Why is it necessary to protect data in non-production environments?
We discussed this on 14/05/2020 at our webinar together with EPI-USE.
Why is it necessary to protect data in non-production environments?
We discussed this on 14/05/2020 at our webinar together with EPI-USE.
Have you ever heard Data Subject Request (DSR)? It is a request to know where, what and how our personal data is handled.
In fact, every European citizen, through the GDPR (Art. 15), has the possibility to request a copy of his or her personal data for information purposes. Whatever service it is.
There are many companies that provide SAP consulting. Each of these, in most cases, also provides support in the SAP security area.
This is absolutely normal. But what is the degree of expertise on these issues?
How much does slavishly following company procedures lead to problems?
Are there any solutions? But what are the impacts in security management? Can we be affected by digital stupidity?
How many times have we heard in the company when creating a new user, "give me a colleague as a reference," that is, in the process of defining a new user, we reason more by copy than by corporate trade.
But is this approach correct? Or does it present some possible problems?
Profiling also exists and can be implemented in the SAP HANA database.
But not all roads lead to the same result. Some choices may not be ideal in the long run and in the management of authorizations in SAP HANA. What is important to know when defining SAP HANA roles?
This is not always done as this database is mainly used when using SAP applications. Such as S/4HANA.
Topics like Least Privileged Access, True Compliance and Accountability are commonplace when it comes to SAP Security.
However, an additional layer of protection, that of biometrics, can be added to the existing set of standard security tools provided by SAP.
Topics: sap cyber security, governance, threat detection, biometric
Do you use a password to login to SAP systems?
Which are the most obvious cases which you should pay attention to?
Topics: sap password, sap logon
SOAR is the acronym for Security Orchestration, Automation, and Response.
Why is it important to know what it is and how is it used? The definition of a SOAR SAP Security system is strategic.
Topics: soar, sap etd, sap siem, sap splunk
Have you ever heard of this kind of organization?
What is it? How does it work? How is SAP Security managed in this kind of organizations?
Topics: sap security teal
Every Friday a new post, interview or content related to SAP Security.
Aglea s.r.l. P. IVA: IT 03868780960 - 2024 | Copy | Note legali