SlideShare a Scribd company logo
1 of 37
Download to read offline
Security in SAP Systems




                                             FIST Conference
                                           26th of November 2004
                                                  Barcelona
                                             Dr. Michael Woitass




©Dr. Michael Woitass   Version 02/04
Agenda


                         Security risks



                         High-level security in SAP systems



                         Single Sign-On to SAP



                         Secure Network Communication (SNC) in SAP



                         Digital signature of documents (SSF) in SAP


                                                                       2
©Dr. Michael Woitass   Version 02/04
Information security

          ¿Do organisations need cryptographic solutions?

           The competitive advantage of many companies and institutions results from
           obtaining ad managing information.
           The loss of information can generate a serious risk for these organisations.

           Without protection internal data may be accessible via the network:

                                 Personal data

                                 Financial data

                                 Customers and providers

                                 Product and service prices

                                 Intellectual proprietary

                                 Confidential corporate information.
                                                                                          3
©Dr. Michael Woitass   Version 02/04
SAP systems environment


          SAP data are transmitted by an insecure network.

       WEB Browser                       WEB Server        ITS                  SAPgui / SAPlogon


                                                                                           R/3
                                  Internet




                          WEB                      SAP WEB
                        Browser                Application Server                        SAPlpd



                                             Internet


                                                                     Insecure
                                SAP Router              SAP Router   network
                                                                                       rfc access




                                                                                                    4
©Dr. Michael Woitass   Version 02/04
Security of SAP systems


              Standard SAP:

                The security of SAP systems depends on the security of
                the network.

                         The login information (userid and password) can be captured
                         during transmission.

                         SAP data are transmitted as legible text.



                          SAPgui / SAPlogon                          R/3




                                                                                       5
©Dr. Michael Woitass   Version 02/04
Security risks



              Appropriate security purposes eliminate the risks.


                       Attack                            Security purpose
                       •     Man-in-the-middle             Authentication
                       •     Unauthorised modification     Data integrity
                       •     Unauthenticated sender        Proof of origin
                       •     Wiretapping                   Confidentiality




                                                                             6
©Dr. Michael Woitass   Version 02/04
Security technology


            Asymmetric cryptography provides the technology
            to guarantee high-level security.


                       Security purpose        Technology

                       •     Autentication       Strong authentication
                       •     Data integrity      Digital signature
                       •     Proof of origin     Digital signature
                       •     Confidentiality     Encryption




                                                                         7
©Dr. Michael Woitass   Version 02/04
Basics: asymmetric encryption


            Encryption and decryption
            with public-key-cryptography




                                           8
©Dr. Michael Woitass   Version 02/04
Basics: hybrid encryption


            Encryption and decryption
            with hybrid cryptography




                                        9
©Dr. Michael Woitass   Version 02/04
Basics: digital signature


            Digital signature and
            its verification




                                       10
©Dr. Michael Woitass   Version 02/04
SAP Security




                        Cryptographic solutions facilitate



                               Secure Single Sign-On to SAP (SSO)

                               Encryption of data communications in SAP (SNC)

                               Digital signature of SAP documents (SSF)




                                                                                11
©Dr. Michael Woitass   Version 02/04
SAP Security




                        Cryptographic solutions facilitate



                               Secure Single Sign-On to SAP (SSO)

                               Encryption of data communications in SAP (SNC)

                               Digital signature of SAP documents (SSF)




                                                                                12
©Dr. Michael Woitass   Version 02/04
Secure access to SAP


          Single Sign-On by means of:
                   Crypto libraries at client and server side
                   Strong authentication using digital certificates



                               SAPgui                           SAP R/3
                                Client                           Server
                                         Authentication
                                         with certificate
                            Network      Secure Sign-On        Network
                            Interface                          Interface


                             Security                           Security
                             Library                            Library



                                                                           13
©Dr. Michael Woitass   Version 02/04
Secure Login with certificates


        Strong authentication between SAP clients and servers


                                       User       Server


        Generates an                                       Signs the message
      arbitrary message                                       from the user
                                                       B



                                                           Generates another
                                                           arbitrary message

   Verifies the signature
       of the server                          B



                                                           Verifies the signature
      Signs the message                                          of the user
         of the server                        A
                                                       A

                                                                                    14
©Dr. Michael Woitass   Version 02/04
Secure Single Sign-On




      Secure
      Single Sign-On
      to all
      SAP servers




                                       15
©Dr. Michael Woitass   Version 02/04
Single Sign-On with smartcards




         Identification
             with
             PIN




                                                                     Access
                                       Certificate and private key
                                                                              16
©Dr. Michael Woitass   Version 02/04
SSO Integration



           Motivation:

           •     The company wants to establish a Single Sign-On via the
                 logon to the network (e.g. Windows Active Directory
                 authentication, one-time tokens).

