SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH
|
|
|
- Benjamin Barker
- 10 years ago
- Views:
Transcription
1 SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH 25 Mar 2011, ISACA Singapore
2 SOD SAS70 Project Controls Infrastructure security Configurable controls Change controls Architecture security SE16, SM30 & SM31 SAP security and controls Authorizations review Information Security Policy and Procedures SAPRouter Access controls SAP Pre Implementation Review SOX Logical access SA38 and SE38 Transport Management System (TMS) SAP*, CPIC, DDIC and EARLYWATCH Segregation Of Duties SAP Post Upgrade Review Roles, Profiles, Authorizations and Authorization Objects BASIS Controls NetWeaver Security Data Migration Change and Transport System (CTS) SAP Post Implementation Review
3 Objectives 3 Discuss various types of security controls in SAP Define framework for SAP security audits Discuss integration with IT and operational audits This presentation does not cover individual SAP security controls and concepts in detail. And it is not a technical presentation on SAP security controls
4 SAP is a sensitive & critical system 4 SAP is an ERP and a business application system Any security vulnerability may result in financial loss, business disruptions, misstatement of financial information, etc Unlike infrastructure security vulnerability, SAP security vulnerability may directly impact the business SAP is an integrated system therefore, any errors may have a widespread impact One of the most important system in any organization
5 What is the impact on IT audit? 5 It is important to secure SAP system To secure SAP, it is not sufficient to enforce controls inside SAP only
6 SAP is a part of IT infrastructure 6 Application Server 1 User PC/ Laptop Application Server 2 Database Server User PC/ Laptop Application Server 3
7 What needs to be secured? 7 Application appropriate security controls need to be enforced in SAP Infrastructure the supporting infrastructure needs to be secured as well Network routers, switches, firewalls Server application server and database server Operating system Database PCs/ Laptops presentation layer of the SAP system
8 What organizations review.. 8 SAP Audit/ Review Scope 70% Authorizations 68% SoD 54% SAP security policies and procedures 38% Configurable/ automated business 24% BASIS controls 16% Data migration Not performed Don't know/ others 14% 8% Source: MANTRAN SAP Security Practices Survey 2010
9 Security controls in SAP 9 Business Process Controls Authorization s Controls BASIS Controls Segregation of Duties (SOD)
10 Authorization controls 10 Allow users in SAP to perform their work while securing transactions from unauthorized access It is a complex and scalable concept Determines WHAT activity can be performed by a user as well as WHERE it can be performed Enforced through a pseudo object oriented concept using authorization objects Authorizations are assigned to Roles, which are then assigned to Users Approximately 2,000 authorization objects control access to more than 100,000 transaction codes
11 Look for the holes 11 SAP checks user master record for required authorizations SAP provides information on which authorizations are required for each transaction codes It is important to look for disabled authorization checks!
12 Disabling authorization checks 12 The Authorization Object check has been disabled for the Transaction Code using transaction SU24 (table USOBT_C and USOBX_C) Don t forget global deactivation of Authorization Objects through transaction AUTH_SWITCH_OBJECTS (profile parameter auth/object_disabling_active should be set to Y for this to take effect!)
13 What should be reviewed? 13 Access to critical/ sensitive activities are controlled User access is appropriate (i.e., based on their roles and responsibilities) Roles are appropriate (i.e., authorizations within roles are as per the role definition)
14 Segregation of Duties (SoD) 14 Ensures that no one individual has complete control over major phase of a process Key component of any effective internal controls environment Typically enforced through a combination of access control and mitigating controls
15 What should be reviewed? 15 SoD framework has been defined Users do not have SoD conflicts Roles do not have SoD conflicts If SoD conflicts exists in users, there are appropriate mitigating controls
16 Beyond the basics 16 Mitigating controls do they work? It is important to check whether the mitigating controls work Mitigating controls should be documented and tested regularly!
