Potential security risks in application processes in IDM systems
STANDARDISATION AND VIRTUALISATION
SAP Basis Training starts at the very beginning of the project. Starting with a meticulous documentation of our work. We involve your internal employees from the very beginning.
Each SAP Basis system must be controlled and managed by an administrator. This person is responsible for the smooth operation of the system. This can be an internal administrator or it can be handed over to external service providers.
System Retirement
An SAP HANA system lives on applications. When you develop these applications, you should think about securing them early. Using HTTPS instead of HTTP is one of the basics. In addition, you ensure secure authentication and implement a Secure Software Development Lifecycle to ensure backup in your own developments. In your applications, you better start to check them for risks early on and run this backup process regularly. You can analyse and restrict access to source code later. Create a risk register and address security vulnerabilities in a risk-based manner. The later you discover a risk, the more expensive the fix will be. Further information on SAP Security in addition to the article can be found here. Do you have any further questions or suggestions concerning this topic? Would you like us to go further on the subject? I look forward to your feedback!
In earlier product generations, databases from various third-party providers were used - primarily Oracle and Microsoft SQL. However, this has changed with the introduction of the new database generation SAP HANA.
"Shortcut for SAP Systems" makes many tasks in the area of the SAP basis much easier.
These are used to perform the following tasks:
On www.sap-corner.de you will also find useful information about SAP basis.
The data is not only data tables, but also applications, system control tables and user data.