SlideShare a Scribd company logo
1 of 25
Download to read offline
PUBLIC
SAP UI Data Security
UI Logging and UI Masking solutions
Tobias Keller, Product Manager
v322 – 2018-01-31
SAP
Innovative
Business
Solutions
Data Protection
01010100101010100
10100101001011000
10010101011011100
10010101000101110
01101010101001010
10100101010010101
01001010101001010
01010010110001001
01010110111001001
01010001011100110
6PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
data security threat
legal requirements
(compliance)
internal requirements
(decrease of financial
risk)
personal information
valuable business
information
commercial
motivation:
protection of the
organization
political
motivation:
protection of
individuals
UI Data Security – driving factors
Compliance & financial risk of data security breaches
7PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Data Security
Data protection requirements
• increasing number and severity of data
protection regulations worldwide
(EU-GDPR, HIPAA, PIPEDA, PIPA, SOX, DPA…)
• commonly protecting personal information
(employees, customers, suppliers…)
• rising compliance infringement cost
(discovery, fines, litigation; personal fines)
• deteriorating competitive situation (recipes
stolen, employees poached, customer
contacts leaked, supplier prices
publicized…)
• lost trust = lost business
(customers, suppliers, financial markets…)
• efficiency impact
(countermeasures, suspicious employees;
management stability…)
legal requirements –
protection of individual
information
internal requirements –
protection of business
critical data assets
8PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Data Security – the threat from inside
A threat vector often underestimated – but substantial and difficult to tackle
Two step approach
10PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Data Security: two step approach to protect data from insiders
UI Masking: hiding unnecessary data; UI Logging: enabling analysis of data access
to keep data accessible, but log & analyze
access, to take appropriate measures
The solution provides a detailed, structured data access
log and allows for analysis who exactly received which
data (output), how (input), and in which context (IP…)?
è prevent illegitimate data access and theft
by inducing compliant behavior
è identify & prove irregular data access
to conceal specific data (values in
fields/columns) – unless required for tasks
The solution masks sensitive (configured) values per
default; unmasking requires explicit access rights (on
top of existing role/authorization setup)
è make data elements unavailable for data abuse
(opportunistic and targeted)
• awareness for data security (“human firewall”) à protect employees by decreasing inadvertent breaches
• top-of-class protection measures à trust (employees, customers, and investors)
UI Masking UI Logging
“the speed limiter” “the speed camera”
11PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
SAP Backend System
SAP UI (user)
Dynpro Processor
Request
Response
Database LayerBusiness Logic
UI Logging
observed data
traffic
asynchronous call of
log & filtering service
Enterprise Threat DetectionAlert (e.g. email) Log Analyzer
• UI Masking and UI Logging can be used individually or jointly, depending on the required functionality
• add-ons to SAP NetWeaver:
• secure server-based logging/masking,
• modification free,
• minimal performance impact.
UI Data Security
High level solution architecture (example: SAP GUI)
UI Masking
masked data
original data configuration & BAdIs
Apply masking rules
12PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI technology UI Masking UI Logging
SAP GUI for Windows / HTML / Java ü ü
WebDynpro ABAP ü ü
CRM Web Client UI ü ü
RFC/BAPI and Web Services project based ü
BW Access (BEx Web/Analyser, BW-IP, BICS, MDX) project based ü
UI5/Fiori ü ü
Availability: 10 “channels” (Q1/2018)
• Based on SAP NetWeaver (cf. RCS Availability Matrix or contact product management for detailed requirements)
• Available for ECC, HEC, Suite on HANA, S/4HANA
• Maintenance: integrated into standard maintenance, planned until end 2025
• Enhancements and adaptations can be delivered on request
14PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
• Installation of add-ons with SAINT conducted by customer (ERP/basis team)
• Implementation support efforts – based on experience (”typical” scope and requirements)
Service option 1: enablement/jump start
• Set-up workshop for requirements, installation support, baseline configuration, KT and Ramp
Up session.
• Effort: commonly 5 PD per channel, duration ca. 1-2 weeks, preferably onsite.
• Service option 2: implementation
• As above, but also implementation of functional scope, test support, go-live support.
• Effort ca. 20 – 25PD per channel; preferably 1 week onsite; then remote.
• Customer enablement of an in-house resource to handle the main parts of the execution phase of the
implementation, and support subsequent changes in requirement and configuration.
Implementation – exemplary
17PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Wrap-up: High quality, low TCO
• UI Masking: unique functionality for SAP screens/applications
• UI Logging: premium offering from SAP in data access logging
Unique Coverage of the “insider” risk
ècompliance & decrease risk exposure
• Aligned with SAP standard è secure, performant, future proof
• quick implementation, support by product team è low TCO
UI Masking
19PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Masking
Refine data access into transactions
Data masking: UI layer on server side
• business and technical transactions
• download, export, print
Highly configurable
• what: on field level (inside transactions)
• how: pattern
• who: role required for unmasked access
• BADIs to introduce additional logic
Aligned with SAP standard
Based on SAP NetWeaver releases 7.00 – 7.50
Maintenance: planned until 31.12.2025
Further enhancements on request
24PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Please note: the following sequence is to exemplify how UI
Masking config technically works
The actual config creation would be mainly taken over by a
mass configuration utility included in the product.
