Skip to content

Commit 9c71f78

Browse files
authored
Merge pull request #231696 from limwainstein/sap-cross-workspace-query
SAP multi-workspace
2 parents d7296e9 + a2ccbe6 commit 9c71f78

14 files changed

+134
-20
lines changed

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,8 @@
177177
items:
178178
- name: Solution overview
179179
href: sap/solution-overview.md
180+
- name: Working with the solution across multiple workspaces
181+
href: sap/cross-workspace.md
180182
- name: How-tos
181183
items:
182184
- name: Plan architecture
Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,86 @@
1+
---
2+
title: Working with the Microsoft Sentinel solution for SAP® applications across multiple workspaces
3+
description: This article discusses working with Microsoft Sentinel solution for SAP® applications across multiple workspaces in different scenarios.
4+
author: limwainstein
5+
ms.author: lwainstein
6+
ms.topic: conceptual
7+
ms.date: 03/22/2023
8+
---
9+
10+
# Working with the Microsoft Sentinel solution for SAP® applications across multiple workspaces
11+
12+
When you set up your Microsoft Sentinel workspace, there are [multiple architecture options](../design-your-workspace-architecture.md#decision-tree) and considerations. Considering geography, regulation, access control, and other factors, you may choose to have multiple Sentinel workspaces in your organization.
13+
14+
This article discusses working with the Microsoft Sentinel solution for SAP® applications across multiple workspaces in different scenarios.
15+
16+
The Microsoft Sentinel solution for SAP® applications natively supports a cross-workspace architecture to allow improved flexibility for:
17+
18+
- Managed security service providers (MSSPs) or a global or federated SOC
19+
- Data residency requirements
20+
- Organizational hierarchy/IT design
21+
- Insufficient role-based access control (RBAC) in a single workspace
22+
23+
> [!IMPORTANT]
24+
> Working with multiple workspaces is currently in PREVIEW. This feature is provided without a service level agreement. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25+
26+
You can define multiple workspaces when you [deploy the SAP security content](deploy-sap-security-content.md#deploy-sap-security-content).
27+
28+
## Collaboration between the SOC and SAP teams in your organization
29+
30+
In this article, we focus on a specific and common use case, where collaboration between the security operations center (SOC) and SAP teams in your organization requires a multi-workspace setup.
31+
32+
Your organization's SAP team has technical knowledge that's critical to successfully and effectively implement the Microsoft Sentinel solution for SAP® applications. Therefore, it's important for the SAP team see the relevant data and collaborate with the SOC on the required configuration and incident response procedures.
33+
34+
As part of this collaboration, there are two possible scenarios, depending on your organization's needs:
35+
36+
1. **The SAP data and the SOC data reside in separate workspaces**. Both teams can see the SAP data, using [cross-workspace queries](#scenario-1-sap-and-soc-data-reside-in-separate-workspaces).
37+
1. **The SAP data is kept in the SOC workspace**, and SAP team can query the data using [resource context queries](#scenario-2-sap-data-is-kept-in-the-soc-workspace).
38+
39+
## Scenario 1: SAP and SOC data reside in separate workspaces
40+
41+
In this scenario, the SAP and SOC teams have separate Microsoft Sentinel workspaces.
42+
43+
:::image type="content" source="media/cross-workspace/sap-cross-workspace-separate.png" alt-text="Diagram of working with the Microsoft Sentinel solution for SAP® applications in separate workspaces for the SAP and SOC data." border="false":::
44+
45+
When your organization [deploys the Microsoft Sentinel solution for SAP® applications](deploy-sap-security-content.md#deploy-sap-security-content), each team specifies its SAP workspace.
46+
47+
A common practice is to provide some or all of the SOC team members with the **Sentinel Reader** role on the SAP workspace.
48+
49+
Creating separate workspaces for the SAP and SOC data has these benefits:
50+
51+
- Microsoft Sentinel can trigger alerts that include both SOC and SAP data, and run those alerts on the SOC workspace.
52+
53+
> [!NOTE]
54+
> For larger SAP landscapes, running queries made by the SOC on data from the SAP workspace can impact performance, because the SAP data must travel to the SOC workspace when being queried. For improved performance and cost optimizations, consider having both the SOC and SAP workspaces on the same [dedicated cluster](../../azure-monitor/logs/logs-dedicated-clusters.md?tabs=cli#cluster-pricing-model).
55+
56+
- The SAP team has its own Microsoft Sentinel workspace, including all features, except for detections that include both SOC and SAP data.
57+
- Flexibility: The SAP team can focus on the control and internal threats in its landscape, while the SOC can focus on external threats.
58+
- There is no additional charge for ingestion fees, because data is only ingested once into Microsoft Sentinel. However, note that each workspace has its own [pricing tier](../design-your-workspace-architecture.md#step-5-collecting-any-non-soc-data).
59+
- The SOC can see and investigate SAP incidents: If the SAP team faces an event they can't explain with the existing data, they can assign the incident to the SOC.
60+
61+
This table maps out the access of data and features for the SAP and SOC teams in this scenario.
62+
63+
|Function |SOC team |SAP team |
64+
|---------|---------|---------|
65+
|SOC workspace access | ✅ | ❌ |
66+
|SAP workspace data, analytics rules, functions, watchlists, and workbooks access | &#x2705; | &#x2705;<sup>1</sup> |
67+
|SAP incident access and collaboration | &#x2705; | &#x2705;<sup>1</sup> |
68+
69+
<sup>1</sup>The SOC team can see these functions on both workspaces, while the SAP team can see these functions only on the SAP workspace.
70+
71+
## Scenario 2: SAP data is kept in the SOC workspace
72+
73+
In this scenario, you want to keep all of the data in one workspace and to apply access controls. You can do this using Log Analytics to [manage access to data by resource](../resource-context-rbac.md). You can also associate SAP resources with an Azure resource ID by specifying the required `azure_resource_id` field in the [connector configuration section](reference-systemconfig.md#connector-configuration-section) on the data collector used to ingest data from the SAP system into Microsoft Sentinel.
74+
75+
:::image type="content" source="media/cross-workspace/sap-cross-workspace-combined.png" alt-text="Diagram of working with the Microsoft Sentinel solution for SAP® applications using the same workspace for the SAP and SOC data." border="false":::
76+
77+
Once the data collector agent is configured with the correct resource ID, the SAP team can access the specific SAP data in the SOC workspace using a resource-scoped query. The SAP team cannot read any of the other, non-SAP data types.
78+
79+
There are no costs associated with this approach, as the data is only ingested once into Microsoft Sentinel. Using this mode of access, the SAP team only sees raw and unformatted data and cannot use any Microsoft Sentinel features. In addition to accessing the raw data via log analytics, the SAP team can also access the same data [via Power BI](../resource-context-rbac.md).
80+
81+
## Next steps
82+
83+
In this article, you learned about working with Microsoft Sentinel solution for SAP® applications across multiple workspaces in different scenarios.
84+
85+
> [!div class="nextstepaction"]
86+
> [Deploy the Sentinel solution for SAP® applications](deployment-overview.md)