17 BASIS controls 17 Refers to technical controls in SAP Password controls User administration Privileged users Auditing Change controls Batch job management Direct access to data through tables
18 Go beyond the basics 18 Client settings direct changes should not be allowed on the production client Don t forget to check system settings! And the table logging!
19 What should be reviewed? 19 BASIS review Policies and procedures Technical settings in SAP IT procedures related to SAP administration and maintenance
20 Business process controls 20 Refers to automated (and IT dependent) controls available in SAP for various business processes such as purchasing, sales, financial reporting, inventory, HR, etc Broadly classified under following three categories: Inherent controls Configurable controls Procedural controls
21 Business process controls 21 Inherent controls Enforced by default in SAP Sales Order cannot be created with an invalid customer Configurable controls Switches that can be set by turning them on or off based on the business requirements Configured through Implementation Guide (IMG) Examples - tolerance limits for three way match, PO approval hierarchy Procedural controls IT dependent controls (e.g., review of exception reports)
22 Do organizations use them? 22 Utilization of SAP automated controls 13% 11% Very confident 30% Somewhat confident 46% Not confident Don't know/ others Source: MANTRAN SAP Security Practices Survey 2010
23 Some examples of such controls 23 PMIN condition for pricing PMIN is used 16% 35% 25% 24% PMIN is not required Not aware that SAP has PMIN Don't know Source: MANTRAN SAP Security Practices Survey 2010
24 A few more examples 24 Dual controls for customer and vendor masters
25 A few more examples 25 Alternate payee
26 A few more examples 26 Regular review of vendor reports such as RFKABL00 (Changes to Vendors)
27 What should be reviewed? 27 Configuration settings Procedural controls Exception reports
28 Clearing the confusion Business Process Review 2. Configuration Review 3. Blueprint Review 4. IT Automated Controls (ITAC) Review 5. IT Application Controls (ITAC) Review 1. BASIS Review 2. IT General Controls (ITGC) Review 3. Technical Review 1. Authorizations Review 2. Access Review 3. SoD review 4. Role Review 5. User Review
29 Security controls outside SAP 29 It is equally important to enforce security controls in the underlying infrastructure components SAP interacts with its underlying infrastructure components in unique ways Therefore, it is important to consider controls related to these interactions at the infrastructure level
30 Network controls are important 30 SAP network security Can users directly connect to the database through backend? Is the data transmission over the network secure? What network communication is allowed between user machines and application server? What network communication is allowed between application server and database server? Apart from usual network security controls, consider SAP specific controls such as SAPRouter and SNC
31 SAP supports network security 31 SAPRouter SAPRouter is an SAP program that serves as an intermediate station (proxy) in a network connection between SAP systems or programs Controls access to your network (application level gateway) Useful extension to an existing firewall Secure Network Communications SNC is used to secure SAP network connections Provides reliable authentication as well as encryption of the data to be transferred SAPRouter allows SNC connections to be set up
32 SAP server needs to be hardened 32 Both application and database servers need to be hardened Consider SAP specific hardening requirements such as transport tools security, profile parameter file security and security audit logs security
33 SAP changes are controlled by OS 33 Operating system level transport tools in SAP servers Change and Transport System (CTS) is a set of tools to organize development projects in the ABAP Workbench and in customizing, and then transport the changes between the SAP systems and clients It broadly consists of Change and Transport Organizer (CTO), Transport Management System (TMS) and some operating system level transport tools
34 SAP Change and Transport System 34 Transport Tools (tp and R3trans) RFC Transport Organizer RFC CTO Workbench Organizer RFC Customizing Organizer TMS Transport Management System
35 CTS depends on OS files 35 There are two global configuration files TP_DOMAIN_<SID>.PFL and TPPARAM that must include entries for each SAP systems taking part in transports tp uses these files for making transports. Stored in /usr/sap/trans or <DRIVE>/usr/sap/trans Access rights should be configured so that all SAP systems within the transport group can access these files
36 Transport tools reside at OS level 36 Imports can be performed using tp program at the OS level by logging into the target system as user <SID>adm, going to /usr/sap/trans/bin directory and calling the program
37 SAP profiles are OS files 37 Profile parameter files stored in SAP server A profile in SAP is an operating system file containing parameters and configuration information of SAP instance The profile files are located under the directory /usr/sap/<sid>/sys/profile This directory is shared by all application servers belonging to the same SAP system (i.e., SID) Access to modify the profile files should be restricted
38 Audit log is stored on server 38 Security audit logs stored in SAP server Rsau/local/file define names and locations of the security audit log files Access to the security audit log files and directories should be restricted