• Create a new entry in the general masking config transaction for the
field to be masked, here end date.
• Next to table and field name, set the role required for unmasked
access and choose when to write a trace (always, never, only if
unmasked). Further details can be configured (which digits should be
masked in which way, etc. )
• These settings are sufficient to activate masking of data in lists and
ALV grids, as exemplified for transaction SE16n (in case of conversion
exit based masking, also business transactions are covered).
• In edit mode for such table views, the masked values are offered in
display mode only (or are being hidden).
• Data masking also applies to export/ download and print of relevant
data.
• The option to generate conversion exits allows to determine which of
the available technologies to employ for masking.
UI Masking
Case study: data masking in SE16, SE16n, SE11, etc.
25PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
• For masking of data fields in Dynpro views (generated programmatically) without
conversion exits, the configuration needs to be enriched with the relevant program
names and UI number.
• A given database field can be utilized by different programs for different Dynpro
transactions, all of which need to be identified for consistent masking results.
• This task is mainly taken up by a mass configuration report.
• With these settings, data in a Dynpro field can be masked in a
modification free approach. In this example, the field content is
being replaced by stars over the whole length of the field.
Protected fields are also offered in display mode, even if the
user switches to edit mode.
UI Masking
Usage Example: Masking in dynpro-UIs
29PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Masking: supporting your GDPR project
• restrict data access
è supports “privacy by default” and “privacy by design”
• suppress/change data field values on UI level
è supports data pseudonymization and anonymization
è supports restriction of data processing
è supports compliant cross-border data transfers (display/export)
31PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Masking
Success Story: CF Industries, Chemicals (US)
A take on what other customers think:
Check out CF Industries' experience!
UI Logging
33PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
4. Aggregate &
detect (ETD, …)
Key functionality: log, notice, analyze
1. Log data
access
2. Automatic
alert
3. in-depth
analysis
35PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Logging
The log – the key element of UI Logging
• Logging based on roundtrips (frontendàserveràfrontend)
• filtering options to control log file size
• efficient analysis: log data organized with unique <name> àvalue pairs
• on demand: detailed analysis of log file via Log Analyzer
• real time: configurable alerts/notifications
• automated: integrated with ETD à usable as powerful data source
transaction: PA30
“Maintain HR Data”
Infotype 8
“Basic Pay”
40PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Logging: supporting your GDPR project
• provide information baseline of data access:
è supports personal data breach notification “in time and quality”
è supports effective co-operation in case of review
è facilitates identification and investigation of irregular data usage.
• reduces non-task related data access
è decreases the probability and magnitude of a data leak occurring.
41PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
• Log exactly which what a user requested and which data he really obtained (on screen, print, export…)
as well as context of data access (user, IP…)
• efficient identification and meaningful analysis of data threats:
• real time: configurable alerts/notifications
• on demand: detailed analysis of log file via Log Analyzer
• automated: integrated with ETD à usable as powerful data source
• “Quick start” – define on transaction level which data to log. Then refine scope (on view or field level)
• Define Users/Roles to be excluded/included for logging
• BAdI to implement complex business logic
• Based on SAP Netweaver, supporting multiple UI technologies (channels)
• Completely in background with minimal impact on system performance, and imperceptible to users
• Log is “reinforced” – access for authorized users only, and log data can be encrypted
• Archiving functionality for the log file
UI Logging
Functional scope & highlights
42PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Logging
Success Story: Hannover Medical School (Germany)
A take on what customers think:
Check out Hannover Medical School's experience!
mail product management
uilogging@sap.com
uimasking@sap.com
Contact us
Deepak Gupta
Solution Manager UI Masking
T +91 124 385-7195
E deepak04.gupta@sap.com
http://www.sap.com/innovbizsolutions
SAP Innovative
Business Solutions
Martin Loitz
Solution Manager UI Logging
T +49 6227-7-48810
E martin.loitz@sap.com
http://www.sap.com/innovbizsolutions
SAP Innovative
Business Solutions
Tobias Keller
Product Manager UI Data Security
T +49 6227-7-74995
E tobias.keller@sap.com
http://www.sap.com/innovbizsolutions
SAP Innovative
Business Solutions
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company.
The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components
of other software vendors. National product specifications may vary.
These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated
companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are
set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.
In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release
any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products,
and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The
information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various
risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements,
and they should not be relied upon in making purchasing decisions.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company)
in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies.
See http://global.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices.
© 2018 SAP SE or an SAP affiliate company. All rights reserved.

