Uncovering the Risk of SAP Cyber Breaches Research Proprietary

advertisement
ch
ar
es
e
R
ry
ta
rie
op
Pr
nd
la
G
lo
ba
lC
on
fid
en
tia
Uncovering the Risk of SAP Cyber
Breaches
Ax
on
Research sponsored by Onapsis
Independently Conducted by Ponemon Institute LLC
February 2016
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
1
Uncovering the Risks of SAP Cyber Breaches
Ponemon Institute, February 2016
Part 1. Introduction
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber
Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP
cyber breach and how companies are managing the risk of information theft, modification of data
and disruption of business processes. The companies represented in this study say their SAP
platform has been breached an average of two times in the past 24 months.
ch
We surveyed 607 IT and IT security practitioners who are involved in the security of SAP
applications used by their organizations to manage business operations and customer relations.
The most common SAP products deployed are enterprise management (ERP), technology
platforms (backbone), financial and data management and customer relationship management
(CRM).
ar
The respondents in this study
understand the risk of an SAP cyber
breach. Sixty percent of
respondents say the impact of
information theft, modification of
data and disruption of business
processes on their company’s SAP
would be catastrophic (17 percent of
respondents) or very serious (43
percent of respondents).
es
e
Figure 1. Perceptions about SAP security risks
nd
Pr
op
rie
ta
ry
R
Strongly agree and agree responses combined
on
G
lo
ba
lC
on
fid
en
tia
la
However, many senior executives
are underestimating the risk and do
not have an understanding of the
impact of the value of the data that
could be lost from the SAP system,
according to respondents. As shown
in Figure 1 only 21 percent of
respondents say senior leadership
is aware of SAP cybersecurity risks,
but 56 percent of respondents say a security or data breach resulting from insecure SAP
applications is likely (100 percent – 44 percent of respondents).
Ax
The following are key takeaways from this research:
Senior leadership values the importance of SAP to the bottom line but ignores its
cybersecurity risks. Seventy-six percent of respondents say their senior leadership understands
the importance and criticality of SAP installations to profitability. However, 63 percent of
respondents say C-level executives in their company tend to underestimate the risks associated
with insecure SAP applications.
SAP systems are critical to the revenues of companies represented in this research. When
asked about the financial consequences if their companies’ SAP systems were taken offline, the
average cost was estimated to be $4.5 million. This includes all direct cash outlays, direct labor
expenditures, indirect labor costs, overhead costs and lost business opportunities.
Are SAP applications secure? Fifty-four percent of respondents believe it is the responsibility of
SAP, not their company, to ensure the security of its applications and platform. While 62 percent
of respondents say SAP applications are more secure than other applications deployed by their
company, respondents say their companies are evenly divided about confidence in the security of
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
1
2
SAP applications (50 percent of respondents). A barrier to achieving security is that only 34
percent of respondents say they have full visibility into the security of SAP applications and many
companies do not have the required expertise to prevent, detect and respond to cyber attacks on
their SAP applications.
The SAP security team is seldom accountable for the security of SAP systems,
applications and processes. The majority of respondents believe it is difficult to secure SAP
applications. One possible reason could be the lack of clear ownership over securing SAP
applications. Twenty-five percent of respondents say no one function is most accountable for
SAP security in their organizations followed by IT infrastructure (21 percent of respondents). Only
19 percent of respondents say the SAP security team is accountable.
ar
ch
SAP platforms are likely to contain one or more malware infections. Fifty-eight percent of
respondents rate the difficulty in securing SAP applications as very high and 65 percent of
respondents rate their level of concern about malware infections in the SAP infrastructure as very
high. Seventy-five percent of respondents say it is very likely (33 percent) or likely (42 percent)
that SAP platforms have one or more malware infections.
rie
ta
ry
R
es
e
If a data breach involving the SAP system occurred, who would be responsible for
remediating the incident? Despite the perceptions of the seriousness of an SAP breach, 30
percent of respondents say no one is most accountable if their organization had an SAP breach
followed by the CIO (26 percent of respondents) and the CISO (18 percent of respondents).
la
nd
Pr
op
There is little confidence a breach involving the SAP platform would be detected
immediately or within one week. Only 25 percent of respondents say they are very confident or
confident such a data breach would be detected immediately and 35 percent of respondents say
they are very confident or confident a breach would be detected within one week.
on
fid
en
tia
Frequency and sophistication of cyber attacks against SAP platforms will increase. Fortyseven percent of respondents say the frequency of cyber attacks against their companies’ SAP
platform will increase over the next 2 years and 54 percent of respondents say the stealth and
sophistication of cyber attacks against the companies’ SAP platform will increase.