           •     The company uses SAP systems.

           •     The objective is to implement a certificate-based Single
                 Sign-On to SAP without the need to have a PKI installed.




                                                                            17
©Dr. Michael Woitass   Version 02/04
Architecture


                                                     scalable              scalable


                                                Secure Login            Active
                                                   Server              Directory
                                                                   3

       2                               5                  4




                                                  Generate
      Secure Login                                Certificate
         Client                             6

                          UserID, Domain,
              1
                          Password

           Windows                                    Soft Token
            Logon

                                                                                      18
©Dr. Michael Woitass   Version 02/04
Architecture


         SAP GUI – SAP Server

                 Single Sign-On
                 Secure Communication



                                       SAP GUI                SAP R/3
                                        Client                 Server

   GSS-API                                              SNC              GSS-API

                                       Security               Security
                                       Library                Library


                                           Soft Token




                                                                                   19
©Dr. Michael Woitass   Version 02/04
Architecture


         Web Browser – Web Server

                 Single Sign-On
                 Secure Communication


                                       Internet
                                       Explorer                WEB
          Microsoft                                           Server
                                                        SSL
            Crypto
               API
                                         CSP


                                           Soft Token




                                                                       20
©Dr. Michael Woitass   Version 02/04
Advantages


                 High User Acceptance
                          The user doesn’t need to learn a new software.
                          The user will not be afflicted to enter his login data again and again.


                 High Security
                          Secure authentication and communication in SAP applications via SNC.
                          Secure authentication and communication in Web applications via SSL.


                 Reduced Administration
                          No overhead of a Public Key Infrastructure, nevertheless certificate-
                          based login to SAP applications and Web applications.


                 Reduced Costs
                          Reuse of established authentication method.
                          Single Sign-On assures an optimized workflow.

                                                                                                    21
©Dr. Michael Woitass   Version 02/04
SAP Security




                        Cryptographic solutions facilitate



                               Secure Single Sign-On to SAP (SSO)

                               Encryption of data communications in SAP (SNC)

                               Digital signature of SAP documents (SSF)




                                                                                22
©Dr. Michael Woitass   Version 02/04
Architecture


    Integration in SAP with
    Secure Network Communication (SNC)


                                                               Workprocess



                                                                    Compression
                                                         Protocol

                                                                       SNC


                                                        GSS API
                                       Generic Security Services
                                                                     Security
                                                                     Library
                                                                                  23
©Dr. Michael Woitass   Version 02/04
Secure network


          End-to-End security by means of:
                       Crypto libraries at client and server side
                       SAP standard interface SNC



                               SAPgui                               SAP R/3
                                Client                               Server
                                             Authentication
                                             with certificate
                            Network                                 Network
                                                 SNC
                            Interface                               Interface
      GSS                                                                       GSS
      API                                                                       API
                             Security                               Security
                             Library                                Library



                                                                                      24
©Dr. Michael Woitass   Version 02/04
Architecture


    Secure Network Communications (SNC) in SAP

            Application Programming Interface
            standardised by the IETF
            Abstraction from mechanisms used
            behind the API
                                                               Workprocess
            Certification within SAP‘s CSP
            Program (BC-SNC Interface)


                                                                    Compression
                                                         Protocol

                                                                       SNC


                                                        GSS API
                                       Generic Security Services
                                                                     Security
                                                                     Library
                                                                                  25
©Dr. Michael Woitass   Version 02/04
Integration on the R/3 server side



            SNC configuration: central user administration




                                                             26
©Dr. Michael Woitass   Version 02/04
Integration in SAPlogon




    SNC configuration:
    selection of the security level



                                       27
©Dr. Michael Woitass   Version 02/04
Example: Spanish Data Protection Law



                            Requerimientos:


                La LOPD (Ley Orgánica de Protección de Datos) entró en
                vigor el 1 de julio de 2002.