articles/sentinel/sap/deploy-data-connector-agent-container.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ Deployment of the Microsoft Sentinel solution for SAP® applications is divided
1919

2020
1. [Deployment prerequisites](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
2121

22+
1. [Work with the solution across multiple workspaces](cross-workspace.md) (PREVIEW)
23+
2224
1. [Prepare SAP environment](preparing-sap.md)
2325

2426
1. **Deploy data connector agent (*You are here*)**
@@ -132,7 +134,7 @@ If you're not using SNC, then your SAP configuration and authentication secrets
132134
```bash
133135
wget -O sapcon-sentinel-kickstart.sh https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/SAP/sapcon-sentinel-kickstart.sh && bash ./sapcon-sentinel-kickstart.sh --cloud fairfax
134136
```
135-
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the amount of prompts or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md).
137+
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the number of prompts or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md).
136138
137139
2. **Follow the on-screen instructions** to enter your SAP and key vault details and complete the deployment. When the deployment is complete, a confirmation message is displayed:
138140
@@ -210,7 +212,7 @@ If you're not using SNC, then your SAP configuration and authentication secrets
210212
./sapcon-sentinel-kickstart.sh --keymode kvsi --appid aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa --appsecret ssssssssssssssssssssssssssssssssss -tenantid bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb -kvaultname <key vault name>
211213
```
212214
213-
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the amount of prompts or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md).
215+
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the number of prompts or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md).
214216
215217
1. **Follow the on-screen instructions** to enter the requested details and complete the deployment. When the deployment is complete, a confirmation message is displayed:
216218
@@ -245,7 +247,7 @@ If you're not using SNC, then your SAP configuration and authentication secrets
245247
./sapcon-sentinel-kickstart.sh --keymode cfgf
246248
```
247249
248-
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the amount of prompts or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md).
250+
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the number of prompts or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md).
249251
250252
1. **Follow the on-screen instructions** to enter the requested details and complete the deployment. When the deployment is complete, a confirmation message is displayed:
251253

