The Cybersecurity Extension for SAP provides an alternative to Security Bridge for SAP vulnerability management, threat detection, and custom code security. The Cybersecurity Extension for SAP is developed by Layer Seven Security. Layer7 is an SAP partner and competitor of Security Bridge. This guide will help you plan for the transition from Security Bridge to the Cybersecurity Extension for SAP. Once you have transitioned from Security Bridge, you can remove the Security Bridge consoles and sensors from your SAP landscape, as well as the Security Bridge users and addons in your SAP systems.
Unlike Security Bridge, the Cybersecurity Extension for SAP is an addon for SAP Solution Manager. Solution Manager is a monitoring and diagnostics platform widely used by SAP customers for application lifecycle management. Over 12,000 SAP customers worldwide are actively using Solution Manager to manage their SAP systems. Usage rights for Solution Manager are included in SAP support.
The Cybersecurity Extension for SAP requires the standard setup of Solution Manager. This guide will help you review your Solution Manager setup and prepare your platform to ensure a smooth transition from Security Bridge to the Cybersecurity Extension for SAP.
Check Managed System Configuration
The Cybersecurity Extension for SAP requires the completion of Managed System Configuration for each target system. Execute transaction SOLMAN_SETUP or navigate to work center SAP Solution Manager Configuration – Configuration (All Scenarios). Click on Managed System Configuration in Cross Scenario Configuration. Highlight a relevant system in the Technical Systems tab and select Configure System – Full Configuration. Confirm the status of all steps in Managed System Configuration is green (completed). Follow the guided procedures for Managed System Configuration to perform steps that are red or yellow (incomplete).
The following Automatic and Manual Activities are not required in Finalize Configuration:
Setup Single Sign-On
Activate E2E Trace Upload Service
Introscope Host Adaptor
Apply Settings for EWA Monitoring
Byte Code Adaptor Installation (Java Systems)
Enable Remote R/3 Connection
The status of the steps Maintain Users, Finalize Configuration and Check Configuration can be yellow.
Repeat the steps for each target system.