More Related Content

What's hot

Microsoft Security Development Lifecycle
Microsoft Security Development LifecycleMicrosoft Security Development Lifecycle
Microsoft Security Development LifecycleRazi Rais
 
Software Quality Assurance
Software Quality Assurance Software Quality Assurance
Software Quality Assurance ShashankBajpai24
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfICS
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration ManagementChandan Chaurasia
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityAlert Logic
 
Domain-Specific Software Engineering
Domain-Specific Software EngineeringDomain-Specific Software Engineering
Domain-Specific Software Engineeringelliando dias
 
INTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERINGINTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERINGProf Ansari
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineeringsommerville-videos
 
Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models Satya P. Joshi
 
OWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityOWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityMatt Tesauro
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Mohammed A. Imran
 
Principles of SAP HANA Sizing - on premise and cloud-1.pdf
Principles of SAP HANA Sizing - on premise and cloud-1.pdfPrinciples of SAP HANA Sizing - on premise and cloud-1.pdf
Principles of SAP HANA Sizing - on premise and cloud-1.pdfCharithNilangaWeeras
 
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...gmaran23
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice Saqib Raza
 

What's hot (20)

SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
 
Microsoft Security Development Lifecycle
Microsoft Security Development LifecycleMicrosoft Security Development Lifecycle
Microsoft Security Development Lifecycle
 
Software Quality Assurance
Software Quality Assurance Software Quality Assurance
Software Quality Assurance
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
Domain-Specific Software Engineering
Domain-Specific Software EngineeringDomain-Specific Software Engineering
Domain-Specific Software Engineering
 
DevOps or DevSecOps
DevOps or DevSecOpsDevOps or DevSecOps
DevOps or DevSecOps
 
INTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERINGINTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERING
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
 
Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models
 
OWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityOWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security Sanity
 
Agile software development
Agile software developmentAgile software development
Agile software development
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
 
Principles of SAP HANA Sizing - on premise and cloud-1.pdf
Principles of SAP HANA Sizing - on premise and cloud-1.pdfPrinciples of SAP HANA Sizing - on premise and cloud-1.pdf
Principles of SAP HANA Sizing - on premise and cloud-1.pdf
 
