Finding the Leak Access Logging for Sensitive Data. SAP Product Management Security



Similar documents
Budget Control by Cost Center

Application Lifecycle Management

User Experience in Custom Apps

HR400 SAP ERP HCM Payroll Configuration

SAPFIN. Overview of SAP ERP Financials COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)

USDL XG WP3 SAP use case. Kay Kadner

Fixed Asset in SAP Business One 9.0

Enterprise Software - Applications, Technologies and Programming

Table of Contents. How to Find Database Index usage per ABAP Report and Creating an Index

TM111. ERP Integration for Order Management (Shipper Specific) COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)

AC200. Basics of Customizing for Financial Accounting: General Ledger, Accounts Receivable, Accounts Payable COURSE OUTLINE

SAP Master Data Governance- Hiding fields in the change request User Interface

BICS Connectivity for Web Intelligence in SAP BI 4.0. John Mrozek / AGS December 01, 2011

Intelligent Business Operations Chapter 1: Overview & Strategy

Understanding HR Schema and PCR with an Example

Accounts Receivable. SAP Best Practices

Run SAP like a Factory

SAP Business ByDesign Reference Systems. Scenario Outline. SAP ERP Integration Scenarios

Process Archiving using NetWeaver Business Process Management

UI Framework Simple Search in CRM WebClient based on NetWeaver Enterprise Search (ABAP) SAP Enhancement Package 1 for SAP CRM 7.0

Third Party Digital Asset Management Integration

Introducing the SAP Business One starter package. A Great Start to help you to Streamline Your Small Business

R/3 and J2EE Setup for Digital Signature on Form 16 in HR Systems

SAP Service Tools for Performance Analysis

RUN BETTER Become a Best-Run Business with Remote Support Platform for SAP Business One

Certificate SAP INTEGRATION CERTIFICATION

OData in a Nutshell. August 2011 INTERNAL

K in Identify the differences between the universe design tool and the information design tool

SOP through Long Term Planning Transfer to LIS/PIS/Capacity. SAP Best Practices

SAP Best Practices for Subsidiary Integration in One Client Production with Intercompany Replenishment

Business One in Action - How can we post bank fees and charges while posting Incoming or Outgoing Payment transactions?

Alert Notification in SAP Supply Network Collaboration. SNC Extension Guide

Portfolio and Project Management 5.0: Excel Integration for Financial and Capacity Planning

Maintaining Different Addresses and Ids for a Business Partner via CRM Web UI

NetWeaver Business Client (NWBC) for Incentives and Commissions Management (ICM)

How to Create a Support Message in SAP Service Marketplace

Integrating Easy Document Management System in SAP DMS

Next Generation Digital Banking with SAP

Integration of SAP Netweaver User Management with LDAP

SAP NetWeaver BRM 7.3

Data Archiving in CRM: a Brief Overview

UI Framework Task Based User Interface. SAP Enhancement Package 1 for SAP CRM 7.0

Compliant, Business-Driven Identity Management using. SAP NetWeaver Identity Management and SBOP Access Control. February 2010

How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide

Ariba Network Integration to SAP ECC

ERP Quotation and Sales Order in CRM WebClient UI Detailed View. SAP Enhancement Package 1 for SAP CRM 7.0 CRM Sales - SFA

Integration of Universal Worklist into Microsoft Office SharePoint

Secure MobiLink Synchronization using Microsoft IIS and the MobiLink Redirector

How To Improve Your Business Process With Sap

SAP Sustainability Solutions: Achieving Customer Strategies

BW Workspaces Use Cases

How-to-Guide: Middleware Settings for Download of IPC Configuration (KB) Data from R/3 to CRM System

SAP Business One for iphone and ipad. Version 1.5.x January 2012

Integrated Release Management Maximize IT s business value. Swen Conrad, PMP Senior Director Solution Marketing IT Business Management

