Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT

Similar documents
Organizational IT Concepts and SAP Solution Manager. General IT operations and service concepts with SAP Solution Manager. Driving value with IT

theguard! SmartChange Intelligent SAP change management think big, change SMART!

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management

Identity and Access Management

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

Cybersecurity and Secure Authentication with SAP Single Sign-On

theguard! Software for Enterprise-wide IT Management and Secure Business Processes

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Minimize Access Risk and Prevent Fraud With SAP Access Control

Security Think beyond! Patrick Hildenbrand, SAP HANA Platform Extensions June 17, 2014

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

SAP: One Logon for All Systems SAP NetWeaver Single Sign-On

SAP Standard for Security

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Protect Your Connected Business Systems by Identifying and Analyzing Threats

SAP Netweaver Application Server and Netweaver Portal Security

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

PortWise Access Management Suite

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

Provide access control with innovative solutions from IBM.

EFFICIENT ENTERPRISE SERVICE MANAGEMENT: FLEXIBLE, IN LINE WITH ITIL, AND OUT OF THE BOX

Strengthen security with intelligent identity and access management

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Intelligent Security Design, Development and Acquisition

Auditing the Security of an SAP HANA Implementation

Injazat s Managed Services Portfolio

IBM Security Privileged Identity Manager helps prevent insider threats

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH

SAP Identity Management Overview

PortWise Access Management Suite

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

STRONGER AUTHENTICATION for CA SiteMinder

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Seven Things To Consider When Evaluating Privileged Account Security Solutions

REALTECH AG. Deutsches Eigenkapitalforum, Frankfurt/Main, November 10, Dr. Rudolf Caspary, CTO

How to Secure Your SharePoint Deployment

Top 5 Reasons to Choose User-Friendly Strong Authentication

Sarbanes-Oxley Compliance and Identity and Access Management

SAP NetWeaver Identity

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls

Compliance in 5 Steps

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

ADDING STRONGER AUTHENTICATION for VPN Access Control

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager

Identity & Access Management in the Cloud: Fewer passwords, more productivity

SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.

Information Technology Branch Access Control Technical Standard

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

IBM Connections Cloud Security

Mobile Device Management for CFAES

SAP Single Sign-On 2.0 Overview Presentation

SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned

A HIGH-LEVEL GUIDE TO EFFECTIVE IDENTITY MANAGEMENT IN THE CLOUD

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

Strong Authentication for Secure VPN Access

State of Oregon. State of Oregon 1

SERENA SOFTWARE Serena Service Manager Security

Enterprise Security Solutions

SMART PAYMENTS - BETTER DECISIONS BANK ACCOUNT MANAGEMENT E BANK ACCOUNT MANAGEMENT BEST PRACTICES IN BANK ACCOUNT MANAGEMENT.

Extending Identity and Access Management

Identity Management with SAP NetWeaver IdM

Managing Special Authorities. for PCI Compliance. on the. System i

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

privileged identities management best practices

Cloud Computing in a Regulated Environment

ImageMaster. ECM Integration Platform.

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management

1 Introduction Product Description Strengths and Challenges Copyright... 5

SUPPLIER SECURITY STANDARD

SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis

How can Identity and Access Management help me to improve compliance and drive business performance?

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

Making Database Security an IT Security Priority

Transcription:

Compliance & SAP Security Secure SAP applications based on state-of-the-art user & system concepts Driving value with IT

BO Access Control Authorization Workflow Central User Management Encryption Data Security Roles User Lifecycle Single Sign-On Revision Emergency User Basel II FDA Segregation of Duties Revision SOX Identity Management SAP Role Management Access Concepts Authentication ABAP Programming Password Reset Configuration NetWeaver Identity Management Authorizations Secure SAP Secure IT systems and secure data are a must for the operation of any business-critical application. This is no more apparent than in the news on hacker attacks, data theft, or unauthorized disclosure of sensitive data due to inadequate access concepts. Typically, IT security projects concentrate on PC software and networks. SAP is considered a stable backend application with its systems safely located in the data center and the user rights set up according to the classic SAP authorization concepts. This approach, however, is not without shortcomings because it fails to acknowledge that SAP is a dynamic system: Users enter or leave the company, business processes are adopted, and code is customized. Considering the sensitivity of critical business data like payrolls, orders or production data, backdoors or fraud within the system has serious consequences. And so it is time to think about security! More than ever, it is important to have a comprehensive and coherent security concept. Only the combination of the secure operation of SAP components with compliant access concepts mitigates risks and gives decision makers the security they need. Our consulting portfolio helps you implement SAP landscapes that comply with audit trail requirements, ease the burden on your IT staff, and protect your enterprise. Get maximum IT security with minimal cost and risk!