Ax
on
G
lo
ba
lC
New technologies and trends increase the risk of a data breach involving SAP
applications. Fifty-nine percent of respondents also believe new technologies and trends such
as cloud, mobile, big data and the Internet of Things increases the attack surface of their SAP
applications. Despite this concern about the cloud, only 43 percent of respondents say it is
important to understand the cybersecurity and privacy risks before deciding to move SAP
applications to the cloud.
How can organizations improve the security of their SAP infrastructure? Understanding the
latest threats and vulnerabilities in SAP applications helps strengthen the organization’s
cybersecurity posture. Seventy-three percent of respondents say knowledge about the latest
threats and vulnerabilities affecting SAP applications improves their organization’s ability to
manage cybersecurity risks.
Further, 83 percent of respondents say it is very important to be able to detect zero-day
vulnerabilities in SAP applications, 81 percent say the ability to prioritize threats against SAP
applications based on when the attack is likely to succeed and 81 percent say it is very important
to have continuous monitoring in order to ensure SAP applications are safe and secure.
Segregation of duties can improve SAP security. Sixty-six percent of respondents say their
current approach to SAP security includes segregation of duties and access controls and 51
percent of these respondents say it is effective in safeguarding your company’s core business.
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
2
3
Part 2. Key findings
In this section, we present an analysis of the research findings. The complete audited findings are
presented in the appendix of the report. We have organized the findings according to the
following topics from the research:
§
§
§
Senior leadership’s perceptions about SAP
SAP security challenges
SAP and the risk of data breaches and cyber attacks
Senior leadership’s perceptions about SAP
es
e
ar
ch
Senior leadership values the importance of SAP to the bottom line but ignores its
cybersecurity risks. As shown in Figure 2, 76 percent of respondents say their senior leadership
understands the importance and criticality of SAP installations to profitability. However, only 21
percent of respondents say their leaders recognize SAP cybersecurity risks and 63 percent of
respondents say C-level executives in their company tend to underestimate the risks associated
with insecure SAP applications.
rie
ta
ry
R
Moreover, only 41 percent of respondents say their organization understands the impact of the
value of the data that could be lost from its SAP system and only 23 percent of respondents say
the senior leadership in their companies know what data resides on the SAP systems.
op
Figure 2. Senior leadership’s perceptions about SAP security risks
la
nd
Pr
Strongly agree and agree responses combined
tia
Our senior leadership understands the
importance and criticality of SAP installations to
our organization’s bottom line
lC
on
fid
en
76%
C-level executives in my company tend to
underestimate the risks associated with insecure
SAP applications
Ax
on
G
lo
ba
63%
Our organization understands the impact of the
value of the data that could be lost from our SAP
system
41%
Our senior leadership knows what data resides
on our company’s SAP systems
23%
0%
10% 20% 30% 40% 50% 60% 70% 80%
SAP systems are critical to the revenues of companies represented in this research. When
asked about the financial consequences of their companies’ SAP systems being taken offline, the
average cost was estimated to be $4.5 million. This includes all direct cash outlays, direct labor
expenditures, indirect labor costs, overhead costs and lost business opportunities.
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
3
4
SAP security challenges
How secure are SAP applications? As shown in Figure 3, 54 percent of respondents believe it
is the responsibility of SAP, not their company, to ensure the security of its applications and
platform.
While 62 percent of respondents say SAP applications are more secure than other applications
deployed by their company, respondents say their companies are evenly divided about whether
they are confident in the security of SAP applications (50 percent of respondents).
ch
Barriers to achieving better security are the lack of full visibility into the security of SAP
applications and required expertise. Less than half (49 percent) of respondents say their
organization has the required expertise to prevent, detect and respond to cyber attacks on their
SAP applications. This lack of expertise could be due to more resources allocated to network
rather than applications security (68 percent of respondents).
Figure 3. How secure are SAP applications?