                La ley exige medidas de seguridad de nivel alto,
                entre ellos el cifrado de los datos.



               Las empresas y administraciones públicas españoles que
              tienen SAP R/3 y tratan datos de nivel alto de seguridad
              deberán cumplir con la ley.




                                                                         28
©Dr. Michael Woitass   Version 02/04
Example: Spanish Data Protection Law


       Medidas de seguridad de nivel alto:

              Los ficheros que contengan determinados datos personales
              requerirán la implantación de medidas de nivel alto:
               –       ideología, religion, creencias
               –       origen racial, salud o vida sexual de las personas físicas
               –       datos recabados para fines policiales.


              Principalmente, estas medidas consisten en:
               –       el cifrado previo de los datos
               –       el almacenamiento de la información relativa al acceso a
                       los ficheros durante al menos dos años
               –       el almacenamiento de las copias de seguridad en un lugar
                       distinto a donde se encuentren los equipos informáticos.




                                                                                    29
©Dr. Michael Woitass   Version 02/04
SAP Security




                        Cryptographic solutions facilitate



                               Secure Single Sign-On to SAP (SSO)

                               Encryption of data communications in SAP (SNC)

                               Digital signature of SAP documents (SSF)




                                                                                30
©Dr. Michael Woitass   Version 02/04
Digital signature of SAP documents



                 Digital signature in SAP
                                                                              The digital signature
                                                                                guarantees



                                                                              the identity
                                               Data
                                             extraction                       of the user

                                                            Private key
                                                                                              and
                                                              Encryption
                                                            RSA Algorithm
                                                            with asymmetric
                               Digital
                                                               1.024 Bits
                              signature
                                                               encryption     the integrity
                                                                              of the data.


                                            Extraction of
                                            signed data


                                                                                                      31
©Dr. Michael Woitass   Version 02/04
Example: Project ArchiSig




                              Electronic Signature of Medical Documents –
                              Integration and Evaluation of a Public Key
                              Infrastructure (PKI) in Hospitals




                                                                            32
©Dr. Michael Woitass   Version 02/04
Workflow in SAP IS-H*MED

  The secretary writes                     The doctor signs the                                The department head
  A medical document.                      document.                                           countersigns.



                                                                  The Workflow passes the
                                                                  document to the daprtment
                                                                  head.




                        SAP IS-H Med                                       SECUDE
                                                                           Security       Time stamp
                                                                           Library


          The medical document and the signatures are transferred to the archiving system.


                         IXOS-eCONserver




                                                                                                                     33
©Dr. Michael Woitass   Version 02/04
Document workflow: create, modify, sign, verify


                                                                                        Determinar el
                                                                                        siguiente paso




                                                       Crear un
                                                       expediente
                                                                                             Mostrar pdf
                        „My letters“
                        - Tareas
                                                                                  Función de firma
                                 Historial de firmas
                        - Lista de documentos
                                       Verificación
                                                                      Firmar el
                                                                      documento

                                  Archivo del
                                  documento
                                                            Enviar a la
                                                            secretaria
                                                                                                           34
©Dr. Michael Woitass   Version 02/04
Integration of the signature in SAP IS-H*MED




                                                 35
©Dr. Michael Woitass   Version 02/04
Resume




                 Certificate-based security technology facilitates:



                         Secure Single Sign-On to SAP



                         Encryption of SAP data



                         Digital signature of SAP documents.




                                                                      36
©Dr. Michael Woitass   Version 02/04
Security in SAP Systems




                             ¡Muchas gracias por su atención!

