{"id":4240,"date":"2016-11-25T00:09:25","date_gmt":"2016-11-24T23:09:25","guid":{"rendered":"http:\/\/e3mag.com\/?p=4240"},"modified":"2022-02-06T00:11:52","modified_gmt":"2022-02-05T23:11:52","slug":"target-sap","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/target-sap\/","title":{"rendered":"Target SAP"},"content":{"rendered":"<p>Unauthorized access enables sabotage, espionage and fraud - up to full control over SAP infrastructures.<\/p>\n<p>Due to unauthorized <span id=\"urn:local-text-annotation-r4lba5rs6dpqz6qrg58cu8nlj4i2qbdt\" class=\"textannotation disambiguated wl-thing\">Accesses<\/span> at <span id=\"urn:local-text-annotation-nvrcqfcigwcu06njy37vhp7iq6ev7yry\" class=\"textannotation disambiguated wl-thing\">Databases<\/span> spies gain insight into all of a company's critical data: USIS, a provider of background research on personal data, was forced to admit in 2015 to unauthorized external access to at least 25,000 employees' data in U.S. government agencies.<\/p><div id=\"great-2418708755\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>For a fraud extends a <span id=\"urn:local-text-annotation-u5gjf5rjm881uwktagmg9p2rzq333d7n\" class=\"textannotation disambiguated wl-thing\">Attacker<\/span> his <span id=\"urn:local-text-annotation-3uiaoxkhg25na2s6sg4mpoj2keaw50be\" class=\"textannotation disambiguated wl-thing\">Right<\/span> in SAP systems, creates itself as a fake supplier, writes itself an invoice and initiates the transfer to its own account.<\/p>\n<p>This is done by extending the privileges of a user-<span id=\"urn:local-text-annotation-rscrkgym5h5gr9wcmj9cplc7mi8szpcw\" class=\"textannotation disambiguated wl-thing\">Accounts<\/span> - by leveraging the SAP-specific security approach of Segregation of Duties (SoD): While a separation of duties or competencies can be effective for <span id=\"urn:local-text-annotation-fak8lpg2yytnoe1xg2fdtadyjl5htkm7\" class=\"textannotation disambiguated wl-thing\">Security<\/span> provide by <span id=\"urn:local-text-annotation-oqcsqn3see7etbc0jyw5xzr2y7wjeayw\" class=\"textannotation disambiguated wl-thing\">Right<\/span> of employees in development, production, planning and accounting are neatly separated.<\/p>\n<p><a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Mariano-Nun.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Target sap\" class=\"wp-image-4245 alignleft\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Mariano-Nun.jpg\" alt=\"Mariano Nunez\" width=\"251\" height=\"304\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Mariano-Nun.jpg 505w, https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Mariano-Nun-100x121.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Mariano-Nun-480x582.jpg 480w\" sizes=\"auto, (max-width: 251px) 100vw, 251px\" \/><\/a>However, the separation can also be achieved by strongly privileged <span id=\"urn:local-text-annotation-pcbw7p10yzmp64igg6o31u30f4gydoss\" class=\"textannotation disambiguated wl-thing\">Accounts<\/span> be leveraged.<\/p>\n<p>In a case warned about in May 2016 by the government-affiliated US-CERT, a patch that has actually been closing since 2010 is being <span id=\"urn:local-text-annotation-j25fjib07zjidcxe7rpn3e3uhwg3hjm5\" class=\"textannotation disambiguated wl-thing\">Security gap<\/span> still exploited in SAP systems with Invoker Servlet enabled.<\/p>\n<p>Through the gap can <span id=\"urn:local-text-annotation-2auherlg7c3xjtrtvcd6ofvoow76u0m5\" class=\"textannotation disambiguated wl-thing\">Attacker<\/span> remotely access new SAP<span id=\"urn:local-text-annotation-1p2m03olh0li644k9ffctvfbo3kao75h\" class=\"textannotation disambiguated wl-thing\">User<\/span> with administrative privileges via the web browser.<\/p>\n<p>The gap could be identified at 36 companies - 13 of which generated annual sales of more than ten billion euros.<\/p>\n<p>The attack targeted non-updated or misconfigured SAP Java platforms. Sabotage by shutting down SAP applications or even an entire system is also dramatic.<\/p>\n<p>The damage when an application must be taken offline was estimated by respondents to a Ponemon Institute study in spring 2016 at $4.5 million - including all costs to repair the damage and lost business opportunities.