R
es
e
ar
Strongly agree and agree responses combined
68%
op
rie
ta
ry
My company’s budget provides a higher funding
level for network rather than application security
62%
la
nd
Pr
SAP applications are more secure than other
applications deployed by my company
tia
It is the responsibility of SAP, not my company, to
ensure its applications and platform are safe and
secure
on
fid
en
54%
My company is confident in the security of SAP
applications
lo
ba
lC
50%
G
Our organization has the required expertise to
prevent, detect and respond to cyber attacks on
our SAP applications
Ax
on
49%
0%
Ponemon Institute© Research Report
10% 20% 30% 40% 50% 60% 70% 80%
Axon Global Confidential and Proprietary Research
4
5
The SAP security team is seldom accountable for the security of SAP systems,
applications and processes. The majority of respondents believe it is difficult to secure SAP
applications. One possible reason could be the lack of clear ownership over securing SAP
applications. As shown in Figure 4, 25 percent of respondents say no one function is most
accountable for SAP security in their organizations followed by IT infrastructure (21 percent of
respondents). Only 19 percent of respondents say the SAP security team is accountable followed
by information security (18 percent of respondents).
Figure 4. Which function is most accountable to ensure the security of SAP systems,
applications and processes?
No one function is most accountable for SAP
security
25%
21%
ch
IT infrastructure
19%
es
e
ar
SAP security team
18%
R
Information security
9%
rie
ta
ry
Risk executives
6%
2%
5%
la
0%
nd
Pr
Board of directors
op
Audit
10%
15%
20%
25%
30%
on
fid
en
tia
SAP security is difficult to achieve. According to Figure 5, fifty-eight percent of respondents
rate the difficulty of securing SAP applications as high and 65 percent of respondents rate their
level of concern about malware infections in the SAP infrastructure as very high. Only 34 percent
of respondents say their companies have visibility into the security of SAP applications
lC
Figure 5. Difficulty of SAP security, concern about malware infections and visibility
on
G
lo
ba
1 = no difficulty, no concern and no visibility to 10 = high difficulty, high concern and high visibility
(7 + responses reported)
Level of concern about malware infection in the
SAP infrastructure
Ax
65%
Level of difficulty in securing SAP applications
58%
34%
Visibility into the security of SAP applications
0%
Ponemon Institute© Research Report
10%
20%
30%
Axon Global Confidential and Proprietary Research
40%
50%
60%
70%
5
6
SAP platforms are likely to contain one or more malware infections As shown in Figure 6,
seventy-five percent of respondents say it is very likely (33 percent) or likely (42 percent) that
SAP platforms have one or more malware infections.
Figure 6. What is the likelihood that your company’s SAP platform at any point in time
contains one or more malware infections?
45%
42%
40%
35%
33%
30%
25%
ch
21%
es
e
ar
20%
R
15%
ry
10%
4%
rie
ta
5%
Likely
Not likely
No chance
Ax
on
G
lo
ba
lC
on
fid
en
tia
la
nd
Pr
Very likely
op
0%
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
6
7
SAP and the risk of data breaches and cyber attacks
If a data breach involving the SAP system occurred, who would be responsible for
remediating the incident? Despite the perceptions of the seriousness of an SAP breach, 30
percent of respondents say no one person would be most accountable if their organization had a
SAP breach followed by the CIO (26 percent of respondents) and the CISO (18 percent of
respondents), as shown in Figure 7.
Figure 7. Who is the person most accountable if your organization has an SAP breach?
No one person is accountable
30%
CIO
26%
14%
R
8%
op
3%
0%
5%
10%
nd
Other
rie
1%
Pr
CFO
ta
ry
SAP BASIS administrator
es
e
SAP security
ch
18%
ar
CISO
15%
20%
25%
30%
35%
lC
on
fid
en
tia
la
There is little confidence that a breach involving the SAP platform would be detected
immediately or within one week. According to Figure 8, only 25 percent of respondents say
they are very confident or confident such a data breach would be detected immediately and 35
percent of respondents say they are very confident or confident a breach would be detected
within one week. Confidence increases in the detection of a breach within one month (41 percent
of respondents) or one year (53 percent of respondents).
lo
ba
Figure 8. How soon would you know if the SAP platform had been breached?
Very confident and confident responses combined
on
53%
Ax
50%
G
60%
41%
40%
30%
35%
25%
20%
10%
0%
Detected immediately
Detected within one
week
Ponemon Institute© Research Report
Detected within one
month
Axon Global Confidential and Proprietary Research
Detected within one
year
7
8
Certain SAP applications are most susceptible to cyber attack. According to respondents,
content and collaboration, data management, customer relationship management (CRM) and the
technology platform (backbone) are the most vulnerable to attack, as shown in Figure 9.