                             Michael Woitass        mwoitass@telefonica.net




©Dr. Michael Woitass   Version 02/04

More Related Content

What's hot

SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Securitytrickey270
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Intel IT Center
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your CloudthinkASG
 
Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Michael Bunn
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to CloudCisco Security
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Sean Xie
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance EvolvedSafeNet
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Canada
 

What's hot (20)

SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Unc charlotte prezo2016
Unc charlotte prezo2016Unc charlotte prezo2016
Unc charlotte prezo2016
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 

Viewers also liked

Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009Soarian Health Archive User Group
 
Weightless Digital Experience - Delivering IBM Digital Experience in the cloud
Weightless Digital Experience - Delivering IBM Digital Experience in the cloudWeightless Digital Experience - Delivering IBM Digital Experience in the cloud
Weightless Digital Experience - Delivering IBM Digital Experience in the cloudDavid Strachan
 
Best Practices for Running SAP HANA Workloads with EC2 - August 2016 Monthly ...
Best Practices for Running SAP HANA Workloads with EC2 - August 2016 Monthly ...Best Practices for Running SAP HANA Workloads with EC2 - August 2016 Monthly ...
Best Practices for Running SAP HANA Workloads with EC2 - August 2016 Monthly ...Amazon Web Services
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administrationnanda nanda
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap securityyektek
 
How to Archive and Read FI_ACCOUNT in SAP R/3
How to Archive and Read FI_ACCOUNT in SAP R/3How to Archive and Read FI_ACCOUNT in SAP R/3
How to Archive and Read FI_ACCOUNT in SAP R/3Mohammad Ali Rajabi
 
Benefits of Data Archiving in Data Warehouses
Benefits of Data Archiving in Data WarehousesBenefits of Data Archiving in Data Warehouses
Benefits of Data Archiving in Data WarehousesVineet
 
SAP security in figures
SAP security in figuresSAP security in figures
SAP security in figuresERPScan
 
Анализ безопасности и много другое
Анализ безопасности и много другоеАнализ безопасности и много другое
Анализ безопасности и много другоеCisco Russia
 
Data Archiving -Ramesh sap bw
Data Archiving -Ramesh sap bwData Archiving -Ramesh sap bw
Data Archiving -Ramesh sap bwramesh rao
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsUL Transaction Security
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 stepsERPScan
 
SAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data securitySAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data securitySven Ringling
 
sap security interview_questions
sap security interview_questionssap security interview_questions
sap security interview_questionssumitmsn2
 

Viewers also liked (19)

Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
 
Weightless Digital Experience - Delivering IBM Digital Experience in the cloud
Weightless Digital Experience - Delivering IBM Digital Experience in the cloudWeightless Digital Experience - Delivering IBM Digital Experience in the cloud
Weightless Digital Experience - Delivering IBM Digital Experience in the cloud
 
Best Practices for Running SAP HANA Workloads with EC2 - August 2016 Monthly ...
Best Practices for Running SAP HANA Workloads with EC2 - August 2016 Monthly ...Best Practices for Running SAP HANA Workloads with EC2 - August 2016 Monthly ...
Best Practices for Running SAP HANA Workloads with EC2 - August 2016 Monthly ...
 
Huawei Solutions for SAP HANA Overview
Huawei Solutions for SAP HANA OverviewHuawei Solutions for SAP HANA Overview
Huawei Solutions for SAP HANA Overview
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
 
How to Archive and Read FI_ACCOUNT in SAP R/3
How to Archive and Read FI_ACCOUNT in SAP R/3How to Archive and Read FI_ACCOUNT in SAP R/3
How to Archive and Read FI_ACCOUNT in SAP R/3
 
Benefits of Data Archiving in Data Warehouses
Benefits of Data Archiving in Data WarehousesBenefits of Data Archiving in Data Warehouses
Benefits of Data Archiving in Data Warehouses
 
SAP security in figures
SAP security in figuresSAP security in figures
SAP security in figures
 
Sap archiving process
Sap archiving processSap archiving process
Sap archiving process
 
Анализ безопасности и много другое
Анализ безопасности и много другоеАнализ безопасности и много другое
Анализ безопасности и много другое
 
Data Archiving -Ramesh sap bw
Data Archiving -Ramesh sap bwData Archiving -Ramesh sap bw
Data Archiving -Ramesh sap bw
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
SAP HANA
SAP HANASAP HANA
SAP HANA
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM Authorizations
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
SAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data securitySAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data security
 
sap security interview_questions
sap security interview_questionssap security interview_questions
sap security interview_questions
 
SAP Archiving
SAP ArchivingSAP Archiving
SAP Archiving
 

Similar to SAP Security

Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012Валерий Коржов
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-upEnterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-upDileep Kalidindi
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection CompanyASBIS SK
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3Eoin Keary
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACARamsés Gallego
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAmazon Web Services
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 