<\/p>\n<h3>Attacks on profiles and privileges<\/h3>\n<p>The target areas for attacks on access rights and user profiles are the transaction layers - such as Hana or NetWeaver - which manage business information and processes as well as access to them, regulate communication between the instances, and are responsible for their <span id=\"urn:local-text-annotation-nmbwgzdorafitikt0df46hbwpf2x770e\" class=\"textannotation disambiguated wl-thing\">Security<\/span> for instance by <span id=\"urn:local-text-annotation-4i9rc3zi2ohvwa8n3yz42divazzzwa9j\" class=\"textannotation disambiguated wl-thing\">Encryption<\/span> provide.<\/p>\n<p>Also <span id=\"urn:local-text-annotation-tmj5fb4bzgfhrutsje6sw8gi9qu8fzxz\" class=\"textannotation disambiguated wl-thing\">Accounts<\/span> and their permissions are managed in the transaction layer with parameters and can be configured like in a <span id=\"urn:local-text-annotation-g0s8d0y44r63gn6dnkm5rnuvp83zhxd1\" class=\"textannotation disambiguated wl-thing\">Database<\/span> Change. <span id=\"urn:local-text-annotation-juog362f0zs6251a3ifrkaemymu8a0os\" class=\"textannotation disambiguated wl-thing\">Attacker<\/span> try to use these accesses to remotely control data traffic, read, copy, move or overwrite directories of any content.<\/p>\n<p>All parameters of SAP infrastructures can be configured quickly by entering numerical values.<\/p>\n<h3><span id=\"urn:local-text-annotation-2tkhk56coc2hfhx9nkiryvgvfukkdptg\" class=\"textannotation disambiguated wl-thing\">Account<\/span>-Management and error rate<\/h3>\n<p>The most diverse possibilities of <span id=\"urn:local-text-annotation-6rp5qrvb36nalvm1d3yy3vf9izdejjl5\" class=\"textannotation disambiguated wl-thing\">Account<\/span>-<span id=\"urn:local-text-annotation-tmip2zgx45l9ta24qlkgfcbirsoijjps\" class=\"textannotation disambiguated wl-thing\">Management<\/span> quickly create complexity and increase the error rate.<\/p>\n<p>Risks arise from the customizing of the SAP software, from the settings made by the user <span id=\"urn:local-text-annotation-hwpedpn6ufp70u24s0hq6sspja995vpo\" class=\"textannotation disambiguated wl-thing\">Management<\/span> Engine (UME) in Java systems, which is responsible for searching or creating new users, and by the Access Control List (ACL), which regulates the logon to servers and the admission of programs or connections (reginfo, secinfo, Webdispatcher, Management Console, Message Server, ICM).<\/p>\n<p>Further dangers exist in the configuration of user roles and user parameters in general (for example, through the universally authorized Sap_All user and user profiles that can accept RFC connections) or in the case of insecure configurations of authentication procedures.<\/p>\n<h3><span id=\"urn:local-text-annotation-yq7sb73plws0zgim9bxds0cu6pdi007s\" class=\"textannotation disambiguated wl-thing\">Management<\/span> from <span id=\"urn:local-text-annotation-xq8825xs5rm9dv5ffog0cr02ftugsjrq\" class=\"textannotation disambiguated wl-thing\">Risk<\/span>-Applicants<\/h3>\n<p>Extensive privileges make users dangerous. However, if credentials have been leaked or authentication procedures have been circumvented, the use of secure user types can still provide a second wall of protection.<\/p>\n<p>A basic rule in rights management is therefore to create a <span id=\"urn:local-text-annotation-wmz3au0lr28teyur1ia65uui8x4zrgf9\" class=\"textannotation disambiguated wl-thing\">User<\/span> only with the minimum <span id=\"urn:local-text-annotation-6ff9p0gvzefnrro6ozhfhmekszz2zsnc\" class=\"textannotation disambiguated wl-thing\">Right<\/span> which he needs for his task. The so-called restricted user, who has no special privileges in the default setting, on <span id=\"urn:local-text-annotation-5qvvz4p6kru0d1t7bfagm1uzrblhyfx3\" class=\"textannotation disambiguated wl-thing\">Databases<\/span> only accesses via client applications and does not have full SQL access should be security standard.<\/p>\n<p>Standard users who can create their own objects by default, read data in the system view and have a public role should be avoided if possible. Their log-in, data query and data transfer activities must be monitored in particular.