SAP Basis Relevance of SAP Basis

Direkt zum Seiteninhalt
Relevance of SAP Basis
SU21 Maintenance of authorization objects
The results of the tests can be documented so that the development can be considered over a period of time. This way, you will be aware of the revision and of the relevant issues before the examination.

This access method depends solely on the rights assigned to the user. System users: Users of this user group are comparable to SAP*. They act as administrator in the system. Therefore, they should be deactivated / set to inactive as soon as possible, as soon as the system operation is ensured. You should still be aware of the SAP ERP environment to address this security risk. In a HANA system, there are privileges instead of permissions. The difference is first of all in terms of terminology. Nevertheless, the permissions are assigned differently (directly / indirectly) via the assignment of roles. These are thus accumulations of privileges. As in older SAP systems, system users must be disabled and certain roles that already exist must be restricted. Compared to an SAP ERP system, small apps are allowed instead of large applications. In this case, attention should be paid to an individual authorisation. It should be a matter of course for users to have implemented secure password rules. Settings Securing the system also means securing the underlying infrastructure. Everything from the network to the host's operating system must be secured. When looking at the system landscape, it is striking that the new technology brings many connections that need to be secured. The SAP Gateway, which is responsible for the connection between backend and frontend, is also a security risk and must be considered. All security settings of existing and future components must be validated to HANA compatibility. Secure communication of connections is obtained when you restrict access where possible. Encryption of the data of a HANA system is disabled by default. Be sure to encrypt sensitive data anyway. Especially data that is archived. If an attack is made on your system, you should be able to run forensic analysis, so you should enable the audit log. Moreover, few users should have access to it.
Administration SAP & SAP HANA- Seminars - Online or Presence
The CodeProfiler prevents poor-quality code or programs with security vulnerabilities from entering a productive SAP system landscape in the first place. It is therefore important to use the CodeProfiler throughout the entire lifecycle of a software. Already during programming, the CodeProfiler helps the developer to identify and correct errors and vulnerabilities in the SAP landscape. The CodeProfiler automatically ensures that only "clean" code is transported to the next level (development system -> test system -> quality assurance system -> production system). The CodeProfiler can also be used for regular review cycles.

Many companies that use or would like to use an SAP Basis system seek advice from external service providers or completely outsource the administration of the system. SAP Basis Consulting is a technical consulting service that covers many tasks and sub-areas related to SAP Basis. Providers include BasisTeam IT Service & Consulting AG, Phoron, Mindsquare and many others.

"Shortcut for SAP Systems" makes it easier and quicker to complete a number of SAP basis tasks.

For this, the following values must be set in the customizing table PRGN_CUST: NO = The alternative spaces are still allowed in the user name.

Critical business processes require a secure, efficient and stable operation of an SAP system landscape.
SAP Corner
Zurück zum Seiteninhalt