Similar to SAP Security (20)

Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-upEnterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACA
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
Unit 08: Security for Web Applications
Unit 08: Security for Web ApplicationsUnit 08: Security for Web Applications
Unit 08: Security for Web Applications
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 

More from Conferencias FIST

Seguridad en Entornos Web Open Source
Seguridad en Entornos Web Open SourceSeguridad en Entornos Web Open Source
Seguridad en Entornos Web Open SourceConferencias FIST
 
Las Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática ForenseLas Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática ForenseConferencias FIST
 
Evolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFiEvolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFiConferencias FIST
 
El Information Security Forum
El Information Security ForumEl Information Security Forum
El Information Security ForumConferencias FIST
 
Inseguridad en Redes Wireless
Inseguridad en Redes WirelessInseguridad en Redes Wireless
Inseguridad en Redes WirelessConferencias FIST
 
Mas allá de la Concienciación
Mas allá de la ConcienciaciónMas allá de la Concienciación
Mas allá de la ConcienciaciónConferencias FIST
 
Riesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el DesarrolloRiesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el DesarrolloConferencias FIST
 
Demostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis ForenseDemostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis ForenseConferencias FIST
 

More from Conferencias FIST (20)

Seguridad en Open Solaris
Seguridad en Open SolarisSeguridad en Open Solaris
Seguridad en Open Solaris
 
Seguridad en Entornos Web Open Source
Seguridad en Entornos Web Open SourceSeguridad en Entornos Web Open Source
Seguridad en Entornos Web Open Source
 
Spanish Honeynet Project
Spanish Honeynet ProjectSpanish Honeynet Project
Spanish Honeynet Project
 
Seguridad en Windows Mobile
Seguridad en Windows MobileSeguridad en Windows Mobile
Seguridad en Windows Mobile
 
Que es Seguridad
Que es SeguridadQue es Seguridad
Que es Seguridad
 
Network Access Protection
Network Access ProtectionNetwork Access Protection
Network Access Protection
 
Las Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática ForenseLas Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática Forense
 
Evolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFiEvolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFi
 
El Information Security Forum
El Information Security ForumEl Information Security Forum
El Information Security Forum
 
Criptografia Cuántica
Criptografia CuánticaCriptografia Cuántica
Criptografia Cuántica
 
Inseguridad en Redes Wireless
Inseguridad en Redes WirelessInseguridad en Redes Wireless
Inseguridad en Redes Wireless
 
Mas allá de la Concienciación
Mas allá de la ConcienciaciónMas allá de la Concienciación
Mas allá de la Concienciación
 
Security Metrics
Security MetricsSecurity Metrics
Security Metrics
 
PKI Interoperability
PKI InteroperabilityPKI Interoperability
PKI Interoperability
 
Wifislax 3.1
Wifislax 3.1Wifislax 3.1
Wifislax 3.1
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Riesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el DesarrolloRiesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el Desarrollo
 
Demostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis ForenseDemostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis Forense
 
Security Maturity Model
Security Maturity ModelSecurity Maturity Model
Security Maturity Model
 
Cisco Equipment Security
Cisco Equipment SecurityCisco Equipment Security
Cisco Equipment Security
 

