SAP Basis Potential security risks in application processes in IDM systems - SAP Basis

Direkt zum Seiteninhalt
Potential security risks in application processes in IDM systems
Very good IT skills - especially SAP solutions
Every SAP system architecture is as individual as the company itself. Full planning, including hardware sizing, is therefore essential. These services are included here:

An important area of SAP Security is the analysis of the customer's own SAP programs, which are classically written in the proprietary SAP language ABAP. Here, too, as in all programming languages, security vulnerabilities can be programmed - whether consciously or unconsciously. However, the patterns of security vulnerabilities in ABAP code differ from those in Java stacks or Windows programs. The goal of these conventional programs is usually to either crash the program (buffer overflow) or to artificially execute the program's own code (code injection). Both is not possible in ABAP, since a crash of a process causes nothing else than the creation of an entry in the log database (Dump ST22) and a subsequent termination of the report with return to the menu starting point. So a direct manipulation as in other high level languages or servers is not possible. However, there are other manipulation possibilities.
Independent transactions
Sound up-to-date know-how: With SAP Basis support, you can save time and money on training that would be needed in-house to keep your employees up to date. An SAP expert is always familiar with the latest technologies.

SAP Basis Training starts at the very beginning of the project. Starting with a meticulous documentation of our work. We involve your internal employees from the very beginning.

Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.

The syntax of the different ACL files may vary depending on the release level.

The optimization of time-critical processes guarantees a smooth process.
SAP BASIS
Zurück zum Seiteninhalt