Security Expectation Overview
Security Expectations |
---|
|
Security Expectations
Requirements for protecting sensitive data:
A company must meet certain legal requirements based on their country of operation. These include, for example, data protection laws (personal data, family status, illnesses, and so on), or employee protection.
A company must be able to adhere to agreements with and requirements of partners and vendors, and to ensure their implementation.
A company must publish and enforce security policies, so that a secure environment can be established and maintained. This applies both to data used externally and to data used internally.
Cost-Benefit Relation
There are a large number of different possible threats. Perfect security could only be achieved with cross-dimensional assignment of authorizations. However, the benefits achieved in this way are often not relative to the costs incurred.
With some values, it is cheaper to replace a loss than to protect the data at great expense. A company should therefore concentrate on areas in which a clear benefit can be realized through this expenditure. This saves unnecessary investments of time and money.
It is impossible to ensure complete security against all potential threats. Therefore, a company must be able to weigh up the extraordinary risks of a threat against the costs of a security system.
Obstruction of Business Processes
It is disadvantageous if business processes are controlled with authorizations to such an extent that almost every call leads to an error message. A situation of this type is not favorable for the processes in a company.
The assignment of authorizations should be structured in a way that is clear for the administrator, by using a smaller number of roles. If this is not done, it is often difficult to remove undesired obstructions to business processes in complex, nested authorizations. Only with a transparent structure can this be avoided. If problems occur nevertheless, it is only in this way that the places to be maintained can be found.

When developing a security concept, you must first determine what you want to make safe. Which assets must be protected? To which categories do these assets belong (for example: hardware, software, data, persons)? When assigning assets to categories, consider the consequences of losing these assets. When calculating the value of fixed assets, for example, you should take into account the loss of value due to depreciation, damage, or theft.
You must also determine against what you want to protect your assets. What are potential dangers? Sources of danger could be, for example, technology, the environment, or persons.
Persons: Important employees leaving the company, dissatisfied or inexperienced employees. Hackers with criminal intent.
Technology: Processing errors (caused by applications or operating systems), viruses, power supply interruption, hardware failure.
Environment: Fire, flood, dust, earthquakes.
Once you have identified your assets and the potential sources of danger, you can develop security mechanisms. You must determine an appropriate protective measure for each source of danger. These measures should also be assigned to different categories (for example: organizational, technical, environmental).
Organizational measures; Training, internal security policy, procedures, roles, responsibilities.
Technical measures: Inclusion of electronics for checks (routers). Access authorizations for systems and data.
Environmental measures protect physical system components against natural sources of danger.

SAP systems are made safe at a variety of levels. Each level has its own protection mechanisms.
To avoid unauthorized system access, for example, system and data access control mechanisms are provided at the application level.
When protecting an SAP system, you must consider the following:
Security must be implemented at all levels, since the overall security depends on the weakest part.
A complex authorization concept is therefore only one aspect of an overall security concept.
This course deals only with the security mechanisms at application level. The other levels are covered in the SAP courses ADM950 and ADM960.