Figure 9. SAP applications most susceptible to attack
More than one response permitted
Content and collaboration
64%
Data management
56%
50%
Customer relationship management (CRM)
Technology platform (backbone)
48%
Enterprise management (ERP)
37%
35%
Financial management
Supplier relationship management
31%
5%
0%
ta
Other
10%
rie
5%
20%
op
Product life cycle management
R
11%
ry
Analytics
es
e
25%
Human capital management
ch
33%
ar
Supply chain management
30%
40%
50%
60%
70%
tia
la
nd
Pr
Frequency and sophistication of cyber attacks against SAP platforms will increase. As
shown in Figure 10, 47 percent of respondents say the frequency of cyber attacks against their
company’s SAP platform will increase over the next 2 years and 54 percent of respondents say
the stealth and sophistication of cyber attacks against the company’s SAP platform will increase.
on
fid
en
Figure 10. How will the frequency and stealth and sophistication of cyber attacks against
your company’s SAP platform change over the next 24 months?
45%
39%
lC
40%
35%
G
30%
15%
Ax
15%
on
25%
20%
37%
lo
ba
35%
42%
12%
8%
10%
7%
3%
5%
2%
0%
Significant
increase
Increase
Frequency of cyber attacks
Ponemon Institute© Research Report
No change
Decrease
Significant
decrease
Stealth and sophistication of cyber attacks
Axon Global Confidential and Proprietary Research
8
9
New technologies and trends increase the risk of a data breach involving SAP
applications. Fifty-nine percent of respondents believe new technologies and trends such as
cloud, mobile, big data and the Internet of Things increases the attack surface of their SAP
applications, according to Figure 11. Despite this concern about the cloud, only 43 percent of
respondents say it is important to understand the cybersecurity and privacy risks before deciding
to move SAP applications to the cloud.
Figure 11. What new technologies and trends will increase the risk of a data breach
involving SAP applications?
Strongly agree and agree responses combined
Cloud, mobile, big data and the Internet of
Things increase the attack surface of our SAP
applications and therefore the probability of a
breach
ry
R
es
e
ar
ch
59%
ta
Understanding the cyber security and privacy
risks are considered when evaluating whether or
not to move SAP applications to the cloud
nd
Pr
op
rie
43%
10%
20%
30%
40%
50%
60%
70%
Ax
on
G
lo
ba
lC
on
fid
en
tia
la
0%
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
9
10
Certain practices are very important to achieving security and avoiding cyber breaches in
the SAP infrastructure. Understanding the latest threats and vulnerabilities in SAP applications
helps strengthen the organization’s cybersecurity posture. Seventy-three percent of respondents
say knowledge about the latest threats and vulnerabilities affecting SAP applications improves
their organization’s ability to manage cybersecurity risks.
According to Figure 12, eighty-three percent of respondents say it is very important to be able to
detect zero-day vulnerabilities in SAP applications, 81 percent say the ability to prioritize threats
against SAP applications based on when the attack is likely to succeed and 81 percent say it is
very important to have continuous monitoring in order to ensure SAP applications are safe and
secure.
R
es
e
ar
ch
The following practices are also considered important: the ability to assess and audit SAP
compliance with policies, industry standards and government regulations (78 percent of
respondents), the ability to integrate existing security technologies including GRC, SIEM, network
security and security operations management with their company’s SAP security solution (73
percent of respondents), the ability to receive a direct feed of the latest SAP vulnerabilities
confirmed by security experts (72 percent of respondents) and compliance when deploying SAP
applications (67 percent of respondents).
ry
Figure 12. What practices are important in achieving security in the SAP infrastructure?
op
rie
ta
1 = low importance to 10 = high importance, 7+ responses
83%
tia
la
nd
Pr
Ability to detect zero-day vulnerabilities in SAP
applications
on
fid
en
Ability to prioritize threats against SAP
applications based on when the attack is likely to
succeed
lC
81%
lo
ba
Continuous monitoring in ensuring SAP
applications are safe and secure
on
G
81%
Ax
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
10
11
Segregation of duties can improve SAP security. Sixty-six percent of respondents say their
current approach to SAP security includes segregation of duties and access controls. As shown
in Figure 13, 51 percent of these respondents say it is effective in safeguarding your company’s
core business.
Figure 13. Is the segregation of duties and access controls effective in safeguarding your
company’s core business systems?
