SlideShare a Scribd company logo
1 of 26
Download to read offline
WEBINAR
Attribute-based Data Masking:
How to effectively
improve the protection
of your sensitive data.
© Pathlock Inc. All rights reserved.
Axel Daldorf
Presales SAST SOLUTIONS – Part of Pathlock
+49 40 88137-109
mail@sast-solutions.de
sast-solutions.com
Your host today:
3
"SAST SOLUTIONS has specialized its portfolio in
holistic solutions for securing SAP ERP and
SAP S/4HANA systems.
As part of the Pathlock Group, we are also the global
market leader for the automation of access
orchestration and cyber security of all business
of all business applications."
Ralf Kempf & Bodo Kahl
SAST SOLUTIONS
4
4
© Pathlock Inc. All rights reserved.
15
LOCATIONS
500
just
under
EMPLOYEES
w o r l d w i d e
1.200
SATISFACTION
C U STO M E RS
around
We are part of the Pathlock Group:
5
5
© Pathlock Inc. All rights reserved.
Pathlock Group portfolio:
The "one fits all" solution for securing your business applications
REAL-TIME CONNECTION
ERP
SECURITY INTELLIGENCE
ALL APPLICATIONS
Connect to Applications
ALL USER
Govern User Access
ALL ACTIVITY
Monitor Business Transactions
ALL THREAT VECTORS
Internal/External Revision
Cloud
Legacy
Enterprise Systems
ALL APPLICATIONS
Connect to Applications
"CAN DO" ANALYSIS
Access Analysis
User Access Review
Access Management
Emergency Access
"DID DO" ANALYSIS
Business Processes
Risk Score
Mitigation
Access & Compliance Security
PROTECT & QUANTIFY RISK
Vulnerability Management
Threat Detection
App Security Testing
Compliance Testing
6
6
© Pathlock Inc. All rights reserved.
Full protection for your business applications
360 degree protection for cloud and on-premise
User Access Certifications
and Review
Privileged and Temporary
Access Management
Compliant Provisioning
Role design and Re-design
Separation of Duties
and Risk Analysis
Dynamic Authorization
SSO and MFA Enforcement
Data Masking
Transaction Monitoring
Control Enforcement
and Transaction Blocking
Cybersecurity Management
Detection and Response
Logging and SIEM Integration
Code scanning
Vulnerability Management
Continuous Control Monitoring
Process Controls
Access Governance
7
© 2022 Pathlock Inc. All rights reserved. 7
Data Masking
8
© 2022 Pathlock Inc. All rights reserved. 8
DATA MASKING
Pathlock Security Platform for
SAP
Unified control machine
- Contextual security policies
- Pre-built policy templates
- Versatile configuration
Real-time analytics
• Penetration protection
• Data loss prevention
• Compliance monitoring
Logging of user activities
• Detailed logging of user activities
• Complete audit trail of user access
• Compliance-enabled protocols
Fine-grained data security
• Contextual DLP policies
• Dynamic data masking and redaction
• Query and search masking
Contextual access control
• Contextual access control
• Field-level multifactor authentication
• Privileged access management
PATHLOCK
SAFETY PLATFORM
9
© 2022 Pathlock Inc. All rights reserved.
DATA MASKING
Pathlock Security Platform for SAP
Extending ERP with granular and context-aware
security
Dynamic, contextual security - ITAR, GDPR
Business Process Controls
Preventive SOD controls
Real-time visibility of user behavior
10
© 2022 Pathlock Inc. All rights reserved.
Adding preventive controls to
exception scenarios
Detect & report
Violations in real time
Stop actual SoD violations, but
continue to
allow non-injurious activity.
Enables continuous monitoring of
controls and alerting of control holders.
A second layer of defense against
unintentional
Insert overprovisioning.
DATA MASKING
Strengthening SoD with attribute-based controls and real-time
visibility
Adding second layer of
defense
11
© 2022 Pathlock Inc. All rights reserved.
DATA MASKING
NIST Cybersecurity Framework
Improvement of the critical infrastructure
IDENTIFY
• Asset Management
• Business Environment
• Governance
• Risk Assessment
• Risk Management
Strategy
RE-CREATE
• Recovery Planning
• Improvements
• Communication
PROTECT
• Access Control
• Awareness and Training
• Data Security
• Information Protection
Processes & Procedures
• Maintenance
• Protective Technologies
DISCOVER
• Anomalies & Events
• Security Continuous
Monitoring
• Detection Processes
REACT
• Response Planning
• Communications
• Analysis
• Mitigation
• Improvements
12
© 2022 Pathlock Inc. All rights reserved.
Extends native SAP RBAC by applying context-based
rules for data permissions.
• DATA MASKING
ABAC for Dynamic Data Masking
Rules can be based on any criteria, such as nationality,
whitelisted access points, time, data characteristics,
user group membership, age or geographic location of
data, or calculated factors, etc.
Data is controlled with little or no code, enforced
quickly and at scale, and without performance
