SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
30 marzo 2009 – ANDREA CAVALLERI
11 1
The company

Aglea was founded in 2003 as a company specializing
in the management of users and authorizations of the
SAP world
Work directly or beside major System Integrator
AGLEA is part of APL Italian SpA, owner of the
software "SOFIA" ® (portfolio manager titles Banks
and Insurance)

29.9.09

Security Analyzer

22 2
Le competenze
I FOCUS:
Consulting
SAP Security project
New implementations
Authorizations review based on RBE (Reverse Business Engineering)

Authorizations upgrade
Auditing
Sarbanes Oxley / Dlgs 231/2001 / L 262/2005 Dlgs 196/2003
Segregation of Duties
Risk management
Sod Anlysis

Software
Security Analyzer

29.9.09

Security Analyzer

33 3
Security Analyzer

Security Analyzer (SA) is the application that manages
the SAP Security (users and authorization)
Is formed by
two ABAP that download security information from a
SAP System
a Microsoft Access application for import and process
data
SA is compatible with SAP systems starting from release
4.6 of R/3

29.9.09

Security Analyzer

55 5
Strengths

S.A. :
Customizable. This means it can be adapted to specific
customer requirements
Lets cross our authorizations with the statistics, even in the
SOD analysis
SOD tab contains an SoD matrix of risks (based on
transactions SAP R/3-ECC)
Performs special analysis that help identify "noncompliance" to use the profile generator
Is very quick to install and use
Allows you to make retrospective analysis
Is fully developed by Aglea, which operates exclusively in
the consulting SAP security
29.9.09

Security Analyzer

66 6
Integrazione con GRC

SA is not an alternative to the SAP GRC Access
Control. The “point of contatc” is in the SOD
Security Analyzer is ideal for analyzing a SAP system
in review of authorizations and monitoring role model
adopted
Reporting of SA is complementary to the GRC and is
particularly useful when REMEDIATION

29.9.09

Security Analyzer

77 7
Security Analyzer
After installing the two reports in ABAP system to analyze the
process of documentation and analysis is very simple
Extracting data from SAP (53 + tables usage statistics) and
place in a directory
Design (one time) of a project in SA and customize your
settings
Importing data into SA
Generation of reports needed
Conducting analysis more specific
analysis on authorizations (a “SUIM” more powerful)

analysis of SOD-based transactional

29.9.09

Security Analyzer

88 8
Project definition

The first action is to
create a project
With a client SAP

SA can keep data on
line for one system
at a time

29.9.09

Security Analyzer

99 9
Project definition
Form in which you can specify the specific attributes of project

29.9.09

Security Analyzer

1010
10
Importazione

Rapid import (about 15
minutes)
of
data
exported from SAP

You can even import
some tables, divided by
subject

A
dedicated
LOG
provides
useful
information
on
any
problems encountered
during the import

29.9.09

Security Analyzer

1111
11
Reports

Mask for the opening of
the output
you can:
• obtain a query to be
exported to Excel
•directly save xls
•print report format
(PDF), choosing among
the more than 100
models currently

29.9.09

Security Analyzer

1212
12
Reports

29.9.09

Security Analyzer

1313
13
Reports

29.9.09

Security Analyzer

1414
14
Organizational Analysis

If the scenario is
implemented HR, can
be analyzed off-line
organizational structure
There are specific
information and
features not available
directly from SAP

29.9.09

Security Analyzer

1515
15
Indicators

The main
information of the
Security are
summarized in a
single screen.
Con essa è possibile
supervisionare lo
stato di salute del
sistema in pochi
minuti

29.9.09

Security Analyzer

1616
16
Auditing

Can do analysis in the
audit focused on
authorization objects
You can create as
many audits by
excluding from
analysis any blocked
users or SAP_ALL and
SAP_NEW

29.9.09

Security Analyzer

1717
17
Auditing

The details are specified in the
affected and the values to be
found

You can enter up to 3 values in
"OR".

29.9.09

Security Analyzer

1818
18
SOD Analysis
The analysis of SOD may be conducted on 5 items SAP
1.

