Security Not a Priority for SAP Projects, Users Report

  /     /     /  
Publicated : 23/11/2024   Category : security


Security Not a Priority for SAP Projects, Users Report


Nearly 70% of SAP users surveyed believe organizations lacked focus on IT security during previous SAP implementations.



A vast majority (68.8%) of SAP users believe their business placed inadequate focus on IT security during SAP implementations, researchers report in a new study on SAP security. More than half (53.4%) said it was very common to find SAP security flaws in the audit process. 
Turnkey Consulting researchers polled more than 100 SAP customers, all of whom were at the managerial level or above, across the UK, Europe, Asia, and the US. Their goal was to learn the cost and effects of SAP security remediation; to do this, they asked about participants current security position, perceived costs to fix it, and plans for security in future SAP implementations.
Respondents expect SAP audit findings for at least 80% of companies, indicating a broad belief that auditors will focus on SAP as a business-critical system. But they are not confident in their SAP environments: one-fifth of SAP customers dont have the skills and tools to effectively protect their SAP applications and environments; 64.5% said they have some skills and tools.
Taking a closer look at specific areas of concern, 93.2% believe its likely an SAP audit would reveal access management problems. Most (86.4%) think its common or very common to have audit findings related to privileged or emergency access. This may indicate a broad lack of effective controls for privileged access management, or low confidence in current controls.
Overall, it seems these concerns are driving a stronger focus on security. Nearly 75% of respondents anticipate IT security will be a higher priority in future SAP deployments; 89.6% say security specialists should be recruited to support SAP S/4 HANA transformation initiatives.
Read the full report
here
.
Check out
The Edge
, Dark Readings new section for features, threat data, and in-depth perspectives. Todays featured story:
What Should I Do If Someone Is Impersonating My Company in a Phishing Campaign?


Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Security Not a Priority for SAP Projects, Users Report