39 And vice versa.. 39 With appropriate access, OS level commands can be executed from within SAP!
40 Indicative SAP security framework..
41 What does it mean for IT auditors? 41 SAP audit covers both technical and functional areas Requires integration between IT and internal/ operational auditors Within IT audit team, coordination between infrastructure and SAP auditors is important to ensure that important infrastructure controls are covered Excellent opportunity to understand business and align IT audit with business risks!
42 Integrated audit is not yet common 42 IA Approach 22% 32% No - no integration with systemic controls in SAP Yes - to a very small extent 32% 14% Yes - to large extent Don't know/ Others Source: MANTRAN SAP Security Practices Survey 2010
43 SAP review through its lifecycle 43 SAP review may be performed at various stages of SAP lifecycle Accordingly, scope and coverage may vary Pre-Implementation Review Post-Implementation Review
44 Pre-implementation review 44 Conducted before SAP is implemented (i.e., before go-live) and may include Blueprint/configuration/ business process controls review Authorizations and SoD review IT general controls/ BASIS review Data migration / conversion/ cutover review Project management review Program development review
45 Pre-implementation review 45 System may not exist or controls may not have been implemented It is often a document review based on documents such as Business blueprints Authorization design documents Project plan, strategy and other project documents Data migration plan, strategy and cutover plan SAP technical design documents UAT documents
46 Post-implementation review 46 Usually conducted after system stabilization It usually includes the following areas Configuration/ business process controls review Authorizations and SoD review IT general controls/ BASIS review Usually conducted by reviewing the system settings
47 Other areas 47 There are new security concerns with use of various NetWeaver products Other SAP products such as CRM, SRM, SCM and SLM have their own security issues
48 Mantran Consulting Pte Ltd 2011 All rights reserved. MANTRAN logo are registered or unregistered trademarks of Mantran Consulting Pte Ltd. All other names, brands, logo, etc are registered trade or service marks of their respective owners. SAP, SAP logo and all SAP screenshots are copyright of SAP AG. SAP is a registered trademark of SAP AG. All information provided in the training is true to best of our knowledge. The information provided is a summarization of various concepts for ease of understanding. Certain facts may have been ignored or simplified for easy understanding. The information provided may not be accurate or complete. Questions Presented by Barun Kumar Director Mantran Consulting Pte Ltd ID [email protected] LinkedIn profile My blogs
SAP Secure Operations Map. SAP Active Global Support Security Services May 2015
SAP Secure Operations Map SAP Active Global Support Security Services May 2015 SAP Secure Operations Map Security Compliance Security Governance Audit Cloud Security Emergency Concept Secure Operation
SAP R/3 Security Assessment Framework
NII CONSULTING SAP R/3 Security Assessment Framework Version 1.0 N E T W O R K I N T E L L I G E N C E (IN D I A ) P VT. L TD. Contents Objective... 3 Methodology... 4 Phase 1: User Authentication... 4
SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT
SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT Foreword by Prof. Wolfgang Lassmann... 15 Foreword by Dr. Sachar Paulus... 17 1 Introduction...