Composite role(Job Role)

2.

Simple role (Task), Menu tcode level

3.
4.

Simple role (Task), Authorizations tcode level (S_TCODE)
Permissions assigned to the user (User). In this case, if a user has a permission
on S_TCODE range or with asterisks, are still identified all transactions
matching
Transactions statistics used.
This feature allows you to
act quickly on the real risks
and then into the potential

5.

You can also generate an additional
SOD matrix-based Job Roles.

29.9.09

Security Analyzer

1919
19
SOD Analysis

29.9.09

Security Analyzer

2020
20
SOD Analysis

29.9.09

Security Analyzer

2121
21
Mapper
The function mapper lets you find the best set of roles (chosen from a list
of "candidates") to be assigned to a user based on his statistics

29.9.09

Security Analyzer

2222
22
Mapper
Creating a composed role - identifying TASK

29.9.09

Security Analyzer

2323
23
Mapper
Mapping users and roles according to statistics

29.9.09

Security Analyzer

2424
24
Version and Licensing

29.9.09

Security Analyzer

2525
25

Más contenido relacionado

Destacado

TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピックTechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピックDaisuke Fuke
 
OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介Daisuke Fuke
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIINextLabs, Inc.
 
CIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market OverviewCIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market OverviewCloudIDSummit
 
OpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech NightOpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech NightDaisuke Fuke
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2NextLabs, Inc.
 
Digital in store for dummies
Digital in store for dummiesDigital in store for dummies
Digital in store for dummiesPaolo Maioli
 
Colin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc PresentationColin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc PresentationAmy Jacobs MA BA Hons
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014e-Xpert Solutions SA
 
Retail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt LtdRetail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt LtdSodtech
 
Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?VSR *
 
Agile du point de vue d'un PMP
Agile du point de vue d'un PMPAgile du point de vue d'un PMP
Agile du point de vue d'un PMPguestaaee88d
 
Global Delivery Model 2.0 (GDM 2.0)
Global Delivery Model 2.0 (GDM 2.0)Global Delivery Model 2.0 (GDM 2.0)
Global Delivery Model 2.0 (GDM 2.0)VSR *
 

Destacado (16)

TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピックTechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
 
OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of III
 
CIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market OverviewCIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market Overview
 
OpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech NightOpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech Night
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2
 
Digital in store for dummies
Digital in store for dummiesDigital in store for dummies
Digital in store for dummies
 
Colin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc PresentationColin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc Presentation
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014
 
Retail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt LtdRetail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt Ltd
 
Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?
 
Agile du point de vue d'un PMP
Agile du point de vue d'un PMPAgile du point de vue d'un PMP
Agile du point de vue d'un PMP
 
Dfuke oidfj tn10
Dfuke oidfj tn10Dfuke oidfj tn10
Dfuke oidfj tn10
 
Global Delivery Model 2.0 (GDM 2.0)
Global Delivery Model 2.0 (GDM 2.0)Global Delivery Model 2.0 (GDM 2.0)
Global Delivery Model 2.0 (GDM 2.0)
 

Similar a Analyzing SAP Security with Security Analyzer

Pmo slides jun2010
Pmo slides jun2010Pmo slides jun2010
Pmo slides jun2010Steve Turner
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 trainingsuresh
 
Getting Started with Nastel AutoPilot Business Views and Policies - a Tutorial
Getting Started with Nastel AutoPilot Business Views and Policies - a TutorialGetting Started with Nastel AutoPilot Business Views and Policies - a Tutorial
Getting Started with Nastel AutoPilot Business Views and Policies - a TutorialSam Garforth
 
R12 common-features
R12 common-featuresR12 common-features
R12 common-featuresnitingupta1
 
Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalapprize360
 
Lecture 6 & 7.pdf
Lecture 6 & 7.pdfLecture 6 & 7.pdf
Lecture 6 & 7.pdfRaoShahid10
 
OTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least PrivilegeOTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least PrivilegeBiju Thomas
 
