SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Towards new shores
with cross-system
SoD analyses.
AXEL DALDORF
Senior PreSales Consultant SAST SUITE
Fon: +49 40 88173-4438
Email: axel.daldorf@akquinet.de
Web: www.sast-solutions.com
WELCOME!
Introducing your host today:
With the SAST SOLUTIONS portfolio of akquinet AG, we are your world-class provider for the holistic protection
of SAP ERP as well as S/4HANA systems - with real-time monitoring. In addition to our proprietary software suite,
we offer SAP security and compliance consulting and managed services from a single source.
Worldwide, more than 200 customers with 3.5 million SAP users currently rely on our vast expertise in protecting
their SAP systems from cyberattacks, manipulation, espionage and data theft.
Facts and figures
- 3 -
SAST SOLUTIONS customers worldwide
920
305
165
325
556
796
64
845
Employees
Turnovers Mio. €
5,3
16,3
41,5
28,2
118
2002 2005 2008 2011 2014 2018 2019 2020
132
124
akquinet AG
71
Your IT security is our number one concern – in real time.
SAST gives you the choice!
SAP Security & Compliance – make or buy?!
SOFTWARE SUITE CONSULTING MANAGED SERVICES
Identity and User Access Management
Platform Security
Security Intelligence
Security Consulting
Security Advisory
Authorization Consulting
Software Implementation & Workshops
User Access Management
Platform Security
Migration of your SoD analyses into the SAP Cloud Apps.
SAP extension using external systems / cloud applications+
+
+
+
+
- 6 -
Systematics / Differences in authorizations and users
SAST Central Identity Module
Authorization analyses for ARIBA as an example
Q & A
The SAP Identity and Account Problem in Practice
Where does an Identity Account have authorizations? And which?
ID: P261165 (Max Müller)
SAP P11/100: MMUELER
SAP P21/200: P261165
Max.Mueller@Kunde.de
SAP P31/300: P261165
DB User: MUELLER
Max.Mueller@4711.kunden.sap.de
- 7 -
SAP extension using external systems / cloud applications
SoD conflict using SAP ERP and Ariba integration as examples
Account: Max.Mueller@Kunde.de
Gruppe: SUBMIT_PO
Account: P261165
Rolle: MAINTAIN_VENDOR
SoD
- 8 -
SAP Ariba Cloud Integration Gateway
 Cross-system account and permission list.
 Checking permissions:
 Single critical / sensitive.
 Separation of functions (SoD) in one system.
 Function separation (SoD) across system boundaries.
 Possibility of mitigation of risks at all levels.
 Central evaluation without double IT systems.
 Integration into existing SAST scenarios.
SAP extension using external systems / cloud applications
Requirements from Practical User and Authorization Administration
- 9 -
 Identity: Describes a unique characteristic of a natural/technical person.
 Account: Describes a user account in a defined IT system.
 Role:
 In SAP context, a set of users and their permissions (object, field, value).
 In non-SAP context, a grouping of permissions (characteristics such as CREATE_PO).
 Group: A set of users in a non-SAP context.
Systematics / Difference in user and authorization management
Terminology
- 10 -
 The Central Identity function provides the following functions:
 Import identities from
 LDAP
 HR
 SAP
 IDM
 Import of accounts from systems
 Import roles and roles assignment
 Available for customers with release 5.20
 Connection of external systems using adapters based on RFC, HTTP (SOAP/REST, XML), File.
 Support of SAP Netweaver and Ariba from SAST SUITE 5.20, then S/4 HANA Cloud, HANA DB and
others planned.
SAST Central Identity Function
Overview
- 11 -
SAST Central Identity Function
"Sync on Premise" as basis for Cross System evaluations
Identity Source Adapter SAP on Premise with SAST SUITE
Identities
Accounts
Roles
Systems
ID-Sources
Info System
and
SOD Engine
and Rules
Cross System
Identity/Account Info
System
Cross System Role
Info System
Authorization and
SoD Scan Results
- 12 -
Account Adapter
Role / Group Adapter
Account Adapter
Role / Group Adapter
Account Adapter
Role / Group Adapter
Account Adapter
Role / Group Adapter
Authorization analyses using ARIBA as an example
- 13 -
Authorization analyses using ARIBA as an example
Drill Down similar to SAP user analyze
- 14 -
Case Story:
SoD analyses in a hetero-
geneous SAP landscape.
Initial situation
 Japan's largest pharmaceutical company has SAP landscapes with around 4,000 users
in 50 countries worldwide.
 User requests and authorization assignments were handled via Winword forms.
 The SAP cloud application "Ariba" is used to optimize the procurement process,
but master data maintenance takes place in SAP ERP.
 Standard software solutions on the market usually cover SoD risks only on a single system.
Example: Audit-proof SoD analyses at Takeda.
Project goals
1. Simplification and speed-up of the authorization assignment process.
2. Regular reports on potential risks/conflicts should optimize the control process additionally.
3. Protection of research projects and product innovations is of highest priority for Takeda.
- 16 -
Project implementation
 Before the implementation of SAST SUITE, the authorization process was optimized.
 Development of a cross SoD matrix with check content for SAP ERP and S/4HANA systems
in combination with Ariba and integration into the SAST SUITE.
 Identification of various user IDs of a person and assignment to a central identity.
Synchronization of the SAP Cloud Application via SAP Cloud Connector daily or on demand.
 Permanent check for SoD conflicts including recommendations for action via SAST SUITE.
Example: Audit-proof SoD analyses at Takeda.
- 17 -
Advantages for Takeda
Establishment of a transparent and secure SAP user management in only two months.
Automated reporting of role conflicts and risks.
Reduction of high and medium critical SoD conflicts by about 70%.
✓
✓
✓
- Manfred Meier -
“The SAST SUITE has given us the perfect
solution for our global SAP authorization
management.
At the same time our systems
are permanently monitored
for vulnerabilities.“
Take Home Messages for cross-system SoD analyses:
Uniform "central identity" necessary (organisation and standards).
Define your S/4HANA SoD matrix before creating the first role!
The introduction of a "mixed" architecture must be planned and
tightly controlled.
SoD analysis Hybrid-On-Premise / Cloud / Non-SAP possible.
Implement a sandbox system for "test drive" for IT and users.
- 19 -
✓
✓
✓
✓
✓
Keep the
ball rolling
with us.
- 20 -
Keep the ball rolling with us…
SAST BLOG sast-blog.akquinet.com
New expert articles, practical tips, case studies, etc. every week
SAST NEWS Registration on the website or by mail: sast@akquinet.de
Current information every 6-8 weeks.
SAST WEBINARS Were you unable to attend a live webinar?
ON DEMAND The webinar archive allows you to individually schedule when you want
to take advantage of our recommendations.
SAST WEBINARS Further topics for 2020 are available on our event page on the web.
- 21 -
DO YOU HAVE ANY QUESTIONS?
WE ANSWER. FOR SURE.
© Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright.
All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior
written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions.
The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information.
AXEL DALDORF
Senior PreSales Consultant SAST SUITE
Fon: +49 40 88173-4438
Email: axel.daldorf@akquinet.de
Web: www.sast-solutions.com

