Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and maintain user accounts. Then, dive into managing authentications, certificates, audits, and traces.
2424
GDPR and SAP - Data Privacy with SAP Business Suite and SAP S/4HANA
Can your data privacy protocols prevent data breaches? With this guide, you’ll develop and implement a privacy policy that protects your data and complies with GDPR. Learn to block and delete data, implement purpose-based processing, and determine who can access what information in your SAP system. Use the Information Retrieval Framework, SAP MDG, SAP Read Accessing Logging, and other tools to support your data privacy efforts. Get compliant before it’s too late!
2120
How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an in-depth look at authentication and certificate management before seeing how to enable auditing and security tracing. Protect your SAP HANA system!
130
If you're a Basis administrator looking to keep your SAP system under lock and key, this is the book for you! Discover information on security-relevant issues, from identity and access management to network and backend security. Get the technical know-how to identify vulnerabilities, defend your system from internal and external threats, and pass audits. Secure your SAP system from the ground up!
1955
SAP BusinessObjects BI Security
"Don't talk to strangers"—if only data security policies were this easy. Learn to keep your SAP BusinessObjects Business Intelligence data truly safe from unauthorized actions with this comprehensive guide. Begin with security basics and work your way to advanced concepts; along the way, you’ll explore functional and data security, define a rights model, and secure data sources and universes. Step-by-step instructions ensure that you can implement important security techniques in your administration and design work.
Теги
Ключевые слова:
SAP BusinessObjects; Безопасность / Security
Функциональная область:
Управление рисками / GRC; Бизнес аналитика / BI
Ролевое назначение:
SAP Консультант / Consultant; Руководитель / Manager; Ключевой пользователь / Expert
4595
Authorizations in SAP Software: Design and Configuration
Authorizations aren't easy, but this book is here to help. Learn how to develop a meaningful authorization concept that meets statutory requirements and is tailored to your business processes. Explore the SAP tools and functions that play a role in designing and implementing an authorizations concept. In addition to discussions of SAP IdM, CUA, SAP Access Control, and the UME, you’ll learn about authorizations across the entire SAP landscape (SAP ERP, HCM, CRM, SRM, and BW).
Теги
Ключевые слова:
Полномочия / Authorizations
Функциональная область:
Информационные технологии / IT, Basis, ABAP; Управление рисками / GRC
Ролевое назначение:
Ключевой пользователь / Expert
4664