SAP Basis SAP HANA - SAP Basis

Direkt zum Seiteninhalt
SAP HANA
BACKUP, RESTORE, RECOVERY
A user name without a restricted character set can be a security risk. Therefore, it is advisable that you restrict the character set of the user ID. In this article you will learn where the dangers lie if you do not limit the user ID. I also explain how to eliminate this security risk.

This possibility is particularly advantageous when it is a new topic and there is not yet a lot of know-how in the company. Instead of buying an expensive coach to teach employees the basics of a new topic, this means that the knowledge can be made available more cheaply and in a longer term, for example, through an online course.
ABAP Objects
A secure SAP system does not only include a good role concept. It is also necessary to check whether a user should (still) have a specific role. Regular verification of role assignment is called recertification. In this blog post, I'd like to introduce you to the need for recertifications and our own tool, EasyReCert. The need for recertification - scenarios: Example 1: The "apprentice problem" Imagine the following scenario: A new employee (e.g. apprenticeship or trainee) will go through various departments as part of his or her training and will work on various projects. Of course, an SAP User will be made available to your employee right at the beginning, which is equipped with appropriate roles. As each project and department passes, the employee repeatedly needs new permissions to meet the requirements. After the employee has successfully completed his or her induction and is now in a permanent position, he or she still has permissions that are not necessary to perform his or her duties. This violates the principle of "last privilede" and represents a potential security risk for your company. Example 2: The change of department The change of department is one scenario that probably occurs in every company. If a change of department does not automatically involve a complete reallocation of roles and the employee simply takes his old permissions with him, critical combinations of permissions can occur very quickly. For example, an employee who has permissions in accounts payable and accounts receivable violates the SoD ("Segregation of Duties") principle and poses a potential security risk to your company. Recertification as part of a revision: The two examples above show that a regular review of role allocation identifies potential security risks for your business and can be addressed.

A degree in computer science is usually required and is now almost obligatory. If you have completed training as a computer scientist, you can continue your education to become an SAP Basis Administrator and position yourself particularly well on the job market. Integrata CegosEine also offers training to become an SAP Basis Administrator.

Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.

Create a risk register and address security vulnerabilities in a risk-based manner.

You can select the desired support packages before loading.
SAP BASIS
Zurück zum Seiteninhalt