Más contenido relacionado

La actualidad más candente

How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
akquinet enterprise solutions GmbH
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
akquinet enterprise solutions GmbH
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
akquinet enterprise solutions GmbH
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
akquinet enterprise solutions GmbH
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
ERPScan
 

La actualidad más candente (20)

SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
 
SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
 
SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
SAP License Audit Tips
SAP License Audit TipsSAP License Audit Tips
SAP License Audit Tips
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 
SAP security in figures
SAP security in figuresSAP security in figures
SAP security in figures
 
Sap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksSap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless Attacks
 

Similar a Towards new shores with cross-system SoD analyses. [Webinar]

Similar a Towards new shores with cross-system SoD analyses. [Webinar] (20)

SAP BOBJ Rapid Marts Overview I
SAP BOBJ Rapid Marts Overview ISAP BOBJ Rapid Marts Overview I
SAP BOBJ Rapid Marts Overview I
 
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
 
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
 
TDWI Roundtable: The HANA EDW
TDWI Roundtable: The HANA EDWTDWI Roundtable: The HANA EDW
TDWI Roundtable: The HANA EDW
 
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
 
SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01
 
CoreToEdge Company Presentation
CoreToEdge Company PresentationCoreToEdge Company Presentation
CoreToEdge Company Presentation
 
Digital Reinvention by NRB
Digital Reinvention by NRBDigital Reinvention by NRB
Digital Reinvention by NRB
 
Improve Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingImprove Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and Masking
 
Asat Overview V1.0
Asat Overview V1.0Asat Overview V1.0
Asat Overview V1.0
 
Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...
Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...
Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...
 