60%
51%
50%
44%
40%
es
e
ar
ch
30%
R
20%
5%
0%
No
Unsure
Ax
on
G
lo
ba
lC
on
fid
en
tia
la
nd
Pr
Yes
op
rie
ta
ry
10%
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
11
12
Part 3. Methods & Limitations
A sampling frame of 17,473 experienced IT and IT security practitioners located in the United
States were selected as participants to this survey. From this sampling frame, we captured 709
returns of which 102 were rejected for reliability issues. Our final sample was 607, thus resulting
in an overall 3.5 percent response rate, as shown in Table 1.
Table 1. Sample response
Total sampling frame
Total returns
Rejected or screened surveys
Final sample
Freq
17,473
709
102
607
Pct%
100%
4.1%
0.6%
3.5%
2%2% 3%
R
5%
es
e
Pie Chart 1. Distribution of respondents according to position level
ar
ch
Pie Chart 1 summarizes the approximate position levels of respondents in our study. As can be
seen, the majority of respondents (58 percent) are at or above the supervisory level.
op
rie
ta
ry
17%
15%
on
fid
en
tia
21%
la
nd
Pr
35%
Senior Executive
Vice President
Director
Manager
Supervisor
Technician
Staff
Contractor
lo
ba
lC
Pie Chart 2 reveals 25 percent of respondents identified their primary role as being within IT
management, 18 percent responded IT security and 15 percent responded SAP infrastructure.
on
G
Pie Chart 2. Primary role within the organization
3% 2%2%
Ax
4%
25%
5%
5%
8%
18%
13%
IT management
IT security
SAP infrastructure
Application security
Application development
Security architecture
Risk management
SAP security
SAP consultant
Quality assurance
Other
15%
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
12
13
Pie Chart 3 reports the respondents’ organizations primary industry focus. As shown, 18 percent
of respondents identified financial services and insurance, which includes banking, investment
management, insurance, brokerage, payments and credit cards. Nine percent responded
manufacturing, and eight percent responded public sector/government.
Pie Chart 3. Distribution of respondents according to primary industry classification
2% 2%
2%
3%
3%
3%
18%
3%
3%
9%
4%
ch
4%
es
e
4%
ar
8%
4%
ry
R
8%
7%
op
rie
6%
ta
5%
Financial services & Insurance
Manufacturing
Public sector/ Government
Retail
Healthcare
Services
Technology & Software
Airlines/Automotive/Transportation
Hospitality
Internet & ISPs
Pharmaceuticals
Communications/Telecom
Consumer Products
Energy/Oil & Gas
Utilities
Chemicals
Education
Media
Professional Services
Other
nd
Pr
According to Pie Chart 4, the majority of respondent are located in larger-sized organizations with
a global headcount of more than 1,000 employees.
tia
la
Pie Chart 4. Distribution of respondents according to world headcount
5,000 to 25,000 people
51%
25,001 to 75,000 people
More than 75,000 people
Ax
36%
on
G
lo
ba
lC
on
fid
en
13%
In addition to the United States, 70 percent of respondents reported that their organization has
employees located in Europe, 67 percent responded Canada, and 63 percent responded AsiaPacific.
Table 2. Location of employees
United States
Europe
Canada
Asia-Pacific
Middle East & Africa
Latin America (including Mexico)
Total
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
Pct%
100%
70%
67%
63%
54%
49%
403%
13
14
Limitations
There are inherent limitations to survey research that need to be carefully considered before
drawing inferences from findings. The following items are specific limitations that are germane to
most web-based surveys.
Non-response bias: The current findings are based on a sample of survey returns. We sent
surveys to a representative sample of individuals, resulting in a large number of usable
returned responses. Despite non-response tests, it is always possible that individuals who
did not participate are substantially different in terms of underlying beliefs from those who
completed the instrument.
§
Sampling-frame bias: The accuracy is based on contact information and the degree to
which the list is representative of individuals who are IT or IT security practitioners. We
also acknowledge that the results may be biased by external events such as media
coverage. We also acknowledge bias caused by compensating subjects to complete this
research within a holdout period.
§
Self-reported results: The quality of survey research is based on the integrity of confidential
responses received from subjects. While certain checks and balances can be incorporated
into the survey process, there is always the possibility that a subject did not provide a
truthful response.
