<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SAP MANAGEMENT in DevOps and System Administration Forum</title>
    <link>https://community.sap.com/t5/devops-and-system-administration-forum/sap-management/m-p/12113180#M493</link>
    <description>&lt;P&gt;Hi expect,&lt;/P&gt;
  &lt;P&gt;My leader wants to know if there is a vulnerability that can destroy the system program without logging in to the system. &lt;/P&gt;
  &lt;P&gt;(Even though I think it's impossible.)&lt;/P&gt;
  &lt;P&gt;It seems to have something to do with SAP basis. I'm just an ABAPer What I said can't make him believe. &lt;/P&gt;
  &lt;P&gt;I hope you can answer my questions from a professional perspective. Thank you in advance！&lt;/P&gt;</description>
    <pubDate>Wed, 23 Oct 2019 06:38:24 GMT</pubDate>
    <dc:creator>former_member635517</dc:creator>
    <dc:date>2019-10-23T06:38:24Z</dc:date>
    <item>
      <title>SAP MANAGEMENT</title>
      <link>https://community.sap.com/t5/devops-and-system-administration-forum/sap-management/m-p/12113180#M493</link>
      <description>&lt;P&gt;Hi expect,&lt;/P&gt;
  &lt;P&gt;My leader wants to know if there is a vulnerability that can destroy the system program without logging in to the system. &lt;/P&gt;
  &lt;P&gt;(Even though I think it's impossible.)&lt;/P&gt;
  &lt;P&gt;It seems to have something to do with SAP basis. I'm just an ABAPer What I said can't make him believe. &lt;/P&gt;
  &lt;P&gt;I hope you can answer my questions from a professional perspective. Thank you in advance！&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 06:38:24 GMT</pubDate>
      <guid>https://community.sap.com/t5/devops-and-system-administration-forum/sap-management/m-p/12113180#M493</guid>
      <dc:creator>former_member635517</dc:creator>
      <dc:date>2019-10-23T06:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: SAP MANAGEMENT</title>
      <link>https://community.sap.com/t5/devops-and-system-administration-forum/sap-management/m-p/12113181#M494</link>
      <description>&lt;P&gt;Hello Ivan,&lt;/P&gt;&lt;P&gt;Can you please elaborate on what "destroy the system program" means?&lt;/P&gt;&lt;P&gt;Do you mean an ABAP program? Or the SAP system itself?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Isaías&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 16:45:24 GMT</pubDate>
      <guid>https://community.sap.com/t5/devops-and-system-administration-forum/sap-management/m-p/12113181#M494</guid>
      <dc:creator>Isaias_SAP</dc:creator>
      <dc:date>2019-10-24T16:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: SAP MANAGEMENT</title>
      <link>https://community.sap.com/t5/devops-and-system-administration-forum/sap-management/m-p/12113182#M495</link>
      <description>&lt;P&gt;Short answer: yes it is possible assuming someone exploits a known vulnerability, injects and executes malicious code. Security concerns around SAP systems have increased in the past decade, SAP vulnerabilities are being actively scanned around the world. These days you have companies specializing in SAP security including vulnerability and penetration testing.&lt;/P&gt;&lt;P&gt;You should at least follow the &lt;A href="https://wiki.scn.sap.com/wiki/display/PSR/The+Official+SAP+Product+Security+Response+Space" target="_blank"&gt;SAP Security Response Wiki Page&lt;/A&gt; to know what vulnerabilities exist in your SAP system.&lt;/P&gt;&lt;P&gt;Long answer: every system can be compromised given sufficient time and resources, you need to always keep security in mind. Security can mean physical security, network security, application level security, etc. With SAP, you should only open up access to the system where needed and configure your network accordingly. For example, do not expose your SAP system to the Internet unless you absolutely have to. At least always restrict port and protocol access using a firewall. If you need to expose your system to the Internet, at least have a system in between such as SAP Gateway that you expose rather than the actual system of record. Also, I recommend you use encrypted communication whenever possible, even inside the corporate network. Even more important is to keep up to date with security patches. You might have to patch your SAP system monthly just like you would patch your hardware, operating system, database, etc. Also, security has to be considered when implementing enhancements or creating custom solutions on top of SAP. Proper design and adherence to authorization concepts and best practices should always be a priority. Typically, SAP security is handled by three different teams: basis, development and security/governance/compliance. You can also have a dedicated security team or teams depending on your company size.&lt;/P&gt;&lt;P&gt;I suggest you add the &lt;A href="https://answers.sap.com/tags/49511061904067247446167091106425" target="_blank"&gt;Security&lt;/A&gt; tag to have more visibility.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2019 11:16:39 GMT</pubDate>
      <guid>https://community.sap.com/t5/devops-and-system-administration-forum/sap-management/m-p/12113182#M495</guid>
      <dc:creator>SamuliKaski</dc:creator>
      <dc:date>2019-10-25T11:16:39Z</dc:date>
    </item>
  </channel>
</rss>

