SAP R/3 Authorization Concept
- Role administration using PFCG
- Authorization objects
- Authorization in Role administration
- User Buffer / Roles
Securing Systems through user, role and authorization maintenance
- Protect tables and transaction codes
- Applications-, WebFlow-, ChangeTables Logs
- User Information System
- System Parameters
- Network Ports
- Firewalls and DMZ
Cryptography and Encryption
- Digital signatures
- Load Balancing
- Enterprise Portal Security
AIS and other Security monitoring tools
- Configure AIS
- Audit Log
Protecting System Services
- Protect tables and programs
- Protect System Services, Background processing, and spool
What is Security?
Dictionary meaning of security: Freedom from risk or danger; safety.
In other words: The process of ensuring confidentiality, integrity, and availability of computers, their programs, hardware devices, and data.
Secure system: It is a system, which does exactly what we want it to do and nothing that we don’t want it to do even when someone else tries to make it behave differently.
Threat: It is an act or event that has the potential to cause a failure of security.
Why is security necessary?
- With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise.
- When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information.
- User errors, negligence, or attempted manipulation on your system should not result in loss of information or processing time.
- These demands on security apply likewise to the SAP NetWeaver platform.
Types Of Security:
What will we protect by Using SAP Security?
In the SAP environment, we should be able to reduce the risk of a security attack in the entire NetWeaver stack
Broadly, we are looking at reducing security risks to the following NetWeaver layers:
- People Integration
- Process Integration
- Information Integration
- Application Platform
What are Safeguards?
To reduce threats, a sound and robust system provides safeguards such as firewall, encryption, O/S hardening, access control, security monitor, digital certificate, and antivirus.
Different Layers In Security:
We can help multiple layers of security in a SAP R/3 system.
Authentication: Only legitimate users should be able to access the system.
Authorization: Users should only be able to perform their designated tasks.
Integrity: Data integrity needs to be granted at all time.
Privacy: Protection of data against unauthorized access.
Obligation: Ensuring liability and legal obligation towards stakeholders and shareholders including
Why do we learn SAP Security?
The SAP is known worldwide for its unique innovations that help the customers run their business with high efficiency. Some of its facts and figures stand as follows:
- More than 263,000 customers in 188 countries.
- More than 68,800 employees in more than 130 countries.
- Annual revenue (IFRS) of €1682 billion.
- Listed under the symbol “SAP” on stock exchanges, including the Frankfurt Exchange and NYSE.
Who should do the SAP Security course?
Anyone interested in getting well versed with SAP’s Business Suite solutions.
What are Certifications Available in SAP?
- SAP Development: ISO 9001:2008 certificate
- SAP Active Global Support: ISO 9001:2008 certificate
- SAP Active Global Support: ISO 27001:2005 certificate
What are the Prerequisites to learn SAP Security?
Our Experienced trainers will teach from basics, if you have a basic idea of MS Office, Knowledge of operational business processes is an added advantage for this course.
Course Finished Certificate :
After finish, the course we provide SAP Security course finished certificate of kits technologies looks like