Topics like Least Privileged Access, True Compliance and Accountability are commonplace when it comes to SAP Security.
However, an additional layer of protection, that of biometrics, can be added to the existing set of standard security tools provided by SAP.
Biometrics, in the field of computing, allows physical or behavioral characteristics to be used to identify a person.
It can thus be used in many ways (iris reading, fingerprinting, way of walking, voice etcc) and in different contexts, to gain access to a system or to perform critical operations, within a system, as a dual control mechanism.
Using these techniques can be even more useful when you add practices (bad practices) of managing information and carrying out business processes that have very little to do with the word "security" for example:
In this article we introduce a solution, available on the market, called bioLock. The goal of which is precisely to protect the SAP system in its entirety, as well as, potentially, to reduce to zero any risks that these bad practices would bring.
How does it work? What benefits could it bring to your SAP system? Let's go into more detail!
bioLock is software that relies on biometric analysis technologies and integrates into SAP systems via the ABAP language to make it possible to define "ID Checks" that can be set as mandatory upon the performance of any action in SAP.
For example, it can be used through the following products for the acquisition and authentication of the user's biometric information:
In fact, biometric authentication is at the heart of bioLock technology, through which the software provides a wide range of security options.
This allows for the creation of an Allow List, which contains all users who will be accepted when they attempt to perform a certain action.
All users not included in this list, on the other hand, will be automatically rejected by the system when they try to perform the action.
Some of the most important functions of the software are:
To better understand the mechanisms underlying the operation of bioLock let's take a closer look at Function Protection. Three quick and easy steps are required to protect a function within SAP using the software.
If you wish not only to prevent access, but also to operate at a more detailed level of security and segregate the actual execution within the transaction, you can add a bioLock Checkpoint within the ABAP code just before the execution involved, and link this entry to the function defined above.
Each action performed in the system can eventually be tracked to have a log of the activities performed. When can you use it?
Did you know that this information can also be integrated into a SIEM?
We have seen the way bioLock operates and through what tools and logic it aims to improve SAP system security.
In summary, what are the ways in which bioLock can help your company?
Interested in learning more? Do you have additional concerns? Contact us here!