degradation.
Fields can be fully or partially masked, blacked out, or
click-protected, limiting data exposure without
impacting productivity.
13
© 2022 Pathlock Inc. All rights reserved.
DATA MASKING
Dynamic contextual security
Control of access to the transaction, at the
transaction level (VA03)
USER 1
USER 2
196.20.0.0
196.20.0.1
With any attribute, example: IP address ERP
14
© 2022 Pathlock Inc. All rights reserved.
DATA MASKING
Dynamic contextual security
USER 1
USER 1
100001/1100/US01
100001/1101/US01
Control of access to the transaction, at the
transaction level (ME11)
Use of Org elements
(protected purchase Org 1101)
ERP
15
© 2022 Pathlock Inc. All rights reserved.
DATA MASKING
Dynamic contextual security -
Masking PERSONAL
PA20 is allowed, user1 can see sensitive data
(SSN number)
USER 1
USER 2
Control of access to sensitive data by context
attributes (example: IP range)
PA20 is allowed, sensitive data is masked for
user2
ERP
16
© 2022 Pathlock Inc. All rights reserved.
DATA MASKING
Dynamic contextual security -
MASKING PRICE
$2000.00
$0.00
USER 1
USER 2
Dynamic protection of pricing or order data
based on IP range
VA03, Tcode is allowed, can see price data
VA03, Tcode is allowed, price is displayed as
zero
ERP
17
© 2022 Pathlock Inc. All rights reserved.
DATA MASKING
Dynamic data download
Control (DATA BROWSERS)
USER 1
USER 1
SE16
SE11
Protection of data downloads based on
context (table name or columns in tables)
SE11, Tcode is allowed, Data Download is
denied
SE16, Tcode is allowed, can download based
on specific column values
ERP
18
© 2022 Pathlock Inc. All rights reserved.
DATA MASKING
SOD Prevention
USER 1
USER 1
ME21N
MIGO
Protection against SOD violations on the
basis of GRC regulations
ME21N, Tcode is allowed, user may create an
order
MIGO, Tcode is denied, user cannot post
goods receipt for same order
ERP
19
© 2022 Pathlock Inc. All rights reserved.
DATA MASKING
Fiori masking - product master data
Maintenance product master:
MD_C_PRODUCT_MAINTAIN_SRV
Product descriptions are defined as sensitive
information and are masked.
20
© 2022 Pathlock Inc. All rights reserved.
DATA MASKING
Fiori masking - supplier master data
Vendor Master Maintenance:
MD_SUPPLIER_MASTER_SRV
Address data is considered sensitive information
and is masked.
21
© 2022 Pathlock Inc. All rights reserved.
DATA MASKING
Fiori Masking - Purchasing Info Set
Maintenance purchasing info records:
MM_PUR_INFO_RECORDS_MANAGE_SRV
Material and supplier information are defined as
sensitive information and are masked.
22
© 2022 Pathlock Inc. All rights reserved.
ACCESS GOVERNANCE
RBAC and ABAC in detail
ABAC starts at the moment when the user
begins to access data and transactions.
.
.
.
+
User Rollers
Access
allow
Limited
Access
Access
refuse
ABAC
RBAC
Role-based
Approach
Attribute based
approach
23
© 2022 Pathlock Inc. All rights reserved.
ACCESS GOVERNANCE
By using ABAC, organizations
can reduce their accepted risk
by defining granular business
policies and access controls to
strengthen security at the data
and transaction level.
You can dynamically enforce
data masking or restriction
policies for any field in SAP
when you apply real-time
contextual policies that balance
security with user-friendliness.
ABAC allows you to apply
preventive controls in SoD
exception scenarios.
This way, you can prevent SoD
violations while having the
flexibility to assign conflicting
roles (if necessary) and role-
based policies to mitigate over-
provisioning.
Advantages of Pathlock's ABAC
Use of dynamic data
masking
Reduction of the attack
surface
Preventing violations
of SoD policies
24
© 2022 Pathlock Inc. All rights reserved.
Transactions are driven based on business rules and
master data, so they can be enforced quickly and at scale
without the need for SAP change management.
ABAC for Transaction Control
Policy-driven preventive controls based on business rules
are low/no code.
Integration with Access Governance to automatically
mitigate SoD exception scenarios and lock down RBAC
permissions when existing permissions are inappropriate.
© Pathlock Inc. All rights reserved.
Do you have any questions?
We answer. For sure.
© Copyright akquinet enterprise solutions GmbH. All rights reserved. This publication is protected by copyright.
All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic
systems without the prior written agreement of akquinet enterprise solutions GmbH. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions.
The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. akquinet enterprise solutions GmbH shall assume no liability for losses arising
from use of the information.
Thank You
AXEL DALDORF
Presales SAST SOLUTIONS –
Part of Pathlock
+49 40 88137-109
mail@sast-solutions.de

