Security Monitoring and SIEM Integration of SAP Applications: How We Protect 100-Plus SIDs
This session will give an overview of what challenges Tech Data has encountered during the implementation of our SAP application security monitoring and incident response, including how we overcame them.
Key takeaways:
- Our approach to SAP security monitoring for ABAP, Java, HANA systems, and SAP’s cloud solutions
- Determining what to monitor, how to monitor, and eliminating the false positives
- Using automation to significantly reduce manual work
- Avoiding common pitfalls: How we enabled SM19/SM20 logging without exhausting our file storage
- How we integrated all these with SIEM (Security Incident and Event Management)
Timestamps:
- 1:45 – Speaker introduction
- 2:20 – Key takeaways and agenda overview
- 4:10 – Tech Data Corporation at a glance
- 5:30 – Project considerations and early SAP security status
- 7:50 – New approach to SAP Security Monitoring
- 9:30 – Tech Data’s SAP Landscape Security
- 11:45 – Real-time SAP security monitoring and SIEM integration
- 17:15 – SIEM for SAP – technology selection
- 19:15 – Threat monitoring and fraud detection cases
- 24:55 – Sensitive data access: incident or security exception?
- 33:10 – Automation and reducing manual work
- 35:15 – SAP security monitoring best practices
- 36:40 – Measuring success