Skip to content

Commit 71e511f

Browse files
authored
Merge pull request #243426 from yelevin/yelevin/sap-incident-response-playbooks
SAP incident response playbooks
2 parents 1f03421 + f4021eb commit 71e511f

File tree

6 files changed

+98
-14
lines changed

6 files changed

+98
-14
lines changed

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,8 @@
173173
href: sap/solution-overview.md
174174
- name: Working with the SAP solution across multiple workspaces
175175
href: sap/cross-workspace.md
176+
- name: Respond to SAP incidents with playbooks
177+
href: sap/sap-incident-response-playbooks.md
176178
- name: SAP BTP solution
177179
items:
178180
- name: Overview

articles/sentinel/sap/deployment-overview.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,10 @@ Microsoft Sentinel solution for SAP® applications is certified for SAP S/4HANA
2424
**Microsoft Sentinel solution for SAP® applications** is a [Microsoft Sentinel solution](../sentinel-solutions.md) that you can use to monitor your SAP systems and detect sophisticated threats throughout the business logic and application layers. The solution includes the following components:
2525
- The Microsoft Sentinel for SAP data connector for data ingestion.
2626
- Analytics rules and watchlists for threat detection.
27-
- Functions for easy data access.
28-
- Workbooks for interactive data visualization.
29-
- Watchlists for customization of the built-in solution parameters.
27+
- Functions for easy data access.
28+
- Workbooks for interactive data visualization.
29+
- Watchlists for customization of the built-in solution parameters.
30+
- Playbooks for automating responses to threats.
3031

