linkedin
YouTube
Twitter
ABOUT AGLEA
SERVICES
SAP SECURITY CONSULTANCY
HANA & S/4HANA SECURITY
SAP SECURITY CLOUD
AUDITING SAP
SAP CYBER SECURITY
SEGREGATION OF DUTIES SAP
GRC
GDPR
AMS
BLOG
CASE HISTORY
CONTACTS
AGLEA Blog
SAP User Trace
SAP CVA what is it?
How many and which workflows to define in SAP GRC Access Control?
HOW TO PERFORM A RISK ANALYSIS WITH GRC ACCESS CONTROL?
Single Sign On (SAP SSO)
SAP Translations
How to search for an APP in SAP FIORI?
SAP FIORI Cloud Catalog
SAP FIORI Authorization
SAP Fiori Roles and Authorization
SAP FIORI Library
Onboarding security
SoD GRC Ruleset Matrix
App Support: the evolution of transaction SU53 in SAP Fiori
SAP Cyber Security Deception
SAP GRC documentation, where and which one?
2 Tips in data security management: SAP interfaces
OKR SAP Security, what does it mean?
System administrator
SAP FIORI Launchpad
Microsoft Sentinel for SAP
How do you write SAP?
ChatGPT & SAP Security
Zero Trust Security SAP
Cybersecurity Manager
Cyber Security SAP ERP
External personnel management in SAP, how to do?
Personal Data Protection
Why choose an identity management system?
SAP Data Retention GDPR 5 Points of Attention
SAP Data Scrambling
Data Subject Request what is it and how to do it?
SAP Security consulting, how to choose?
Functional stupidity (digital stupidity) in Cyber Security
Is creating users by copying wrong?
WHAT ARE SAP HANA ROLES?
BioLock for SAP: what is it?
SAP User Management: password, 5 points for reflection
SOAR, what does it mean? Why is it important?
Teal Organization and SAP Security, what does it mean?
SAP AMS Support, How to Choose?
Standard SAP Roles, are they used or it's better not to use them?
Does SAP trace everything?
SAP Security Patch Day
10 things NOT to do if you have SAP GRC
5 suggestions on SAP S/4HANA Security: S/4HANA Upgrade
6 checks the Data Protection Officer must do in SAP
TIP OF THE DAY: LIMIT VISIBILITY TO CERTAIN FINANCIAL YEARS
TIP OF THE DAY: SAP AUTHORIZATION PFUD USER COMPARISON
SAP DEFAULT PASSWORD
Tip of the day: SAP User Parameters
SAP Roles and Profiles, what are they?
SAP GRC Access Control Tables
SE16 in SAP
SAP Security Optimization Service (SOS)
SAP Security Authorization for projects? No thanks!
SAP SCP/BTP for external, how to do it?
SAP RFC Security
SAP GxP Compliance
SAP GRC 12, upgrade
SAP Data Loss Prevention, what to do?
SAP Security, which courses should you follow?
SAP Security awareness, Make yourself heard!
SAP Authorization Manual
Data Protection in SAP
SAP authorizations, 10 things to avoid!
3 Tips to secure printers in SAP
3 tips ready to use. Reduce SAP security management costs!
SAP HANA Security, HANA o S/4HANA migration or installation?
Does SAP_ALL view only exist?
Do you need SAP GRC to manage a Super User in SAP?
Risk and violation in SoD management, are they synonymous?
SAP HANA Security, 4 operational tips
SAP Query Security
SAP GDPR: What systems/ tools are involved?
SAP Developers. Better an internal or external development team?
SAP Password Policy
SAP Mail, does everyone in SAP read anyone’s email?
SAP licenses, how to optimize costs?
The 5 recurring questions in SAP Security Governance projects
System Users with SAP_ALL assigned, no thanks!
SAP Security Guidelines
SAP HR LOG
How to define a SoD Matrix
SAP Developer, how to manage the ABAP code security?
SU53 SAP why do authorization errors never end?
SAP PFCG: 5 Things you did not know about this transaction
S_TABU_NAM S_TABU_DIS in SAP
SAP Cyber Security for SME
How can Aglea help you manage your Segregation of Duties?
Tables, Roles, Profiles and Authorizations in SAP
SAP Role and User Administration: what are the metrics?
Who are the owners of the Governance and Security area?
SAP Field Masking
SAP Upgrades. Authorizations are always neglected, why?
Consultants with production environment access? 5 actions to remember!
How does Segregation of Duties help protect your company data?
How to export data from SAP?
Change management SAP Security
How do you surpass the 312 profiles limit in SAP?
