Posts

Is SAP GRC about security and user provisioning

  GRC has its roots in the space of providing and managing user access within an SAP environment. This includes role provisioning and the whole processes of managing movers, joiners and leavers. know more sap grc online training But despite these origins, GRC has evolved to solve a broader business problem. Managing Risk (and Cyber Security) in SAP GRC tools also provide a critical insight into who’s doing what, when and where.  They highlight risks which could lead to financial fraud - Segregation of Duties breaches, access to sensitive transactions, ineffective controls and Cyber Security threats - given that the average organisation loses 5% of its revenues to financial fraud (estimated to be $4 trillion per annum globally and increasing) it’s a crucial process to be on-top of. The trouble is, SAP’s GRC tool is designed for very large organisations and it simply too complex and expensive for most SAP customers The alternative to SAP GRC ProfileTailor Dynamics provides a low-cost an

Sap Security

  CYBSEC  has been working and advising in SAP security issues since 2001, under UNIX, Windows and AS/400 platforms. As from 2005, they show an intense activity in the detection of vulnerabilities and have made significant contributions towards their solution.know more sap security online  training                                 In 2007,  CYSEC  began to work directly with SAP Ag Germany, establishing a fluent and highly constructive contact with security areas. Following is a description of SAP system security related services rendered by  CYBSEC : 1. Design of SAP architecture within a secure environment The object of this service is to design or re-design the architecture of SAP with the highest security level possible. This service is focused on defining security in the network topology of SAP components (SAP Applications Servers, Database Servers, Administrators and Final Users). It covers the development of a secure network scheme and the security measures to be adopted: Firewa

Top Most SCCM tools

  Kick start your configuration skill sets with SCCM tools. In this top most used SCCM tools blog, you will be learning the important SCCM tools and their features. We have already explained that SCCM is a Microsoft Corporation product that is developed to maintain the system updates and configuration. The SCCM tools are mainly used Windows operating system to manage the up-to-date applications. These SCCM configuration management tools can be differentiated as client-based and server-based tools. Make use of these tools to support and troubleshoot your infrastructure management. Are you excited to explore the important SCCM tools and their benefits? Then let’s begin A quick introduction to SCCM: Microsoft system center configuration manager (SCCM) is a Microsoft product developed to manage and update software products. SCCM configuration manager provides a highly flexible, automated solution to the full deployment and configuration of personal desktops, laptops from any initial state,

SAP Security Recommendations

  Maintain  the SAP secure gateway: There are various attacks to SAP gateway such as running operating system commands without authentication. Restrict access to SAP gateway by proper network controls both internally and externally. If business case exists for customer networks to use RFC communications because of applications such as BEx (Business Explorer), apply proper security configuration on the SAP gateway for restricting TYPE E and TYPE R connections. know more sap security training Please refer to secinfo, reginfo configuration for more information. Make-sure that SAP landscape is free of weak or default passwords: SAP systems contain hundreds or thousands of users. A single compromised account can cause issues for the rest of the landscape. After SAP systems are configured for proper password policy, we recommend running password audits on SAP systems periodically to prevent weak passwords such as " Summer-2012 " or " Welcome01 " to be present. Although su

SAP SECURITY INTERVIEW QUESTIONS & ANSWERS

  SAP SECURITY INTERVIEW QUESTIONS & ANSWERS   1.Please explain the personalization tab within a role.  Personalization is a way to save information that could be common to users, I meant to a user role...  E.g. you can create SAP queries and manage authorizations by user groups. Now this information can be stored in the personalization tab of the role.  (I supposed that it is a way for SAP to address his ambiguity of its concept of user group and roles: is "usergroup" a grouping of people sharing the same access or is it the role who is the grouping of people sharing the same access) know more sap security online training 2.Is there a table for authorizations where I can quickly see the values entered in a group of fields?   In particular I am looking to find the field values for P_ORGIN across a number of authorization profiles, without having to drill down on each profile and authorization. AGR_1251 will give you some reasonable info. 3.How can I do a mass delete of th