The global and independent platform for the SAP community.

SAP penetration tests: Blind spots at the core of IT

Companies invest heavily in cyber security, but their most valuable data often remains unprotected. SAP systems, the heart of critical business processes, are often overlooked in penetration tests - a fatal omission that opens the door to attackers.
Tobias Stage, Abat
April 21, 2026
avatar
This text has been automatically translated from German to English.

The current threat landscape leaves no doubt: cyber attacks are an omnipresent danger for companies of all sizes. According to the BSI situation report on IT security in Germany 2025, the situation is tense and offers attackers the opportunity to attack small and medium-sized companies in particular due to attack surfaces that are still too poorly protected. This trend is also reflected in the SAP environment: an analysis of the monthly security advisories published in 2025 shows a significant increase in vulnerabilities, which underlines the growing attack surface of SAP applications. In response to this tense cyber situation, most organizations have strengthened their defenses: multi-factor authentication, endpoint detection systems and information security management as examples of modern security measures are well known and have become part of the standard repertoire. But in the midst of these efforts, there is a dangerous blind spot: the SAP system landscape. While the network and the classic IT infrastructure are meticulously checked, the system that manages financial and personnel data, production plans and customer information often remains a black box. 

Neglected SAP security

The reasons for this are mostly of an organizational nature. SAP security often falls into a responsibility gap: The IT security team lacks specialist knowledge of proprietary architecture, while the SAP team focuses on stability rather than attack simulations. In addition, there is a deceptive sense of security that views SAP systems as internal, sealed-off monoliths. This assumption ignores the reality of modern landscapes networked via web services and cloud connections. A classic network pentest is not enough: Standard scanners only check the host machine, but do not understand the complex SAP application layer with its proprietary protocols such as Remote Function Call (RFC) or Dynamic Information and Action Gateway (DIAG). Furthermore, if connected development, test or technical systems such as Solution Manager, Focused Run, Governance, Risk and Compliance etc. are excluded from the test scope, a decisive attack vector remains unconsidered.

Typical attack vectors

Attacks on SAP systems can be divided into server encryption with the aim of extorting ransom money on the one hand and insider attacks on the other. Both methods are particularly dangerous due to their speed: a report by Onapsis and SAP shows that attacks on critical SAP applications are on the rise and often occur within 72 hours of a security patch being released. Attackers repeatedly exploit typical vulnerabilities. Unpatched SAP systems are a particularly common attack vector. Although SAP publishes security-relevant information on every second Tuesday of the month as part of its Patch Day, many companies do not apply updates promptly. This leaves systems open to known exploits for weeks or months. Inadequately secured RFC interfaces are also critical. If a less protected development or test system is compromised first, attackers can laterally access productive systems via these connections and execute functions there. 

Added to this are inadequate authorization concepts: Standard users such as SAP* or DDIC with weak or unchanged passwords and over-privileged dialog or system users still exist. Such accounts are specifically used to gradually extend rights to full system control. Insecure custom code also represents a gateway, for example due to a lack of authorization checks or vulnerability to code injections. Passwords also remain a persistent problem, as long validity periods, weak hashing methods and reuse make it easier to take over user accounts.

A conventional penetration test is not enough to proactively address the risks. The SAP Secure Operations Map provides a clear model for understanding the various security levels. 

SAP-specific vulnerabilities exceeded the 200 mark for the first time in 2025.