3132
> [!NOTE]
3233
> The Microsoft Sentinel for SAP solution is free to install, but there will be an [additional hourly charge](https://azure.microsoft.com/pricing/offers/microsoft-sentinel-sap-promo/) for activating and using the solution on production systems starting May 2023.
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
title: Microsoft Sentinel incident response playbooks for SAP
3+
description: This article introduces Microsoft Sentinel playbooks built to respond to incidents in your SAP environment.
4+
author: yelevin
5+
ms.author: yelevin
6+
ms.topic: conceptual
7+
ms.date: 06/28/2023
8+
---
9+
10+
# Microsoft Sentinel incident response playbooks for SAP
11+
12+
This article describes how to take advantage of Microsoft Sentinel's security orchestration, automation, and response (SOAR) capabilities in conjunction with SAP. The article introduces purpose-built playbooks included in the [Microsoft Sentinel solution for SAP® applications](solution-overview.md). You can use these playbooks to respond automatically to suspicious user activity in SAP systems, automating remedial actions in SAP RISE, SAP ERP, SAP Business Technology Platform (BTP) as well as in Azure Active Directory.
13+
14+
The Microsoft Sentinel SAP solution empowers your organization to secure its SAP environment. For a complete, detailed overview of the Sentinel SAP solution, see the following articles:
15+
- [Microsoft Sentinel solution for SAP® applications overview](solution-overview.md)
16+
- [Deploy Microsoft Sentinel solution for SAP® applications](deployment-overview.md)
17+
- [Microsoft Sentinel solution for SAP® applications: security content reference](sap-solution-security-content.md)
18+
19+
With the addition of these playbooks to the solution, you can not only monitor and analyze security events in real-time, you can also automate SAP incident response workflows to improve the efficiency and effectiveness of security operations.
20+
21+
The Microsoft Sentinel solution for SAP® applications includes the following playbooks:
22+
- SAP Incident Response - Lock user from Teams - Basic
23+
- SAP Incident Response - Lock user from Teams - Advanced
24+
- SAP Incident Response - Reenable audit logging once deactivated
25+
26+
## Use cases
27+
28+
You're tasked with defending your organization's SAP environment. You've implemented Microsoft Sentinel solution for SAP® applications. You've enabled the solution's analytics rule "SAP - Execution of a Sensitive Transaction Code," and you've possibly customized the solution's "Sensitive Transactions" watchlist to include particular transaction codes you wish to screen for. An incident warns you of suspicious activity in one of the SAP systems. A user is trying to execute one of these highly sensitive transactions. You must [investigate and respond to this incident](../investigate-incidents.md).
29+
30+
During the triage phase, you decide to take action against this user, kicking it out of your SAP ERP or BTP systems or even from Azure AD.
31+
32+
### Lock out a user from a single system
33+
34+
As an example of how to bring orchestration and automation to this process, let's build an [automation rule](../automate-incident-handling-with-automation-rules.md) to invoke the **Lock user from Teams - Basic** playbook whenever a sensitive transaction execution by an unauthorized user is detected. This playbook uses Teams' adaptive cards feature to request approval before unilaterally blocking the user.
35+
36+
For more information on configuring this playbook, see [this SAP blog post](https://blogs.sap.com/2023/05/22/from-zero-to-hero-security-coverage-with-microsoft-sentinel-for-your-critical-sap-security-signals-youre-gonna-hear-me-soar-part-1/).
37+
38+
### Lock out a user from multiple systems
39+
40+
The **Lock user from Teams - Advanced** playbook accomplishes the same objective, but is designed for more complex scenarios, allowing a single playbook to be used for multiple SAP systems, each with its own SAP SID. The playbook seamlessly manages the connections to all of these systems, and their credentials, using the optional dynamic parameter *InterfaceAttributes* in the *SAP - Systems* watchlist (included with the Microsoft Sentinel solution for SAP® applications) and Azure Key Vault. The playbook also allows you to communicate to the parties in the approval process using [Outlook actionable messages](/outlook/actionable-messages/get-started) in addition to—and synchronized with—Teams, using the *TeamsChannelID* and *DestinationEmail* parameters in the *SAP_Dynamic_Audit_Log_Monitor_Configuration* watchlist.
41+
42+
For more information on configuring this playbook, and in particular on how to use dynamic parameters in watchlists to manage connections to all your SAP systems, see [this SAP blog post](https://blogs.sap.com/2023/05/23/from-zero-to-hero-security-coverage-with-microsoft-sentinel-for-your-critical-sap-security-signals-part-2/).
43+
44+
### Prevent deactivation of audit logging
45+
46+
With your mission being to ensure that security coverage of your SAP environment remains comprehensive and uninterrupted, you might be concerned about the SAP audit log—one of the sources of your security information—being deactivated. You want to build an automation rule based on the **SAP - Deactivation of Security Audit Log** analytics rule, that will invoke the **Reenable audit logging once deactivated** playbook to make sure that doesn't happen. This playbook also uses Teams, but only to inform security personnel after the fact, since, given the severity of the offense and the urgency of its mitigation, immediate action can be taken with no approval required. Since this playbook also uses Azure Key Vault to manage credentials, the playbook's configuration is similar to that of the previous one. For more information on this playbook and its configuration, see [this SAP blog post](https://blogs.sap.com/2023/05/23/from-zero-to-hero-security-coverage-with-microsoft-sentinel-for-your-critical-sap-security-signals-part-3/).
47+
48+
## Standard vs. Consumption playbooks
49+
50+
Microsoft Sentinel lets you create instances of these playbooks directly from templates if you're using playbooks based on Azure Logic Apps' **Consumption** plan. If you have specific requirements for virtual networking (VNET) injection support, you must either use **Azure API management** [as described here](https://blogs.sap.com/2023/05/17/generate-soap-services-for-your-legacy-rfcs-to-simplify-integration-out-of-the-box/) in conjunction with your Consumption logic app, or use **Standard**-plan logic apps.
51+
52+
See the [full explanation of the different types of playbooks](../automate-responses-with-playbooks.md#logic-app-types). Also, see [this SAP blog post](https://blogs.sap.com/2023/05/22/from-zero-to-hero-security-coverage-with-microsoft-sentinel-for-your-critical-sap-security-signals-youre-gonna-hear-me-soar-part-1/), in the table under the heading "Creating line of sight to your SAP system for the SOAP request," for the ramifications of choosing each type of logic app.
53+
54+
The process for deploying Standard logic apps generally is more complex than it is for Consumption logic apps, but we've made available a series of shortcuts which allows you to deploy them quickly from the Microsoft Sentinel GitHub repository. Follow the [procedure outlined there](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SAP/Playbooks/INSTALLATION.md) to deploy the playbooks.
55+
56+
Currently available Standard playbooks in GitHub:
57+
- [**Lock SAP User from Teams - Basic** Standard playbook](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/SAP/Playbooks/Basic-SAPLockUser-STD)
58+
59+
Keep tabs on the [SAP playbooks folder](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/SAP/Playbooks) in the GitHub repository for more playbooks as they become available. There's also a short introductory video there to help you get started.
60+
61+
## Next steps
62+
63+
In this article, you learned about the playbooks available in the Microsoft Sentinel solution for SAP® applications.
64+
65+
- Learn more about the [Microsoft Sentinel solution for SAP® applications](solution-overview.md).
66+
- Learn how to [deploy the Microsoft Sentinel solution for SAP® applications](deployment-overview.md).
67+
- Learn about the [security content available in the Microsoft Sentinel solution for SAP® applications](sap-solution-security-content.md).
68+
- Learn about [automation rules](../automate-incident-handling-with-automation-rules.md) and [playbooks](../automate-responses-with-playbooks.md).

0 commit comments

Comments
 (0)