Download presentation
Presentation is loading. Please wait.
Published byDelphia Morgan Modified over 6 years ago
1
Privacy 101: Data Security Implementation for SAP
Ryan Victoria Makati, Philippines 22 February 2013
2
Issues on Computer Security
90% of persons interviewed detected computer security breaches in the last twelve months. 80% of the respondents acknowledged financial losses due to computer breaches. 40% of the respondents were able to quantify their financial losses. 55% of the respondents reported denial of service. Source: Computer Security Institute,
3
Challenges on Data Security
ITIL Confidentiality Protection Cost-benefit relation Efficiency Integrity Availability Protection of sensitive business data Laws Agreements Regulations Cost-benefit relation Efficiency of business processes
4
Impact of security breach
To business Poor data quality/dispersed data Inefficient processes Poor business agility Leak of confidential information Expensive (TCO) To IT Missed SLAs Performance issues Limited time for value-added innovation Audit non-conformances Supportability and heterogeneity
5
Goal Data Hackers Security Protect Assets From Threats
Through Measures Data Hackers Security
6
Security in every layer
Presentation Communication Web connection Application Database Operating system
7
Securing the Database Encryption Vulnerability patches
8
Securing the Application
System admin Authori-zations Profiles Users SAP system System access control Access control . Five-stage implementation of the authorization concept. . Login parameters
9
Securing the Web connection
Internet SAP system ITS Encryption Certificates Single Sign-on . Wgate and Agate . Loadbalancing . ITS parameters . Enable SNC for network security --- SAP Cryptographic Library – public and private key – SNC Personal Security Environment (PSE) . Security parameters sec/..., ssf/... . In recent years, have become obsolete / less and less – because of improved Internet security features (firewalls, VLAN, DMZ) . SSO – social engineering ... <> CUA --- Through logon tickets ... Sso parameters
10
Securing the Communication
Internet SAP system Access control Packet filtering Encryption . SAProuter, network, SNC . DMZ . Encryption using SSL – HTTPS - SAPCryptoLib
11
Securing the Presentation
Access control Virus scanners Encryption Enterprise portal
12
Summary Data security is the responsibility of both the business and the IT group. Security in every layer. Kaisa can help you.
13
Visit http://www.kaisa.com
THANK YOU!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.