articles/sentinel/sap/deploy-sap-security-content.md

Lines changed: 24 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,18 @@
11
---
22
title: Deploy SAP security content in Microsoft Sentinel
33
description: This article shows you how to deploy Microsoft Sentinel security content into your Microsoft Sentinel workspace. This content makes up the remaining parts of the Microsoft Sentinel solution for SAP® applications.
4-
author: MSFTandrelom
5-
ms.author: andrelom
4+
author: limwainstein
5+
ms.author: lwainstein
66
ms.topic: how-to
7-
ms.date: 04/27/2022
7+
ms.date: 03/23/2023
88
---
99

1010
# Deploy SAP security content in Microsoft Sentinel
1111

1212
This article shows you how to deploy Microsoft Sentinel security content into your Microsoft Sentinel workspace. This content makes up the remaining parts of the Microsoft Sentinel solution for SAP® applications.
1313

14+
Learn about [working with the solution across multiple workspaces](cross-workspace.md) (PREVIEW), or [define multiple workspaces](#deploy-sap-security-content).
15+
1416
## Deployment milestones
1517

1618
Track your SAP solution deployment journey through this series of articles:
@@ -19,6 +21,8 @@ Track your SAP solution deployment journey through this series of articles:
1921

2022
1. [Deployment prerequisites](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
2123

24+
1. [Work with the solution across multiple workspaces](cross-workspace.md) (PREVIEW)
25+
2226
1. [Prepare SAP environment](preparing-sap.md)
2327

2428
1. [Deploy data connector agent](deploy-data-connector-agent-container.md)
@@ -46,9 +50,22 @@ To deploy SAP solution security content, do the following:
4650

4751
1. To open the SAP solution page, select **Microsoft Sentinel solution for SAP® applications**.
4852

49-
:::image type="content" source="./media/deploy-sap-security-content/sap-solution.png" alt-text="Screenshot of the 'Microsoft Sentinel solution for SAP® applications' solution pane." lightbox="media/deploy-sap-security-content/sap-solution.png":::
53+
:::image type="content" source="./media/deploy-sap-security-content/sap-solution.png" alt-text="Screenshot of the 'Microsoft Sentinel solution for SAP® applications' solution pane." lightbox="./media/deploy-sap-security-content/sap-solution.png":::
54+
55+
1. To launch the solution deployment wizard, select **Create**, and then enter the details of the Azure subscription and resource group.
56+
57+
1. For the **Deployment target workspace**, select the Log Analytics workspace (the one used by Microsoft Sentinel) where you want to deploy the solution. <a id="multi-workspace"></a>
58+
59+
1. If you want to [work with the Microsoft Sentinel solution for SAP® applications across multiple workspaces](cross-workspace.md) (PREVIEW), do one of the following, select **Some of the data is on a different workspace**.
60+
1. Under **Configure the workspace where the SOC data resides in**, select the SOC subscription and workspace.
61+
1. Under **Configure the workspace where the SAP data resides in**, select the SAP subscription and workspace.
62+
63+
For example:
64+
65+
:::image type="content" source="./media/deploy-sap-security-content/sap-multi-workspace.png" alt-text="Screenshot of how to configure the Microsoft Sentinel solution for SAP® applications to work across multiple workspaces.":::
5066

51-
1. To launch the solution deployment wizard, select **Create**, and then enter the details of the Azure subscription, resource group, and Log Analytics workspace (the one used by Microsoft Sentinel) where you want to deploy the solution.
67+
> [!Note]
68+
> If you want the SAP and SOC data to be kept on the same workspace with no additional access controls, do not select **Some of the data is on a different workspace**. If you want the SOC and SAP data to be kept on the same workspace, but to apply additional access controls, review [this scenario](cross-workspace.md#scenario-2-sap-data-is-kept-in-the-soc-workspace).
5269
5370
1. Select **Next** to cycle through the **Data Connectors**, **Analytics**, and **Workbooks** tabs, where you can learn about the components that will be deployed with this solution.
5471

@@ -68,11 +85,11 @@ To deploy SAP solution security content, do the following:
6885

6986
1. In Microsoft Sentinel, go to the **Microsoft Sentinel for SAP** data connector to confirm the connection:
7087

