Privacy 101: Data Security Implementation for SAP Ryan Victoria ryan.victoria@kaisa.com Makati, Philippines 22 February 2013
Issues on Computer Security 90% of persons interviewed detected computer security breaches in the last twelve months. 80% of the respondents acknowledged financial losses due to computer breaches. 40% of the respondents were able to quantify their financial losses. 55% of the respondents reported denial of service. Source: Computer Security Institute, http://www.gocsi.com
Challenges on Data Security ITIL Confidentiality Protection Cost-benefit relation Efficiency Integrity Availability Protection of sensitive business data Laws Agreements Regulations Cost-benefit relation Efficiency of business processes
Impact of security breach To business Poor data quality/dispersed data Inefficient processes Poor business agility Leak of confidential information Expensive (TCO) To IT Missed SLAs Performance issues Limited time for value-added innovation Audit non-conformances Supportability and heterogeneity
Goal Data Hackers Security Protect Assets From Threats Through Measures Data Hackers Security
Security in every layer Presentation Communication Web connection Application Database Operating system
Securing the Database Encryption Vulnerability patches
Securing the Application System admin Authori-zations Profiles Users SAP system System access control Access control . Five-stage implementation of the authorization concept. . Login parameters
Securing the Web connection Internet SAP system ITS Encryption Certificates Single Sign-on . Wgate and Agate . Loadbalancing . ITS parameters . Enable SNC for network security --- SAP Cryptographic Library – public and private key – SNC Personal Security Environment (PSE) . Security parameters sec/..., ssf/... . In recent years, have become obsolete / less and less – because of improved Internet security features (firewalls, VLAN, DMZ) . SSO – social engineering ... <> CUA --- Through logon tickets ... Sso parameters
Securing the Communication Internet SAP system Access control Packet filtering Encryption . SAProuter, network, SNC . DMZ . Encryption using SSL – HTTPS - SAPCryptoLib
Securing the Presentation Access control Virus scanners Encryption Enterprise portal
Summary Data security is the responsibility of both the business and the IT group. Security in every layer. Kaisa can help you.
Visit http://www.kaisa.com THANK YOU!