SAP Cybersecurity by NO MONKEY

Uncovering SAP BTP Attack Vectors


Listen Later

Navigating the Complexities of SAP Cybersecurity

TIMESTAMPS:

03:45 - Transitioning to Cloud: Impact on Security
07:26 - Understanding SAP BTP: Basics and Structure
11:02 - Exploring BTP Environments
14:30 - The Role of ABAP in BTP
16:53 - Shared Responsibility in Cloud Security
22:27 - The Attackers Playbook and Pentesting
23:54 - Understanding SSH and Security in Cloud Foundry
27:35 - Service Keys and Their Risks
30:38 - Best Practices for Application Security
34:14 - Exploring Kyma and Cloud Connector Security
40:55 - Top Recommendations for Reducing BTP Risk

HOST & GUEST:

  • Waseem Ajrab – Host, NO MONKEY
  • Julian Petersohn – Guest, Fortinet
  • KEY TAKEAWAYS:

    • BTP is essential for modern SAP security
    • Misconfigurations are a leading cause of vulnerabilities
    • Shared responsibility is crucial in cloud environments
    • Monitor your applications continuously
    • Develop applications with security in mind
    • Regularly update and patch systems
    • CONNECT WITH US:

      Website: https://www.no-monkey.com/
      LinkedIn: https://www.linkedin.com/company/no-monkey/

      Subscribe for more SAP security insights!

      ...more
      View all episodesView all episodes
      Download on the App Store

      SAP Cybersecurity by NO MONKEYBy Waseem Ajrab