<\/p>\n<p>Of course, this also applies to particularly critical <span id=\"urn:local-text-annotation-byiohykv2chahglles1wrvxkk686kznb\" class=\"textannotation disambiguated wl-thing\">Hana<\/span>-User: The adm user (where  stands for the respective <span id=\"urn:local-text-annotation-e5q3tsb53n76vpijml744ijjvz3vu5di\" class=\"textannotation disambiguated wl-thing\">Hana<\/span>-system SID), which is created during the installation process at the operating system level, unprotected represents a <span id=\"urn:local-text-annotation-0zbawivkurtnf4751xfvzs74bzj4vxhd\" class=\"textannotation disambiguated wl-thing\">Risk<\/span> represents. It has privileges for all <span id=\"urn:local-text-annotation-jc9ch4teyotsfln1d21gve1v1cg2wden\" class=\"textannotation disambiguated wl-thing\">Hana<\/span>-System Resources.<\/p>\n<p>Many system providers place the <span id=\"urn:local-text-annotation-2hujp7d46utsawodctr7xh4lnl3mbe7t\" class=\"textannotation disambiguated wl-thing\">Password<\/span> for this <span id=\"urn:local-text-annotation-nf8bvsgk1gk29rj1uelzkd6gee3228wo\" class=\"textannotation disambiguated wl-thing\">User<\/span> during the installation of the systems at customers' sites. It should be changed at the latest after handover of the SAP infrastructure.<\/p>\n<p>Also other <span id=\"urn:local-text-annotation-rb12j6prsia263xd6hhlmp98lrq4yx0w\" class=\"textannotation disambiguated wl-thing\">User<\/span> on operating system environment, such as the root user, the sapadm user or individually created user profiles, must be configured securely and monitored all the more closely with extensive privileges.<\/p>\n<h3>Side entrances<\/h3>\n<p>Another backdoor to be monitored, which is often not asked for credentials when entering, are SAP's emergency mechanisms. With the profile parameter login\/no_automatic_user_sapstar, an access for uncomplicated problem solving is available, which leads to the dangerous <span id=\"urn:local-text-annotation-wmuao17urxrugkrk7tfhlsrqapulemso\" class=\"textannotation disambiguated wl-thing\">Backdoor<\/span> can be.<\/p>\n<p>If the super user SAP* is then deleted, this access no longer exists for the auditable <span id=\"urn:local-text-annotation-apcsmafscq82mmytqj4u4sh1rsu6ihmm\" class=\"textannotation disambiguated wl-thing\">Databases<\/span>. Therefore, it remains undetected when performing conventional audits, but has a connection to the system with all authorizations. In addition, the standard<span id=\"urn:local-text-annotation-vlsg5eltfuasjij76lzmjf9tc8m8g0ux\" class=\"textannotation disambiguated wl-thing\">Password<\/span> not be changed.<a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Gefa\u0308hrdungstabelle.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Target sap\" class=\"aligncenter size-full wp-image-4244\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Gefa\u0308hrdungstabelle.jpg\" alt=\"Hazard table\" width=\"600\" height=\"474\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Gefa\u0308hrdungstabelle.jpg 600w, https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Gefa\u0308hrdungstabelle-100x79.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Gefa\u0308hrdungstabelle-480x379.jpg 480w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>The result of misuse is the compromise of either one or more clients, one or more application servers, or even the entire SAP system.<\/p>\n<p>The simple workaround is to never delete the super user, additionally save the user SAP* and set the value login\/no_automatic_user_sapstar with \"1\".<\/p>\n<p>However, insecure configurations of authentication procedures also pose a high <span id=\"urn:local-text-annotation-qceoejtlspu4iyprq003ojd4qrb4kzdw\" class=\"textannotation disambiguated wl-thing\">Risk<\/span> present. Danger create scripts for automatic saving of <span id=\"urn:local-text-annotation-mq399146m5gx2cbljb6gyd3ena6ssinj\" class=\"textannotation disambiguated wl-thing\">Passwords<\/span> in the SAP GUI user interface. If set appropriately, these save the values entered in the log-in field, for example, and thus also <span id=\"urn:local-text-annotation-y2xebry46tc3q2q11ryqv2oc2vhb3qnk\" class=\"textannotation disambiguated wl-thing\">Passwords<\/span> - but also user data from customers.