{"id":162339,"date":"2026-04-21T15:00:00","date_gmt":"2026-04-21T13:00:00","guid":{"rendered":"https:\/\/e3mag.com\/?p=162339"},"modified":"2026-03-30T16:16:46","modified_gmt":"2026-03-30T14:16:46","slug":"sap-penetration-tests-blind-spots-at-the-core-of-it","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/sap-penetration-tests-blind-spots-at-the-core-of-it\/","title":{"rendered":"SAP penetration tests: Blind spots at the core of IT"},"content":{"rendered":"<p>The current threat landscape leaves no doubt: cyber attacks are an omnipresent danger for companies of all sizes. According to the BSI situation report on IT security in Germany 2025, the situation is tense and offers attackers the opportunity to attack small and medium-sized companies in particular due to attack surfaces that are still too poorly protected. This trend is also reflected in the SAP environment: an analysis of the monthly security advisories published in 2025 shows a significant increase in vulnerabilities, which underlines the growing attack surface of SAP applications. In response to this tense cyber situation, most organizations have strengthened their defenses: multi-factor authentication, endpoint detection systems and information security management as examples of modern security measures are well known and have become part of the standard repertoire. But in the midst of these efforts, there is a dangerous blind spot: the SAP system landscape. While the network and the classic IT infrastructure are meticulously checked, the system that manages financial and personnel data, production plans and customer information often remains a black box.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Neglected SAP security<\/h2>\n\n\n\n<p>The reasons for this are mostly of an organizational nature. SAP security often falls into a responsibility gap: The IT security team lacks specialist knowledge of proprietary architecture, while the SAP team focuses on stability rather than attack simulations. In addition, there is a deceptive sense of security that views SAP systems as internal, sealed-off monoliths. This assumption ignores the reality of modern landscapes networked via web services and cloud connections. A classic network pentest is not enough: Standard scanners only check the host machine, but do not understand the complex SAP application layer with its proprietary protocols such as Remote Function Call (RFC) or Dynamic Information and Action Gateway (DIAG). Furthermore, if connected development, test or technical systems such as Solution Manager, Focused Run, Governance, Risk and Compliance etc. are excluded from the test scope, a decisive attack vector remains unconsidered.<\/p><div id=\"great-377525841\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Typical attack vectors<\/h2>\n\n\n\n<p>Attacks on SAP systems can be divided into server encryption with the aim of extorting ransom money on the one hand and insider attacks on the other. Both methods are particularly dangerous due to their speed: a report by Onapsis and SAP shows that attacks on critical SAP applications are on the rise and often occur within 72 hours of a security patch being released. Attackers repeatedly exploit typical vulnerabilities. Unpatched SAP systems are a particularly common attack vector. Although SAP publishes security-relevant information on every second Tuesday of the month as part of its Patch Day, many companies do not apply updates promptly. This leaves systems open to known exploits for weeks or months. Inadequately secured RFC interfaces are also critical. If a less protected development or test system is compromised first, attackers can laterally access productive systems via these connections and execute functions there.&nbsp;<\/p>\n\n\n\n<p>Added to this are inadequate authorization concepts: Standard users such as SAP* or DDIC with weak or unchanged passwords and over-privileged dialog or system users still exist. Such accounts are specifically used to gradually extend rights to full system control. Insecure custom code also represents a gateway, for example due to a lack of authorization checks or vulnerability to code injections. Passwords also remain a persistent problem, as long validity periods, weak hashing methods and reuse make it easier to take over user accounts.<\/p>\n\n\n\n<p>A conventional penetration test is not enough to proactively address the risks. The SAP Secure Operations Map provides a clear model for understanding the various security levels.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"604\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-spezifische-Schwachstellen_web.jpg\" alt=\"\" class=\"wp-image-162341\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-spezifische-Schwachstellen_web.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-spezifische-Schwachstellen_web-400x242.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-spezifische-Schwachstellen_web-768x464.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-spezifische-Schwachstellen_web-100x60.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-spezifische-Schwachstellen_web-480x290.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-spezifische-Schwachstellen_web-640x387.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-spezifische-Schwachstellen_web-720x435.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-spezifische-Schwachstellen_web-960x580.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-spezifische-Schwachstellen_web-18x12.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-spezifische-Schwachstellen_web-600x362.jpg 600w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">SAP-specific vulnerabilities exceeded the 200 mark for the first time in 2025.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">SAP penetration tests<\/h2>\n\n\n\n<p>Traditional pentests usually only cover the lowest IT infrastructure level. However, the crucial vulnerabilities and points of attack are usually found in the system and application-specific levels above, which often represent a black box for outsiders. An SAP penetration test therefore starts where traditional tests end and analyzes SAP-specific services and protocols such as gateway, message server or the Internet Communication Framework as well as the security of DIAG and RFC communication. In addition, application security is checked by examining standard transactions, Fiori apps and web services for manipulation possibilities and unauthorized access. Another focus is on the authorization concept, which is systematically analysed for critical authorizations and potential paths for extending rights. Customer-specific Abap code is also examined both manually and using specialized tools for vulnerabilities such as code injection or missing authority checks. In addition, the system configuration, in particular security-relevant profile parameters, is checked for compliance with SAP best practices and DSAG recommendations. Another advantage lies in the testers' deep understanding of the SAP world. They know where hidden configurations are, how business processes can be manipulated and which default settings pose a risk. This technical focus makes it possible to uncover vulnerabilities that remain invisible to general security scanners and experts. Regulatory requirements such as Nis2 or Kritis specifications demand a verifiable, holistic approach to security, which the isolated penetration test alone does not fulfill.