{"id":66525,"date":"2020-06-10T12:00:00","date_gmt":"2020-06-10T10:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=66525"},"modified":"2020-05-28T14:16:24","modified_gmt":"2020-05-28T12:16:24","slug":"security-begins-with-the-design-of-the-infrastructure","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/sicherheit-beginnt-beim-design-der-infrastruktur\/","title":{"rendered":"Safety begins with the design of the infrastructure"},"content":{"rendered":"<p>Vulnerabilities are the viruses of today. They are even more dangerous. This is because they allow cyber criminals to silently infiltrate a network and IT environment, penetrate the crown jewels and ultimately steal valuable intellectual property, blackmail the board of directors or paralyze business operations and production. <\/p>\n\n\n\n<p>We rarely hear about successful attacks. For reputational reasons, many companies prefer to keep a low profile and are even prepared to pay millions to cyber extortionists.<\/p><div id=\"great-1611018217\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>Existing SAP customers are aware of the risk; after all, their SAP systems are the heart of the company. They therefore invest in traditional security software to ward off the dangers of cyber threats in advance. <\/p>\n\n\n\n<p>This protection is extremely useful and effective, but it is not enough. On the one hand, unknown security gaps cannot be shielded by definition; on the other hand, it often takes weeks and months in large SAP landscapes before security updates are installed to close the gaps.<\/p>\n\n\n\n<p>In addition, the boundaries between IT security and legal security are becoming blurred due to an increasing number of ever more demanding rules and regulations - the EU GDPR and SOX should definitely be mentioned in this context. <\/p>\n\n\n\n<p>Precautions that serve to increase the traceability of changes to system configurations and primarily fulfill legal requirements also make a valuable contribution to greater IT security.<\/p>\n\n\n\n<p>These challenges can be met with a triad of the right infrastructure for SAP landscapes, a high degree of automation, which starts with the design and programming of this infrastructure platform, and a security ecosystem.<\/p>\n\n\n\n<p>Updating security mechanisms in a conventional three-tier architecture takes a long time and is expensive due to the large number of manufacturers involved and the differences in their technologies. <\/p>\n\n\n\n<p>However, if an IT infrastructure is completely virtualized and controlled exclusively by software, this effort can be significantly reduced. Even in large and very large SAP landscapes, security updates are possible within hours or a few days instead of weeks or months as was previously the case. <\/p>\n\n\n\n<p>Software-controlled infrastructures also have the advantage that security can be implemented in them as an equal functionality alongside all others. They represent the entire process of security-oriented development. <\/p>\n\n\n\n<p>This ranges from the design and deployment of the software through to testing and additional \"hardening\" and is known in technical jargon as the \"Security Development Lifecycle\" (SecDL).<\/p>\n\n\n\n<p>Furthermore, security gaps in such infrastructures can be identified and closed largely automatically. The implementation of security guidelines, known as Security Technical Implementation Guides (STIGs), is particularly useful for this purpose. <\/p>\n\n\n\n<p>Software-controlled infrastructures also help to track and secure the integrity of database configurations. But let's be honest: even the best infrastructure software cannot guarantee 100% protection. <\/p>\n\n\n\n<p>This is why connectivity to third-party solutions via open application programming interfaces (APIs) is a must. This applies in particular to the areas of encryption key management, endpoint security and microsegmentation.<\/p>\n\n\n\n<p>Absolute security is impossible. But with the right infrastructure, the attack surface in SAP environments can be significantly reduced and the time from the discovery of a security vulnerability to its closure massively shortened.<\/p>","protected":false},"excerpt":{"rendered":"<p>Due to the increasing number of cyberattacks, business-critical applications like SAP need more protection than ever. It doesn't start with the applications, but with the design of the infrastructure.<\/p>","protected":false},"author":71,"featured_media":15608,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[7,21,37619],"tags":[20346,1790,117],"coauthors":[22192],"class_list":["post-66525","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-it-security","category-mag-2005","tag-cybersecurity","tag-it-security","tag-sicherheit","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",400,172,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-768x331.jpg",768,331,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-480x207.jpg",480,207,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-640x276.jpg",640,276,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-720x310.jpg",720,310,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Aufgrund der steigenden Anzahl von Cyberattacken ben\u00f6tigen gesch\u00e4ftskritische Anwendungen wie SAP mehr Schutz denn je. Der beginnt nicht bei den Applikationen, sondern bereits beim Design der Infrastruktur.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-2005\/\" rel=\"category tag\">MAG 20-05<\/a>","author_info_v2":{"name":"Bas Raayman, Nutanix","url":"https:\/\/e3mag.com\/en\/author\/bas-raayman\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/66525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=66525"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/66525\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/15608"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=66525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=66525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=66525"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=66525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}