(Aarthi Kannan serves as APJ Regional Senior Security Expert for SAP Enterprise Cloud Services (ECS). She is also an avid Cloud Security enthusiast and a shift-left proponent for securing compute and data solutions on the cloud. In her current role, she is responsible for advising existing and potential customers on the multi-layered defense-in-depth security features and operational security aspects of the RISE with SAP private cloud environment.)
The SAP S/4HANA Cloud, Private Edition serves as the foundation for the “RISE with SAP” offering, safeguarding customers’ essential business data and their mission critical operations. SAP Enterprise Cloud Services (ECS) is the business unit that manages and delivers the SAP S/4HANA Private Cloud environment, featuring a multi-layered defense-in-depth security architecture that covers both infrastructure and technical managed services.
As customers embark on their digital transformation journey, RISE with SAP is at the forefront, offering organizations a path to innovation and growth. However, as your business ascends to new heights, so do the potential cybersecurity risks. In this ever-changing landscape, understanding and instituting a comprehensive vulnerability and patch management program is key to safeguarding your RISE with SAP Private Cloud environment.
This is a two-part blog series; in this first part of the blog series, we will focus on the critical aspects of the Vulnerability Management process as implemented by SAP Enterprise Cloud Services (ECS). We will also cover the importance of implementing patches on time and the security risks of not doing so. The second part of the blog series will focus on the Patch management process within SAP ECS.
Vulnerabilities are weaknesses, flaws, or gaps in the security of hardware, software, networks, or systems that can be exploited by attackers to compromise the confidentiality, integrity, or availability of information, assets, or resources. Patches are additional pieces of code developed to address problems (also commonly referred to as “bugs”) in operating systems, databases, application software, or even firmware. Patches enable additional functionality or address security flaws within a program.
SAP’s Vulnerability management program is designed to proactively prevent the exploitation of security vulnerabilities that exist within SAP’s cloud services and solutions. Patch management is the systematic process of identifying, acquiring, testing, deploying, and monitoring updates, fixes, and patches to software applications, operating systems, and hardware devices. When vulnerability management is combined with an effective patch management program, it will reduce the potential for active exploitation of vulnerabilities by malicious entities.
Not all vulnerabilities have patches. Accordingly, administrators and security teams must not only be aware of either actual or potential vulnerabilities and available patches, but they must also be aware of other methods of remediation (such as configuration changes, employee training or even server reimaging) that limit the exposure of systems to vulnerabilities. Further when no patches are available, countermeasures must be in place either to remediate the flaw temporarily or permanently.
Timely patching of security flaws is widely recognised in the quest to provide appropriate security. It is essential to maintaining the confidentiality, integrity, and availability of information resources and data.
As a Cloud service provider, SAP understands the immense importance of a comprehensive vuln management and patching program and how it is critical to achieving appropriate security. In years past, many people approached server patch management with the following mindset: “We don’t patch unless there is a reason to upgrade the version for application compatibility.” This philosophy is no longer appropriate today because of the risk of downtime that can result from malicious code targeting known vulnerabilities on unpatched systems. Regular patching is like maintaining the locks on your doors to ensure that potential entry points are secure.
Patching systems and software on time offers numerous benefits, primarily centered around security, stability, and functionality. Here are some of the key advantages of applying patches promptly:
Failing to patch systems and software in a timely manner can pose significant security risks, which directly impact the organization’s security posture. Here are some of the key risks associated with not patching on time:
There have been several major cyberattacks in the past that exploited unpatched vulnerabilities. Figure 1 shows some well-known examples:
Figure 1 – Major cyberattacks due to unpatched vulnerabilities [1] [2]
These examples demonstrate the serious consequences that can result from neglecting patch management. Applying patches promptly and regularly is essential for maintaining a strong defense against cyber threats and protecting sensitive data.
While it might seem completely reasonable to deploy patches against vulnerabilities as soon as possible, there are a few aspects to be considered while implementing an effective vulnerability management program.
Security within the RISE with SAP Private Cloud environment is a Shared Responsibility between various entities like SAP, Customers and Hyperscale Cloud Providers as shown in Figure 2. The Shared Security Responsibility Model is explained in more detail in this blog. This is important for customers to consider from the perspective of Vulnerability and Patch Management. Accordingly, SAP is responsible for managing vulnerabilities and patching at the infrastructure layer (with the caveat that customers are accountable for providing downtime windows for applying certain types of patches, that require system rebooting). Customers are responsible for vulnerability and patch management at the application layer. Customers are also responsible for testing the applications after applying patches at the infrastructure and application layers.