More Related Content

Similar to ttribute-based Data Masking: How to effectivelyimprove the protectionof your sensitive data [Webinar]

Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudMarketingArrowECS_CZ
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDGaret Keller
 
MySQL 8.0 - Security Features
MySQL 8.0 - Security FeaturesMySQL 8.0 - Security Features
MySQL 8.0 - Security FeaturesHarin Vadodaria
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceCloudera, Inc.
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesTI Safe
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleAdam Doyle
 
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...PaaSword EU Project
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarAlgoSec
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecuritySolarWinds
 
Autonomous Database Security Features
Autonomous Database Security FeaturesAutonomous Database Security Features
Autonomous Database Security FeaturesSinanPetrusToma
 
From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...Capgemini
 
Hybrid Data Pipeline for SQL and REST
Hybrid Data Pipeline for SQL and RESTHybrid Data Pipeline for SQL and REST
Hybrid Data Pipeline for SQL and RESTSumit Sarkar
 
2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in production2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in productionThomas Burg
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyAegify Inc.
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Sridhar Karnam
 

Similar to ttribute-based Data Masking: How to effectivelyimprove the protectionof your sensitive data [Webinar] (20)

ITAMSoft-Datasheet-2015
ITAMSoft-Datasheet-2015ITAMSoft-Datasheet-2015
ITAMSoft-Datasheet-2015
 
Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
 
MySQL 8.0 - Security Features
MySQL 8.0 - Security FeaturesMySQL 8.0 - Security Features
MySQL 8.0 - Security Features
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at Scale
 
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
 
Autonomous Database Security Features
Autonomous Database Security FeaturesAutonomous Database Security Features
Autonomous Database Security Features
 
From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...
 
Hybrid Data Pipeline for SQL and REST
Hybrid Data Pipeline for SQL and RESTHybrid Data Pipeline for SQL and REST
Hybrid Data Pipeline for SQL and REST
 
2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in production2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in production
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 

More from akquinet enterprise solutions GmbH

How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...akquinet enterprise solutions GmbH
 
Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]akquinet enterprise solutions GmbH
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...akquinet enterprise solutions GmbH
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...akquinet enterprise solutions GmbH
 
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]akquinet enterprise solutions GmbH
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...akquinet enterprise solutions GmbH
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]akquinet enterprise solutions GmbH
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...akquinet enterprise solutions GmbH
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...akquinet enterprise solutions GmbH
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...akquinet enterprise solutions GmbH
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]akquinet enterprise solutions GmbH
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]akquinet enterprise solutions GmbH
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...akquinet enterprise solutions GmbH
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...akquinet enterprise solutions GmbH
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...akquinet enterprise solutions GmbH
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...akquinet enterprise solutions GmbH
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...akquinet enterprise solutions GmbH
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...akquinet enterprise solutions GmbH
 

More from akquinet enterprise solutions GmbH (20)

How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
 
Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
 
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
 
Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

ttribute-based Data Masking: How to effectivelyimprove the protectionof your sensitive data [Webinar]

