{"id":135809,"date":"2024-01-12T06:55:00","date_gmt":"2024-01-12T05:55:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=135809"},"modified":"2024-01-05T08:15:12","modified_gmt":"2024-01-05T07:15:12","slug":"sap-security-solution","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/sap-sicherheitsloesung\/","title":{"rendered":"SAP Security Solution"},"content":{"rendered":"<p>SAP was introduced at the company in 1995. Today, the majority of the 2000 employees work in an SAP environment, mainly with the classic FI, CI, MM, SD and PP modules. An S\/4 Hana transformation project is underway, but the company is currently still working with an SAP ECC system.&nbsp;<\/p>\n\n\n\n<p>100 years of expertise: The Westfalen Group is active in the fields of technical gases, cooling and heating, filling stations and mobility as well as respiratory home therapy. With its products and services, the company is increasingly offering solutions that help customers to become more sustainable. Hydrogen as an energy source is playing a particularly important role in more and more areas. Founded in M\u00fcnster in 1923, the family-owned company is now represented by numerous subsidiaries and associated companies at over 20 production sites in Germany, the Netherlands, Belgium, France, Switzerland and Austria.<\/p><div id=\"great-2523313066\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>In 2021, the company was hit by a ransomware attack in which all IT systems in its own data center were encrypted. The SAP system was not affected as it had been running on the servers of an outsourcing service provider for some time. However, the attack was enough of a wake-up call: what would happen if SAP data was also encrypted in this way one day?&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-e495ea3\" data-block-id=\"e495ea3\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-e495ea3-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-45c2ea4\" data-v=\"4\" data-block-id=\"45c2ea4\"><style>@media screen and (min-width:768px){.stk-45c2ea4{flex:1 1 33.3% !important}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-45c2ea4-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-45c2ea4-inner-blocks\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"500\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/WEB_Andreas_Eckey_Westfalen_Gruppe.jpg\" alt=\"\" class=\"wp-image-135813\" style=\"aspect-ratio:0.8;width:234px;height:auto\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/WEB_Andreas_Eckey_Westfalen_Gruppe.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/WEB_Andreas_Eckey_Westfalen_Gruppe-320x400.jpg 320w, https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/WEB_Andreas_Eckey_Westfalen_Gruppe-100x125.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/WEB_Andreas_Eckey_Westfalen_Gruppe-10x12.jpg 10w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-6849f3c\" data-v=\"4\" data-block-id=\"6849f3c\"><style>.stk-6849f3c-inner-blocks{align-items:flex-start !important;justify-content:center !important}@media screen and (min-width:768px){.stk-6849f3c{flex:1 1 66.7% !important}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-6849f3c-container stk--no-background stk--no-padding\"><div class=\"has-text-align-left stk--column-flex stk-block-content stk-inner-blocks stk-6849f3c-inner-blocks\">\n<p>\u201c<em>You need SAP knowledge to distinguish whether it is a vulnerability or a false positive.<\/em>\u201c<\/p>\n\n\n\n<p><strong>Andreas Eckey<\/strong>,<br>Information Security Officer, Westfalen Group<br><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<p>To rule this out with certainty, the company decided to work with Werth IT and use the WerthAuditor. The outsourcing service provider commissioned by the Westfalen Group had already taken standard security precautions, which were thus expanded to include the SAP security solution. \"Thomas Werth's special expertise in SAP security was recommended to us by the IT security company that helped us rebuild after the ransomware attack,\" explains Andreas Eckey, Information Security Officer at the Westfalen Group.<\/p>\n\n\n\n<p>The collaboration began with a penetration test on the SAP system.<br>A number of valuable measures were derived from this, which the Westfalen Group team immediately implemented. For example, there was a need to optimize some parameters in the system in order to eliminate possible weak points. They were changed immediately after the pen test. The IT department also hardened the existing password guidelines on the basis of the test results.&nbsp;<\/p>\n\n\n\n<p>However, the Westfalen Group's IT security did not want to stop at this one-off measure. New vulnerabilities also regularly emerged in the SAP environment that needed to be addressed. At the beginning of 2022, the decision was made to purchase and use the WerthAuditor independently. Since then, the company's SAP Basis IT team has been using it permanently.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Notes and recommendations<\/h2>\n\n\n\n<p>The Auditor is basically easy to use, even for non-expert security specialists. Nevertheless, there are tricks and subtleties that require regular communication with the manufacturer. Andreas Eckey: \"The support from Werth IT is excellent. We receive proactive advice on updates and recommendations for certain system settings, so that the issues don't even become acute for us.\"<\/p>\n\n\n\n<p>There are short monthly coordination calls on the results of the WerthAuditor. The new dashboard, which provides the Westfalen Group's IT department with a clear and simple overview of the weak points identified and the measures to be derived from them, helps with this. After all, the SAP system in the company is alive; new processes are constantly being established or existing ones changed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Overview and fast response<\/h2>\n\n\n\n<p>The dashboard is a real help when it comes to transparency. \"Of course, you also need SAP knowledge to differentiate between a real vulnerability and a false positive,\" says Andreas Eckey. \"What the dashboard gives us in practice is a real-time overview of possible vulnerabilities. This applies to parameters, authorizations, etc., from the database to the core of the system. We can therefore react immediately.\"&nbsp;<\/p>\n\n\n\n<p>To this end, the Westfalen Group has established a process for importing SAP hot fixes into the system. Andreas Eckey emphasizes: \"It makes things much easier if we don't have to manually gather information as we did before. We can assess more quickly what is really relevant and what we need to import hot fixes for. The WerthAuditor automatically identifies incidents and displays them in the dashboard, including the measures to be derived from them.\"<\/p>\n\n\n\n<p>This enables SAP user companies such as the Westfalen Group to permanently strengthen their protective walls, which is extremely important, especially in times of increasing cyber threats. Andreas Eckey emphasizes: \"What is in SAP is our crown jewel - nothing can be allowed to happen to it. With WerthAuditor, we have excellent prospects for the future of our SAP security.\" <\/p>\n\n\n\n<p><a href=\"https:\/\/www.werth-it.de\/hp\/\" target=\"_blank\" rel=\"noreferrer noopener\">werth-it.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>A ransomware attack on the IT infrastructure prompted the internationally active family business to purchase an explicit SAP security solution.<\/p>","protected":false},"author":2368,"featured_media":135812,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[5,43707],"tags":[],"coauthors":[39720],"class_list":["post-135809","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-management","category-mag-23-12","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Eine Ransomware-Attacke auf die IT-Infrastruktur war f\u00fcr das international t\u00e4tige Familienunternehmen der Anlass, eine explizite SAP-Sicherheitsl\u00f6sung anzuschaffen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/it-management\/\" rel=\"category tag\">IT-Management<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-23-12\/\" rel=\"category tag\">MAG 23-12 \/ 24-01<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e3_magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/135809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=135809"}],"version-history":[{"count":5,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/135809\/revisions"}],"predecessor-version":[{"id":136264,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/135809\/revisions\/136264"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/135812"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=135809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=135809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=135809"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=135809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}