Ax
on
G
lo
ba
lC
on
fid
en
tia
la
nd
Pr
op
rie
ta
ry
R
es
e
ar
ch
§
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
14
15
Appendix: Detailed Survey Results
The following tables provide the frequency or percentage frequency of responses to all survey
questions contained in this study. All survey responses were captured in mid December 2015
through January 4, 2016.
Survey response
Total sampling frame
Total returns
Rejected or screened surveys
Final sample
Response rate
Freq.
17,473
709
102
607
3.5%
Part 1. Screening
S1a. Does your company use SAP?
Yes
No
Total
R
Pr
op
rie
ta
ry
25%
19%
19%
13%
5%
19%
100%
la
Pct%
73%
69%
53%
50%
46%
41%
33%
33%
25%
25%
18%
0%
0%
466%
Ax
on
G
lo
ba
lC
on
fid
en
tia
S2. Which SAP products (e.g., modules) does your organization deploy?
Enterprise management (ERP)
Technology platform (backbone)
Financial management
Data management
Customer relationship management (CRM)
Human capital management
Supply chain management
Supplier relationship management
Content and collaboration
Product life cycle management
Analytics
Other (please specify)
None of the above (stop)
Total
S3. What best describes your involvement in the security of SAP applications
deployed by your organization?
Very significant
Significant
Moderate
Minimal or none (stop)
Total
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
81%
19%
100%
Pct%
nd
S1b. If no, do you use any of the following solutions?
Oracle E-Business Suite (Financials)
Oracle JD Edwards
Oracle Siebel
Oracle PeopleSoft
Other
None of the above (stop)
Total
es
e
ar
ch
Pct%
Pct%
31%
47%
22%
0%
100%
15
16
Pct%
68%
63%
50%
54%
76%
41%
ar
ch
23%
49%
56%
es
e
Part 2. Attributions: Are organizations prepared to deal with SAP security
risks? Strongly agree and Agree responses combined
Q1. My company’s budget provides a higher funding level for network rather
than application security.
Q2. C-level executives in my company tend to underestimate the risks
associated with insecure SAP applications.
Q3. My company is confident in the security of SAP applications.
Q4. It is the responsibility of SAP, not my company, to ensure its applications
and platform are safe and secure.
Q5. Our senior leadership understands the importance and criticality of SAP
installations to our organization’s bottom line.
Q6. Our organization understands the impact of the value of the data that could
be lost from our SAP system.
Q7. Our senior leadership knows what data resides on our company’s SAP
systems.
Q8. Our organization has the required expertise to prevent, detect and respond
to cyber attacks on our SAP applications.
Q9. SAP applications that are not connected to the Internet pose no real
security threat to my company.
Q10. SAP applications are more secure than other applications deployed by my
company.
Q11. Our senior leadership is aware of SAP cybersecurity risks.
Q12. Understanding the latest threats and vulnerabilities affecting SAP
applications improves our organization’s ability to manage cyber security risks.
Q13. My company is unlikely to experience a material security or data breach
resulting from insecure SAP applications.
Q14. New technologies and trends such as cloud, mobile, big data and the
Internet of Things increase the attack surface of our SAP applications and
therefore the probability of a breach.
Q15. Understanding the cyber security and privacy risks are considered when
evaluating whether or not to move SAP applications to the cloud.
ta
ry
R
62%
21%
op
rie
73%
nd
Pr
44%
la
59%
on
fid
en
tia
43%
Pct%
19%
18%
6%
21%
9%
2%
25%
100%
Ax
on
G
lo
ba
lC
Part 3. SAP security challenges
Q16. Which function is most accountable to ensure the security of SAP
systems, applications and processes?
SAP security team
Information security
Audit
IT infrastructure
Risk executives
Board of directors
No one function is most accountable for SAP security
Total
Q17a. Does your current approach to SAP security include segregation of
duties and access controls?
Yes
No
Unsure
Total
Q17b. If yes, is it effective in safeguarding your company’s core business
systems?
Yes
No
Unsure
Total
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
Pct%
66%
30%
4%
100%
Pct%
51%
44%
5%
100%
16
17
Q18. What is the likelihood that your company’s SAP platform at any point in
time contains one or more malware infections?
Very likely
Likely
Not likely
No chance
Total
33%
42%
21%
4%
100%
es
e
ar
ch
Average
4%
10%
30%
36%
22%
100%
6.73
R
The following items are rated using a 10-point scale ranging from 1 =
lowest to 10 = highest.
Q19. Please rate the level of difficulty in securing SAP applications.
