{"id":63826,"date":"2020-01-08T08:00:18","date_gmt":"2020-01-08T07:00:18","guid":{"rendered":"http:\/\/e3mag.com\/?p=63826"},"modified":"2020-02-07T19:39:16","modified_gmt":"2020-02-07T18:39:16","slug":"cyber-attacks-tu","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/cyber-attacks-tu\/","title":{"rendered":"Cyber attacks: TU Darmstadt relies on Virtual Forge"},"content":{"rendered":"<p>With around 26,000 students and 4700 employees, the TU Darmstadt is one of the leading technical universities in Germany.<\/p>\n<p>Here, SAP is used both in the central university administration and in the departments, institutes and decentralized facilities to control central business processes: from budget and personnel management to construction and real estate management to third-party funding management and controlling.<\/p><div id=\"great-2055351614\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p><em>\"If an SAP system fails, essential administrative processes can come to a standstill\"<\/em><\/p>\n<p>reports Dorothee Krohberger-Stock, who heads the SAP CCoE and IT and process coordination at Darmstadt Technical University.<\/p>\n<p>To prevent operational disruptions and be prepared against external and internal cyber attacks, SAP managers planned to install an effective SAP security concept.<\/p>\n<p>To this end, three areas were initially identified: system configurations, system-critical authorizations, and Abap custom developments. Since manual analyses of these audit areas would exceed the available resources, the decision was made to use the SAP security tools from Virtual Forge.<\/p>\n<h3><a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-63827\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka.jpg\" alt=\"Silke Kubelka\" width=\"800\" height=\"800\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-150x150.jpg 150w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-768x768.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-100x100.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-480x480.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-640x640.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-720x720.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-24x24.jpg 24w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-48x48.jpg 48w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-96x96.jpg 96w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-300x300.jpg 300w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/h3>\n<h3>Faulty configurations detected<\/h3>\n<p>In 2014, for example, TU Darmstadt introduced the SystemProfiler to automatically identify and eliminate faulty or suboptimal configurations in the SAP systems.<\/p>\n<p>The tool combines many years of security know-how with current security guidelines and recommendations, for example from SAP, the German-speaking SAP User Group (DSAG) and the German Federal Office for Information Security (BSI).<\/p>\n<p><em>\"With the SystemProfiler, we can analyze all SAP system settings at the push of a button.\"<\/em><\/p>\n<p>Silke Kubelka, who heads SAP applications at Darmstadt Technical University, sums up the advantages.<\/p>\n<p><em>\"If errors and weaknesses are discovered, many parameters and settings can be adjusted quickly and easily.\"<\/em><\/p>\n<p>In addition, the solution is used to check system-critical SAP authorizations. Automatically, the tool detects when a user has access rights based on multiple assigned roles that, taken together, could lead to an SAP security risk.<\/p>\n<p>Used during the import of SAP updates, the SystemProfiler helps to adapt maintenance adjustments made or new systems with the best practices configuration.<\/p>\n<h3><a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-63828\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock.jpg\" alt=\"Dorothee Krohberger Stock\" width=\"800\" height=\"800\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-150x150.jpg 150w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-768x768.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-100x100.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-480x480.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-640x640.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-720x720.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-24x24.jpg 24w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-48x48.jpg 48w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-96x96.jpg 96w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-300x300.jpg 300w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/h3>\n<h3>Abap modifications in sight<\/h3>\n<p>The CodeProfiler is also used regularly to identify risks and optimization potential in the Abap customer code (Z namespace). TU Darmstadt uses it to check the existing SAP in-house developments for security, compliance, quality and S\/4 Hana suitability.<\/p>\n<p>At the same time, the tool will be used in the future for the acceptance of new programs and add-ons that are developed internally or by external partners and service providers. If weak points in the code come to light in the process, clean-up measures are initiated.<\/p>\n<p>This prevents corrupt code from getting into the existing SAP systems. In order to keep the operating costs as low as possible, the TU Darm- city uses the CodeProfiler \"as a Service\".<\/p>\n<p><em>\"Since we only develop or have our own Abap code developed to a limited extent, the cloud offering accommodates our desire to use the tool on an as-needed basis\"<\/em><\/p>\n<p>explains Dorothee Krohberger- Stock.<\/p>\n<p><em>\"Our long-term goal is to ensure that all of our SAP custom developments are robust, secure, maintainable, and compatible with emerging requirements such as Hana.\"<\/em><\/p>\n<p><em>\"The combined use of the two analysis tools has enabled us to increase the security and quality of our SAP applications\"<\/em><\/p>\n<p>SAP application manager Silke Kubelka takes stock.<\/p>\n<p><em>\"In all three defined testing areas, these tools largely meet our security and compliance requirements.\"<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>SAP security at the push of a button: This is the motto that the Technical University (TU) of Darmstadt is putting into practice with the analysis tools from Virtual Forge, which is now part of Onapsis.<\/p>","protected":false},"author":38,"featured_media":63829,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[4,36983],"tags":[453,4780,273,1790,6174,4981],"coauthors":[19920],"class_list":["post-63826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","category-mag-1911","tag-abap","tag-cyber-security","tag-dsag","tag-it-security","tag-it-sicherheit","tag-virtual-forge","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>SAP-Sicherheit auf Knopfdruck: Dieses Motto setzt die Technische Universit\u00e4t (TU) Darmstadt mit den Analysewerkzeugen von Virtual Forge, das heute zu Onapsis geh\u00f6rt, um.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/management\/\" rel=\"category tag\">Business-Management<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-1911\/\" rel=\"category tag\">MAG 19-11<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/63826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=63826"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/63826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/63829"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=63826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=63826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=63826"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=63826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}