Avanttic tech dates - de la monitorización a la 'observabilidad'
Avanttic tech dates - de la monitorización a la 'observabilidad'Avanttic tech dates - de la monitorización a la 'observabilidad'
Avanttic tech dates - de la monitorización a la 'observabilidad'avanttic Consultoría Tecnológica
 
PLC and SCADA Training
PLC and SCADA TrainingPLC and SCADA Training
PLC and SCADA TrainingAEAB Engineer
 
SOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataSOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataKashish Trivedi
 
Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Jay Steidle
 
Session Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior RecorderSession Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior RecorderBMST
 
Azure. Is It Worth It? - TechEd Beijing 2010 - Ethos
Azure. Is It Worth It? - TechEd Beijing 2010 - EthosAzure. Is It Worth It? - TechEd Beijing 2010 - Ethos
Azure. Is It Worth It? - TechEd Beijing 2010 - EthosEthos Technologies
 
EMA - Measuring the User Experience in the Cloud
EMA - Measuring the User Experience in the CloudEMA - Measuring the User Experience in the Cloud
EMA - Measuring the User Experience in the CloudCorrelsense
 

Similar a Analyzing SAP Security with Security Analyzer (20)

Pmo slides jun2010
Pmo slides jun2010Pmo slides jun2010
Pmo slides jun2010
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
 
Getting Started with Nastel AutoPilot Business Views and Policies - a Tutorial
Getting Started with Nastel AutoPilot Business Views and Policies - a TutorialGetting Started with Nastel AutoPilot Business Views and Policies - a Tutorial
Getting Started with Nastel AutoPilot Business Views and Policies - a Tutorial
 
Isms5
Isms5Isms5
Isms5
 
What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?
 
R12 common-features
R12 common-featuresR12 common-features
R12 common-features
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
System design
System designSystem design
System design
 
Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 final
 
Lecture 6 & 7.pdf
Lecture 6 & 7.pdfLecture 6 & 7.pdf
Lecture 6 & 7.pdf
 
OTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least PrivilegeOTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least Privilege
 
Avanttic tech dates - de la monitorización a la 'observabilidad'
Avanttic tech dates - de la monitorización a la 'observabilidad'Avanttic tech dates - de la monitorización a la 'observabilidad'
Avanttic tech dates - de la monitorización a la 'observabilidad'
 
PLC and SCADA Training
PLC and SCADA TrainingPLC and SCADA Training
PLC and SCADA Training
 
SOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataSOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp Drata
 
Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15
 
Session Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior RecorderSession Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior Recorder
 
S1nn -Intland-Software-Techday-2013
S1nn -Intland-Software-Techday-2013S1nn -Intland-Software-Techday-2013
S1nn -Intland-Software-Techday-2013
 
Azure. Is It Worth It? - TechEd Beijing 2010 - Ethos
Azure. Is It Worth It? - TechEd Beijing 2010 - EthosAzure. Is It Worth It? - TechEd Beijing 2010 - Ethos
Azure. Is It Worth It? - TechEd Beijing 2010 - Ethos
 
3
33
3
 
EMA - Measuring the User Experience in the Cloud
EMA - Measuring the User Experience in the CloudEMA - Measuring the User Experience in the Cloud
EMA - Measuring the User Experience in the Cloud
 

Último

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Analyzing SAP Security with Security Analyzer

