SecurityBridge enhances SAP security with advanced SIEM and ITSM integrations
SecurityBridge today announced the launch of SecurityBridge Security Information Event Management (SIEM) and IT Service Management (ITSM) for SAP.
These company platform additions are designed to enhance SAP-specific security monitoring and incident management. Through the enhancements, APIs allow workflow integration between infrastructure security and SAP security to enable the sharing of identified IoCs (Indicators of Compromise) and initiate automated compensating controls to bridge the gap with unprecedented visibility.
“With the increasing recognition of SAP vulnerabilities, organizations need robust solutions to ensure this information seamlessly aligns with broader IT security operations,” said Holger Hügel, Product Management Director at SecurityBridge. “SecurityBridge SIEM for SAP and ITSM for SAP provide organizations with enriched threat insights and improved operational efficiency.”
SecurityBridge integrates seamlessly with enterprise SIEM and ITSM solutions, offering built-in SAP security monitoring rules customized to fit organizational needs—allowing for rapid deployment and tailored security responses. Additionally, the solution enriches event messages by correlating SAP audit and security logs with contextual data, including infrastructure details such as hostnames and IP addresses.
Additional benefits include:
- Built-in SAP Security Monitoring Rules: Pre-configured and customizable rules for rapid deployment and effective monitoring.
- Incident Message Enrichment: Delivers actionable insights by correlating SAP events with broader infrastructure details.
- Enhanced Operational Efficiency: This solution provides a unified view of SAP-specific and enterprise-wide security operations, reducing response times and increasing threat visibility.
- Simplified Incident Management for SAP: Drag-and-drop features and seamless ITSM workflows with tools like ServiceNow and Jira, including backlinks to original SAP events for detailed analysis.
Additional Integration Areas
Support for Change Management Processes
The complexity of SAP applications makes Change Management a critical process that requires seamless integration with technical testing and validation. SecurityBridge addresses this need by embedding essential security checks into SAP’s standard testing and deployment workflows, including the ABAP Test Cockpit (ATC) and SAP Solution Manager. Its Patch Management feature automates SAP patching within SAP Solution Manager. At the same time, SecurityBridge TRACE (Transport Center) offers advanced validation and control capabilities, ensuring automated and secure deployment of SAP changes across the entire landscape.
Identity and Access Management (IAM) Integration
SAP’s user authorization system is highly complex and tailored to SAP-specific use cases, making integration into overall Identity and Access Management (IAM) processes essential. SecurityBridge provides detailed insights into SAP user authorizations, identifying critical users and privileges that require attention. This includes highlighting obsolete users or authorizations to reduce the attack surface and unnecessary elevated privileges that can be safely de-provisioned without disrupting workflows. Additionally, SecurityBridge enables easy extraction of user authorization data for integration with third-party IAM tools, streamlining the management and mitigation of potential risks.
Alignment with SAP Governance, Risk, and Compliance (GRC)
Segregation of Duties (SoD) is vital to Governance, Risk, and Compliance (GRC), ensuring restricted business functions remain appropriately segregated. SecurityBridge complements SAP GRC by providing technical SoD monitoring, with predefined rulesets offering "can-do" and "did-do" overviews of restricted program executions. Enhanced by Threat Detection and User and Entity Behavior Analysis (UEBA), further advancements are planned for 2025. SecurityBridge’s Privileged Access Management (PAM) enforces the “least privilege” principle, enabling ad-hoc elevated access requests with full control and audit review, maintaining consistent end-to-end audit trails without impersonation for efficient forensic analysis.
Availability and Pricing
These integrations are currently available and offered as part of or as add-ons to the SecurityBridge platform.