauthorized access. A potential workaround involves disabling SAML and using alternative authentication methods.</p>



<p>An information disclosure vulnerability in the ST-PI Addon for NetWeaver AS ABAP is patched by note <a href="https://me.sap.com/notes/3705882" target="_blank" rel="noreferrer noopener">3705882</a>. This flaw could be exploited to obtain sensitive system information.</p>



<p>Finally, a series of notes including <a href="https://me.sap.com/notes/3674246" target="_blank" rel="noreferrer noopener">3674246</a>, <a href="https://me.sap.com/notes/3678282" target="_blank" rel="noreferrer noopener">3678282</a>, and <a href="https://me.sap.com/notes/3654236" target="_blank" rel="noreferrer noopener">3654236</a> address multiple open redirect and denial of service vulnerabilities within SAP BusinessObjects.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Frequently Asked Questions (FAQ)</h3>



<p><strong>What was the most critical SAP vulnerability for February 2026?</strong><br>The most critical vulnerability was a code injection flaw in SAP S/4HANA and SAP CRM, covered by Hot News note <a href="https://me.sap.com/notes/3697099" target="_blank" rel="noreferrer noopener">3697099</a>. It allows for arbitrary SQL execution via the Scripting Editor.</p>



<p><strong>How do I fix the missing authentication check in SAP NetWeaver?</strong><br>To fix the vulnerability from note <a href="https://me.sap.com/notes/3674774" target="_blank" rel="noreferrer noopener">3674774</a>, you must apply the recommended support package and set the profile parameter <strong>rfc/authCheckInPlayback</strong> to the value <strong>2</strong> to enforce stronger authorization checks.</p>



<p><strong>What systems were affected by the February 2026 patches?</strong><br>Key systems affected include SAP S/4HANA, SAP CRM, SAP NetWeaver AS ABAP, and SAP BusinessObjects.</p>



<script type="application/ld+json">
{
  "@context": "https://schema.org",
  "@type": "FAQPage",
  "mainEntity": [
    {
      "@type": "Question",
      "name": "What was the most critical SAP vulnerability for February 2026?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "The most critical vulnerability was a code injection flaw in SAP S/4HANA and SAP CRM, covered by Hot News note 3697099 (https://me.sap.com/notes/3697099). It allows for arbitrary SQL execution via the Scripting Editor."
      }
    },
    {
      "@type": "Question",
      "name": "How do I fix the missing authentication check in SAP NetWeaver?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "To fix the vulnerability from note 3674774 (https://me.sap.com/notes/3674774), apply the recommended support package and set the profile parameter rfc/authCheckInPlayback to the value 2 to enforce stronger authorization checks."
      }
    },
    {
      "@type": "Question",
      "name": "What systems were affected by the February 2026 patches?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "Key systems affected include SAP S/4HANA, SAP CRM, SAP NetWeaver AS ABAP, and SAP BusinessObjects."
      }
    }
  ]
}
</script>



<p></p>
<p>The post <a href="https://www.layersevensecurity.com/sap-security-notes-february-2026/">SAP Security Notes February 2026: Critical Code Injection and Authentication Flaws</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital Operational Resilience Act (DORA) Compliance for SAP Solutions</title>
		<link>https://www.layersevensecurity.com/digital-operational-resilience-act-dora-compliance-for-sap-solutions/</link>
		
		<dc:creator><![CDATA[Layer Seven]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 20:40:53 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[SAP Audit]]></category>
		<category><![CDATA[SAP Security Solutions]]></category>
		<guid isPermaLink="false">https://layersevensecurity.com/?p=9356</guid>

					<description><![CDATA[<p>The Digital Operational Resilience Act (DORA) is an EU regulation that requires financial institutions to ensure their Information and Communications Technology (ICT) systems can withstand, respond to, and recover from disruptions. For organizations using SAP for critical functions, this means SAP solutions must be governed, monitored, and tested to meet DORA&#8217;s stringent standards for operational [&#8230;]</p>
<p>The post <a href="https://www.layersevensecurity.com/digital-operational-resilience-act-dora-compliance-for-sap-solutions/">Digital Operational Resilience Act (DORA) Compliance for SAP Solutions</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img decoding="async" width="1207" height="724" src="https://www.layersevensecurity.com/wp-content/uploads/2026/01/DORA-Compliance-for-SAP.webp" alt="" class="wp-image-9359" srcset="https://www.layersevensecurity.com/wp-content/uploads/2026/01/DORA-Compliance-for-SAP.webp 1207w, https://www.layersevensecurity.com/wp-content/uploads/2026/01/DORA-Compliance-for-SAP-300x180.webp 300w, https://www.layersevensecurity.com/wp-content/uploads/2026/01/DORA-Compliance-for-SAP-1024x614.webp 1024w, https://www.layersevensecurity.com/wp-content/uploads/2026/01/DORA-Compliance-for-SAP-768x461.webp 768w" sizes="(max-width: 1207px) 100vw, 1207px" /></figure>