Master Data Governance Security Guide
Master Data Governance Security Guide PUBLIC Document Version: 01.08 2014 Master Data Governance Security Guide 70 1 Copyright Copyright 2013 SAP AG. All rights reserved. Portions Copyright 2014 Utopia
SAP Netweaver Application Server and Netweaver Portal Security
VU University Amsterdam SAP Netweaver Application Server and Netweaver Portal Security Author: Nick Kirtley Supervisors: Abbas Shahim, Frank Hakkennes Date: 28-09-2012 Organization: VU University Amsterdam,
Processed on SAP Solution Manager Service Center Release EHP 1 for Solution Manager 7.0 Telephone Service Tool 701_2011_1 SP0 Fax
SERVICE REPORT SAP Security Optimization Self-Service SAP System ID SAP Product Release DB System Customer Processed on SAP Solution Manager Service Center Release EHP 1 for Solution Manager 7.0 Telephone
Inception of the SAP Platform's Brain Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Juan Perez-Etchegoyen [email protected] May 23 rd, 2012 HITB Conference, Amsterdam Disclaimer This publication is copyright 2012
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
So far in the first three chapters of this book we have studied an overview of SAP
4 CHAPTER SAP ERP Integration Overview with Other Systems So far in the first three chapters of this book we have studied an overview of SAP business suite applications and the NetWeaver Application Server
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
SAP SECURITY OPTIMIZATION
SAP SECURITY OPTIMIZATION ABAP Checks This documents shows the description of all checks which are executed by the SAP Security Optimization Service for an ABAP system (Version from May 2014). Author:
SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.
Exam : P_ADM_SEC_70 Title : SAP Certified Technology Professional - Security with SAP NetWeaver 7.0 Version : Demo 1 / 5 1.Which of the following statements regarding SSO and SAP Logon Tickets are true?
EAS-SEC Project: Securing Enterprise Business Applications
EAS-SEC Project: Securing Enterprise Business Applications SESSION ID: SEC-W06 Alexander Polyakov CTO ERPScan @Twitter sh2kerr Alexander Polyakov CTO of the ERPScan inc EAS-SEC.org President Business application
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed?
CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed? by Mariano Nunez [email protected] Abstract Global Fortune 1000 companies, large governmental organizations and defense entities
Business-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
Information Technology General Controls (ITGCs) 101
Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options
R/3 Security Guide : VOLUME II
SAP AG Neurottstr. 16 D-69190 Walldorf R/3 Security R/3 Security Guide : VOLUME II R/3 Security Services in Detail Version 2.0a : English July 31, 1998 R/3 Security Services in Detail Copyright Copyright
Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT
Compliance & SAP Security Secure SAP applications based on state-of-the-art user & system concepts Driving value with IT BO Access Control Authorization Workflow Central User Management Encryption Data
Configuring Java IDoc Adapter (IDoc_AAE) in Process Integration. : SAP Labs India Pvt.Ltd
Configuring Java IDoc Adapter (IDoc_AAE) in Process Integration Author Company : Syed Umar : SAP Labs India Pvt.Ltd TABLE OF CONTENTS INTRODUCTION... 3 Preparation... 3 CONFIGURATION REQUIRED FOR SENDER
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Business-Driven, Compliant Identity Management
Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Hosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
SAP SECURITY OPTIMIZATION
SAP SECURITY OPTIMIZATION ABAP Checks This document shows the description of all checks which are executed by the SAP Security Optimization Service for an ABAP system (Version from July 2011). Author:
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
The Information Systems Audit
November 25, 2009 e q 1 Institute of of Pakistan ICAP Auditorium, Karachi Sajid H. Khan Executive Director Technology and Security Risk Services e q 2 IS Environment Back Office Batch Apps MIS Online Integrated
Security and Your SAP System When Working with Winshuttle Products
Security and Your SAP System When Working with Winshuttle Products 2014 Winshuttle, LLC. All rights reserved. 2/14 www.winshuttle.com Background Companies running SAP systems are accustomed to configuring
SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22, 2010. mnunez@onapsis.