<\/p>\n<p>Such attacks are favoured by an excessively weak <span id=\"urn:local-text-annotation-t4mc0yupfhrn7hbqo2izalkwvr4wy8rh\" class=\"textannotation disambiguated wl-thing\">Encryption<\/span> when saving the data. In addition, the history of entries in user name fields for each <span id=\"urn:local-text-annotation-b2c7oe6tvdcpbftyonpe0ac9klstu2kz\" class=\"textannotation disambiguated wl-thing\">User<\/span> saved in a uniformly named file, so that a <span id=\"urn:local-text-annotation-y8uolh00ybk0eowgra0hwzskj8u9ttpu\" class=\"textannotation disambiguated wl-thing\">Hacker<\/span> find them easily. For more <span id=\"urn:local-text-annotation-irhwzrqt8dhjm5wod58oymub904r0t55\" class=\"textannotation disambiguated wl-thing\">Security<\/span> provides the <span id=\"urn:local-text-annotation-por1kj5is9j1pfidqvr44f11oe5ayg7d\" class=\"textannotation disambiguated wl-thing\">Protection<\/span> of entries in darkened input fields or turning off the saving of past entries.<\/p>\n<p>Another gap are the so-called SAP shortcuts. Here define <span id=\"urn:local-text-annotation-1mtlvzhq80dmcou8qu6wz1k9xd0jx222\" class=\"textannotation disambiguated wl-thing\">User<\/span> not only a target address for logging in to an SAP instance, the transaction to be triggered there, and possibly the entry of a default user name.<\/p>\n<p>A shortcut defined or controlled by the wrong hands can become a gateway to systems. In earlier transaction layers, the danger was even greater because the shortcuts also included the automatic input of individual <span id=\"urn:local-text-annotation-in2m7cn872dv14bai48ainyfszj9w4by\" class=\"textannotation disambiguated wl-thing\">Passwords<\/span> could be installed.<\/p>\n<p>SAP has made these options available for new <span id=\"urn:local-text-annotation-h2w1mf17rp3869koq07q3pkwx7wyjcpq\" class=\"textannotation disambiguated wl-thing\">Passwords<\/span> therefore blocked in the meantime. For already existing <span id=\"urn:local-text-annotation-725l1qbyjcd0ndf0c7ny6j5hhsuvjd1v\" class=\"textannotation disambiguated wl-thing\">Passwords<\/span> this danger may still exist.<\/p>\n<h3>Configuration check and attack defense<\/h3>\n<p>Given the complexity and dimension of configuration issues, errors are almost impossible to avoid. But it is important to find and fix them as quickly as possible.<\/p>\n<p>An effective SAP security solution therefore investigates configuration errors and provides near real-time protection against possible attacks.<\/p>\n<p>The inventory of <span id=\"urn:local-text-annotation-nrz9sik74jbna6707wqvawb2b0pidj64\" class=\"textannotation disambiguated wl-thing\">Security gaps<\/span> can only be achieved through automated assessment solutions. It is important to continuously check the security status of the SAP infrastructure in order to immediately detect any new misconfigurations. <a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/SAP-Sicherheit.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Target sap\" class=\"wp-image-4247 alignright\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/SAP-Sicherheit.jpg\" alt=\"SAP Security\" width=\"293\" height=\"559\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/SAP-Sicherheit.jpg 505w, https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/SAP-Sicherheit-100x191.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/SAP-Sicherheit-480x916.jpg 480w\" sizes=\"auto, (max-width: 293px) 100vw, 293px\" \/><\/a><\/p>\n<p>In the process, not only productive systems, but also <span id=\"urn:local-text-annotation-sik3jzg6r2vnnwb6nlpqrb23edqxijo4\" class=\"textannotation disambiguated wl-thing\">Test<\/span>-systems must be taken into account, because it is precisely here that default configured and often forgotten user-<span id=\"urn:local-text-annotation-q3icdr1saf6j8i38ud1n4lazcu97r9ce\" class=\"textannotation disambiguated wl-thing\">Accounts<\/span>, which are exploited by unwanted visitors.<\/p>\n<p>Configurations from <span id=\"urn:local-text-annotation-h2hfh6rigd87tdquljijlx8bwix62xyv\" class=\"textannotation disambiguated wl-thing\">Accounts<\/span> or authentication solutions can be configured according to different guidelines (SAP-<span id=\"urn:local-text-annotation-mo11g5uj0ffwdts1pzlmme0ghh1s4pw6\" class=\"textannotation disambiguated wl-thing\">Security Policy<\/span>, PCI, SOX, NERC, Custom or others).