Is creating users by copying wrong?

Posted by Klea Duro on May 12, 2023 8:15:00 AM

How many times have we heard in the company when creating a new user, "give me a colleague as a reference," that is, in the process of defining a new user, we reason more by copy than by corporate trade.

 

But is this approach correct? Or does it present some possible problems?

Read More

WHAT ARE SAP HANA ROLES?

Posted by Klea Duro on May 5, 2023 8:15:00 AM

Profiling also exists and can be implemented in the SAP HANA database.

 

 

But not all roads lead to the same result. Some choices may not be ideal in the long run and in the management of authorizations in SAP HANA. What is important to know when defining SAP HANA roles?

 

This is not always done as this database is mainly used when using SAP applications. Such as S/4HANA.

Read More

BioLock for SAP: what is it?

Posted by Andrea Mazzolani on Apr 28, 2023 8:15:00 AM

Topics like Least Privileged Access, True Compliance and Accountability are commonplace when it comes to SAP Security.

 

 

However, an additional layer of protection, that of biometrics, can be added to the existing set of standard security tools provided by SAP.

 

Read More

Topics: governance, sap cyber security, Threat detection, biometric

SAP User Management: password, 5 points for reflection

Posted by Andrea Mazzolani on Apr 21, 2023 8:15:00 AM

Do you use a password to login to SAP systems?

Which are the most obvious cases which you should pay attention to?

Read More

Topics: sap password, sap logon

SOAR, what does it mean? Why is it important?

Posted by Andrea Mazzolani on Apr 14, 2023 8:15:00 AM

SOAR is the acronym for Security Orchestration, Automation, and Response.

 

Why is it important to know what it is and how is it used? The definition of a SOAR SAP Security system is strategic.

 

Read More

Topics: soar, sap siem, sap etd, sap splunk

Teal Organization and SAP Security, what does it mean?

Posted by Andrea Mazzolani on Apr 7, 2023 8:15:00 AM

Have you ever heard of this kind of organization?

 

What is it? How does it work? How is SAP Security managed in this kind of organizations?

Read More

Topics: sap security teal

SAP AMS Support, How to Choose?

Posted by Andrea Mazzolani on Mar 31, 2023 8:15:00 AM

What is it? How should you structure it in our opinion?

 

 

How should you prepare to activate and evaluate it?

Read More

Topics: security ams, supporto sap ams

Standard SAP Roles, are they used or it's better not to use them?

Posted by Andrea Mazzolani on Mar 24, 2023 8:15:00 AM

 

SAP provides pre-defined roles instead of having to create them from scratch.

 

 

Is it worth using them or not? Why are they often, or almost always, not used?

Read More

Topics: pfcg, sap standard role

Does SAP trace everything?

Posted by Andrea Mazzolani on Mar 17, 2023 8:15:00 AM

This is a statement that I often hear: "SAP traces everything". 

 

 

But is it actually like that? Can I really ensure an activity tracing and find out who did what in the system? Or are there any methods to bypass these logs?

Read More

Topics: audit sap, log sap

SAP Security Patch Day

Posted by Andrea Mazzolani on Mar 10, 2023 8:15:00 AM

What is a SAP Security Patch Day? When should you do it?

 

Who are the main researchers reporting security problems to SAP?

Read More

Topics: patch, sap vulnerability, sap patch

Yes Subscribe!

Blog Aglea, what you could find out?

Every Friday a new post, interview or content related to SAP Security.

  • Tips on how to design SAP Security
  • How to
  • Checklist
  • Common error and pitfall on security SAP
  • Interview with experts
  • Who we are and Aglea vision on SAP Security

Recent Posts

Post By Topic

See all