How To Use the BPC Mass User Management Tool in BPC 10.0 NW

Configuring Single Sign-on for SAP HANA

SAP Central Process Scheduling (CPS) 8.0 by Redwood

Sending Additional Files from SAP Netweaver PI to third Party System

GRC 10.0 Pre-Installation

How to Schedule Report Execution and Mailing

Log Analysis Tool for SAP NetWeaver AS Java

HANA Operations for Outsourcing Providers. SAP Ecosystem & Channels, SAP Hosting Certifications November 7, 2013

UI Framework Logo exchange without skin copy. SAP Enhancement Package 1 for SAP CRM 7.0

Learning Series: SAP NetWeaver Process Orchestration, secure connectivity add-on 1c SFTP Adapter

Sales Planning Detailed View. SAP Enhancement Package 1 for SAP CRM 7.0 CRM Sales - SFA

SAP DSM/BRFPlus System Architecture Considerations

How To Use the ESR Eclipse Tool with the Enterprise Service Repository

AC 10.0 Centralized Emergency Access

Data Source Enhancement Using User Exit

How To... Migrate Custom Portal Applications to SAP NetWeaver 7.3

Production Subcontracting (External Processing) SAP Best Practices

SAP How-To Guide: Develop a Custom Master Data Object in SAP MDG (Master Data Governance)

Unified Service Description Language Enabling the Internet of Services

Single Sign-On between SAP Portal and SuccessFactors

AC 10.0 Customizing Workflows for Access Management

SAP Portfolio and Project Management

SAP Cloud Strategy - Timeless Software. Frank Stienhans on behalf of Kaj van de Loo SAP

Ten reasons small and midsize enterprises (SMEs) choose SAP to help transform their business. Copyright/Trademark

ABAP Custom Code Security

Installation Guide Customized Installation of SQL Server 2008 for an SAP System with SQL4SAP.VBS

Xcelsius Dashboards on SAP NetWaver BW Implementation Best Practices

Getting Started with Scope and Effort Analyzer (SEA) ALM Solution Management, AGS, SAP AG

Learning Series: SAP NetWeaver Process Orchestration, business to business add-on EDI Separator Adapter

Consume an External Web Service in a Nutshell with good old ABAP

SAP NetWeaver Decision Service Management in SAP CRM for Utilities

ALM204 Change Impact Analysis with Business Process Change Analyzer. Rajeev Gollapudi, SAP Labs India September, 2011

Matthias Steiner SAP. SAP HANA Cloud Platform A guided tour

Variable Exit in Sap BI How to Start

SAP Fraud Management for Insurance

Business Requirements... 3 Analytics... 3 Typical Use Cases... 8 Related Content... 9 Copyright... 10

LO Extraction Part 1: SD Application Short Overview

SAP NetWeaver MDM 7.1 Features at a Glance. November, 2011

Query, Read, Create and Update CLOUD FOR CUSTOMER ODATA SERVICE QUERY, READ, CREATE AND UPDATE

How to Add an Attribute to a Case, Record and a Document in NW Folder Management (ex-records Management)

Mass Maintenance of Procurement Data in SAP

Sample Universe on Microsoft OLAP Cube

Project Governance The Role Of The Business Process Owner

AC 10.0 Business Role Management

Transcription:

Finding the Leak Access Logging for Sensitive Data SAP Product Management Security

Disclaimer This document does not constitute a legally binding proposal, offer, quotation or bid on the part of SAP. SAP assumes that the parties negotiate legally binding contracts relating to the subject of this document in a later phase. Any and all information contained in this document is preliminary and subject to change and shall not at any time be considered as binding. Especially preliminary is the described solution, the scope and the pricing. SAP expressly reserves the right to make subsequent alterations to the content of this document. This document is exclusively based on the information provided to SAP by the customer and SAP s understanding of the customer s requirements. Changing these requirements might also cause a change in system architecture or functionality. The contents of this document represent business secrets of SAP and must be handled in confidence by the customer. In particular, forwarding information to third parties is prohibited. This document and information included in it must be used exclusively for the purposes of evaluating the possibility of future business cooperation between SAP and customer. Any other use requires prior written consent from SAP. If the underlying proposal is not accepted, all documents and all copies of these documents must be returned to SAP immediately on demand or, if no request is made, destroyed within one month after rejection or non-acceptance of our proposal. All brands, trademarks etc. used in this document, including the SAP signature and logo, are the property of SAP and may not be used without its express written consent in advance. 2013 SAP AG or an SAP affiliate company. All rights reserved. 2