71-
[![Screenshot of the Microsoft Sentinel for SAP data connector page.](./media/deploy-sap-security-content/sap-data-connector.png)](./media/deploy-sap-security-content/sap-data-connector.png#lightbox)
88+
:::image type="content" source="./media/deploy-sap-security-content/sap-data-connector.png" alt-text="Screenshot of the Microsoft Sentinel for SAP data connector page." lightbox="media/deploy-sap-security-content/sap-data-connector.png":::
7289

7390
SAP ABAP logs are displayed on the Microsoft Sentinel **Logs** page, under **Custom logs**:
7491

75-
[![Screenshot of the SAP ABAP logs in the 'Custom Logs' area in Microsoft Sentinel.](./media/deploy-sap-security-content/sap-logs-in-sentinel.png)](./media/deploy-sap-security-content/sap-logs-in-sentinel.png#lightbox)
92+
:::image type="content" source="./media/deploy-sap-security-content/sap-logs-in-sentinel.png" alt-text="Screenshot of the SAP ABAP logs in the 'Custom Logs' area in Microsoft Sentinel." lightbox="media/deploy-sap-security-content/sap-logs-in-sentinel.png":::
7693

7794
For more information, see [Microsoft Sentinel solution for SAP® applications solution logs reference](sap-solution-log-reference.md).
7895

articles/sentinel/sap/deployment-overview.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,12 +42,13 @@ Follow your deployment journey through this series of articles, in which you'll
4242
| Milestone | Article |
4343
| --------- | ------- |
4444
| **1. Deployment overview** | **YOU ARE HERE** |
45-
| **2. Deployment prerequisites** | [Prerequisites for deploying the Microsoft Sentinel solution for SAP® applications](prerequisites-for-deploying-sap-continuous-threat-monitoring.md) |
46-
| **3. Prepare SAP environment** | [Deploying SAP CRs and configuring authorization](preparing-sap.md) |
47-
| **4. Deploy data connector agent** | [Deploy and configure the container hosting the data connector agent](deploy-data-connector-agent-container.md) |
48-
| **5. Deploy SAP security content** | [Deploy SAP security content](deploy-sap-security-content.md)
49-
| **6. Microsoft Sentinel solution for SAP® applications** | [Configure Microsoft Sentinel solution for SAP® applications](deployment-solution-configuration.md) |
50-
| **7. Optional steps** | - [Configure auditing](configure-audit.md)<br>- [Configure Microsoft Sentinel for SAP data connector to use SNC](configure-snc.md)<br>- [Configure audit log monitoring rules](configure-audit-log-rules.md)<br>- [Select SAP ingestion profiles](select-ingestion-profiles.md) |
45+
| **2. Plan architecture** | Learn about [working with the solution across multiple workspaces](cross-workspace.md) (PREVIEW) |
46+
| **3. Deployment prerequisites** | [Prerequisites for deploying the Microsoft Sentinel solution for SAP® applications](prerequisites-for-deploying-sap-continuous-threat-monitoring.md) |
47+
| **4. Prepare SAP environment** | [Deploying SAP CRs and configuring authorization](preparing-sap.md) |
48+
| **5. Deploy data connector agent** | [Deploy and configure the container hosting the data connector agent](deploy-data-connector-agent-container.md) |
49+
| **6. Deploy SAP security content** | [Deploy SAP security content](deploy-sap-security-content.md)
50+
| **7. Microsoft Sentinel solution for SAP® applications** | [Configure Microsoft Sentinel solution for SAP® applications](deployment-solution-configuration.md) |
51+
| **8. Optional steps** | - [Configure auditing](configure-audit.md)<br>- [Configure Microsoft Sentinel for SAP data connector to use SNC](configure-snc.md)<br>- [Configure audit log monitoring rules](configure-audit-log-rules.md)<br>- [Select SAP ingestion profiles](select-ingestion-profiles.md) |
5152

5253
## Next steps
5354

articles/sentinel/sap/deployment-solution-configuration.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@ Track your SAP solution deployment journey through this series of articles:
2727

2828
1. [Deployment prerequisites](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
2929

30+
1. [Work with the solution across multiple workspaces](cross-workspace.md) (PREVIEW)
31+
3032
1. [Prepare SAP environment](preparing-sap.md)
3133

3234
1. [Deploy data connector agent](deploy-data-connector-agent-container.md)
66.2 KB
Loading
153 KB
Loading
516 KB
Loading
226 KB
Loading

0 commit comments

Comments
 (0)