S 5.129 Secure configuration of HTTP-based services on SAP systems

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

A variety of services offered by an SAP system can be accessed using the HTTP interface. Access to the functions and applications of the Java stack is generally obtained using HTTP. The ABAP stack is accessible through the Internet Connection Framework (ICF) using HTTP. Generally, the HTTP interface needs to be configured securely so that accesses transmitting data worthy of protection are protected by SSL, on the one hand, and only the services needed are enabled, on the other hand.

The use of the following interfaces accessible via HTTP comes in conjunction with special risks:

The following must be taken into account:

SOAP interface

The Simple Object Access Protocol (SOAP) is a protocol that can be used to access web services. The following must be taken into consideration for the SOAP interface of an SAP system:

In general, it is also necessary to ensure the security of the application accessed using SOAP by implementing corresponding authorisation checks.

SAP documentations can be found in S 2.346 Use of the SAP documentation.

WebDAV interface

The WebDAV (Web-based Distributed Authoring and Versioning) protocol allows users to access information using the HTTP protocol as if it was stored in a file system. WebDAV access can be provided by the ABAP stack and the Java stack when appropriate products or applications are used. The Knowledge Warehouse (KW, ICF path: /sap/bc/kw/fs) is an example of such an application for the ABAP stack, and Component Collaboration Management (CM, SAP Enterprise Portal Component) is an example for the Java stack.

Since WebDAV access may result in local file system accesses under some circumstances, the local file system must be protected against unauthorised accesses. In this case, the primary goal is to protect the data offered via WebDAV, but an attacker may also use WebDAV to access the local file system and prepare it for further attacks. For this reason, access should only be granted after authentication and should be protected using SSL. In addition, it is always necessary to ensure the authorisations have been assigned properly.

Content Server Interface

The Content Server Interface can be used to access document archives (repositories). If this interface is not protected, information and documents can be retrieved from all repositories available. The following must be taken into account:

References to additional documentation can be found in S 2.346 Use of the SAP documentation.

Review questions: