Article

Towards a Zero Trust Architecture in SAP landscape

Secure organizations by adopting a new security posture for SAP applications

In order to remain competitive, flagship organizations are running an array of technologies implemented throughout digital transformation programs that amplified their attack surface across the entire IT landscape. This exposure lead to a significant increase in the number of cyber security incidents, as the annual cost of cybercrime has risen by 72% over the past five years.

Cyber attackers are very sophisticated and are outmatching current cyber defenses. Therefore, a new security posture should be adopted to limit the access to valuable information in the event of a cyber incident. Zero Trust posture adopts the moto: “Never trust, always verify”. Our approach is based on this premise, and it stands assuming every component may be vulnerable, every device needs authentication and validation.

For many organizations, SAP is a mission critical application.

This is why we launched a series of stories aiming to describe how organizations can protect SAP applications against cyber attacks proposing approaches and solutions in the market. The following stories will focus on different subjects:

  • SAP Security Assessment with Deloitte’s SAP Security Framework;
  • Towards Passwordless Authentication in SAP Applications;
  • Efficient Access Governance in SAP Applications using SAP IAG;
  • Integrating a third-party IAM and PAM Solutions to Manage Identities in SAP Applications;
  • Continuous Monitoring and Threat Detection in SAP Applications.
     
Did you find this useful?