SlideShare une entreprise Scribd logo
1  sur  24
SAP Security Assessment SAP R/3 Security Assessment The first step towards the secure management of your ERP                            
Why Openware - Insside ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Track record
Track record
Track record Assessment and Revision of SAP R/3 Platform Terra Networks Argentina T-Manages Argentina Telephonic Group (T-Gestiona Grupo  Telefónica Argentina) Assessment and Revision of SAP Profiles T-Manages Spain Telephonic Group (T-Gestiona Grupo  Telefónica España) AES Chile – Implementación Sarbanes Oxley Remote Access and SAP Security Monsanto Famiq Penetration Test DELSUR – El Salvador Liberty Argentina Insurance Company (Liberty Compañía  de Seguros Argentina) Rosario’s City Council (Municipalidad de Rosario) Argentina Movile Telephonic (Telefónica Moviles Argentina) Audit and Information Security Implementation  Emergia (Telephonic Group) Sesa Select (Vedior Group) Telefónica Empresa (Telephonic Group) Revisión de Seguridad Portal Terra Networks (Telephonic Group) Adquira Spain Security Audit (Auditoría de Seguridad Adquira España) Telefónica Comunicaciones Personales (Telephonic Group) Argentina Municipal Bank of Rosario (Banco Municipal de Rosario) CEICOM Spain (CEICOM España) DPS Best Select Chile Terminal 6 Minera Lumbrera Meridiam Bank (Banco Meridiam) Argentina Federal Police (Policia Federal Argentina) Vulnerability Assessments New Bisel Bank (Nuevo Banco Bisel) Toyota Globant Microglobal NCA Globalstar – TESACOM Globant Neuralsoft
Why to secure SAP? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is the importance of security in  the ERP world ?
Risk areas: Causes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk areas: Consequences ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do we propose? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSA- Security Model ,[object Object],[object Object],[object Object],[object Object]
SSA Process Vulnerability & Risk Analysis 1 ,[object Object],[object Object],[object Object],Analysis of  the Actual  Context 0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SSA: Stage 1 Security Deployment: Stage 2 Awareness 3 4 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],Security Hardening & Mgmt Monitoring for compliance ,[object Object],[object Object],Development of the  normative  frame ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SOX  ISO17799/270001  COBIT  Organizational Capacity Technical Complexity Business Benefits (Critical Success Factors)
SSA: Regular   participants Client ,[object Object],[object Object],[object Object],[object Object],Openware  ,[object Object],[object Object],[object Object]
SSA- In depth Analysis of actual context ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Methodology and tools ,[object Object],[object Object],Vulnerability  and  risk analysis 0 1
SSA- Submissions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSA- Submissions  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSA- How does it develop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSA- Own tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],(*) It is the only security tool in Spanish America under authorization process by cve.mitre.org Vulnerability assessment & management platform
SSA- Own tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],S I A (Sap Insside Audit)
SSA Process Vulnerability & Risk Analysis 1 ,[object Object],[object Object],[object Object],Analysis of  the Actual  Context 0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SSA: Stage 1 Security Deployment: Stage 2 Awareness 3 4 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],Security Hardening & Mgmt Monitoring for compliance ,[object Object],[object Object],Development of the  normative  frame ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SOX  ISO17799/270001  COBIT  Organizational Capacity Technical Complexity Business Benefits (Critical Success Factors)
SSA makes it viable..   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stage 2  (potential) ,[object Object],Products, tools and automation Profiles and roles properly assigned  Knowledge, functions and responsibilities  Modules People Technology
Stage 2  (potential) Development  of the normative frame ,[object Object],[object Object],[object Object],Monitoring  for compliance ,[object Object],Security Hardening & Management ,[object Object],[object Object],[object Object],[object Object],[object Object],2 3 4
Thank you! SSA SAP Security Assessment http://www.openware.biz/index_en.shtml

Contenu connexe

Tendances

Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP SecurityNasir Gondal
 
Sap S/4 HANA New Implementation
Sap S/4 HANA New ImplementationSap S/4 HANA New Implementation
Sap S/4 HANA New ImplementationSoumya De
 