Increase value and minimize risks Virtually every department and individual within the company benefits from our consulting services: Management: Data security and risk minimization through access concepts with complete audit trails. Business departments: Better process quality through defined access authorizations based on secure programs. Users: Easier access to applications using the required access rights to increase acceptance. IT organization: Benefits from secure applications and processes to become a business enabler. Also, the IT staff can control the quality of code programming, which is often changed by external partners. Why REALTECH? REALTECH customers rely on our many years of expertise in Compliance & SAP Security, which has been repeatedly recognized by SAP with numerous Special Expertise Partnerships (SEP). We know how to handle regulatory compliance with the Federal Data Protection Act, COBIT, GoBS, EuroSOX, SOX, etc. The sheer number of applications involved in SAP access and authorization projects make them very complex. This complexity is a result of the inclusion of necessary interfaces from within SAP and the integration with existing directory services (e.g. MS Active Directory, Novell edirectory or OpenLDAP). For this reason we have developed a comprehensive consulting approach: We combine our experience and technological expertise with your in-depth knowledge of your applications and processes. Compliance & SAP Security projects require an end-to-end overview of your users working environment. The combination and systematic application of knowledge will make your project a joint success. Therefore, we rely on a team of experts who can effectively navigate a complex (IT) environment. Our comprehensive set of security measures includes: Authorization Concepts User Lifecycle Management Accessibility & Single Sign-On Technical Security Vulnerability Detection Fraud Detection

SAP audits and authorization concepts with complete audit trails The fulfillment of legal requirements and compliance with international guidelines and company policies are the key to successful SAP audits. This can be achieved with future-proof authorization concepts that avoid conflicts in the segregation of duties (SoD) and ensure traceability. These are the key questions: How well prepared are you for an SAP audit? Do you have the understanding and expertise needed to work with auditors in order to move smoothly through the process? How secure and future-proof is the existing authorization concept? Do users have the exact authorizations they require, not more or less? How are the activities surrounding the assignment of authorizations documented? What access measures are established to deal with emergencies? Cut costs in the preparation and conduct of SAP audits. Minimize the findings of SAP audits through the implementation of authorization concepts that meet today s requirements. Avoid conflicts in the segregation of duties and introduce mitigating controls. Ensure traceability of all activities surrounding the management of authorizations. Establish emergency concepts with complete audit trails. Preparation of SAP audits (audit self check). Assistance in conducting and following up on SAP audits. Creation and implementation of authorization concepts for your SAP applications that provide complete audit trails. Support in the selection and implementation of tools (e.g. SAP Business Objects Access Control) needed to ensure fulfillment of compliance requirements and to review SoD conflicts. Design and implementation of emergency user scenarios.

User Lifecycle Management / Identity Management Employees typically hold several positions during their career within a company and each of them is associated with different roles. The right User Lifecycle Management strategy ensures that employees always have the appropriate authorizations to access all of the IT applications they need to accomplish their work not more or less. Companies need an intelligent Identity Management strategy to centralize and automate this process. Transparent authorization workflows ensure traceability and the fulfillment of compliance requirements while mitigating security risks. Additionally, user self-services speed up the processes associated with assigning roles and authorizations, thereby reducing costs and improving employee productivity. Improve security with consistent and transparent user lifecycle processes. Provide all employees with the necessary access rights when they need them. Implement authorization workflows that comply with audit requirements by ensuring traceability. Improve security with custom-tailored role authorizations (principle of least privilege). Analysis and assessment of your user lifecycle processes. Support in devising an appropriate Identity Management strategy. Tool selection support. Design and implementation of SAP NetWeaver Identity Management. Migration from SAP Central User Administration to SAP NetWeaver Identity Management. Definition and implementation of user self-services and authorization workflows.

