Security management in SAP Commerce Cloud covers several key areas:
- Web Access Management regulates user access to web applications based on varying roles and permissions. It can restrict access to specific IP ranges or geographic areas. It uses Spring Security for a robust, customizable framework aimed at securing web applications.
- Backend UI Access Rights includes access to all backend UIs like SAP Commerce Cloud administration console (HAC) or Backoffice by different users. Access and functionality for each user typically depend on their assigned user roles and permissions.
- Data Permission uses role-based data permission to regulate access to different data types and items. Administrators can assign user roles, determining who gets access to what data. Each role has specific permissions linked to various data types, for instance, customer data, product data, or order information.
- Database Security assists in protection of data integrity by employing multiple strategies,
- Mainly, it offers transparent symmetric encryption that auto-encodes data before storing it, thus reducing the risk of unauthorized access.
- Field encryption is another security measure that protects confidential, specific data fields from public view.
- Further, SAP curtails database user rights, ensuring each user has only suitable access levels to prevent both accidental modifications and deliberate breaches.
In this unit, we'll explore each area in more detail. But before we go further, it's vital that we understand the basics of security management, especially about user accounts.