  • 1. WEBINAR Attribute-based Data Masking: How to effectively improve the protection of your sensitive data.
  • 2. © Pathlock Inc. All rights reserved. Axel Daldorf Presales SAST SOLUTIONS – Part of Pathlock +49 40 88137-109 mail@sast-solutions.de sast-solutions.com Your host today:
  • 3. 3 "SAST SOLUTIONS has specialized its portfolio in holistic solutions for securing SAP ERP and SAP S/4HANA systems. As part of the Pathlock Group, we are also the global market leader for the automation of access orchestration and cyber security of all business of all business applications." Ralf Kempf & Bodo Kahl SAST SOLUTIONS
  • 4. 4 4 © Pathlock Inc. All rights reserved. 15 LOCATIONS 500 just under EMPLOYEES w o r l d w i d e 1.200 SATISFACTION C U STO M E RS around We are part of the Pathlock Group:
  • 5. 5 5 © Pathlock Inc. All rights reserved. Pathlock Group portfolio: The "one fits all" solution for securing your business applications REAL-TIME CONNECTION ERP SECURITY INTELLIGENCE ALL APPLICATIONS Connect to Applications ALL USER Govern User Access ALL ACTIVITY Monitor Business Transactions ALL THREAT VECTORS Internal/External Revision Cloud Legacy Enterprise Systems ALL APPLICATIONS Connect to Applications "CAN DO" ANALYSIS Access Analysis User Access Review Access Management Emergency Access "DID DO" ANALYSIS Business Processes Risk Score Mitigation Access & Compliance Security PROTECT & QUANTIFY RISK Vulnerability Management Threat Detection App Security Testing Compliance Testing
  • 6. 6 6 © Pathlock Inc. All rights reserved. Full protection for your business applications 360 degree protection for cloud and on-premise User Access Certifications and Review Privileged and Temporary Access Management Compliant Provisioning Role design and Re-design Separation of Duties and Risk Analysis Dynamic Authorization SSO and MFA Enforcement Data Masking Transaction Monitoring Control Enforcement and Transaction Blocking Cybersecurity Management Detection and Response Logging and SIEM Integration Code scanning Vulnerability Management Continuous Control Monitoring Process Controls Access Governance
  • 7. 7 © 2022 Pathlock Inc. All rights reserved. 7 Data Masking
  • 8. 8 © 2022 Pathlock Inc. All rights reserved. 8 DATA MASKING Pathlock Security Platform for SAP Unified control machine - Contextual security policies - Pre-built policy templates - Versatile configuration Real-time analytics • Penetration protection • Data loss prevention • Compliance monitoring Logging of user activities • Detailed logging of user activities • Complete audit trail of user access • Compliance-enabled protocols Fine-grained data security • Contextual DLP policies • Dynamic data masking and redaction • Query and search masking Contextual access control • Contextual access control • Field-level multifactor authentication • Privileged access management PATHLOCK SAFETY PLATFORM
  • 9. 9 © 2022 Pathlock Inc. All rights reserved. DATA MASKING Pathlock Security Platform for SAP Extending ERP with granular and context-aware security Dynamic, contextual security - ITAR, GDPR Business Process Controls Preventive SOD controls Real-time visibility of user behavior
  • 10. 10 © 2022 Pathlock Inc. All rights reserved. Adding preventive controls to exception scenarios Detect & report Violations in real time Stop actual SoD violations, but continue to allow non-injurious activity. Enables continuous monitoring of controls and alerting of control holders. A second layer of defense against unintentional Insert overprovisioning. DATA MASKING Strengthening SoD with attribute-based controls and real-time visibility Adding second layer of defense
  • 11. 11 © 2022 Pathlock Inc. All rights reserved. DATA MASKING NIST Cybersecurity Framework Improvement of the critical infrastructure IDENTIFY • Asset Management • Business Environment • Governance • Risk Assessment • Risk Management Strategy RE-CREATE • Recovery Planning • Improvements • Communication PROTECT • Access Control • Awareness and Training • Data Security • Information Protection Processes & Procedures • Maintenance • Protective Technologies DISCOVER • Anomalies & Events • Security Continuous Monitoring • Detection Processes REACT • Response Planning • Communications • Analysis • Mitigation • Improvements
  • 12. 12 © 2022 Pathlock Inc. All rights reserved. Extends native SAP RBAC by applying context-based rules for data permissions. • DATA MASKING ABAC for Dynamic Data Masking Rules can be based on any criteria, such as nationality, whitelisted access points, time, data characteristics, user group membership, age or geographic location of data, or calculated factors, etc. Data is controlled with little or no code, enforced quickly and at scale, and without performance degradation. Fields can be fully or partially masked, blacked out, or click-protected, limiting data exposure without impacting productivity.