Recently uploaded

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

SAP Security

  • 1. Security in SAP Systems FIST Conference 26th of November 2004 Barcelona Dr. Michael Woitass ©Dr. Michael Woitass Version 02/04
  • 2. Agenda Security risks High-level security in SAP systems Single Sign-On to SAP Secure Network Communication (SNC) in SAP Digital signature of documents (SSF) in SAP 2 ©Dr. Michael Woitass Version 02/04
  • 3. Information security ¿Do organisations need cryptographic solutions? The competitive advantage of many companies and institutions results from obtaining ad managing information. The loss of information can generate a serious risk for these organisations. Without protection internal data may be accessible via the network: Personal data Financial data Customers and providers Product and service prices Intellectual proprietary Confidential corporate information. 3 ©Dr. Michael Woitass Version 02/04
  • 4. SAP systems environment SAP data are transmitted by an insecure network. WEB Browser WEB Server ITS SAPgui / SAPlogon R/3 Internet WEB SAP WEB Browser Application Server SAPlpd Internet Insecure SAP Router SAP Router network rfc access 4 ©Dr. Michael Woitass Version 02/04
  • 5. Security of SAP systems Standard SAP: The security of SAP systems depends on the security of the network. The login information (userid and password) can be captured during transmission. SAP data are transmitted as legible text. SAPgui / SAPlogon R/3 5 ©Dr. Michael Woitass Version 02/04
  • 6. Security risks Appropriate security purposes eliminate the risks. Attack Security purpose • Man-in-the-middle Authentication • Unauthorised modification Data integrity • Unauthenticated sender Proof of origin • Wiretapping Confidentiality 6 ©Dr. Michael Woitass Version 02/04
  • 7. Security technology Asymmetric cryptography provides the technology to guarantee high-level security. Security purpose Technology • Autentication Strong authentication • Data integrity Digital signature • Proof of origin Digital signature • Confidentiality Encryption 7 ©Dr. Michael Woitass Version 02/04
  • 8. Basics: asymmetric encryption Encryption and decryption with public-key-cryptography 8 ©Dr. Michael Woitass Version 02/04
  • 9. Basics: hybrid encryption Encryption and decryption with hybrid cryptography 9 ©Dr. Michael Woitass Version 02/04
  • 10. Basics: digital signature Digital signature and its verification 10 ©Dr. Michael Woitass Version 02/04
  • 11. SAP Security Cryptographic solutions facilitate Secure Single Sign-On to SAP (SSO) Encryption of data communications in SAP (SNC) Digital signature of SAP documents (SSF) 11 ©Dr. Michael Woitass Version 02/04
  • 12. SAP Security Cryptographic solutions facilitate Secure Single Sign-On to SAP (SSO) Encryption of data communications in SAP (SNC) Digital signature of SAP documents (SSF) 12 ©Dr. Michael Woitass Version 02/04
  • 13. Secure access to SAP Single Sign-On by means of: Crypto libraries at client and server side Strong authentication using digital certificates SAPgui SAP R/3 Client Server Authentication with certificate Network Secure Sign-On Network Interface Interface Security Security Library Library 13 ©Dr. Michael Woitass Version 02/04
  • 14. Secure Login with certificates Strong authentication between SAP clients and servers User Server Generates an Signs the message arbitrary message from the user B Generates another arbitrary message Verifies the signature of the server B Verifies the signature Signs the message of the user of the server A A 14 ©Dr. Michael Woitass Version 02/04
  • 15. Secure Single Sign-On Secure Single Sign-On to all SAP servers 15 ©Dr. Michael Woitass Version 02/04
  • 16. Single Sign-On with smartcards Identification with PIN Access Certificate and private key 16 ©Dr. Michael Woitass Version 02/04
  • 17. SSO Integration Motivation: • The company wants to establish a Single Sign-On via the logon to the network (e.g. Windows Active Directory authentication, one-time tokens). • The company uses SAP systems. • The objective is to implement a certificate-based Single Sign-On to SAP without the need to have a PKI installed. 17 ©Dr. Michael Woitass Version 02/04
  • 18. Architecture scalable scalable Secure Login Active Server Directory 3 2 5 4 Generate Secure Login Certificate Client 6 UserID, Domain, 1 Password Windows Soft Token Logon 18 ©Dr. Michael Woitass Version 02/04
  • 19. Architecture SAP GUI – SAP Server Single Sign-On Secure Communication SAP GUI SAP R/3 Client Server GSS-API SNC GSS-API Security Security Library Library Soft Token 19 ©Dr. Michael Woitass Version 02/04
  • 20. Architecture Web Browser – Web Server Single Sign-On Secure Communication Internet Explorer WEB Microsoft Server SSL Crypto API CSP Soft Token 20 ©Dr. Michael Woitass Version 02/04