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
Total
Extrapolated value
Pct%
Pct%
ta
ry
Q20. Please rate your organization’s level of concern about malware infection in
the SAP infrastructure.
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
Total
Extrapolated value
tia
la
nd
Pr
op
rie
3%
12%
20%
31%
34%
100%
7.12
Pct%
0%
8%
17%
43%
32%
100%
7.48
on
G
lo
ba
lC
on
fid
en
Q21. Please rate your organization’s effectiveness in managing the SAP
infrastructure.
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
Total
Extrapolated value
Ax
Q22. Please rate the importance of compliance when deploying SAP
applications.
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
Total
Extrapolated value
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
Pct%
1%
7%
15%
38%
39%
100%
7.64
17
18
Q23. Please rate the importance of continuous monitoring in ensuring SAP
applications are safe and secure.
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
Total
Extrapolated value
1%
5%
13%
42%
39%
100%
7.76
es
e
ar
ch
Pct%
16%
28%
22%
21%
13%
100%
5.24
R
Q24. Using the following 10-point scale, what best defines your company’s
visibility into the security of SAP applications?
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
Total
Extrapolated value
Pct%
Pct%
rie
ta
ry
Q25. Using the following 10-point scale, how important is the ability to integrate
existing security technologies including GRC, SIEM, network security and
security operations management with your company’s SAP security solution?
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
Total
Extrapolated value
on
fid
en
tia
la
nd
Pr
op
5%
4%
18%
38%
35%
100%
7.38
Pct%
4%
2%
16%
20%
58%
100%
8.02
Ax
on
G
lo
ba
lC
Q26. Using the following 10-point scale, how important is the ability to assess
and audit SAP compliance with policies, industry standards and government
regulations?
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
Total
Extrapolated value
Q27. Using the following 10-point scale, how important is the ability to prioritize
threats against SAP applications based on when the attack is likely to succeed?
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
Total
Extrapolated value
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
Pct%
3%
8%
8%
28%
53%
100%
7.90
18
19
Q28. Using the following 10-point scale, how important is the ability to detect
zero-day vulnerabilities in SAP applications?
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
Total
Extrapolated value
0%
1%
16%
40%
43%
100%
8.00
ar
ch
Pct%
3%
7%
18%
42%
30%
100%
7.28
R
es
e
Q29. Using the following 10-point scale, how important is the ability to receive a
direct feed of the latest SAP vulnerabilities confirmed by security experts?
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
Total
Extrapolated value
Pct%
Pct%
rie
ta
ry
Part 4. Data breaches and cyber attack
Q30. What SAP applications are most susceptible to cyber attack? Please
select your top four choices.
Content and collaboration
Data management
Customer relationship management (CRM)
Technology platform (backbone)
Enterprise management (ERP)
Financial management
Supply chain management
Supplier relationship management
Human capital management
Analytics
Product life cycle management
Other (please specify)
Total
lo
ba
lC
on
fid
en
tia
la
nd
Pr
op
64%
56%
50%
48%
37%
35%
33%
31%
25%
11%
5%
5%
400%
Pct%
12%
35%
42%
8%
3%
100%
Ax
on
G
Q31. In your opinion, how will the frequency of cyber attacks against you
company’s SAP platform change over the next 24 months?
Significant increase
Increase
No change
Decrease
Significant decrease
Total
Q32. In your opinion, how will the stealth and sophistication of cyber attacks
against you company’s SAP platform change over the next 24 months?
Significant increase
Increase
No change
Decrease
Significant decrease
Total
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
Pct%
15%
39%
37%
7%
2%
100%
19
20
Q33. Who is the primary person most accountable if your organization has a
SAP breach?
CIO
CISO
CFO
SAP security
SAP BASIS administrator
No one person is accountable
Other (please specify)
Total
26%
18%
1%
14%
8%
30%
3%
100%
ar
ch
Pct%
6%
19%
35%
40%
100%
es
e
Q34a. If your company’s SAP platform was breached, how confident are you
that this breach would be detected immediately?
Very confident
Confident
Not confident
No confidence
Total
Pct%
Pct%
12%
23%
34%
31%
100%
nd
Pr
op
rie
ta
ry
R
Q34b. If your company’s SAP platform was breached, how confident are you
that this breach would be detected within one week?
Very confident
Confident
Not confident
No confidence
Total
Pct%
15%
26%
31%
28%
100%
lC
on
fid
en
tia
la
Q34c. If your company’s SAP platform was breached, how confident are you
that this breach would be detected within one month?