Agenda Why Use Read Access Logging? The Way it Works Read Access Logging in Detail Summary 2013 SAP AG or an SAP affiliate company. All rights reserved. 3

Customer Challenges with Data Access Compliance with data privacy regulations Compliance with industry standards (e.g. Basel suite for the banking industry) Monitor the access to classified data or other sensitive data (such as information about company assets or salary data) Monitor user actions on a need-to-know basis only, deleting the logs thereafter SAP provides a solution that allows to log read access to sensitive data: Read Access Logging 2013 SAP AG or an SAP affiliate company. All rights reserved. 4

Use Cases for Read Access Logging (RAL) John is a data security officer in a bank. Recent analysis of stock transactions indicate malicious orders with insider information about bank customers. John was asked to investigate the issue and identify the information leak. Chelsea is a compliance manager at a big retailer. A customer of the retailer has complained that his account details were used to contact him on private issues by an employee of the retailer. Chelsea now has to check who had accessed the customer s personrelated data. 2013 SAP AG or an SAP affiliate company. All rights reserved. 5

Read Access Logging Application The Read Access Logging Application can be accessed via the transaction SRALMANAGER providing access to Read Access Logging Configuration Data logged with Read Access Logging Administrative Log In addition, Read Access Logging is integrated into the archiving framework to allow automated archiving of older log entries. Read Access Logging is integrated in the Transport Framework of the AS ABAP. 2013 SAP AG or an SAP affiliate company. All rights reserved. 6

Read Access Logging with SRALMANAGER Using transaction SRALMANAGER, you start a Web Dynpro-based application shown in a browser window. With SRALMANAGER, you can access both administration and monitoring functions of Read Access Logging. 2013 SAP AG or an SAP affiliate company. All rights reserved. 7

The Way it Works The Read Access Logging framework (RAL) allows customers to trace which data was sent out of the system, by enabling remote communication and user interface infrastructures to log access to sensitive data. When an application/transaction is started, the Read Access Logging configuration is read. It indicates whether the current remote-enabled function module, Web service operation, Dynpro or Web Dynpro UI element is log-relevant. The RAL configuration defines which fields and elements should be logged. Knowing this, the requested field and element values are set for logging. Finally, the log data is written to the database. It can then be viewed via the Log Monitor. 2013 SAP AG or an SAP affiliate company. All rights reserved. 8

The Way it Works UI Channels Read Access Logging Framework Dynpro Web Dynpro API Channels Configurations Log writer Log data in database Web Service Remote Function Call Log conditions Log monitor 2013 SAP AG or an SAP affiliate company. All rights reserved. 9

Features Read Access Logging (RAL) allows you to track data access: Who had access to the data Which data was accessed When was the data accessed How was the data accessed (transaction or user interface) Amount of detail to be logged is customizable based on User interfaces used to access the data Operations executed on remote APIs Users using the remote APIs / user interfaces Entities and their content 2013 SAP AG or an SAP affiliate company. All rights reserved. 10

Supported Channels Read Access Logging supports the following channels: Web Dynpro You can log context-bound UI elements of Web Dynpro-based user interfaces. Dynpro You can log Dynpro UI elements and ALV grid-based user interfaces. Remote Function Calls (RFC) You can log server and client side of RFC-based communication. Web service calls You can log consumer and provider side of Web services-based communication. 2013 SAP AG or an SAP affiliate company. All rights reserved. 11

Entities Used During Configuration Log purpose Each RAL configuration requires a logging purpose. It groups the log events you want to record by use case and reason for recording. Log domain Log domains define the semantic meaning of the data elements that will be captured during the log recording. This helps auditors understand the data recorded in the log results. Log context Log context is the key field that other visible fields are related to within the logging session. Log group A log group is a collection of fields that are displayed in the same log entry (based on the logging purpose). Log condition Conditions are the rules you can define to decide when the fields in the log group are logged. 2013 SAP AG or an SAP affiliate company. All rights reserved. 12

