SAP Security, which courses should you follow?

Posted by Andrea Mazzolani on Nov 4, 2022 8:15:00 AM

 

There are different formative paths and trainings for the SAP Security area. Below there are the main courses in the SAP Security and Governance area provided by SAP.

Read More

Topics: SAP Security, idm, access management, SAP GRC, SAP HR, e-learning, corso, gdpr, pfcg, HANA, S4/HANA, training

SAP Authorization Manual

Posted by Marta Ortona on Oct 21, 2022 8:15:00 AM

 

During daily support users often have to request some information. By email or by corporate ticketing tool.

 

 

 

What system are you on? What were you doing? What transactions were you using when you received the error and so on 

 

To facilitate these requests, in the SAP authorizations field, we can define a short user manual to publish, for example on the company intranet. 

 

Read More

Topics: SAP Security, aglea, sap consulenza security, su53

SAP HANA Security, 4 operational tips

Posted by Marta Ortona on Aug 19, 2022 8:15:00 AM

Have you replaced the database with SAP HANA? There are several new Security features to activate! 

 

 

Enable all features for SAP HANA Security! Follow the tips to protect data and ensure database compliance. 

Read More

Topics: SAP Security, auditing, sap hana

The 5 recurring questions in SAP Security Governance projects

Posted by Marta Ortona on Jul 1, 2022 8:15:00 AM

 

What are the main questions before starting a revising project of the authorizations in SAP? 

 

 
 
What are the main focus point in a SAP Security Review? How to deal with it and how to be prepared?
Read More

Topics: SAP Security, S4/HANA, documentazione sap security

How to define a SoD Matrix

Posted by Fabio Mambretti on Jun 3, 2022 8:15:00 AM

Segregation of Duties project: how many risks need to be defined?

Read More

Topics: SAP Security, Segregation of duties, audit, custom transactions

SAP Developer, how to manage the ABAP code security?

Posted by Fabio Mambretti on May 27, 2022 8:15:00 AM

Security for custom code in SAP has always been underestimated in most installations

 

Only recently, in the last years, customers are starting to understand the true importance of code security, mostly related to ABAP language in SAP case.

 

The SAP ABAP developer then becomes a strategic figure in making sure that programs security (especially custom code security) is attended to and correctly managed.

 

How do you make sure to always be on top of the topic?

Read More

Topics: SAP Security, secure coding sap, sap developer, Secure programming

How does Segregation of Duties help protect your company data?

Posted by Fabio Mambretti on Mar 4, 2022 8:15:00 AM

How does segregation of duties help protect your company data?

 

Read More

Topics: SAP Security, governance, ISO, sod

How to export data from SAP?

Posted by Fabio Mambretti on Feb 25, 2022 8:30:00 AM

Here's why it's important to check how data is exported and by who it's spread

How do you monitor the data exported from SAP ECC?

 

Many users must be formally authorized in order to do that as part of their job. It’s however of great importance, especially in a GDPR framework, to monitor how and who exports data in a non-authorized way from the SAP system.

How do you do that? Let’s see some paid methods and others included in the SAP business suite

Read More

Topics: SAP Security, SAP ECC, SAP HR, gdpr, UI Masking, security audit log, UI logging

How do you surpass the 312 profiles limit in SAP?

Posted by Fabio Mambretti on Feb 11, 2022 8:15:00 AM

In SAP there is/was a limit on the number of profiles that can be assigned to a user. Historically this limit of 300 and then 312 has been kept to stop the assignment of too many authorizations to users.

 

 

Does this limit persist?

Read More

Topics: SAP Security, 312, profili, ust04, SAP ECC, pfcg, S4/HANA

SAP Security Audit Log

Posted by Marta Ortona on Jan 21, 2022 8:15:00 AM

What is it for?

This tool allows you to trace the activities of one or more SAP users at application level. Can also be used to connect SAP to a third SIEM (Security Information and Event Management) or the solution SAP Enterprise Threat Detection (ETD).

Read More

Topics: SAP Security, governance, SAP ECC, security audit log

Content not found

Yes Subscribe!

Blog Aglea, what you could find out?

Every Friday a new post, interview or content related to SAP Security.

  • Tips on how to design SAP Security
  • How to
  • Checklist
  • Common error and pitfall on security SAP
  • Interview with experts
  • Who we are and Aglea vision on SAP Security

Recent Posts

Post By Topic

See all