Figure 2 – Shared Security Responsibility model
Constraints, dependencies, available maintenance windows and patch availability impact vulnerability and patch management. Finding vulnerabilities and managing them in today’s environments can be overwhelming. The MITRE CVE DB has more than 20,000 vulnerabilities. Patches are released daily. The sheer volume of available patches makes it is difficult for even the most experienced administrators to maintain awareness of available patches and deploy them in a timely manner. The time that follows immediately after the release of a patch is essentially a vulnerable moment due to time lags to obtain, test, and deploy a patch. There is no guarantee that the patch will work, so it is well advised to test them to ensure that they work or that they don’t break something else.
In the private cloud environment, there are other dependencies on customers around downtime windows which further decrease the efficiency of the patch management process. From the customer’s perspective, some of these patches require a reboot, which could mean possible downtime. Application regression testing may also need to be incorporated depending on the nature of the patches and how the patch affects the system.
All these things affect the vulnerability and patch management program, and they all must be weighed appropriately. One cannot assume that patches are immediately implemented without additional consideration for priorities, countermeasures, and especially, for testing. In fact, the patch management program must be carefully assessed, prioritized, and managed, and thorough testing is a critical success factor. For a cloud service requiring service level agreements for system availability, this is, without question, a daunting program management challenge.
The only way to truly keep your cloud services safe is to prioritize patching based on business risk, which requires broad and deep insight into the vulnerabilities themselves. We can gain this insight only through accurate, up-to-date vulnerability research and trustworthy threat intelligence.
To bring order to the chaos, you must:
SAP’s Enterprise vulnerability management lifecycle is an iterative process consisting of 6 steps, as seen in Figure 3.
Figure 3 – Vulnerability Management Lifecycle
SAP has a Vulnerability Advisory Services (VAS) team as shown in Figure 4. This is a team internal to SAP that is responsible for monitoring vulnerabilities in software relevant to SAP operations and providing the criticality and priority rating in alignment with the platforms or business units. Additionally, the VAS team is responsible and accountable for publishing and updating SAP CERT notifications, or SCNs, for all relevant vulnerabilities containing the latest criticality and priority rating.
Figure 4 – SAP Vulnerability Advisory Services (VAS)
The VAS team ingests the daily NIST vulnerability feeds and monitors software vendors’ web sites relevant to SAP environments to identify new vulnerabilities. A risk-based approach is used to analyze and prioritize vulnerabilities. Some factors which are considered when determining the priority of a vulnerability:
The received vulnerability information is analyzed by members of the SAP VAS team. This includes reading and understanding the vulnerability and additional research, if needed. Based on this, the SAP CERT advisory is then published. The vulnerability rating is done in an SAP-developed tool: the SAP CERT advisory service. The rating of the vulnerability is estimated using the following criteria:
Common Vulnerability Scoring System (or CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities. The latest version of CVSS (v.3.1) was released in June 2019. SAP’s vulnerability severity level is based on CVSS v.3.1 base scoring.
The respective severity levels are defined as:
The priority level is ultimately a result of the severity of the vulnerability together with the asset attributes in combination with the exposure level.
When patches are unavailable, as in the case of zero-day vulnerabilities, a risk assessment will be performed by the risk coordinator within SAP ECS. The risk mitigation plan will be reviewed and documented in collaboration with the SAP Enterprise Vulnerability Management Team and asset owners. Exception requests will be handled over the established exception management process. In the absence of patches, mitigating controls will be applied to prevent exploitation of such vulnerabilities.
In summary, the first part of this blog series depicts the importance of an effective Vulnerability management program to address vulnerabilities via timely application of patches. This is reinforced by exploring the benefits of applying patches on time and highlighting the security risks of not patching on time. This blog also explains the Vulnerability Management lifecycle followed by SAP Enterprise Cloud Services (ECS), along with a detailed look at the teams and steps involved in the process within SAP. Vulnerabilities are scored and rated as per the CVSS version 3.1 and patches are prioritized accordingly. The second part of this blog series will focus on Patch management in detail.
1 – Cybercrime and Exploits: Attacks on Unpatched Systems – Security News (trendmicro.com)
2 – Computer giant Acer hit by $50 million ransomware attack (bleepingcomputer.com)
The author would like to express deep appreciation for Roland Costea (Chief Information Security Officer, ECS), Alexandra Anghelache (Security Transformation Lead) and Namrata Mohanty (Infosec Compliance Senior Specialist) from SAP Enterprise Cloud Services for their support in creating and reviewing the content and providing valuable feedback. The author would also like to express gratitude to Sasi Kathirasen Mani, Regional Head Execution for APJ and GCR, SAP Enterprise Cloud Services for his encouragement and support to publish the blog.
© 2023 SAP SE or an SAP affiliate company. All rights reserved. See Legal Notice on www.sap.com/legal-notice for use terms, disclaimers, disclosures, or restrictions related to SAP Materials for general audiences.