Chaos Engineering
Chaos EngineeringChaos Engineering
Chaos Engineering
 
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...
Automating Web Application Security Testing With OWASP ZAP DOT NET API - Tech...
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 

Similar to Improve Data Protection and Compliance with UI-Level Logging and Masking

Integrating Application Security into a Software Development Process
Integrating Application Security into a Software Development ProcessIntegrating Application Security into a Software Development Process
Integrating Application Security into a Software Development ProcessAchim D. Brucker
 
Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...Achim D. Brucker
 
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...akquinet enterprise solutions GmbH
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscapeDharma Atluri
 
SAP Systems in the Cloud (Oct 2010)
SAP Systems in the Cloud (Oct 2010)SAP Systems in the Cloud (Oct 2010)
SAP Systems in the Cloud (Oct 2010)Frank Stienhans
 
In-Memory Database Platform for Big Data
In-Memory Database Platform for Big DataIn-Memory Database Platform for Big Data
In-Memory Database Platform for Big DataSAP Technology
 
SAP AC020 - Investment Management
SAP AC020 - Investment ManagementSAP AC020 - Investment Management
SAP AC020 - Investment ManagementVannak9
 
CO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdfCO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdfssuser878ec2
 
Kamanja: Driving Business Value through Real-Time Decisioning Solutions
Kamanja: Driving Business Value through Real-Time Decisioning SolutionsKamanja: Driving Business Value through Real-Time Decisioning Solutions
Kamanja: Driving Business Value through Real-Time Decisioning SolutionsGreg Makowski
 
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...Codemotion
 
In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015Software AG
 
Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...
 Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos... Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...
Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...Senturus
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick TourActive Base
 
Big Data for Product Managers
Big Data for Product ManagersBig Data for Product Managers
Big Data for Product ManagersPentaho
 
From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...Capgemini
 

Similar to Improve Data Protection and Compliance with UI-Level Logging and Masking (20)

Integrating Application Security into a Software Development Process
Integrating Application Security into a Software Development ProcessIntegrating Application Security into a Software Development Process
Integrating Application Security into a Software Development Process
 
Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]
 
Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...
 
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
 
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
 
SAP Systems in the Cloud (Oct 2010)
SAP Systems in the Cloud (Oct 2010)SAP Systems in the Cloud (Oct 2010)
SAP Systems in the Cloud (Oct 2010)
 
In-Memory Database Platform for Big Data
In-Memory Database Platform for Big DataIn-Memory Database Platform for Big Data
In-Memory Database Platform for Big Data
 
SAP AC020 - Investment Management
SAP AC020 - Investment ManagementSAP AC020 - Investment Management
SAP AC020 - Investment Management
 
CO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdfCO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdf
 
Kamanja: Driving Business Value through Real-Time Decisioning Solutions
Kamanja: Driving Business Value through Real-Time Decisioning SolutionsKamanja: Driving Business Value through Real-Time Decisioning Solutions
Kamanja: Driving Business Value through Real-Time Decisioning Solutions
 
AI at Scale in Enterprises
AI at Scale in Enterprises AI at Scale in Enterprises
AI at Scale in Enterprises
 
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
 
Sap education knoa
Sap education   knoa Sap education   knoa
Sap education knoa
 
In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015
 
Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...
 Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos... Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...
Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick Tour
 
Big Data for Product Managers
Big Data for Product ManagersBig Data for Product Managers
Big Data for Product Managers
 
From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...
 