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"542\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-Systeme-sind-von-Mauern_web.jpg\" alt=\"\" class=\"wp-image-162351\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-Systeme-sind-von-Mauern_web.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-Systeme-sind-von-Mauern_web-400x217.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-Systeme-sind-von-Mauern_web-768x416.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-Systeme-sind-von-Mauern_web-100x54.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-Systeme-sind-von-Mauern_web-480x260.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-Systeme-sind-von-Mauern_web-640x347.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-Systeme-sind-von-Mauern_web-720x390.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-Systeme-sind-von-Mauern_web-960x520.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-Systeme-sind-von-Mauern_web-18x10.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/SAP-Systeme-sind-von-Mauern_web-600x325.jpg 600w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">SAP systems are surrounded by walls of technical security and EU-wide guidelines on IT security and information protection - but can they withstand insider attacks?\u00a0<\/figcaption><\/figure>\n\n\n\n<p>A holistic SAP security strategy goes beyond this and includes secure software development as part of a secure software development lifecycle. Securing the supply chain is also becoming increasingly important, especially in critical industries where dependencies on external partners pose considerable risks. This approach is complemented by continuous monitoring, which uses a central SIEM system to record and evaluate security-relevant events across all systems. Finally, the increasing use of cloud solutions requires special consideration, as their security requirements and threat scenarios differ in many respects from traditional on-premises systems.<\/p>\n\n\n\n<div class=\"wp-block-group has-background is-vertical is-layout-flex wp-container-core-group-is-layout-6be7207b wp-block-group-is-layout-flex\" style=\"background-color:#fef1e7;padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--60)\">\n<h2 class=\"wp-block-heading\">Secure SAP system in four steps<br><\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>Getting started with proactively securing the SAP landscape is possible with a strategic approach in four clear steps.<\/p>\n\n\n\n<p><strong>Set scope:<\/strong> Identification of the most critical systems, typically the productive ERP or S\/4 Hana systems, as well as technical feeders such as a productive Solution Manager.<\/p>\n\n\n\n<p><strong>Choosing the right partner<\/strong>SAP pentests require specialized knowledge. SAP know-how is therefore required that goes beyond general network pentesting.&nbsp;<\/p>\n\n\n\n<p><strong>Risk-based evaluation of the results:<\/strong> A meaningful report must present and prioritize technical findings in detail. This allows you to focus on the weak points that pose the greatest risk to operations.&nbsp;<\/p>\n\n\n\n<p><strong>Implement measures sustainably:<\/strong> A pentest is a snapshot that quickly provides more security with less effort. However, sustainable security can only be achieved by integrating the results into regular IT processes such as patch management and development guidelines.<\/p>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>Continue to the partner entry:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/e3mag.com\/de\/partners\/abat-ag\/\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2023\/02\/abat-autor.png\" alt=\"Abat\" class=\"wp-image-122023\" style=\"width:215px;height:auto\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2023\/02\/abat-autor.png 150w, https:\/\/e3mag.com\/wp-content\/uploads\/2023\/02\/abat-autor-100x100.png 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2023\/02\/abat-autor-24x24.png 24w, https:\/\/e3mag.com\/wp-content\/uploads\/2023\/02\/abat-autor-48x48.png 48w, https:\/\/e3mag.com\/wp-content\/uploads\/2023\/02\/abat-autor-96x96.png 96w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>Companies invest heavily in cyber security, but their most valuable data often remains unprotected. SAP systems, the heart of critical business processes, are often overlooked in penetration tests - a fatal omission that opens the door to attackers.<\/p>","protected":false},"author":5817,"featured_media":162340,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[5,44396],"tags":[73,44414,236,1516],"coauthors":[44413],"class_list":["post-162339","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-management","category-mag-26-04","tag-erp","tag-penetrationstests","tag-sap","tag-security","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/2604_it_abat-1-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Unternehmen investieren massiv in Cybersicherheit, doch ihre wertvollsten Daten bleiben oft ungesch\u00fctzt. SAP-Systeme, das Herzst\u00fcck kritischer Gesch\u00e4ftsprozesse, werden bei Penetrationstests h\u00e4ufig \u00fcbersehen \u2013 ein fatales Vers\u00e4umnis, das Angreifern T\u00fcr und Tor \u00f6ffnet.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/it-management\/\" rel=\"category tag\">IT-Management<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-26-04\/\" rel=\"category tag\">MAG 26-04<\/a>","author_info_v2":{"name":"Tobias Stage, Abat","url":"https:\/\/e3mag.com\/en\/author\/tobias-stage\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/162339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/5817"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=162339"}],"version-history":[{"count":3,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/162339\/revisions"}],"predecessor-version":[{"id":162354,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/162339\/revisions\/162354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/162340"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=162339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=162339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=162339"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=162339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}