<p>The Digital Operational Resilience Act (DORA) is an EU regulation that requires financial institutions to ensure their Information and Communications Technology (ICT) systems can withstand, respond to, and recover from disruptions. For organizations using SAP for critical functions, this means SAP solutions must be governed, monitored, and tested to meet DORA&#8217;s stringent standards for operational resilience.</p>



<p>This guide explains how the EU&#8217;s Digital Operational Resilience Act (DORA) impacts SAP solutions and outlines a clear path to achieving compliance. DORA mandates a comprehensive framework for ICT risk management, incident reporting, resilience testing, and third-party risk oversight, all of which apply to the SAP systems that underpin core financial operations. Because SAP often handles critical processes like procurement, HR, and finance, it falls directly within the scope of DORA&#8217;s requirements. Achieving compliance involves integrating SAP into a broader ICT governance strategy, implementing continuous monitoring and testing, and managing risks from third-party providers like hosters and system integrators. Specialized tools can streamline this process by automating vulnerability management, threat detection, and compliance reporting specific to the SAP environment.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Key Takeaways</h3>



<ul class="wp-block-list">
<li>DORA is a mandatory EU regulation for the financial sector, effective as of January 17, 2025, to strengthen ICT operational resilience.</li>



<li>SAP systems that support critical business functions like finance and HR are in scope for DORA compliance.</li>



<li>Compliance is structured around five key pillars: ICT Risk Management, Incident Reporting, Resilience Testing, Third-Party Risk, and Information Sharing.</li>



<li>Organizations must integrate SAP solutions into their overall ICT risk governance, security operations (SOC), and supplier management processes.</li>



<li>Specialized solutions like the Cybersecurity Extension for SAP can help automate monitoring, testing, and reporting to meet DORA requirements.</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">What are the Five Pillars of DORA?</h3>



<p>DORA&#8217;s core objective is to ensure the continuity and integrity of financial services by strengthening resilience against ICT risks and cyberattacks. The regulation is built upon five interconnected pillars that create a comprehensive framework for digital operational resilience.</p>



<ul class="wp-block-list">
<li><strong>ICT Risk Management</strong>: Establish a comprehensive governance and control framework to manage all ICT assets, including detailed policies for protection, detection, response, and recovery.</li>



<li><strong>Incident Management and Reporting</strong>: Implement consistent processes for managing, classifying, and reporting all ICT-related incidents, with mandatory reporting for major disruptions.</li>



<li><strong>Digital Operational Resilience Testing</strong>: Conduct regular vulnerability assessments and penetration testing, with a focus on the critical functions that support essential business services.</li>



<li><strong>Third-Party Risk Management</strong>: Enforce strict oversight for all ICT vendors and service providers, including cloud hosters, software providers, and outsourced services.</li>



<li><strong>Information Sharing</strong>: Participate in arrangements to share cyber threat intelligence and information to help strengthen the resilience of the entire financial sector.</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">How Does DORA Impact SAP Solutions?</h3>



<p>For most financial services organizations, SAP solutions are the backbone of critical operations, including procurement, supplier management, human resources, and finance. As such, they are a significant part of the ICT landscape that DORA governs. The regulation effectively requires organizations to treat their SAP solutions as regulated platforms, demanding a higher standard of control, monitoring, and reporting.</p>



<p>Under DORA, SAP systems require tight integration with the organization&#8217;s broader resilience strategy, including:</p>



<ul class="wp-block-list">
<li><strong>ICT Risk Governance</strong>: SAP-specific risks must be identified, and key risk indicators (KRIs) must be defined, monitored, and tested.</li>



<li><strong>SOC Operations</strong>: Security incidents within SAP must be detected, triaged, and handled in coordination with the central Security Operations Center.</li>



<li><strong>Service Management</strong>: All changes to SAP systems must go through formal approval, with evidence and testing to ensure they do not introduce new risks.</li>



<li><strong>Supplier Management</strong>: Risks associated with SAP hosting providers, system integrators, and external API connections must be actively managed.</li>
</ul>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">How Does the Cybersecurity Extension for SAP Support DORA Compliance?</h3>



