{"id":162935,"date":"2026-05-11T10:00:00","date_gmt":"2026-05-11T08:00:00","guid":{"rendered":"https:\/\/e3mag.com\/?p=162935"},"modified":"2026-04-29T12:49:53","modified_gmt":"2026-04-29T10:49:53","slug":"sap-security-on-the-test-bench","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/sap-sicherheit-auf-dem-pruefstand\/","title":{"rendered":"SAP security put to the test"},"content":{"rendered":"<p>How secure are SAP systems worldwide? The Cybersecurity Resilience Index for SAP provides a data-based answer to this question: it indicates the average percentage of compliant checks per area of responsibility across thousands of SAP systems in SecurityBridge's customer base. The IT security company now secures 8,000 SAP systems worldwide; the index therefore reflects an approximately representative picture of the security situation in all SAP systems worldwide.<\/p>\n\n\n\n<p>Most areas of responsibility are between 58 and 77 percent. This indicates an overall solid security program in areas directly related to application controls and configuration. However, there are significant fluctuations in the areas of governance and integration. SecurityBridge found an index of 100 percent in the area of \u201eOperating Systems\u201c - at host level, system hardening and controls are therefore mature, consistently enforced and intensively tested. 77 percent in the area of \u201eDevelopment (Code Vulnerability)\u201c indicates established practices for secure development. This reduces the attack surface through custom abap and repository changes and is a positive indicator for long-term risk mitigation.<\/p><div id=\"great-2153985308\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>Likewise, 77 percent in the area of \u201eIntegration\u201c document a considerable safeguarding of interfaces (RFC, HTTP, TCP\/IP), which reduces the risk of lateral movement via cross-system channels. \u201eIdentity\u201c and \u201eAccess\u201c with 73 percent reflect a solid IAM situation, with reliable processes for new hires, transfers and departures as well as authentication controls. Teams are actively managing their accounts and reducing orphaned and privileged access accounts.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Incorrectly managed authorizations<\/h2>\n\n\n\n<p>At the lower end of the scale are the areas of \u201epermissions\u201c (68 percent) and \u201edata protection\u201c (65 percent) - risk areas that should actually enjoy high priority, as mismanaged permissions and the disclosure of sensitive data are frequent attack vectors for security breaches. Gaps in authorization control are closely related to the attack paths of attackers who work their way up from basic users to elevated privileges. The privacy score directly reflects the risk in terms of GDPR and other regulations, as well as the potential threat of data exfiltration. It signals an ongoing risk if<br>Access controls and monitoring for sensitive data are not consistently enforced.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"741\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/CRIS-von-SecurityBrilnen-SAP-Bereic_web.jpg\" alt=\"\" class=\"wp-image-162942\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/CRIS-von-SecurityBrilnen-SAP-Bereic_web.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/CRIS-von-SecurityBrilnen-SAP-Bereic_web-400x296.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/CRIS-von-SecurityBrilnen-SAP-Bereic_web-768x569.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/CRIS-von-SecurityBrilnen-SAP-Bereic_web-100x74.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/CRIS-von-SecurityBrilnen-SAP-Bereic_web-480x356.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/CRIS-von-SecurityBrilnen-SAP-Bereic_web-640x474.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/CRIS-von-SecurityBrilnen-SAP-Bereic_web-720x534.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/CRIS-von-SecurityBrilnen-SAP-Bereic_web-960x711.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/CRIS-von-SecurityBrilnen-SAP-Bereic_web-16x12.jpg 16w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/CRIS-von-SecurityBrilnen-SAP-Bereic_web-600x445.jpg 600w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Different security measures in individual SAP areas. Source SecurityBridge<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">SAP Basis weak point<\/h2>\n\n\n\n<p>The \u201eSAP Basis\u201c area, which is the governance and configuration layer underlying all other controls, has the lowest score at 58 percent. Vulnerabilities in this area can undermine logging, audit readiness and overall system assurance, creating a gap in the visibility of misconfigurations across the entire stack. The score indicates frequent misconfigurations or slow remediation cycles, which can impact incident response and forensic capabilities. The immediate focus - based on the results - should be on authorizations, data protection and SAP Basis. Risky or unused authorization profiles should be reviewed or cleaned up and least privilege models implemented.<\/p>\n\n\n\n<p><br>SecurityBridge also recommends policy-driven corrective measures and continuous monitoring for unusual authorization expansions.<\/p>\n\n\n\n<p><br>When it comes to data protection, organizations should implement tighter data access controls, move to encryption for storage and transmission, and implement (and monitor) robust data loss prevention measures to reduce the risk of data exfiltration. SAP Basis is well advised to tighten hardening measures, fix misconfigurations and ensure audit logs are enabled and retained. (Source: SecurityBridge)<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>SAP user companies have to implement hundreds of security recommendations in their systems. Where do they stand here, and in which areas is there a particular need to catch up?<br \/>\nSecurityBridge has now determined this in its Cybersecurity Resilience Index for SAP.<\/p>","protected":false},"author":2368,"featured_media":162940,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[5,44440],"tags":[20346,1993,44455,73,236],"coauthors":[39720],"class_list":["post-162935","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-management","category-mag-26-05","tag-cybersecurity","tag-datenschutz","tag-dsvgo","tag-erp","tag-sap","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2026\/04\/2605_it_security_bridge-1-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Hunderte von Sicherheitsempfehlungen m\u00fcssen SAP-Anwenderunternehmen in ihren Systemen umsetzen. Wo stehen sie hier, auf welchen Gebieten gibt es besonderen Nachholbedarf?<br \/>\nDies hat SecurityBridge jetzt in seinem Cybersecurity Resilience Index for SAP ermittelt.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/it-management\/\" rel=\"category tag\">IT-Management<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-26-05\/\" rel=\"category tag\">MAG 26-05<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e3_magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/162935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=162935"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/162935\/revisions"}],"predecessor-version":[{"id":162956,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/162935\/revisions\/162956"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/162940"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=162935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=162935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=162935"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=162935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}