<\/p>\n<p>A threat detection and mitigation solution then first gives step-by-step instructions on how to fix the gaps, which can be implemented quickly.<\/p>\n<p>Against unknown threats, which also arise from configuration-related risks, solutions provide a near-real time<span id=\"urn:local-text-annotation-hyob1b6bhfhnd8dsoz9hdpzwjwby1pik\" class=\"textannotation disambiguated wl-thing\">Protection<\/span> by blocking attacks until an SAP Security Note is available for it.<\/p>\n<p>At the top of the list is also a <span id=\"urn:local-text-annotation-nbxdo10svzdhxf2oyr3918ifjc09de9g\" class=\"textannotation disambiguated wl-thing\">Monitoring<\/span> of abnormal access by internal employees.<\/p>\n<p>The developer who suddenly or at unusual times resorts to instances for accounting should not go undetected and its <span id=\"urn:local-text-annotation-xkmgoief7fgr80n61anbztxk64harq1r\" class=\"textannotation disambiguated wl-thing\">Accesses<\/span> be blocked if necessary.<\/p>","protected":false},"excerpt":{"rendered":"<p>SAP-controlled business processes and data are an attractive target for attackers. External as well as internal attackers who hijack foreign credentials or extend authorizations can access data and applications via the transaction layers of incorrectly or riskily configured SAP systems.<\/p>","protected":false},"author":79,"featured_media":4256,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[4,740],"tags":[637,1359,117],"coauthors":[22310],"class_list":["post-4240","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","category-mag1612","tag-hacker","tag-onapsis","tag-sicherheit","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",1000,700,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",400,280,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-768x538.jpg",768,538,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",1000,700,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-100x70.jpg",100,70,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-480x336.jpg",480,336,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-640x448.jpg",640,448,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-720x504.jpg",720,504,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-960x672.jpg",960,672,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",1000,700,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",1000,700,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",1000,700,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",1000,700,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",1000,700,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",18,12,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",964,675,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",1000,700,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",1000,700,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",600,420,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898.jpg",600,420,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/shutterstock_242118898-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>SAP-gesteuerte Gesch\u00e4ftsprozesse und Daten sind f\u00fcr Angreifer ein attraktives Ziel. Externe wie interne Angreifer, die fremde Zugangsdaten in Beschlag nehmen oder Berechtigungen ausweiten, k\u00f6nnen auf Daten und Anwendungen \u00fcber die Transaktionslayer von falsch oder riskant konfigurierten SAP-Systemen zugreifen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/management\/\" rel=\"category tag\">Business-Management<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/likes1612\/\" rel=\"category tag\">MAG 16-12<\/a>","author_info_v2":{"name":"Mariano Nunez, Onapsis","url":"https:\/\/e3mag.com\/en\/author\/mariano-nunez\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/4240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=4240"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/4240\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/4256"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=4240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=4240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=4240"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=4240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}