<p>The <a href="/cybersecurity-extension-for-sap/">Cybersecurity Extension for SAP (CES)</a> is a solution designed to help organizations meet DORA&#8217;s requirements by identifying risks, detecting threats, and verifying compliance within their SAP landscape. The platform provides measurable, auditable evidence of security controls across all five pillars of DORA.</p>



<p>The following table details how the features of the Cybersecurity Extension for SAP map to the five pillars of DORA:</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><th class="has-text-align-left" data-align="left">DORA Pillar</th><th class="has-text-align-left" data-align="left">Cybersecurity Extension for SAP (CES) Capabilities</th></tr><tr><td><strong>ICT Risk Management</strong></td><td>Provides continuous security monitoring, SAP-specific vulnerability management for over 5,000 weaknesses, custom code scanning, and patch management. It aligns systems with benchmarks like the SAP Security Baseline and SAP RISE requirements.</td></tr><tr><td><strong>Incident Management &amp; Reporting</strong></td><td>Features threat detection for over 1,500 Indicators of Compromise (IOCs) across SAP logs, risk-based alert prioritization, and built-in workflows for incident investigation and reporting.</td></tr><tr><td><strong>Digital Operational Resilience Testing</strong></td><td>Enables compliance monitoring and baseline checks to validate SAP system hardening. It supports threat detection exercises for common SAP attack paths and performs daily vulnerability scanning to identify risks.</td></tr><tr><td><strong>Third-Party Risk Management</strong></td><td>Delivers visibility into all external interfaces and cloud connections. It provides evidence for SAP RISE security requirements and helps enforce security standards for system integrators.</td></tr><tr><td><strong>Information Sharing</strong></td><td>Includes SAP-specific security intelligence, such as threat patterns, CVEs, and zero-day vulnerabilities. It offers standardized reporting that can be shared with internal teams and industry forums.</td></tr></tbody></table></figure>



<p>By implementing a solution like the <a href="/cybersecurity-extension-for-sap/">Cybersecurity Extension for SAP</a>, organizations can strengthen their digital resilience, reduce their exposure to cyber risks, and ensure their SAP solutions are secure, monitored, and audit-ready for DORA compliance.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Frequently Asked Questions (FAQ)</h3>



<p><strong>What is the Digital Operational Resilience Act (DORA)?</strong><br>The Digital Operational Resilience Act (DORA) is a regulation from the European Union designed to strengthen the cybersecurity and operational resilience of financial entities. It establishes a unified framework for managing ICT risks to ensure firms can withstand and recover from severe digital disruptions.</p>



<p><strong>Do SAP systems need to be DORA compliant?</strong><br>Yes, if an SAP system supports critical functions (e.g., finance, procurement, HR) within a financial institution in the EU, it falls under the scope of DORA. The organization is responsible for ensuring the resilience and security of the entire ICT landscape, including its SAP solutions.</p>



<p><strong>What are the main requirements of DORA?</strong><br>DORA&#8217;s main requirements are organized into five pillars: ICT Risk Management, Incident Management and Reporting, Digital Operational Resilience Testing, Third-Party Risk Management, and Information Sharing. These pillars mandate a comprehensive approach to identifying risks, testing defenses, reporting incidents, and managing vendors.</p>



<script type="application/ld+json">
{
  "@context": "https://schema.org",
  "@type": "FAQPage",
  "mainEntity": [
    {
      "@type": "Question",
      "name": "What is the Digital Operational Resilience Act (DORA)?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "The Digital Operational Resilience Act (DORA) is a European Union regulation designed to strengthen cybersecurity and operational resilience in financial institutions. It establishes a unified framework for managing ICT risks and ensuring organizations can withstand and recover from digital disruptions."
      }
    },
    {
      "@type": "Question",
      "name": "Do SAP systems need to be DORA compliant?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "Yes, if an SAP system supports critical business functions such as finance, procurement, or HR within an EU financial institution, it falls under DORA. Organizations must ensure the resilience and security of their entire ICT environment, including SAP systems."
      }
    },
    {
      "@type": "Question",
      "name": "What are the main requirements of DORA?",
      "acceptedAnswer": {
        "@type": "Answer",
        "text": "DORA defines five key pillars: ICT risk management, incident reporting, resilience testing, third-party risk management, and information sharing. These requirements ensure a comprehensive approach to managing cybersecurity risks and operational resilience."
      }
    }
  ]
}
</script>
<p>The post <a href="https://www.layersevensecurity.com/digital-operational-resilience-act-dora-compliance-for-sap-solutions/">Digital Operational Resilience Act (DORA) Compliance for SAP Solutions</a> appeared first on <a href="https://www.layersevensecurity.com">Layer Seven Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