Very confident
Confident
Not confident
No confidence
Total
Pct%
23%
30%
29%
18%
100%
Ax
on
G
lo
ba
Q34d. If your company’s SAP platform was breached, how confident are you
that this breach would be detected within one year?
Very confident
Confident
Not confident
No confidence
Total
Q35. To the best of your knowledge, how many times has your company’s SAP
platform been breached over the past 24 months?
Zero
1 or 2
3 or 4
5 or 6
7 or 8
9 or 10
More than 10
Total
Extrapolated value
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
Pct%
35%
32%
16%
12%
3%
1%
1%
100%
2.14
20
21
Q36. What best describes the impact of information theft, modification of data
and disruption of business processes on your company’s SAP?
Catastrophic
Very serious
Serious
Not serious
Nominal or none
Total
17%
43%
32%
8%
0%
100%
Pct%
Pr
op
rie
ta
ry
R
Pct%
2%
3%
17%
21%
15%
35%
5%
2%
0%
100%
on
G
lo
ba
lC
on
fid
en
tia
la
nd
Part 5. Your Role
D1. What organizational level best describes your current position?
Senior Executive
Vice President
Director
Manager
Supervisor
Technician
Staff
Contractor
Other
Total
0%
15%
18%
23%
17%
11%
6%
5%
3%
2%
0%
100%
4,538,750
ch
ar
es
e
Q37. How much would it cost your company if your SAP systems were taken
offline? Please note that the cost estimate should include all direct cash outlays,
direct labor expenditures, indirect labor costs, overhead costs and lost business
opportunities.
Zero
Less than $100,000
100,001 to $250,000
250,001 to $500,000
500,001 to $1,000,000
1,000,001 to $5,000,000
5,000,001 to $10,000,000
10,000,001 to $25,000,000
25,000,001 to $50,000,000
50,000,001 to $100,000,000
More than $100,000,000
Total
Extrapolated value
Pct%
Ax
D2. What best describes your primary role in the organization?
Application development
SAP security
SAP infrastructure
SAP consultant
Application security
Security architecture
IT management
IT security
Quality assurance
Compliance/audit
Risk management
Network engineering
Other
Total
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
Pct%
8%
4%
15%
3%
13%
5%
25%
18%
2%
1%
5%
1%
0%
100%
21
22
ry
R
es
e
ar
ch
Pct%
la
nd
Pr
op
rie
ta
D3. What industry best describes your organization’s industry focus?
Agriculture/Food & Beverage
Airlines/Automotive/Transportation
Communications/Telecom
Consumer Products
Chemicals
Defense
Education
Energy/Oil & Gas
Entertainment
Financial services & Insurance
Healthcare
Hospitality
Internet & ISPs
Manufacturing
Media
Mining & Metals
Pharmaceuticals
Professional Services
Public sector/ Government
Research
Retail
Services
Technology & Software
Utilities
Other
Total
D4. Where are your employees located? (check all that apply):
United States
Canada
Europe
Middle East & Africa
Asia-Pacific
Latin America (including Mexico)
Total
Pct%
D5. What is the worldwide headcount of your organization?
5,000 to 25,000 people
25,001 to 75,000 people
More than 75,000 people
Total
Pct%
on
fid
en
tia
100%
67%
70%
54%
63%
49%
403%
lC
lo
ba
G
on
Ax
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
1%
4%
3%
3%
2%
1%
2%
3%
0%
18%
7%
4%
4%
9%
2%
1%
4%
2%
8%
0%
8%
6%
5%
3%
0%
100%
51%
36%
13%
100%
22
2
1
23
Please contact research@ponemon.org or call us at 800.877.3118 if you have any questions.
Ponemon Institute
Advancing Responsible Information Management
Ponemon Institute is dedicated to independent research and education that advances responsible
information and privacy management practices within business and government. Our mission is to conduct
high quality, empirical studies on critical issues affecting the management and security of sensitive
information about people and organizations.
Ax
on
G
lo
ba
lC
on
fid
en
tia
la
nd
Pr
op
rie
ta
ry
R
es
e
ar
ch
As a member of the Council of American Survey Research Organizations (CASRO),we uphold strict
data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable
information from individuals (or company identifiable information in our business research). Furthermore, we
have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper
questions.
Ponemon Institute© Research Report
Axon Global Confidential and Proprietary Research
23
Download