Onapsis SAP Backdoors
Onapsis SAP BackdoorsOnapsis SAP Backdoors
Onapsis SAP Backdoors
 
resume
resumeresume
resume
 
Mobile pulse sept 2014
Mobile pulse sept 2014Mobile pulse sept 2014
Mobile pulse sept 2014
 
Introduction to NEW SAP - Accenture Technology Meetup
Introduction to NEW SAP - Accenture Technology MeetupIntroduction to NEW SAP - Accenture Technology Meetup
Introduction to NEW SAP - Accenture Technology Meetup
 
Digital Business with SAP B1 - Introduction
Digital Business with SAP B1 - IntroductionDigital Business with SAP B1 - Introduction
Digital Business with SAP B1 - Introduction
 
About Aspans
About AspansAbout Aspans
About Aspans
 
Data Engineer's Lunch #81: Reverse ETL Tools for Modern Data Platforms
Data Engineer's Lunch #81: Reverse ETL Tools for Modern Data PlatformsData Engineer's Lunch #81: Reverse ETL Tools for Modern Data Platforms
Data Engineer's Lunch #81: Reverse ETL Tools for Modern Data Platforms
 
SAP AC020 - Investment Management
SAP AC020 - Investment ManagementSAP AC020 - Investment Management
SAP AC020 - Investment Management
 
PaaS Decision Matrix
PaaS Decision MatrixPaaS Decision Matrix
PaaS Decision Matrix
 

Más de akquinet enterprise solutions GmbH

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
akquinet enterprise solutions GmbH
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
akquinet enterprise solutions GmbH
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
akquinet enterprise solutions GmbH
 

Más de akquinet enterprise solutions GmbH (6)

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
 
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
 
SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Towards new shores with cross-system SoD analyses. [Webinar]

