Introducing SAP Enterprise Threat Detection

Objective

After completing this lesson, you will be able to describe the SAP Enterprise Threat Detection solution.

SAP Enterprise Threat Detection

SAP Enterprise Threat Detection is a real-time Security Information and Event Management (SIEM) tool and a monitoring solution. It helps customers detect, analyze, and neutralize cyberattacks as they are happening before severe damage occurs.

The core competency of SAP Enterprise Threat Detection is to secure business applications - in this case, SAP systems. It can also complement an existing cybersecurity solution with its core competency at the infrastructure level.

The SAP Enterprise Threat Detection application provides critical security information and event management (SIEM) capabilities, using real-time intelligence to help enforce data governance and detect external and internal cybersecurity threats.

  • On-Premise or cloud deployment
  • Available as a managed service 24x7
  • Preconfigured and customizable functionality
  • Risk-based and prioritized alerting
  • Forensic investigations, threat hunting, and anomaly detection
Dashboard interface displaying various charts, graphs, and network diagrams for data analysis. The visuals include bar graphs, line graphs, pie charts, and network nodes with red and yellow indicators.

Key Benefits

  • Enhanced security: Monitor and improve security to help keep systems secure in a continuously changing cybersecurity threat environment.
  • Neutralized threats: Gain transparency, simplify the analysis of suspicious activities, identify security gaps, and understand business impacts.
  • Protected operations: Safeguard the operation of SAP applications and improve the continuity of your business operations.
Dashboard of SAP Enterprise Threat Detection: Monitoring with multiple charts displaying Events by Time, Events by System, Events by Log Type, Alerts by Time, Alerts by System, and Alerts by Severity.

Key Features

Log correlation and analysis

  • Analyze a vast quantity of log data and correlate information to get a complete picture of your IT landscape activities
  • Perform forensic threat detection to discover previously unknown attack variants
  • Customize the integration of third-party systems and infrastructure components
  • Use an exclusive kernel API to send logs directly to SAP Enterprise Threat Detection to make manipulation more difficult

Screenshot of SAP Patterns interface showing various active alerts including blacklisted transactions, failed logons, and security configuration changes. Options include activating, deactivating, and testing modes.

Automated threat detection and alerting

  • Find SAP software-specific threats related to known attacks by using detection patterns
  • Create attack detection patterns without the need for extra code
  • Conduct attack investigations based on generated and published alerts to enable integration with external processes and solutions
  • Include user pseudonymization and resolution with special authorization when evidence of an attack or misuse arises

Straightforward integration

  • Detect threats at the application server level and the database level
  • Integrate your entire IT landscape with SAP solutions

A dashboard with five sections: Analysis and Pattern Design, Monitoring, Alerts and Investigations, Administration, and Advanced Analysis. Each section contains multiple tiles with various icons and metrics.

Cloud Edition

Users can easily access relevant information about cyberattacks with an easy and intuitive interface.

The investigations can be filtered by severity, ID, creation date, description, and customer message. The chosen report can immediately be downloaded and reviewed by the end user.

A dashboard titled Investigation Reports for Tenant SmartInvest. It lists report details such as severity, ID, creation date, description, and customer notification status. Filters and search are available.

The report includes an overview of what has happened and when. It consists of a free text description from the investigator about the investigation's results and recommended mitigation steps for further clarification. All technical details, such as the triggering events, are also provided with the report.

This enables the customer to take the right mitigation action at the right time. Overall, this managed cybersecurity service offered by SAP fills a significant gap by opening the black box and enabling continuous monitoring of SAP business applications as standard cybersecurity frameworks require.

SAP Enterprise Threat Detection (ETD) Architecture

Diagram illustrating SAP Enterprise Threat Detection system. SAP and non-SAP log data are streamed through SAP HANA Smart Data Streaming to SAP HANA, for threat detection, including forensic lab, patterns, and log learning analysis.

SAP ETD gathers information, or logs, from your active systems. This process is called aggregation. The collected data is then pseudonymized for privacy, enriched, and normalized.

After this, the treated log data is loaded into another tool called SAP HANA, which stores and manages the data.

Now, let's consider these predefined attack patterns. They are a set of rules that SAP ETD uses to identify potential threats by comparing them with the log data. SAP developed these patterns based on various sources, including an ERP Auditing Guide by DSAG and findings from their Anomaly Detection Lab. They also include patterns based on input from a System Status Monitor developed from SAP security notes.

The patterns follow specific themes and are grouped into categories called workspaces. Examples of these patterns detect repeated failed attempts to log in (Brute Force Attack), suspicious logins, or attempts to access critical resources. Other patterns can indicate service disruptions (denial of service), unauthorized debugging, or suspicious data manipulation.

Simply put, SAP ETD uses your system's log data and checks it against patterns that indicate a threat. If it spots a match, you get an alert so you can investigate further and protect your system.

Read more information on the SAP Enterprise Threat Detection webpage.

Lesson Summary

You can now describe the SAP Enterprise Threat Detection solution, including its key benefits and features.

Log in to track your progress & complete quizzes