This document describes several patterns used in SAP Enterprise Threat Detection to detect suspicious activity. It provides examples of patterns that detect changes to configuration files, deletion of audit logs, attempts to access data independently of clients, deletion of security content, assignment of critical authorizations, changes to gateway files, unauthorized RFC calls, generic table access via RFC, downloading suspicious files, debugging by restricted users or systems, and more. The patterns leverage security event analytics to issue alerts for these kinds of potential threats.
This document describes several patterns used in SAP Enterprise Threat Detection to detect suspicious activity. It provides examples of patterns that detect changes to configuration files, deletion of audit logs, attempts to access data independently of clients, deletion of security content, assignment of critical authorizations, changes to gateway files, unauthorized RFC calls, generic table access via RFC, downloading suspicious files, debugging by restricted users or systems, and more. The patterns leverage security event analytics to issue alerts for these kinds of potential threats.
This document describes several patterns used in SAP Enterprise Threat Detection to detect suspicious activity. It provides examples of patterns that detect changes to configuration files, deletion of audit logs, attempts to access data independently of clients, deletion of security content, assignment of critical authorizations, changes to gateway files, unauthorized RFC calls, generic table access via RFC, downloading suspicious files, debugging by restricted users or systems, and more. The patterns leverage security event analytics to issue alerts for these kinds of potential threats.
This document describes several patterns used in SAP Enterprise Threat Detection to detect suspicious activity. It provides examples of patterns that detect changes to configuration files, deletion of audit logs, attempts to access data independently of clients, deletion of security content, assignment of critical authorizations, changes to gateway files, unauthorized RFC calls, generic table access via RFC, downloading suspicious files, debugging by restricted users or systems, and more. The patterns leverage security event analytics to issue alerts for these kinds of potential threats.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 17
What is Pattern in SAP ETD
SAP ETD provides a more advanced solution
than most SIEM toolkits by creating patterns based on security event analytics Attack detection patterns are what powers the ability of SAP Enterprise Threat Detection to alert you to suspicious activity in your network. 42 Changes to ETD Streaming Configuration Files • Use case :- Issue an alert if SAP Enterprise Threat Detection Streaming configuration files are changed.
• SAP HANA smart data streaming is installed as an option
within an SAP HANA installation. • SAP HANA smart data streaming provides the ability to process streams of incoming events in real-time, as fast as they arrive. 43 Clear Audit Log • Use case :- This pattern detects a deletion of the audit table content. • Activate this pattern if the audit trail target is a data base table. • Then a Clear-Log SQL statement can delete audit trails. • The system audit tables can be accessed only by a system security officer, who can read the tables by executing SQL commands. 44 Client independent queries via debugger
• Use case :- Issue an alert in the event of any
attempt to read client independently via debugger • The ABAP debugger is a powerful tool helping to examine your ABAP code at runtime. • Client Independent means data means the data which user creates in one client that is available in that as well as in other clients • Client Independent: Smart forms, all dictionary objects data and repository objects data like programs, function modules, tables etc. 45 Content Deletion • Use case:- Issue an alert if security content for SAP Enterprise Threat Detection (such as workspaces, patterns or alerts) is deleted. • A pattern to issue an alert if any of your security content is deleted. 46 Critical authorization assignment and logon
• Use case:- Issue an alert when a user is
assigned critical profiles (such as SAP_ALL or SAP_NEW) and later logged on successfully. SAP_NEW • is a SAP standard Profile which is usually assigned to system users temporarily during an upgrade to ensure that the activities and operations of SAP users is not hindered, during the Upgrade. • SAP_NEW is used in the Production environment during a version upgrade . SAP_ALL • is a SAP standard profile, which is used on need basis, to resolve particular issues which may arise during the usage of SAP. • It is used by Administrators/Developers only and is applied on a need to use basis, then withdrawn. 47 Critical authorization assignment
• Use case:- Issue an alert when a user is
assigned critical profiles (such as SAP_ALL or SAP_NEW). 48 Critical authorization assignment per debugging
• Use case:- Issue an alert in the event of a critical
authorization assignment (such as SAP_ALL or SAP_NEW) per debugging • debugging is one of the important part in trouble shooting of an ABAP application, we can debug ABAP code by using breakpoints. 49 Critical change to Gateway file
• Use case :- Issue an alert if one of the Gateway
configuration files reginfo, secinfo, or prxyinfo has been changed. • The secinfo security file is used to prevent unauthorized launching of external programs. • File reginfo controls the registration of external programs in the gateway. 50 Critical Cloud Connector Configuration Change
• Use case = Issue an alert if one of the specified
Cloud Connector configuration settings was changed. 51 Critical RFC Callbacks for User Management
• Use case :- Issue an alert in the event of any
attempt to execute a critical RFC for user management. • If an RFC call is initiated on a production system that connects to a less protected SAP system (outbound call), the called function module can be manipulated by an attacker. 52 CUZ-Generic table access by RFC pattern • Use case:- Issue an alert in the event of attempts of CUZ-generic table access via RFC. • Remote Function Call (RFC) is the standard SAP interface for communication between SAP systems. • RFC calls a function to be executed in a remote system. 53 Data Download with Suspicious Filename
• Use case:- Issue an alert in case of access to sensitive
data. • If you see the suspicious file associated with the same domains across multiple log source types, you can have a fair amount of confidence that it’s the file you want 54 Debugging by users belonging to a critical user group
• Use case :-Issue an alert if debugging takes
place by a user belonging to a user group which must not debug in a system. 55 Debugging in critical systems • Use case :-Issue an alert if debugging takes place in a critical system ID. • Debugging is a critical aspect of the development process, as it helps to improve the overall quality and reliability of a system.