User-friendly security concepts Concepts that are tailored to today s requirements ensure that users can securely access all applications they need in their daily routines. Single Sign-On mechanisms improve user acceptance and make it more convenient for them to access information scattered across different systems or resources without having to sign on over and over again using different authorization procedures. As a consequence, the service desk has to spend less time dealing with password management issues. In addition, the encryption of data traffic makes it impossible to intercept data transferred through the network (e.g. between SAP client and SAP server). Comply with regulations by encrypting your data traffic. Reduce service desk request associated with password resets. Drive user productivity with single sign-on. Design and implementation of central user and authentication mechanisms using single sign-on. Support in the selection and implementation of suitable solutions, e.g. SAP NetWeaver Single Sign-On. Improve security by preventing password abuse. Secure operation of SAP systems The secure operation of SAP applications is a prerequisite for the provision of applications that provide detailed audit trails. To achieve this, a number of questions have to be asked, starting with those addressing the secure configuration of all components involved and concluding with questions related to the maintenance and daily operation of your SAP systems that take into account the necessary security aspects. Protect your data by implementing secure SAP systems and securing your databases and platforms. Operate and maintain your SAP systems taking security aspects into account. Definition and implementation of security concepts for the SAP components you use. Protection of your SAP data with suitable hardware concepts and database implementations (encryption, backup/recovery concepts, availability).

Identify and eliminate vulnerabilities in SAP applications All SAP applications are open source code systems that often require modifications or in-house developments (performed by service providers or internal employees). Therefore, unsafe ABAP code that is vulnerable to attacks such as ABAP/SQL/OS command injections or executions can easily get into your system. Secure your applications based on secure source code the first step towards better security. Tool-based analysis of your SAP ABAP in-house developments to identify vulnerabilities with REALTECH theguard! Smart Change. theguard! SmartChange Application Security & Performance Scans are based on the Virtual Forge CodeProfiler technology, which is used by SAP itself to secure the company s product development. Elimination of ABAP vulnerabilities with improved code. Support in making SAP ABAP and JAVA programming more secure. SAP Fraud Detection Regardless of how much effort you put into securing your SAP applications and all related SAP systems, someone might still get into your system and try to steal or manipulate your business data. Detect intrusions and data theft by analyzing SAP user input and interactions to discover suspicious transactions and access. Cover all interactions from SAP users (SAP Gui, portal, webdynpro, webservices, remote programs-rfc) to identify vulnerabilities. Installation and configuration of REALTECH s Fraud Detection Solution for SAP. Support in making your systems secure. Enable flexible configuration and reporting by including only selected data in the analysis and benefit from the possibility to include non-sap systems.

Consulting Units IT Management Consulting User Productivity & Integration Compliance & SAP Security IT Technology Consulting SAP Solution Manager Consulting IT Operations IT Quickscan Enterprise Portals SAP Audits and Authorization Concepts with Audit Trails Making the Most of New IT Technologies Solution Manager Strategy SAP Operations IT Sourcing Mobility Solutions for SAP User Lifecycle Management / Identity Management Upgrades Implementation of All Solution Manager Scenarios Flexible IT Services Project & Risk Management Usability User-Friendly Security Concepts Migrations Solution Manager Upgrade to 7.1 SAP Sourcing Consulting Infrastructure Management SAP Knowledge Warehouse Secure Operation of SAP Systems Virtualization End-to-End Monitoring and Error Analysis ITIL-Compliant Operations Cloud Strategy Custom Development Identify & Eliminate Vulnerabilities in In-House Developments SAP HANA Software Enhancements Timekeeping in Incident and Change Management Operational Concepts and Strategies Digital Signatures & Document Management With SAP Solution Manager SAP HANA Operations REALTECH Consulting GmbH Industriestraße 39c 69190 Walldorf Germany Tel. +49.6227.837.0 Fax +49.6227.837.837 customer-services@realtech.com www.realtech.com