AGLEA Blog

ChatGPT & SAP Security

Written by Fabio Mambretti | Aug 4, 2023 6:00:00 AM

What is ChatGPT? What is it used for? And how can it be useful to us?

We have some proof!

What is ChatGPT?

ChatGPT is a large language model developed by OpenAI, an artificial intelligence research organization.

ChatGPT is based on a machine learning algorithm called Transformer, which enables it to generate text autonomously.

The model has been trained on a large number of data, which enables it to understand and generate text naturally.

It is mainly used for natural language processing (NLP), includes natural language understanding, text generation, machine translation and other applications.

The definition above is the answer to the question posed directly to ChatGPT.

 

Let's see some examples regarding SAP Security

I started by asking what SAP Security means

 

SAP Security refers to security measures implemented to protect an organization's systems and data using SAP software. This may include:

 

  • access management,
  • data encryption,
  • security event monitoring, and compliance with corporate regulations and policies.


    In summary, SAP Security is about protecting the integrity, availability and confidentiality of data managed by SAP systems.

    A good answer, just a grammatical error but a good answer.

    At this point I tried to go a little further by asking for some more specific information.

 

What is an "SAP security authorization concept"?

Yet again a very good answer:

 

"The concept of SAP security authorization refers to the management of access to data and functionality within an SAP system.

In other words, it is an access control system that determines who has permission to access what data and functionality within the SAP system.

This is accomplished using a combination of user profiles, roles, and transactions. User profiles are defined for specific users and describe the access permissions for each.


Roles are predefined sets of permissions that can be assigned to users. Transactions are the individual operations that users can perform within the system, such as viewing a report or creating an invoice.


The idea is to restrict access only to those who need to use certain features or data to do their work, thus limiting the risk of security breaches and unauthorized access."

In general it is correct to talk about profiles (as they still exist) however it is more of a legacy of the past that in the text does not appear to be so obvious.

Asking the question directly to ChatGPT, the answer in this case was not the best, as there does not seem to be much difference between the two objects:

 

What about questions regarding the SoD or segregation of other activities?

 

For example, I asked these additional questions:

 

  • How to segregate access to individual material views within SAP?
  • How to solve a Segregation of Duties problem in SAP?

 

 

A very extended answer above, which is generally valid but does not answer the question precisely. So is the next question. Generally correct but operationally with several shortcomings.

 

What about code security? Can it be useful?

A small test to verify if a code is secure or not:

Finally, the answer to the last question, namely "Why is corporate security subjective?" is interesting.

 

Enterprise security is subjective because it depends on the specific needs and priorities of the organization.

Each company has a unique combination of risks, goals, and budgets, so security solutions that work for one organization may not be suitable for another.

In addition, business security risks change over time due to evolving cyber threats and changing rules and regulations.

This means that security solutions that were effective in the past may no longer be adequate to protect the organization from current threats.

In addition, corporate security is subjective because it depends on existing corporate culture and practices. For example, a company with an open and collaborative culture will have different security needs than a company with a more closed and hierarchical culture.


Finally, corporate security is subjective because it depends on the perception of risk by the company's employees and managers.
For example, a company that has experienced a data breach will likely have a higher perception of risk than a company that has never experienced a breach.

In general, enterprise security is an ongoing process that requires constant analysis of the organization's risks and needs to ensure that the security solutions adopted are effective in protecting the company.