5 Reasons (SAP Security) to have an updated test system
10 Tips for a ticket management system!
SAP Security Audit Log
Transactions for SAP Roles (and Security Manager)
10 Tips after installing SAP GRC
SAP GUI HISTORY
6 tips before installing SAP GRC Access Control
GDPR Course - General Data Protection Regulation
Basic Role, what is it and what should it contain?
Yes Subscribe!
Blog Aglea, what you could find out?
Every Friday a new post, interview or content related to SAP Security.
Tips on how to design SAP Security
How to
Checklist
Common error and pitfall on security SAP
Interview with experts
Who we are and Aglea vision on SAP Security
Recent Posts
Post By Topic
SAP Security
(12)
SAP GRC
(11)
pfcg
(8)
gdpr
(7)
SAP GDPR
(5)
Segregation of duties
(5)
governance
(5)
sod
(5)
SAP ECC
(4)
audit sap
(4)
auditing
(4)
sap consulenza security
(4)
sap password
(4)
HANA
(3)
SAP HR
(3)
UI logging
(3)
rfc security
(3)
sap cyber security
(3)
sap hana
(3)
sap_all
(3)
security audit log
(3)
sicurezza sap
(3)
su53
(3)
HANA Security
(2)
ISO
(2)
Profiles
(2)
SAP FIORI Security
(2)
SAP audit
(2)
Secure programming
(2)
UCON
(2)
UI Masking
(2)
access management
(2)
authorization concept
(2)
autorizzazioni sap
(2)
consulenti
(2)
corso
(2)
e-learning
(2)
password policy
(2)
patch
(2)
programmazione sicura
(2)
quality
(2)
rfc
(2)
ruoli
(2)
sap access control
(2)
sap custom
(2)
sap etd
(2)
sap gui
(2)
sap query
(2)
sap security guidelines
(2)
sap siem
(2)
sap standard role
(2)
sap super user
(2)
se16
(2)
security ams
(2)
siem
(2)
soar
(2)
supporto sap ams
(2)
test system
(2)
threat detection
(2)
upgrade
(2)
312
(1)
ABAP
(1)
AI
(1)
CVA
(1)
DPO
(1)
FIORI Security
(1)
HANA Roles
(1)
PFCG SAP transaction
(1)
SAP Cloud Security
(1)
SAP Consulting
(1)
SAP DLP
(1)
SAP Fraud Management
(1)
SAP IDM
(1)
SAP LOG
(1)
SAP Security Documentation
(1)
SAP Table
(1)
SAP Transactions
(1)
SPOOL
(1)
Security Analyzer
(1)
Statistiche security SAP
(1)
Trace autorizzazioni SAP
(1)
User Access Management
(1)
aglea
(1)
audit
(1)
authorization model
(1)
biometric
(1)
chatGPT
(1)
codice sicuro SAP
(1)
consulenti sap security
(1)
consulenza sap security
(1)
crittografia SAP
(1)
custom transactions
(1)
cyber security
(1)
data loss prevention
(1)
data privacy
(1)
documentazione sap security
(1)
emergency users
(1)
gxp
(1)
identity management system
(1)
idm
(1)
log sap
(1)
mail security sap
(1)
microsoft
(1)
parameter sap
(1)
processi security
(1)
profili
(1)
profili sap
(1)
progetti security sap
(1)
quotazione borsa
(1)
rfc destination
(1)
role translation
(1)
s_tabu_dis
(1)
s_tabu_nam
(1)
s_tabu_rfc
(1)
sap FIORI
(1)
sap btp
(1)
sap data masking
(1)
sap dati personali
(1)
sap developer
(1)
sap earlywatch
(1)
sap grc 12
(1)
sap grc tables
(1)
sap gui history
(1)
sap gui security
(1)
sap gxp compliance
(1)
sap ilm gdpr
(1)
sap license auditing
(1)
sap logon
(1)
sap patch
(1)
sap security blog
(1)
sap security teal
(1)
sap sos
(1)
sap splunk
(1)
sap sso
(1)
sap tabelle custom
(1)
sap tdms
(1)
sap vulnerability
(1)
sap_all_only_view
(1)
se16n
(1)
secpol
(1)
secure coding sap
(1)
secure operation map
(1)
security awareness
(1)
security bridge
(1)
sentinel
(1)
sicurezza codice ABAP
(1)
sicurezza dei dati sap
(1)
slaw
(1)
social engineering
(1)
sost
(1)
sql
(1)
su25
(1)
super utenti sap
(1)
system users
(1)
tabelle
(1)
tabelle SAP grc access control
(1)
ticket management system
(1)
training
(1)
transazioni sap
(1)
userid
(1)
usmm
(1)
ust04
(1)
zero trust security
(1)
See all
SAP Security Blog AGLEA RSS Feed