The global and independent platform for the SAP community.

Communicate securely with Hana

Communication in SAP Hana environments currently takes place via more than 2000 connectors and interfaces. This poses a challenge for users, since on the one hand they have to pay attention to security-conscious application development, but on the other hand they should also take security-relevant infrastructure issues into account.
René Bader, NTT Security
22 February 2018
Communicate securely with Hana
avatar
This text has been automatically translated from German to English.

The architectures of SAP landscapes have changed fundamentally with the introduction of SAP Hana. Hana was initially developed as a relational database for SAP systems based on in-memory technology.

All data processing and storage takes place in the main memory of the system environment, which results in an enormous performance boost compared to conventional database systems.

However, Hana also opens up new possibilities in business use and is thus increasingly becoming a development platform on which Java and HTML5 applications are run in runtime environments.

The focus here is now on web-based applications that communicate using HTTP.

However, the SAP core under Hana can no longer be modified programmatically by the user himself; Hana is thus seen as a closed system and makes its functions available via a large number of connectors and interfaces, which can then be accessed by self-developed application programs.

Currently, more than 2000 such connectors and interfaces are implemented in the Hana core - the tendency is strongly increasing, because more and more new application areas are to be covered. In general, the following communication paths can be distinguished on this platform:

Connections to Hana via the database client: They are mainly used to manage the database system - for example, Hana Cockpit or Hana Studio - or for classic database queries, for example, with business intelligence tools or even quite simply with Excel. Communication takes place by using the SQLDBC protocol, which is a derivative of ODBC/JDBC.

Connections from so-called web clients. These can be, for example, applications that run in the Java runtime of Hana XS and are embedded directly in the database environment.

The XS extension is required for this; the mostly web-based communication (HTTP/HTTPS) usually runs via TCP ports 3xx33, where xx stands for the respective instance number. XS provides the Java Runtime Machine and the web server in this configuration.

This results in a number of problems for the security of the platform and the applications: Within the platform, communication is "plain text," which means that all data is exchanged unencrypted; this applies to both the database and web clients.

The respective components must authenticate each other. Basic Auth (username/password), SAML assertions and X.509 certificates are possible here. However, Basic Auth is generally regarded as insecure; SAML and X.509 in turn require appropriate certificate management, which is, however, only available to a limited extent within the Hana landscape.

The topic of "data protection" is thus coming into sharper focus. What exactly happens, for example, when compromised applications access data via the connectors?

Currently, the Hana platform does not provide RAM encryption. Therefore, an attacker could install an app that gains access to the entire unencrypted data.

The obvious solution here would be RAM encryption, but this is only available with the latest processor generation and the corresponding modules in the operating system.

Validation challenge

This puts the topic of secure application development more and more in the security focus, which, for example, gives very high priority to the validation and authorization of data and data streams.

In the past, when an SAP environment was still an open system, the majority of functions were created by Abap development itself and then integrated into the SAP core.

Although security vulnerabilities could arise here as well, the impact remained limited because the SAP core provided a certain level of protection; in any case, it was not possible to compromise an entire infrastructure this way.

Now the developer works on another level, where the system no longer protects him; his application accesses the connectors and interfaces, and if he makes a security-critical error here, in the worst case the entire infrastructure is open to attackers, who can then also access the connectors in question.

Application developers must ensure, for example, that their XML streams are correctly validated so that an attacker does not gain complete access to the application via corresponding vulnerabilities, then modify it and in turn gain access to all the data in RAM.

Consideration and specification of security requirements in the design and conception phase, as well as investments in testing - for example, static application security testing (SAST), dynamic application security testing and penetration testing - must now also be taken into account.

In large SAP landscapes, users also need to increasingly address infrastructure issues such as web application firewalls (WAFs) and XML firewalls.

For example, developers are increasingly using microservices based on REST APIs to exchange data - such as with SAP Leonardo, the platform for exchanging and analyzing IoT information.

This data must be transferred quickly and securely, and compromise of the data must be prevented at all costs. For this purpose, digital signatures, transport encryption using 2-way SSL handshakes, XML validation, for example, are the means of choice.

Many developers still refrain from implementing such security measures in their applications themselves because they fear a reduction in the overall performance of their systems, but on the other hand systems are sometimes also unable to support such measures at the application level.

Therefore, the aforementioned infrastructure components are essential for secure operation in a Hana environment.

In principle, more attention must be paid to security at the application level in the future when using Hana, paradoxically precisely because Hana is a programmatically closed system and precisely because of this the topic of communication paths and communication partners must be focused on.

In the event of a successful attack on Hana applications, the platform could become a gateway for attackers to gain access to any mission-critical data.

avatar
René Bader, NTT Security


Write a comment

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the second time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork. All information about the event can be found here:

SAP Competence Center Summit 2024

Venue

Event Room, FourSide Hotel Salzburg,
At the exhibition center 2,
A-5020 Salzburg

Event date

June 5 and 6, 2024

Regular ticket:

€ 590 excl. VAT

Venue

Event Room, Hotel Hilton Heidelberg,
Kurfürstenanlage 1,
69115 Heidelberg

Event date

28 and 29 February 2024

Tickets

Regular ticket
EUR 590 excl. VAT
The organizer is the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes the attendance of all lectures of the Steampunk and BTP Summit 2024, the visit of the exhibition area, the participation in the evening event as well as the catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due time.