<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SAP Systems Security Vulnerables in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/sap-systems-security-vulnerables/m-p/8791885#M1679263</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Recently I came across an article from the following link. Please check the link.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.securityweek.com/vulnerable-sap-deployments-make-prime-attack-targets"&gt;http://www.securityweek.com/vulnerable-sap-deployments-make-prime-attack-targets&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let say if any sap system is impacted with the above reasons mentioned in this article, what actions we have to take.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Venkat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Jun 2012 18:17:53 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2012-06-26T18:17:53Z</dc:date>
    <item>
      <title>SAP Systems Security Vulnerables</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/sap-systems-security-vulnerables/m-p/8791885#M1679263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Recently I came across an article from the following link. Please check the link.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.securityweek.com/vulnerable-sap-deployments-make-prime-attack-targets"&gt;http://www.securityweek.com/vulnerable-sap-deployments-make-prime-attack-targets&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let say if any sap system is impacted with the above reasons mentioned in this article, what actions we have to take.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Venkat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2012 18:17:53 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/sap-systems-security-vulnerables/m-p/8791885#M1679263</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2012-06-26T18:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: SAP Systems Security Vulnerables</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/sap-systems-security-vulnerables/m-p/8791886#M1679264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, it's mostly a combination of insecure setup and not implementing security patches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration is covered - at least for ABAP - in this excellent post&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://answers.sap.com/blogs/sro/2012/06/05/how-to-secure-your-sap-netweaver-abap" title="http://scn.sap.com/blogs/sro/2012/06/05/how-to-secure-your-sap-netweaver-abap"&gt;http://scn.sap.com/blogs/sro/2012/06/05/how-to-secure-your-sap-netweaver-abap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then SAP has a monthly patch day where new security patches are announced. Go to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://websmp210.sap-ag.de/securitynotes" title="https://websmp210.sap-ag.de/securitynotes"&gt;https://websmp210.sap-ag.de/securitynotes&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to check for the latest security notes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Frank.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2012 19:55:25 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/sap-systems-security-vulnerables/m-p/8791886#M1679264</guid>
      <dc:creator>koehntopp</dc:creator>
      <dc:date>2012-06-26T19:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: SAP Systems Security Vulnerables</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/sap-systems-security-vulnerables/m-p/8791887#M1679265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with Frank, follow the guidelines and keep patched and you will be in a better position than most organisations running SAP (at least from external threats)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jun 2012 12:55:58 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/sap-systems-security-vulnerables/m-p/8791887#M1679265</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2012-06-27T12:55:58Z</dc:date>
    </item>
  </channel>
</rss>

