SAP Penetrating Testing Services by EPI-USE Labs
SAP Penetrating Testing Services by EPI-USE Labs
SAP Penetrating Testing Services by EPI-USE Labs
LEVEL 3:
LEVEL 2:
LEVEL 1: SAP IN-DEPTH
SAP BLACK-BOX
IP-LEVEL SECURITY
TESTING
TESTING
▪ Open Ports and ▪ Level 1 Plus: ▪ Level 2 Plus:
Services ▪ Identify SAP Specific ▪ In Depth SAP
▪ Identify Potentially Avenues of Attack Application Layer
Vulnerable Services ▪ Scanning for SAP Testing
▪ Unauthenticated exposed services ▪ Software Assisted
Attacks ▪ Identify Potentially Whitebox Testing for
Vulnerable SAP Over 1,000 Attacks
Services ▪ Identify Insider and
▪ Simulated Outsider Outsider
Attacks on SAP Vulnerabilities
The three levels of testing cater to the differing expected outcomes and reasons testing is required.
LEVEL 1: This basic test assesses your Internet connected systems as anyone from the outside
would see them. We will be able to identify Internet exposed services and in some cases point out
specific vulnerable components that could be used to start an attack. The purpose of this test is to
identify vulnerabilities that an opportunistic attacker would be able to discover.
LEVEL 2: This is a black-box test, where we do not have any authenticated access to your systems,
but would specifically try to compromise the SAP applications. The purpose of this test is to
simulate what an outsider attacker would do if they specifically targeted your SAP systems. The
limitation of this type of test is that determined attackers can perform reconnaissance and different
attack strategies over a long time period, even years. Our services, however, are typically limited to
a fixed number of weeks. Therefor it should not be seen as an exhaustive test. Despite these
limitations, some organizations require a black-box penetration test for auditing or compliance
purposes.
LEVEL 3: This is a white-box test, where we have full access to the systems we test. This allows us to
perform software assisted testing for over 1,000 known weakness in total, including 800 SAP-
specific tests. Our tests identify weakness in SAP system configuration, access controls, operations
and custom code. The test will uncover vulnerabilities that both insiders and outsiders can use to
compromise SAP systems.