  • 21. Advantages High User Acceptance The user doesn’t need to learn a new software. The user will not be afflicted to enter his login data again and again. High Security Secure authentication and communication in SAP applications via SNC. Secure authentication and communication in Web applications via SSL. Reduced Administration No overhead of a Public Key Infrastructure, nevertheless certificate- based login to SAP applications and Web applications. Reduced Costs Reuse of established authentication method. Single Sign-On assures an optimized workflow. 21 ©Dr. Michael Woitass Version 02/04
  • 22. SAP Security Cryptographic solutions facilitate Secure Single Sign-On to SAP (SSO) Encryption of data communications in SAP (SNC) Digital signature of SAP documents (SSF) 22 ©Dr. Michael Woitass Version 02/04
  • 23. Architecture Integration in SAP with Secure Network Communication (SNC) Workprocess Compression Protocol SNC GSS API Generic Security Services Security Library 23 ©Dr. Michael Woitass Version 02/04
  • 24. Secure network End-to-End security by means of: Crypto libraries at client and server side SAP standard interface SNC SAPgui SAP R/3 Client Server Authentication with certificate Network Network SNC Interface Interface GSS GSS API API Security Security Library Library 24 ©Dr. Michael Woitass Version 02/04
  • 25. Architecture Secure Network Communications (SNC) in SAP Application Programming Interface standardised by the IETF Abstraction from mechanisms used behind the API Workprocess Certification within SAP‘s CSP Program (BC-SNC Interface) Compression Protocol SNC GSS API Generic Security Services Security Library 25 ©Dr. Michael Woitass Version 02/04
  • 26. Integration on the R/3 server side SNC configuration: central user administration 26 ©Dr. Michael Woitass Version 02/04
  • 27. Integration in SAPlogon SNC configuration: selection of the security level 27 ©Dr. Michael Woitass Version 02/04
  • 28. Example: Spanish Data Protection Law Requerimientos: La LOPD (Ley Orgánica de Protección de Datos) entró en vigor el 1 de julio de 2002. La ley exige medidas de seguridad de nivel alto, entre ellos el cifrado de los datos. Las empresas y administraciones públicas españoles que tienen SAP R/3 y tratan datos de nivel alto de seguridad deberán cumplir con la ley. 28 ©Dr. Michael Woitass Version 02/04
  • 29. Example: Spanish Data Protection Law Medidas de seguridad de nivel alto: Los ficheros que contengan determinados datos personales requerirán la implantación de medidas de nivel alto: – ideología, religion, creencias – origen racial, salud o vida sexual de las personas físicas – datos recabados para fines policiales. Principalmente, estas medidas consisten en: – el cifrado previo de los datos – el almacenamiento de la información relativa al acceso a los ficheros durante al menos dos años – el almacenamiento de las copias de seguridad en un lugar distinto a donde se encuentren los equipos informáticos. 29 ©Dr. Michael Woitass Version 02/04
  • 30. SAP Security Cryptographic solutions facilitate Secure Single Sign-On to SAP (SSO) Encryption of data communications in SAP (SNC) Digital signature of SAP documents (SSF) 30 ©Dr. Michael Woitass Version 02/04
  • 31. Digital signature of SAP documents Digital signature in SAP The digital signature guarantees the identity Data extraction of the user Private key and Encryption RSA Algorithm with asymmetric Digital 1.024 Bits signature encryption the integrity of the data. Extraction of signed data 31 ©Dr. Michael Woitass Version 02/04
  • 32. Example: Project ArchiSig Electronic Signature of Medical Documents – Integration and Evaluation of a Public Key Infrastructure (PKI) in Hospitals 32 ©Dr. Michael Woitass Version 02/04
  • 33. Workflow in SAP IS-H*MED The secretary writes The doctor signs the The department head A medical document. document. countersigns. The Workflow passes the document to the daprtment head. SAP IS-H Med SECUDE Security Time stamp Library The medical document and the signatures are transferred to the archiving system. IXOS-eCONserver 33 ©Dr. Michael Woitass Version 02/04
  • 34. Document workflow: create, modify, sign, verify Determinar el siguiente paso Crear un expediente Mostrar pdf „My letters“ - Tareas Función de firma Historial de firmas - Lista de documentos Verificación Firmar el documento Archivo del documento Enviar a la secretaria 34 ©Dr. Michael Woitass Version 02/04
  • 35. Integration of the signature in SAP IS-H*MED 35 ©Dr. Michael Woitass Version 02/04
  • 36. Resume Certificate-based security technology facilitates: Secure Single Sign-On to SAP Encryption of SAP data Digital signature of SAP documents. 36 ©Dr. Michael Woitass Version 02/04
  • 37. Security in SAP Systems ¡Muchas gracias por su atención! Michael Woitass mwoitass@telefonica.net ©Dr. Michael Woitass Version 02/04