  • 1. 30 marzo 2009 – ANDREA CAVALLERI 11 1
  • 2. The company Aglea was founded in 2003 as a company specializing in the management of users and authorizations of the SAP world Work directly or beside major System Integrator AGLEA is part of APL Italian SpA, owner of the software "SOFIA" ® (portfolio manager titles Banks and Insurance) 29.9.09 Security Analyzer 22 2
  • 3. Le competenze I FOCUS: Consulting SAP Security project New implementations Authorizations review based on RBE (Reverse Business Engineering) Authorizations upgrade Auditing Sarbanes Oxley / Dlgs 231/2001 / L 262/2005 Dlgs 196/2003 Segregation of Duties Risk management Sod Anlysis Software Security Analyzer 29.9.09 Security Analyzer 33 3
  • 4. Security Analyzer Security Analyzer (SA) is the application that manages the SAP Security (users and authorization) Is formed by two ABAP that download security information from a SAP System a Microsoft Access application for import and process data SA is compatible with SAP systems starting from release 4.6 of R/3 29.9.09 Security Analyzer 55 5
  • 5. Strengths S.A. : Customizable. This means it can be adapted to specific customer requirements Lets cross our authorizations with the statistics, even in the SOD analysis SOD tab contains an SoD matrix of risks (based on transactions SAP R/3-ECC) Performs special analysis that help identify "noncompliance" to use the profile generator Is very quick to install and use Allows you to make retrospective analysis Is fully developed by Aglea, which operates exclusively in the consulting SAP security 29.9.09 Security Analyzer 66 6
  • 6. Integrazione con GRC SA is not an alternative to the SAP GRC Access Control. The “point of contatc” is in the SOD Security Analyzer is ideal for analyzing a SAP system in review of authorizations and monitoring role model adopted Reporting of SA is complementary to the GRC and is particularly useful when REMEDIATION 29.9.09 Security Analyzer 77 7
  • 7. Security Analyzer After installing the two reports in ABAP system to analyze the process of documentation and analysis is very simple Extracting data from SAP (53 + tables usage statistics) and place in a directory Design (one time) of a project in SA and customize your settings Importing data into SA Generation of reports needed Conducting analysis more specific analysis on authorizations (a “SUIM” more powerful) analysis of SOD-based transactional 29.9.09 Security Analyzer 88 8
  • 8. Project definition The first action is to create a project With a client SAP SA can keep data on line for one system at a time 29.9.09 Security Analyzer 99 9
  • 9. Project definition Form in which you can specify the specific attributes of project 29.9.09 Security Analyzer 1010 10
  • 10. Importazione Rapid import (about 15 minutes) of data exported from SAP You can even import some tables, divided by subject A dedicated LOG provides useful information on any problems encountered during the import 29.9.09 Security Analyzer 1111 11
  • 11. Reports Mask for the opening of the output you can: • obtain a query to be exported to Excel •directly save xls •print report format (PDF), choosing among the more than 100 models currently 29.9.09 Security Analyzer 1212 12
  • 14. Organizational Analysis If the scenario is implemented HR, can be analyzed off-line organizational structure There are specific information and features not available directly from SAP 29.9.09 Security Analyzer 1515 15
  • 15. Indicators The main information of the Security are summarized in a single screen. Con essa è possibile supervisionare lo stato di salute del sistema in pochi minuti 29.9.09 Security Analyzer 1616 16
  • 16. Auditing Can do analysis in the audit focused on authorization objects You can create as many audits by excluding from analysis any blocked users or SAP_ALL and SAP_NEW 29.9.09 Security Analyzer 1717 17
  • 17. Auditing The details are specified in the affected and the values to be found You can enter up to 3 values in "OR". 29.9.09 Security Analyzer 1818 18
  • 18. SOD Analysis The analysis of SOD may be conducted on 5 items SAP 1. Composite role(Job Role) 2. Simple role (Task), Menu tcode level 3. 4. Simple role (Task), Authorizations tcode level (S_TCODE) Permissions assigned to the user (User). In this case, if a user has a permission on S_TCODE range or with asterisks, are still identified all transactions matching Transactions statistics used. This feature allows you to act quickly on the real risks and then into the potential 5. You can also generate an additional SOD matrix-based Job Roles. 29.9.09 Security Analyzer 1919 19
  • 21. Mapper The function mapper lets you find the best set of roles (chosen from a list of "candidates") to be assigned to a user based on his statistics 29.9.09 Security Analyzer 2222 22
  • 22. Mapper Creating a composed role - identifying TASK 29.9.09 Security Analyzer 2323 23
  • 23. Mapper Mapping users and roles according to statistics 29.9.09 Security Analyzer 2424 24