Transport Integration Read Access Logging entities can be transported to other systems and clients Logging purposes Log domains Configurations User interface recordings User exclusion list Parameter for activation 2013 SAP AG or an SAP affiliate company. All rights reserved. 13

Authorization Template Roles to Work with Read Access Logging Template roles Description Assigned authorization objects SAP_BC_RAL_ADMIN_BIZ SAP_BC_RAL_ADMIN_TEC SAP_BC_RAL_ANALYZER SAP_BC_RAL_SUPPORTER A template role for business administrators doing the configuration and monitoring For technical administrators responsible for archiving, maintaining the user exclusion list, en- and disabling client and monitoring administrative log A template role for Read Access Logging analyzer A template role for Read Access Logging support engineer S_RAL_BLKL S_RAL_CLIS- En S_SRAL_CFG S_RAL_LDOM S_RAL_PURP S_RAL_REC S_RAL_ELOG S_RAL_LOG User exclusion list Disabling client Configuration Log domains Logging purposes Recording Administrative log Log Data (S_ARCHIVE) Archiving S_RAL_BLKL User exclusion list S_RAL_CLIS En-/Disabling client S_RAL_ELOG Administrative log S_RAL_LOG Log Data See authorization objects assigned to SAP_BC_RAL_ADMIN_BIZ with display activity specification 2013 SAP AG or an SAP affiliate company. All rights reserved. 14

Availability I NW 7.40 SP0 First shipment of framework and Web service channel NW 7.40 SP2 Shipment connection to archiving / ILM, RFC channel, Web Dynpro channel NW 7.40 SP3 Automatic transport of configurations NW 7.40 SP4 Shipment of Web Dynpro query logging, Dynpro + ALV grid channel NW 7.31 SP9 Same as NW 7.40 SP4 2013 SAP AG or an SAP affiliate company. All rights reserved. 15

Availability II NW 7.30 SP11 Available as of 28.02.2014 NW 7.11 SP13 Available as of 07.02.2014 NW 7.02 SP15 Available as of 07.02.2014 NW 7.01 SP15 Available as of 31.01.2014 For legacy releases, you can use the UI logging solution from SAP Custom Development services 2013 SAP AG or an SAP affiliate company. All rights reserved. 16

Key Take-Aways! Read Access Logging supports you in staying compliant with data privacy regulations Logging access to sensitive data is made easy with the Read Access Logging solution Read Access Logging is deeply integrated into SAP Netweaver 2013 SAP AG or an SAP affiliate company. All rights reserved. 17

Further Information Read Access Logging on SAP Community Network http://scn.sap.com/docs/doc-53843 SAP Insider Article about Read Access Logging http://scn.sap.com/docs/doc-44006 Documentation on SAP Help Portal http://help.sap.com/saphelp_nw74/helpdata/en/54/69bbeab2e94c93b9031584 711d989d/content.htm?frameset=/en/54/69BBEAB2E94C93B9031584711D98 9D/frameset.htm 2013 SAP AG or an SAP affiliate company. All rights reserved. 18

2014 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10, System z9, z10, z9, iseries, pseries, xseries, zseries, eserver, z/vm, z/os, i5/os, S/390, OS/390, OS/400, AS/400, S/390 Parallel Enterprise Server, PowerVM, Power Architecture, POWER6+, POWER6, POWER5+, POWER5, POWER, OpenPower, PowerPC, BatchPipes, BladeCenter, System Storage, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, Parallel Sysplex, MVS/ESA, AIX, Intelligent Miner, WebSphere, Netfinity, Tivoli and Informix are trademarks or registered trademarks of IBM Corporation. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Oracle and Java are registered trademarks of Oracle and/or its affiliates. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems, Inc. HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C, World Wide Web Consortium, Massachusetts Institute of Technology. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects is an SAP company. Sybase and Adaptive Server, ianywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase, Inc. Sybase is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. The information in this document is proprietary to SAP. No part of this document may be reproduced, copied, or transmitted in any form or for any purpose without the express prior written permission of SAP AG. 2014 SAP AG. All rights reserved. 43