Monday, 7 March 2016

Overview of SAP Security


What is SAP Security?

SAP, began in 1972 by five previous IBM representatives in Mannheim, Germany, expresses that it is the world's biggest between big business programming organization and the world's fourth-biggest free programming supplier, generally speaking.

SAP Systems contain exceptionally delicate and classified information of their customer base and organizations. Thus, there is a need to customary review a SAP PC framework to check its security and information honesty.

Case in point, a representative in a distribution center who is in charge of making a buy request might not endorse a legitimate buy request or else he might make and affirm the same number of procurement request with no utilization.

What is SAP Security Design? 


SAP Security System Architecture


At its most basic level, SAP Security Design alludes to the compositional structure of SAP security parts. Be that as it may, successful security configuration is accomplished by means of the joining of part design:
1. SAP Security Organizational Structure and Governance - Ownership, Policies, and Accountability
2. SAP Security Processes - User Provisioning, Role Change Management, Emergency Access
3. Progressing Management and Monitoring of the Security Environment - KPIs, Recertification,"Get Clean and Stay Clean"        

Different Security Measures for SAP 

  1. STAD Data 
  2. SAP Cryptographic library 
  3. Web Transaction Server (ITS) Security 
  4. System Basics ( SAPRouter, Firewalls and DMZ, Network Ports) 
  5. Web-AS Security ( Load Balancing, SSL, Enterprise Portal Security) 
  6. Single Sign-On 
  7. AIS ( Audit Information System)

No comments:

Post a Comment