SAP Penetration Testing with Onapsis Bizploit Mariano Nuñez Di Croce [email protected] April 22, 2010 HITB Security Conference, Dubai Disclaimer This publication is copyright Onapsis SRL 2010 All rights
How Accenture is taking SAP NetWeaver Identity Management to the next level. Kristian Lehment, SAP AG Matthew Pecorelli, Accenture
How Accenture is taking SAP NetWeaver Identity Management to the next level Kristian Lehment, SAP AG Matthew Pecorelli, Accenture In This Session You will receive an overview of the functionality that
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Addressing the SAP Data Migration Challenges with SAP Netweaver XI
Addressing the SAP Data Migration Challenges with SAP Netweaver XI Executive Summary: Whether it is during the final phases of a new SAP implementation, during SAP upgrades and updates, during corporate
SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts
SAP Cybersecurity Solution Brief Objectives Solution Benefits Quick Facts Secure your SAP landscapes from cyber attack Identify and remove cyber risks in SAP landscapes Perform gap analysis against compliance
AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC
AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC MANAGE SECURITY AT THE SPEED OF BUSINESS AlgoSec Whitepaper Simplifying PCI-DSS Audits and Ensuring Continuous Compliance with AlgoSec
Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley
Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Quick Guide to the SAP Customer Relationship Management Rapid- Deployment Solution (based on EhP1) Demo/Evaluation Appliance
SAP CRM 7.01 November 2012 English Quick Guide to the SAP Customer Relationship Management Rapid- Deployment Solution (based on EhP1) Demo/Evaluation Appliance SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
Security Guide SAP GUI for Windows
Security Guide SAP GUI for Windows SAP GUI for Windows Release 7.30 SAP Technical Information June 2012 2 Contents 1. SAP GUI SECURITY MODULE... 4 1.1 SAP GUI SECURITY SETTINGS... 4 2.2 WHICH ACTIONS TRIGGERED
Application Monitoring for SAP
Application Monitoring for SAP Detect Fraud in Real-Time by Monitoring Application User Activities Highlights: Protects SAP data environments from fraud, external or internal attack, privilege abuse and
Change and Transport System - Overview (BC-CTS)
Change and Transport System - Overview (BC-CTS) HELP.BCCTS Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s
PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s
Integrating a Hitachi IP5000 Wireless IP Phone
November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition
SAP Security Monitoring with agilesi. agilesi tm Solution Brief Product Specification July 2012 Version 1.1
SAP Security Monitoring with agilesi Solution Brief agilesi Rel. 1.1 Product Overview agilesi turns SAP Security Data into Insight, Action and Competitive Advantage. The new agilesi solution is a game-changer
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
Minimize Access Risk and Prevent Fraud With SAP Access Control
SAP Solution in Detail SAP Solutions for Governance, Risk, and Compliance SAP Access Control Minimize Access Risk and Prevent Fraud With SAP Access Control Table of Contents 3 Quick Facts 4 The Access
Upgrade made easy: SAP Tools, Accelerators and Best Practices for migrating from SAP NetWeaver PI to SAP NetWeaver Process Orchestration
Upgrade made easy: SAP Tools, Accelerators and Best Practices for migrating from SAP NetWeaver PI to SAP NetWeaver Process Orchestration Mathias Huber September 2013 Agenda Options for migrating from SAP
SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management
Solution in Detail NetWeaver Business-Driven, Compliant Identity Table of Contents 3 Quick Facts 4 Business Challenges Identity for the User Lifecycle 5 The Solution Supporting a Heterogeneous IT Landscape
SAP Enterprise Architecture in the Era of SAP HANA, Infrastructure, Platforms, Software and Everything-as-a-Service
SAP Enterprise Architecture in the Era of SAP HANA, Infrastructure, Platforms, Software and Everything-as-a-Service Chuck Kichler ([email protected]) LEARNING POINTS How to consume the on-premise vs.
