Andrea Mazzolani (translation)
Topics like Least Privileged Access, True Compliance and Accountability are commonplace when it comes to SAP Security.
However, an additional layer of protection, that of biometrics, can be added to the existing set of standard security tools provided by SAP.
Read More
Topics:
sap cyber security,
governance,
threat detection,
biometric
Do you use a password to login to SAP systems?
Which are the most obvious cases which you should pay attention to?
Read More
Topics:
sap password,
sap logon
SOAR is the acronym for Security Orchestration, Automation, and Response.
Why is it important to know what it is and how is it used? The definition of a SOAR SAP Security system is strategic.
Read More
Topics:
soar,
sap etd,
sap siem,
sap splunk
Have you ever heard of this kind of organization?
What is it? How does it work? How is SAP Security managed in this kind of organizations?
Read More
Topics:
sap security teal
What is it? How should you structure it in our opinion?
How should you prepare to activate and evaluate it?
Read More
Topics:
security ams,
supporto sap ams
SAP provides pre-defined roles instead of having to create them from scratch.
Is it worth using them or not? Why are they often, or almost always, not used?
Read More
Topics:
pfcg,
sap standard role
This is a statement that I often hear: "SAP traces everything".
But is it actually like that? Can I really ensure an activity tracing and find out who did what in the system? Or are there any methods to bypass these logs?
Read More
Topics:
audit sap,
log sap
What is a SAP Security Patch Day? When should you do it?
Who are the main researchers reporting security problems to SAP?
Read More
Topics:
patch,
sap vulnerability,
sap patch
What are the main oversights when using SAP GRC or deciding whether to use it or not?
Read More
Topics:
SAP GRC,
SAP Fraud Management
What are the focus points in SAP S/4HANA projects?
What is worth doing to prepare? How to approach new things?
Read More
Topics:
crittografia SAP,
UCON,
upgrade