Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP...

17
May 7 – 9, 2019 Secure SAP – Our approach to securing SAP assets Brian Laughlin, SAP Operations Manager, Eli Lilly and Company Daryl Soughan, Information Security Advisor, Eli Lilly and Company Session ID 82541

Transcript of Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP...

Page 1: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

May 7 – 9, 2019

Secure SAP – Our approach to securing SAP assets Brian Laughlin, SAP Operations Manager, Eli Lilly and Company

Daryl Soughan, Information Security Advisor, Eli Lilly and Company

Session ID 82541

Page 2: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

About the Speakers

Brian Laughlin

• Manager IT – SAP Operations

• Eli Lilly and Company

Daryl Soughan

• Information Security Advisor

• Eli Lilly and Company

Page 3: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Global Fast Facts

Page 4: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Key Outcomes/Objectives

1. Detection Is a Must

2. Focus On Risk

3. A More Secure SAP Solution Is a Balance

Page 5: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Framework Implementation

The success of the implementation of an Information Security Framework depends on the engagement of the following:

– People

– Process

– Technology

Page 6: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

SAP Information Security GovernanceGovernance

People

SAP Security ArchitectsSAP Basis / DBASAP Support ServicesInformation Security

Process

Change ManagementIncident ManagementRisk ManagementSecurity ManagementSecurity Operations

TechnologyInternal and External Standards and Frameworks

Page 7: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Cybersecurity Framework

Lilly aligned Information

Security with the

NIST Cybersecurity

Framework

Page 8: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Framework Implementation

Identify

Protect

Detect

Respond

Recover

Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.

Develop and implement the appropriate safeguards that support the ability to limit or contain the impact of a potential cybersecurity event.

Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.

Develop and implement the actions to take in light of a detected cybersecurity event in order to contain the impact.

Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.

Page 9: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Framework Implementation - Identify

Identify

PeopleSAP Security ArchitectsSAP Basis / DBASAP Support Services

Process

Information ClassificationSecurity DocumentationSystem ValidationProcess Controls

TechnologyExternal tools, consulting, internal knowledge to create awareness of threat environment.

Page 10: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Framework Implementation - ProtectProtect

People

SAP Security ArchitectsSAP Basis / DBASAP Support Services

Process

IS Training - Phishing / Information HandlingChange Management (Configuration / Data)Incident ManagementSecurity ManagementVulnerability Risk Management / Patching

Technology

SAP environment manual and automated monitoringPassword management toolsSAP patchingCode scanning toolsConfiguration database

Page 11: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Framework Implementation - DetectDetect

PeopleSAP Security ArchitectsSAP Basis / DBASAP Support Services

Process

SAP Audit LogSAP Change LogSAP DBTABLOGProcess Controls

Technology

SAP environment manual and automated monitoringSAP process controls monitoringSIEM aggregation toolsConfiguration database

Page 12: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Framework Implementation - RespondRespond

PeopleSAP Security Architects / Basis / DBASAP Support Services

Process

Business Continuity PlanChange ManagementCorrective And Preventive ActionsIncident Response PlanIncident ManagementProblem Management

Technology

SAP environment manual and automated monitoringConfiguration databaseSIEM aggregation tools Incident ticketing tools

Page 13: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Framework Implementation - RecoverRecover

PeopleSAP Security ArchitectsSAP Basis / DBASAP Support Services

Process

Incident Response PlanDisaster Recovery PlanDisaster Recovery Exercise Backup and Restore

TechnologyConfiguration databaseBackup and Recovery toolsIncident ticketing tools

Page 14: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Take the Session Survey.

We want to hear from you! Be sure to complete the session evaluation on the SAPPHIRE NOW and ASUG Annual Conference mobile app.

Page 15: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Access the slides from 2019 ASUG Annual Conference here:

http://info.asug.com/2019-ac-slides

Presentation Materials

Page 16: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Q&AFor questions after this session, contact either of us at

[email protected] or [email protected].

Page 17: Secure SAP Our approach to securing SAP assets AC Slide Decks Wednesday/ASUG82541 - Secure SAP Our...SAP Security Architects SAP Basis / DBA SAP Support Services Process IS Training

Let’s Be Social.Stay connected. Share your SAP experiences anytime, anywhere.

Join the ASUG conversation on social media: @ASUG365 #ASUG