According to our research there are 10 steps that are required for implementation of SAP Security in any organization of the world that are given below
1. Working with security password Length
While implementing security parameters, length of the passwords should be adjusted according to the approved policy for that organization. Account lock after password failure must be adjusted according to the organization approved policy. While working with SAP system parameters are adjusted.
2. Allow to Access the user accounts
Specified number of generic accounts is allocated in SAP applications. These accounts are the basic need for initial installation and to complete the set up process. The passwords are always in knowledge. It is obvious that all the ID’s are secured when the installation process is complete.
3. Access Profile must be Allocated Wide
Along with specified number of IDs, SAP also delivered some profiles that dish up access to system. The allocated privileges have ability to use at initial setups and emergencies. Later on access team is restricted to limited access to system
4. Support and Project Team Access
SAP does not provide the facility to access specific profiles for support or projects. That is why it is necessary to define the access the of these uses for limited time.
5. Access according to Role
SAP is integrated system and there is probability of fraud in this system. A user that has authority to deal with payments can shift company payment to his account. This is controlled by the management and monitoring of duties in SAP environment.
6. Emergency Access Procedure
All roles must be defined according to the access type and team project. This assignment must be on the daily basis.
7. Users Access
For security purposes ongoing monitoring is very mandatory to run a successful system. Duplicate IDs, password parameters and generic accounts must be reviewed periodically
8. Modify Management Function
There is a complete system of change and transport system that has generic ability to modify management functions
9. Access to delicate Procedures
As Sap is integrated environment therefore sensitive information are accessed in the same environment. For security only restricted access is allowed.
10. Business Ownership and Security Process
Because of integrated facility of SAP system only payment clerk can handle secure payment functions. It is very essential which staff member has access to all SAP functions
You can’t apply security steps until you have complete understanding of the SAP security system and how it works. For this you have to go for SAP security training at Tekvdo website. You can also get SAP grc training course at discount.
This entry passed through the Full-Text RSS service - if this is your content and you're reading it on someone else's site, please read the FAQ at http://ift.tt/jcXqJW.
No comments:
Post a Comment