  • 13. 13 © 2022 Pathlock Inc. All rights reserved. DATA MASKING Dynamic contextual security Control of access to the transaction, at the transaction level (VA03) USER 1 USER 2 196.20.0.0 196.20.0.1 With any attribute, example: IP address ERP
  • 14. 14 © 2022 Pathlock Inc. All rights reserved. DATA MASKING Dynamic contextual security USER 1 USER 1 100001/1100/US01 100001/1101/US01 Control of access to the transaction, at the transaction level (ME11) Use of Org elements (protected purchase Org 1101) ERP
  • 15. 15 © 2022 Pathlock Inc. All rights reserved. DATA MASKING Dynamic contextual security - Masking PERSONAL PA20 is allowed, user1 can see sensitive data (SSN number) USER 1 USER 2 Control of access to sensitive data by context attributes (example: IP range) PA20 is allowed, sensitive data is masked for user2 ERP
  • 16. 16 © 2022 Pathlock Inc. All rights reserved. DATA MASKING Dynamic contextual security - MASKING PRICE $2000.00 $0.00 USER 1 USER 2 Dynamic protection of pricing or order data based on IP range VA03, Tcode is allowed, can see price data VA03, Tcode is allowed, price is displayed as zero ERP
  • 17. 17 © 2022 Pathlock Inc. All rights reserved. DATA MASKING Dynamic data download Control (DATA BROWSERS) USER 1 USER 1 SE16 SE11 Protection of data downloads based on context (table name or columns in tables) SE11, Tcode is allowed, Data Download is denied SE16, Tcode is allowed, can download based on specific column values ERP
  • 18. 18 © 2022 Pathlock Inc. All rights reserved. DATA MASKING SOD Prevention USER 1 USER 1 ME21N MIGO Protection against SOD violations on the basis of GRC regulations ME21N, Tcode is allowed, user may create an order MIGO, Tcode is denied, user cannot post goods receipt for same order ERP
  • 19. 19 © 2022 Pathlock Inc. All rights reserved. DATA MASKING Fiori masking - product master data Maintenance product master: MD_C_PRODUCT_MAINTAIN_SRV Product descriptions are defined as sensitive information and are masked.
  • 20. 20 © 2022 Pathlock Inc. All rights reserved. DATA MASKING Fiori masking - supplier master data Vendor Master Maintenance: MD_SUPPLIER_MASTER_SRV Address data is considered sensitive information and is masked.
  • 21. 21 © 2022 Pathlock Inc. All rights reserved. DATA MASKING Fiori Masking - Purchasing Info Set Maintenance purchasing info records: MM_PUR_INFO_RECORDS_MANAGE_SRV Material and supplier information are defined as sensitive information and are masked.
  • 22. 22 © 2022 Pathlock Inc. All rights reserved. ACCESS GOVERNANCE RBAC and ABAC in detail ABAC starts at the moment when the user begins to access data and transactions. . . . + User Rollers Access allow Limited Access Access refuse ABAC RBAC Role-based Approach Attribute based approach
  • 23. 23 © 2022 Pathlock Inc. All rights reserved. ACCESS GOVERNANCE By using ABAC, organizations can reduce their accepted risk by defining granular business policies and access controls to strengthen security at the data and transaction level. You can dynamically enforce data masking or restriction policies for any field in SAP when you apply real-time contextual policies that balance security with user-friendliness. ABAC allows you to apply preventive controls in SoD exception scenarios. This way, you can prevent SoD violations while having the flexibility to assign conflicting roles (if necessary) and role- based policies to mitigate over- provisioning. Advantages of Pathlock's ABAC Use of dynamic data masking Reduction of the attack surface Preventing violations of SoD policies
  • 24. 24 © 2022 Pathlock Inc. All rights reserved. Transactions are driven based on business rules and master data, so they can be enforced quickly and at scale without the need for SAP change management. ABAC for Transaction Control Policy-driven preventive controls based on business rules are low/no code. Integration with Access Governance to automatically mitigate SoD exception scenarios and lock down RBAC permissions when existing permissions are inappropriate.
  • 25. © Pathlock Inc. All rights reserved. Do you have any questions? We answer. For sure. © Copyright akquinet enterprise solutions GmbH. All rights reserved. This publication is protected by copyright. All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior written agreement of akquinet enterprise solutions GmbH. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions. The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. akquinet enterprise solutions GmbH shall assume no liability for losses arising from use of the information.
  • 26. Thank You AXEL DALDORF Presales SAST SOLUTIONS – Part of Pathlock +49 40 88137-109 mail@sast-solutions.de