SAP penetration tests

Traditional pentests usually only cover the lowest IT infrastructure level. However, the crucial vulnerabilities and points of attack are usually found in the system and application-specific levels above, which often represent a black box for outsiders. An SAP penetration test therefore starts where traditional tests end and analyzes SAP-specific services and protocols such as gateway, message server or the Internet Communication Framework as well as the security of DIAG and RFC communication. In addition, application security is checked by examining standard transactions, Fiori apps and web services for manipulation possibilities and unauthorized access. Another focus is on the authorization concept, which is systematically analysed for critical authorizations and potential paths for extending rights. Customer-specific Abap code is also examined both manually and using specialized tools for vulnerabilities such as code injection or missing authority checks. In addition, the system configuration, in particular security-relevant profile parameters, is checked for compliance with SAP best practices and DSAG recommendations. Another advantage lies in the testers' deep understanding of the SAP world. They know where hidden configurations are, how business processes can be manipulated and which default settings pose a risk. This technical focus makes it possible to uncover vulnerabilities that remain invisible to general security scanners and experts. Regulatory requirements such as Nis2 or Kritis specifications demand a verifiable, holistic approach to security, which the isolated penetration test alone does not fulfill.

SAP systems are surrounded by walls of technical security and EU-wide guidelines on IT security and information protection - but can they withstand insider attacks? 

A holistic SAP security strategy goes beyond this and includes secure software development as part of a secure software development lifecycle. Securing the supply chain is also becoming increasingly important, especially in critical industries where dependencies on external partners pose considerable risks. This approach is complemented by continuous monitoring, which uses a central SIEM system to record and evaluate security-relevant events across all systems. Finally, the increasing use of cloud solutions requires special consideration, as their security requirements and threat scenarios differ in many respects from traditional on-premises systems.

Secure SAP system in four steps

Getting started with proactively securing the SAP landscape is possible with a strategic approach in four clear steps.

Set scope: Identification of the most critical systems, typically the productive ERP or S/4 Hana systems, as well as technical feeders such as a productive Solution Manager.

Choosing the right partnerSAP pentests require specialized knowledge. SAP know-how is therefore required that goes beyond general network pentesting. 

Risk-based evaluation of the results: A meaningful report must present and prioritize technical findings in detail. This allows you to focus on the weak points that pose the greatest risk to operations. 

Implement measures sustainably: A pentest is a snapshot that quickly provides more security with less effort. However, sustainable security can only be achieved by integrating the results into regular IT processes such as patch management and development guidelines.

Continue to the partner entry:

Abat
avatar
Tobias Stage, Abat


Write a comment

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the fourth time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork.

Venue

FourSide Hotel Salzburg,
Trademark Collection by Wyndham
Am Messezentrum 2, 5020 Salzburg, Austria
+43-662-4355460

Event date

Wednesday, June 10, and
Thursday, June 11, 2026

AI experience workshop only on June 11, 2026 (limited places)
Bonus: Access to all lectures on June 11, 2026

Regular ticket

Lectures, evening event and, depending on availability, the AI workshop on June 11, 2026
Places at the AI experience workshop are limited and registration is required.

Subscribers to the E3 Magazine Ticket

reduced with promocode CCAbo26

Students*

reduced with promocode CCStud26.
Please send proof of studies by e-mail to office@b4bmedia.net.
*The first 10 tickets are free of charge for students. Try your luck! 🍀
EUR 305 excl. VAT.
EUR 590 excl. VAT
EUR 390 excl. VAT
EUR 290 excl. VAT

Venue

Hotel Hilton Heidelberg
Kurfürstenanlage 1
D-69115 Heidelberg

Event date

Wednesday, April 22 and
Thursday, April 23, 2026

Tickets

AI onlyExperience workshop on April 23, 2026 
Bonus: Access to all lectures on April 23, 2026
Regular ticket
April 22, 2026: Lectures and evening event
April 23, 2026: Lectures and AI workshop
EUR 305 excl. VAT
EUR 590 excl. VAT
Subscribers to the E3 magazine
reduced with promocode STAbo26
EUR 390 excl. VAT
Students*
reduced with promocode STStud26.
Please send proof of studies by e-mail to office@b4bmedia.net.
EUR 290 excl. VAT
*The first 10 tickets are free of charge for students. Try your luck! 🍀
The event is organized by the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes attendance at all presentations of the Steampunk and BTP Summit 2026, a visit to the exhibition area, participation in the evening event and catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due course.