SAP Basis USE OF THE SECURITY AUDIT LOG - SAP Basis

Direkt zum Seiteninhalt
USE OF THE SECURITY AUDIT LOG
SAP Basis - trends for the coming years
Another major topic is the migration of SAP systems, both locally from one data center to another and from one operating system to another or from one database type to another. As a rule, the SWPM tool is used here again.

Using various user, administration and monitoring tools, the SAP Basis system is controlled and managed by an administrator, who is thus responsible for its trouble-free operation. Many companies hand over these tasks to an external service provider.
SM62 Event History
The security of an SAP system requires protection against unauthorised access, e.g. through the secinfo and reginfo files. A cleanly implemented authorisation concept protects against attacks within the SAP system. However, it is also possible to attack your SAP system via the network. Through the RFC Gateway Server, your system communicates with external servers and programmes. One particularly effective way to protect against this are so-called Access Control Lists (ACL). Find out what this is and how you can use it to better protect your SAP system. The SAP Standard offers different approaches for gate protection. All methods combined can provide even greater safety. For example, it is possible to use Access Control Lists (ACL) to monitor exactly which external programmes and which hosts can communicate with the gateway. Another option is to configure the gateway to support Secure Network Communication (SNC). Finally, there are various security parameters for the gateway. This article focuses on the use of ACL files such as secinfo and reginfo files. What is an ACL? Access control lists are files in which permitted or prohibited communication partners can be recorded. For the gateway to use these ACL files, parameters must be set in the default profile of the SAP system and of course the files must be maintained accordingly. With the help of logs and traces, which can be configured for this purpose, a precise investigation can be made in advance of the activation, which connections currently run via the gateway. This allows them to prevent important applications with which your system communicates from being blocked by the ACL files. The rules in the ACL files are read from top to bottom of the gateway to decide whether to allow a communication request. If none of the rules matches the requesting programme, it will be blocked. Network-based ACL The network-based ACL file contains permitted and prohibited subnets or specific clients.

The operator is now responsible for ensuring smooth and safe operation in the SAP environment. It has a basic understanding of the infrastructure and is well connected within the IT departments. For his daily work he uses suitable tools (e.g. monitoring tools), in which he is trained and trained. In the future, the focus will be on reactive activities such as monitoring systems and processing notifications. The operator acts as a customer of SME-expression standardisation and automation as well as the SME-expression-solution manager. Also, the operational aspects of this role are suitable for outsourcing. However, the accountable parts remain in the company.

Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.

Monitoring tools can automatically scan the application logs, identify potential errors, and even suggest fixes, making it much easier to get to the root of the problem.

Rights for calling the table(s) to be retrieved must be assigned.
SAP BASIS
Zurück zum Seiteninhalt