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance
8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Introducing Systemwalker Operation Manager V13.3. July 2008 FUJITSU LIMITED
Introducing Systemwalker Operation Manager V13.3 July 2008 FUJITSU LIMITED Contents I. Market Requirements II. Product Overview a. Planning Execution/Operation b. Operation Visualization c. Operational
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
SAP BASIS and Security Administration
SAP BASIS and Security Administration An Article From thespot4sap LTD Contents 1.0 Introduction...2 2.0 SAP Security Components The Big Picture...2 2.1 SAP Authorization Concept...3 2.2 Composite Profiles...4
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access
Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Compliant, Business-Driven Identity Management using. SAP NetWeaver Identity Management and SBOP Access Control. February 2010
Compliant, Business-Driven Identity Management using SAP NetWeaver Identity Management and SBOP Access Control February 2010 Disclaimer This presentation outlines our general product direction and should
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications March 2012 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective,
Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard
White Paper Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard Abstract This document describes how PowerBroker Identity Services Enterprise and Microsoft Active Directory
Auditing the Security of an SAP HANA Implementation
Produced by Wellesley Information Services, LLC, publisher of SAPinsider. 2015 Wellesley Information Services. All rights reserved. Auditing the Security of an SAP HANA Implementation Juan Perez-Etchegoyen
BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT
Solution in Detail NetWeaver BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING NetWeaver IDENTITY MANAGEMENT Identity management today presents organizations with a host of challenges. System landscapes
SAP Identity Management Overview
Identity Management Overview October 2014 Public Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password
SAP NetWeaver 04 Security Guide. Security Guide for SAP Mobile Infrastructure
SAP NetWeaver 04 Security Guide Security Guide for SAP Mobile Infrastructure Document Version 1.00 April 29, 2004 SAP AG Neurottstraße 16 69190 Walldorf Germany T +49/18 05/34 34 24 F +49/18 05/34 34 20
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
[ JENNIFER BUKO. The 18 Holes of Security ASUG Session 1201 John Hoover, Stanley Black & Decker Rajkishore Una, GyanSys Inc.
The 18 Holes of Security ASUG Session 1201 John Hoover, Stanley Black & Decker Rajkishore Una, GyanSys Inc. ] 18 [ ERIC SYNSTELIEN ASUG INSTALLATION MEMBER MEMBER SINCE: 2000 [ RICHARD RAUCH ASUG INSTALLATION
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security
Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security Agenda Motivation SAP Threat Vectors / SAP Hack Solution Approach the 360 of agilesi Threat Detection Secenarios / SIEM use cases
www.pwc.com Top 10 System Implementation Audit Considerations
www.pwc.com Top 10 System Implementation Audit Considerations Project lifecycle control considerations Auditing standards place specific requirements on the auditor to understand how a Client has responded
SAP Standard for Security
SAP Standard for E2E Solution Operations Document Version: 1.0 2014-12-12 SAP Solution Manager 7.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Oracle Database Security
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches
The Who, What, When, Where and Why of IAM Bob Bentley
The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
Hardening of SAP HTTP- and Webservices
Hardening of SAP HTTP- and Webservices Frederik Weidemann Nürnberg 20.10.2010 Virtual Forge GmbH frederik.weidemann (at) virtualforge.de Copyright The Foundation Permission is granted to copy, distribute
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
Integration of SAP Netweaver User Management with LDAP
Integration of SAP Netweaver User Management with LDAP Applies to: SAP Netweaver 7.0/7.1 Microsoft Active Directory 2003 Summary The document describes the detailed steps of configuring the integration
If I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERP Alexander Polyakov / ERPScan Session ID: ADS-R07 Session Classification: Advanced Intro I hate CYBER talks and all that buzz I usually do more technical
How can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.
Table of Contents PART I. IS Audit Process. CHAPTER 1. Technology and Audit. Technology and Audit. Batch and On-Line Systems. CHAPTER 2. IS Audit Function Knowledge. Information Systems Auditing. What
VBLOCK SOLUTION FOR SAP APPLICATION SERVER ELASTICITY
Vblock Solution for SAP Application Server Elasticity Table of Contents www.vce.com VBLOCK SOLUTION FOR SAP APPLICATION SERVER ELASTICITY Version 2.0 February 2013 1 Copyright 2013 VCE Company, LLC. All
