SAP Basis OUTTASKING COMPLEX AND RATHER RARE TASKS - SAP Basis

Direkt zum Seiteninhalt
OUTTASKING COMPLEX AND RATHER RARE TASKS
PROFESSIONALISE SAP OPERATION AND THE SAP WORLD
We actively support you in the migration of operating systems and databases. The optimization of time-critical processes guarantees a smooth process.

The Expert Team Lead leads a group of specialists, e.g. a group of SMEs or a specific technical area such as a group of operators. For example, this role can lead and steer a virtual group of experts with the participation of other IT departments on the topic of print management. The role serves as the interface and contact of the SAP basis to other specialist areas such as memory management or operating systems. In cooperation with other IT departments, the Technical Team Lead leads expert groups. These expert groups are usually virtually organised and their existence limited in time. The role of the Technical Lead functions as (partial) project leader for topics and projects of particular importance to the SAP basis. He takes care of all the activities involved in project management and control.
Change and Release Management
A role concept according to best practice protects you from potential attacks within your SAP landscape. However, to protect your system from unauthorized access via the network, a correct configuration of the SAP gateway is required. It enables the use of external programs via interfaces or the call of ABAP programs and serves as a technical component of the application server, which manages the communication of all RFC-based functions.

In this article on SAP Security Automation I would like to take a look at the future of automated processes in the SAP Security area. For many companies, the topic of security automation still offers a lot of potential in terms of time savings and process optimisation. Our daily work environment offers numerous tasks that could be handled excellently automatically. For this reason, in this article I present two of the possibilities that already exist in the broad area of security automation. Security Automation via SAP Security Check The first option of Security Automation, which I want to introduce here, is the automatic verification of the existing permissions. Have you ever wondered who has critical permissions in your SAP system? And have you ever tried to do this by hand? Depending on the level of expertise and experience of the privilege administrator, this is a time-consuming work. If an audit is also announced and the SAP system is to be checked for critical permissions and segregation of duties, then it is very difficult to meet all requirements and secure the eligibility landscape in this respect. For this reason, various vendors provide solutions to automate the verification of the permission system with regard to critical permissions and segregation of duties using tool support. This allows permission administrators to use their valuable time to correct the errors rather than just looking for them. For example, we use a tool that runs through the verification of over 250 rules. We then get an evaluation of which rules are violated and which points are correct. A simple example of such rules is the use of the SAP_ALL profile. Another would be to grant the jump permission in debugging (S_DEVELOP permission object with the ACTVT = 02 field). These are two relatively simple examples of Security Check tools' rulebook. In addition, queries are also made, which are located in the field of Segregation of Duties. Using this tool allowed us to move from manual validation of critical permissions to an automatic process.

Some missing SAP basic functions in the standard are supplied by the PC application "Shortcut for SAP Systems".

What information does the UPL provide? Usage Procedure Logging is used to log and record user behaviour data roughly comparable to the ST03N workload statistics.

Examples include the use of cloud services or applications in the IoT and big data environment.
SAP BASIS
Zurück zum Seiteninhalt