SAP Data Scrambling

Posted by Klea Duro on Jun 9, 2023 12:00:00 AM

Why is it necessary to protect data in non-production environments?

 

We discussed this on 14/05/2020 at our webinar together with EPI-USE.

 

Read More

Data Subject Request what is it and how to do it?

Posted by Klea Duro on Jun 2, 2023 12:00:00 AM

Have you ever heard Data Subject Request (DSR)? It is a request to know where, what and how our personal data is handled.

 

 

In fact, every European citizen, through the GDPR (Art. 15), has the possibility to request a copy of his or her personal data for information purposes. Whatever service it is.

 

Read More

SAP Security consulting, how to choose?

Posted by Klea Duro on May 26, 2023 12:00:00 AM

There are many companies that provide SAP consulting. Each of these, in most cases, also provides support in the SAP security area.

 

 

This is absolutely normal. But what is the degree of expertise on these issues?

Read More

Functional stupidity (digital stupidity) in Cyber Security

Posted by Klea Duro on May 19, 2023 12:00:00 AM

How much does slavishly following company procedures lead to problems?

 

Are there any solutions? But what are the impacts in security management? Can we be affected by digital stupidity?

Read More

Is creating users by copying wrong?

Posted by Klea Duro on May 12, 2023 12:00:00 AM

How many times have we heard in the company when creating a new user, "give me a colleague as a reference," that is, in the process of defining a new user, we reason more by copy than by corporate trade.

 

But is this approach correct? Or does it present some possible problems?

Read More

WHAT ARE SAP HANA ROLES?

Posted by Klea Duro on May 5, 2023 12:00:00 AM

Profiling also exists and can be implemented in the SAP HANA database.

 

 

But not all roads lead to the same result. Some choices may not be ideal in the long run and in the management of authorizations in SAP HANA. What is important to know when defining SAP HANA roles?

 

This is not always done as this database is mainly used when using SAP applications. Such as S/4HANA.

Read More

BioLock for SAP: what is it?

Posted by Andrea Mazzolani (translation) on Apr 28, 2023 12:00:00 AM

Topics like Least Privileged Access, True Compliance and Accountability are commonplace when it comes to SAP Security.

 

 

However, an additional layer of protection, that of biometrics, can be added to the existing set of standard security tools provided by SAP.

 

Read More

Topics: sap cyber security, governance, threat detection, biometric

SAP User Management: password, 5 points for reflection

Posted by Andrea Mazzolani (translation) on Apr 21, 2023 12:00:00 AM

Do you use a password to login to SAP systems?

Which are the most obvious cases which you should pay attention to?

Read More

Topics: sap password, sap logon

SOAR, what does it mean? Why is it important?

Posted by Andrea Mazzolani (translation) on Apr 14, 2023 12:00:00 AM

SOAR is the acronym for Security Orchestration, Automation, and Response.

 

Why is it important to know what it is and how is it used? The definition of a SOAR SAP Security system is strategic.

 

Read More

Topics: soar, sap etd, sap siem, sap splunk

Teal Organization and SAP Security, what does it mean?

Posted by Andrea Mazzolani (translation) on Apr 7, 2023 12:00:00 AM

Have you ever heard of this kind of organization?

 

What is it? How does it work? How is SAP Security managed in this kind of organizations?

Read More

Topics: sap security teal

Yes Subscribe!

Blog Aglea, what you could find out?

Every Friday a new post, interview or content related to SAP Security.

  • Tips on how to design SAP Security
  • How to
  • Checklist
  • Common error and pitfall on security SAP
  • Interview with experts
  • Who we are and Aglea vision on SAP Security

Recent Posts

Post By Topic

See all