SAP Basis Application layer (application server and message server) - SAP Basis

Direkt zum Seiteninhalt
Application layer (application server and message server)
SWUE Generate an event
New risks in SAP HANA: In addition to the known risks, there are also new risks from the use of SAP HANA. A very good example are frequently used web applications that represent something new in the SAP area. In contrast to an SAP ERP system, HANA systems consist mainly of web applications, which were considered optional in the previous versions. These web applications can be found by various search engines on the Internet. This also applies to SAP Portal or Netweaver. There are URL schemes that help locate the system. This also applies to other SAP systems that use Web applications. This makes the new technology vulnerable to typical web attacks. SQL Injection, ABAP Code Injection, or XSS are all included. All risks known for a normal SAP system also apply to a SAP-HANA system. The data is stored unencrypted in RAM. Only then does the system gain this speed advantage. This results in risks such as a read-out by memory scraping malware. These pick up data in memory. Encryption costs performance, so it is not used by default. Especially during a migration HANA runs in a parallel system, therefore at least one new system comes to your landscape. Also note: HANA has its own tools and settings that need to be known and configured. The bottom line is that the system simply needs more attention when operating. Many settings often result in more errors. Three - points - HANA Security Plan 1) Roles and permissions In a previous SAP system, roles and permissions are certainly one of the main pillars of a secure system. Roles and permissions work differently in a HANA system. There are two types of users: 1) Default (limited): With this type of user, there are different access methods to the database. For example, the JDBC or HTTP technologies are used to give two examples.

Let me show you how EasyReCert can simplify this process. Automatic representation of employees & role assignment Each user of the application automatically receives the employees assigned to him. In the first step, the user verifies the assignment of the employees assigned to him. In the second step, the user is shown the roles of his employees. It is now possible to mark the assignment of the role as correct or incorrect. Understandable explanation of the roles Often roles have no talking names and for the decider it is not clear which specific permissions are behind a role. The tool offers the possibility to provide a description for each role, which is available by pop-in. Looking up which role has which permissions and which is meant for which is completely omitted. Flags & Criticality The tool offers in its options the possibility to set flags for critical roles and highlight them in particular. At a glance, the decision-makers see that one of their employees has a critical role and can examine it carefully. Since roles are classified differently in each company, you are completely free to decide which roles you want to consider critical. Roll Whitelist Do you want to exclude certain roles from the audit? Or do you want to test only critical roles? The tool offers you a whitelist function for this. This whitelist allows you to include roles that you do not want to check in the recertification process. So you completely decide which roles the tool should take into account. Logging of the results The results of the tests are logged via the application log and can be viewed both by SAP standard means and directly by the tool. It is also possible to export the audit logs or add optional comments to the logs later.
What does TREX have to do with SAP Solution Manager?
Projects: Your SAP Basis administrator plays a key role in planning and executing system upgrades and migrations. He is also responsible for transport management and tests software updates to ensure they are compatible with the landscape. In addition, he must ensure that they are installed in the correct order.

The Expert Team Lead leads a group of specialists, e.g. a group of SMEs or a specific technical area such as a group of operators. For example, this role can lead and steer a virtual group of experts with the participation of other IT departments on the topic of print management. The role serves as the interface and contact of the SAP basis to other specialist areas such as memory management or operating systems. In cooperation with other IT departments, the Technical Team Lead leads expert groups. These expert groups are usually virtually organised and their existence limited in time. The role of the Technical Lead functions as (partial) project leader for topics and projects of particular importance to the SAP basis. He takes care of all the activities involved in project management and control.

Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.

for the maintenance/installation of SAP systems.

To damage your system, the user will now search for the appropriate permissions and perform the attack under a false identity.
SAP BASIS
Zurück zum Seiteninhalt