Activate Methodology
Activate MethodologyActivate Methodology
Activate MethodologySoumya De
 
“Migration to Suite of HANA”
“Migration to Suite of HANA”“Migration to Suite of HANA”
“Migration to Suite of HANA”Wise Men
 
Sap basics (SAP Modules)
Sap basics (SAP Modules)Sap basics (SAP Modules)
Sap basics (SAP Modules)Kamal Joshi
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online traininggrconlinetraining
 
An Overview of SAP S4/HANA
An Overview of SAP S4/HANAAn Overview of SAP S4/HANA
An Overview of SAP S4/HANADebajit Banerjee
 
Sap Upgrade Project Brief
Sap Upgrade Project BriefSap Upgrade Project Brief
Sap Upgrade Project Briefvpallapothu
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access ControlNasir Gondal
 
What is SAP| SAP Introduction | Overview of SAP
What is SAP| SAP Introduction | Overview of SAPWhat is SAP| SAP Introduction | Overview of SAP
What is SAP| SAP Introduction | Overview of SAPGlobustrainings
 
SAP GUI and Navigation - Quick Guide
SAP GUI and Navigation - Quick Guide SAP GUI and Navigation - Quick Guide
SAP GUI and Navigation - Quick Guide Ankit Sharma
 
Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"panayaofficial
 

Tendances (20)

SAP Landscape
SAP Landscape SAP Landscape
SAP Landscape
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
Sap S/4 HANA New Implementation
Sap S/4 HANA New ImplementationSap S/4 HANA New Implementation
Sap S/4 HANA New Implementation
 
Activate Methodology
Activate MethodologyActivate Methodology
Activate Methodology
 
SAP Basics
SAP BasicsSAP Basics
SAP Basics
 
“Migration to Suite of HANA”
“Migration to Suite of HANA”“Migration to Suite of HANA”
“Migration to Suite of HANA”
 
Sap basics (SAP Modules)
Sap basics (SAP Modules)Sap basics (SAP Modules)
Sap basics (SAP Modules)
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
165373293 sap-security-q
165373293 sap-security-q165373293 sap-security-q
165373293 sap-security-q
 
SAP Fiori ppt
SAP Fiori pptSAP Fiori ppt
SAP Fiori ppt
 
An Overview of SAP S4/HANA
An Overview of SAP S4/HANAAn Overview of SAP S4/HANA
An Overview of SAP S4/HANA
 
SAP Basis Overview
SAP Basis OverviewSAP Basis Overview
SAP Basis Overview
 
Sap basis made easy
Sap basis made easySap basis made easy
Sap basis made easy
 
SAP HANA - Understanding the Basics
SAP HANA - Understanding the Basics SAP HANA - Understanding the Basics
SAP HANA - Understanding the Basics
 
Sap Upgrade Project Brief
Sap Upgrade Project BriefSap Upgrade Project Brief
Sap Upgrade Project Brief
 
SAP data archiving
SAP data archivingSAP data archiving
SAP data archiving
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
 
What is SAP| SAP Introduction | Overview of SAP
What is SAP| SAP Introduction | Overview of SAPWhat is SAP| SAP Introduction | Overview of SAP
What is SAP| SAP Introduction | Overview of SAP
 
SAP GUI and Navigation - Quick Guide
SAP GUI and Navigation - Quick Guide SAP GUI and Navigation - Quick Guide
SAP GUI and Navigation - Quick Guide
 
Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"
 

En vedette

Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks ProceduresInprise Group
 
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015Mark Raduenzel
 
Sira insights from cloud vendor risk assessments
Sira   insights from cloud vendor risk assessmentsSira   insights from cloud vendor risk assessments
Sira insights from cloud vendor risk assessmentsCary Sholer
 
SAP HANA SPS08 Security
SAP HANA SPS08 SecuritySAP HANA SPS08 Security
SAP HANA SPS08 Security SAP Technology
 
SAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP SecuritySAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP SecurityPanaya
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 stepsERPScan
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important QuestionsRagu M
 
Database Security
Database SecurityDatabase Security
Database Securityalraee
 

En vedette (16)

Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks Procedures
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
 
Sira insights from cloud vendor risk assessments
Sira   insights from cloud vendor risk assessmentsSira   insights from cloud vendor risk assessments
Sira insights from cloud vendor risk assessments
 
SAP HANA SPS08 Security
SAP HANA SPS08 SecuritySAP HANA SPS08 Security
SAP HANA SPS08 Security
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
SAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP SecuritySAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP Security
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Database security
Database securityDatabase security
Database security
 
SAP License Audit Report
SAP License Audit ReportSAP License Audit Report
SAP License Audit Report
 
DB security
 DB security DB security
DB security
 
SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important Questions
 
Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security
 
Sap audit _ Basic
Sap audit _ BasicSap audit _ Basic
Sap audit _ Basic
 
Database Security
Database SecurityDatabase Security
Database Security
 

Similaire à Sap Security Assessment V3 English

SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...akquinet enterprise solutions GmbH
 
Incident_Management_with_SAPEHSM
Incident_Management_with_SAPEHSMIncident_Management_with_SAPEHSM
Incident_Management_with_SAPEHSMChristian Polivka
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qsPhong Ho
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil Kumar
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]akquinet enterprise solutions GmbH
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Bossrbrockway
 
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docx
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docxNGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docx
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docxtaitcandie
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Gourav ladha - Profile
Gourav ladha - ProfileGourav ladha - Profile
Gourav ladha - ProfileGourav Ladha
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxtienboileau
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 

Similaire à Sap Security Assessment V3 English (20)

SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
Incident_Management_with_SAPEHSM
Incident_Management_with_SAPEHSMIncident_Management_with_SAPEHSM
Incident_Management_with_SAPEHSM
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qs
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultant
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docx
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docxNGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docx
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docx
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
 
Gourav ladha - Profile
Gourav ladha - ProfileGourav ladha - Profile
Gourav ladha - Profile
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
Security audit
Security auditSecurity audit
Security audit
 

Dernier

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 

Dernier (20)

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 

Sap Security Assessment V3 English

  • 1. SAP Security Assessment SAP R/3 Security Assessment The first step towards the secure management of your ERP                          
  • 2.
  • 3.
  • 5. Track record Assessment and Revision of SAP R/3 Platform Terra Networks Argentina T-Manages Argentina Telephonic Group (T-Gestiona Grupo Telefónica Argentina) Assessment and Revision of SAP Profiles T-Manages Spain Telephonic Group (T-Gestiona Grupo Telefónica España) AES Chile – Implementación Sarbanes Oxley Remote Access and SAP Security Monsanto Famiq Penetration Test DELSUR – El Salvador Liberty Argentina Insurance Company (Liberty Compañía de Seguros Argentina) Rosario’s City Council (Municipalidad de Rosario) Argentina Movile Telephonic (Telefónica Moviles Argentina) Audit and Information Security Implementation Emergia (Telephonic Group) Sesa Select (Vedior Group) Telefónica Empresa (Telephonic Group) Revisión de Seguridad Portal Terra Networks (Telephonic Group) Adquira Spain Security Audit (Auditoría de Seguridad Adquira España) Telefónica Comunicaciones Personales (Telephonic Group) Argentina Municipal Bank of Rosario (Banco Municipal de Rosario) CEICOM Spain (CEICOM España) DPS Best Select Chile Terminal 6 Minera Lumbrera Meridiam Bank (Banco Meridiam) Argentina Federal Police (Policia Federal Argentina) Vulnerability Assessments New Bisel Bank (Nuevo Banco Bisel) Toyota Globant Microglobal NCA Globalstar – TESACOM Globant Neuralsoft
  • 6.
  • 7. What is the importance of security in the ERP world ?
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Thank you! SSA SAP Security Assessment http://www.openware.biz/index_en.shtml

Notes de l'éditeur

  1. Introduction and welcome.