  • 1. Towards new shores with cross-system SoD analyses.
  • 2. AXEL DALDORF Senior PreSales Consultant SAST SUITE Fon: +49 40 88173-4438 Email: axel.daldorf@akquinet.de Web: www.sast-solutions.com WELCOME! Introducing your host today:
  • 3. With the SAST SOLUTIONS portfolio of akquinet AG, we are your world-class provider for the holistic protection of SAP ERP as well as S/4HANA systems - with real-time monitoring. In addition to our proprietary software suite, we offer SAP security and compliance consulting and managed services from a single source. Worldwide, more than 200 customers with 3.5 million SAP users currently rely on our vast expertise in protecting their SAP systems from cyberattacks, manipulation, espionage and data theft. Facts and figures - 3 - SAST SOLUTIONS customers worldwide 920 305 165 325 556 796 64 845 Employees Turnovers Mio. € 5,3 16,3 41,5 28,2 118 2002 2005 2008 2011 2014 2018 2019 2020 132 124 akquinet AG 71
  • 4. Your IT security is our number one concern – in real time.
  • 5. SAST gives you the choice! SAP Security & Compliance – make or buy?! SOFTWARE SUITE CONSULTING MANAGED SERVICES Identity and User Access Management Platform Security Security Intelligence Security Consulting Security Advisory Authorization Consulting Software Implementation & Workshops User Access Management Platform Security
  • 6. Migration of your SoD analyses into the SAP Cloud Apps. SAP extension using external systems / cloud applications+ + + + + - 6 - Systematics / Differences in authorizations and users SAST Central Identity Module Authorization analyses for ARIBA as an example Q & A
  • 7. The SAP Identity and Account Problem in Practice Where does an Identity Account have authorizations? And which? ID: P261165 (Max Müller) SAP P11/100: MMUELER SAP P21/200: P261165 Max.Mueller@Kunde.de SAP P31/300: P261165 DB User: MUELLER Max.Mueller@4711.kunden.sap.de - 7 -
  • 8. SAP extension using external systems / cloud applications SoD conflict using SAP ERP and Ariba integration as examples Account: Max.Mueller@Kunde.de Gruppe: SUBMIT_PO Account: P261165 Rolle: MAINTAIN_VENDOR SoD - 8 - SAP Ariba Cloud Integration Gateway
  • 9.  Cross-system account and permission list.  Checking permissions:  Single critical / sensitive.  Separation of functions (SoD) in one system.  Function separation (SoD) across system boundaries.  Possibility of mitigation of risks at all levels.  Central evaluation without double IT systems.  Integration into existing SAST scenarios. SAP extension using external systems / cloud applications Requirements from Practical User and Authorization Administration - 9 -
  • 10.  Identity: Describes a unique characteristic of a natural/technical person.  Account: Describes a user account in a defined IT system.  Role:  In SAP context, a set of users and their permissions (object, field, value).  In non-SAP context, a grouping of permissions (characteristics such as CREATE_PO).  Group: A set of users in a non-SAP context. Systematics / Difference in user and authorization management Terminology - 10 -
  • 11.  The Central Identity function provides the following functions:  Import identities from  LDAP  HR  SAP  IDM  Import of accounts from systems  Import roles and roles assignment  Available for customers with release 5.20  Connection of external systems using adapters based on RFC, HTTP (SOAP/REST, XML), File.  Support of SAP Netweaver and Ariba from SAST SUITE 5.20, then S/4 HANA Cloud, HANA DB and others planned. SAST Central Identity Function Overview - 11 -
  • 12. SAST Central Identity Function "Sync on Premise" as basis for Cross System evaluations Identity Source Adapter SAP on Premise with SAST SUITE Identities Accounts Roles Systems ID-Sources Info System and SOD Engine and Rules Cross System Identity/Account Info System Cross System Role Info System Authorization and SoD Scan Results - 12 - Account Adapter Role / Group Adapter Account Adapter Role / Group Adapter Account Adapter Role / Group Adapter Account Adapter Role / Group Adapter
  • 13. Authorization analyses using ARIBA as an example - 13 -
  • 14. Authorization analyses using ARIBA as an example Drill Down similar to SAP user analyze - 14 -
  • 15. Case Story: SoD analyses in a hetero- geneous SAP landscape.
  • 16. Initial situation  Japan's largest pharmaceutical company has SAP landscapes with around 4,000 users in 50 countries worldwide.  User requests and authorization assignments were handled via Winword forms.  The SAP cloud application "Ariba" is used to optimize the procurement process, but master data maintenance takes place in SAP ERP.  Standard software solutions on the market usually cover SoD risks only on a single system. Example: Audit-proof SoD analyses at Takeda. Project goals 1. Simplification and speed-up of the authorization assignment process. 2. Regular reports on potential risks/conflicts should optimize the control process additionally. 3. Protection of research projects and product innovations is of highest priority for Takeda. - 16 -
  • 17. Project implementation  Before the implementation of SAST SUITE, the authorization process was optimized.  Development of a cross SoD matrix with check content for SAP ERP and S/4HANA systems in combination with Ariba and integration into the SAST SUITE.  Identification of various user IDs of a person and assignment to a central identity. Synchronization of the SAP Cloud Application via SAP Cloud Connector daily or on demand.  Permanent check for SoD conflicts including recommendations for action via SAST SUITE. Example: Audit-proof SoD analyses at Takeda. - 17 - Advantages for Takeda Establishment of a transparent and secure SAP user management in only two months. Automated reporting of role conflicts and risks. Reduction of high and medium critical SoD conflicts by about 70%. ✓ ✓ ✓
  • 18. - Manfred Meier - “The SAST SUITE has given us the perfect solution for our global SAP authorization management. At the same time our systems are permanently monitored for vulnerabilities.“
  • 19. Take Home Messages for cross-system SoD analyses: Uniform "central identity" necessary (organisation and standards). Define your S/4HANA SoD matrix before creating the first role! The introduction of a "mixed" architecture must be planned and tightly controlled. SoD analysis Hybrid-On-Premise / Cloud / Non-SAP possible. Implement a sandbox system for "test drive" for IT and users. - 19 - ✓ ✓ ✓ ✓ ✓
  • 21. Keep the ball rolling with us… SAST BLOG sast-blog.akquinet.com New expert articles, practical tips, case studies, etc. every week SAST NEWS Registration on the website or by mail: sast@akquinet.de Current information every 6-8 weeks. SAST WEBINARS Were you unable to attend a live webinar? ON DEMAND The webinar archive allows you to individually schedule when you want to take advantage of our recommendations. SAST WEBINARS Further topics for 2020 are available on our event page on the web. - 21 -
  • 22. DO YOU HAVE ANY QUESTIONS? WE ANSWER. FOR SURE. © Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright. All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions. The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information. AXEL DALDORF Senior PreSales Consultant SAST SUITE Fon: +49 40 88173-4438 Email: axel.daldorf@akquinet.de Web: www.sast-solutions.com