SnappyFlow Presentation.pdf
SnappyFlow Presentation.pdfSnappyFlow Presentation.pdf
SnappyFlow Presentation.pdf
 

More from Patric Dahse

SAP Cloud for Energy Webinar Series Part 1
SAP Cloud for Energy Webinar Series Part 1SAP Cloud for Energy Webinar Series Part 1
SAP Cloud for Energy Webinar Series Part 1Patric Dahse
 
Webcast DSGVO im bw
Webcast DSGVO im bwWebcast DSGVO im bw
Webcast DSGVO im bwPatric Dahse
 
Webinar mit TakeASP: Ent-personalisierung
Webinar mit TakeASP: Ent-personalisierungWebinar mit TakeASP: Ent-personalisierung
Webinar mit TakeASP: Ent-personalisierungPatric Dahse
 
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)Patric Dahse
 
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt?
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt? Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt?
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt? Patric Dahse
 
Steigern Sie Ihre Prozessexzellenz mit Celonis Process Mining
Steigern Sie Ihre Prozessexzellenz mit Celonis Process MiningSteigern Sie Ihre Prozessexzellenz mit Celonis Process Mining
Steigern Sie Ihre Prozessexzellenz mit Celonis Process MiningPatric Dahse
 
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)Patric Dahse
 
Data Security und Data Privacy: Read Access Logging
Data Security und Data Privacy: Read Access LoggingData Security und Data Privacy: Read Access Logging
Data Security und Data Privacy: Read Access LoggingPatric Dahse
 
Russian: Webcast Security Anonymization (TDA)
Russian: Webcast Security Anonymization (TDA)Russian: Webcast Security Anonymization (TDA)
Russian: Webcast Security Anonymization (TDA)Patric Dahse
 
Webcast Security & Data Privacy: Anonymization
Webcast Security & Data Privacy: AnonymizationWebcast Security & Data Privacy: Anonymization
Webcast Security & Data Privacy: AnonymizationPatric Dahse
 
Doing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and doDoing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and doPatric Dahse
 
How is GDPR relevant for US companies
How is GDPR relevant for US companies How is GDPR relevant for US companies
How is GDPR relevant for US companies Patric Dahse
 
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud Platform
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud PlatformWebcast Nr. 3 - Java Entwicklung mit der SAP Cloud Platform
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud PlatformPatric Dahse
 
Webcast SAP Cloud Platform 2 - Developing Tools
Webcast SAP Cloud Platform 2 - Developing ToolsWebcast SAP Cloud Platform 2 - Developing Tools
Webcast SAP Cloud Platform 2 - Developing ToolsPatric Dahse
 
Webcast SAP Cloud Platform No. 1: On-Boarding
Webcast SAP Cloud Platform No. 1: On-BoardingWebcast SAP Cloud Platform No. 1: On-Boarding
Webcast SAP Cloud Platform No. 1: On-BoardingPatric Dahse
 
Webcast Security No. 8 - Read Access Logging (RAL)
Webcast Security No. 8 - Read Access Logging (RAL)Webcast Security No. 8 - Read Access Logging (RAL)
Webcast Security No. 8 - Read Access Logging (RAL)Patric Dahse
 
Data Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationData Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationPatric Dahse
 
Einfaches Sperren und Löschen / SAP Information LifeCycle Management
Einfaches Sperren und Löschen / SAP Information LifeCycle ManagementEinfaches Sperren und Löschen / SAP Information LifeCycle Management
Einfaches Sperren und Löschen / SAP Information LifeCycle ManagementPatric Dahse
 
Neue umsatzsteuerliche Berechnungsgrundlage des Gemeinderabatts
Neue umsatzsteuerliche Berechnungsgrundlage des GemeinderabattsNeue umsatzsteuerliche Berechnungsgrundlage des Gemeinderabatts
Neue umsatzsteuerliche Berechnungsgrundlage des GemeinderabattsPatric Dahse
 
Abrechnungsprozesse im wettbewerblichen Meßstellenbetrieb
Abrechnungsprozesse im wettbewerblichen MeßstellenbetriebAbrechnungsprozesse im wettbewerblichen Meßstellenbetrieb
Abrechnungsprozesse im wettbewerblichen MeßstellenbetriebPatric Dahse
 

More from Patric Dahse (20)

SAP Cloud for Energy Webinar Series Part 1
SAP Cloud for Energy Webinar Series Part 1SAP Cloud for Energy Webinar Series Part 1
SAP Cloud for Energy Webinar Series Part 1
 
Webcast DSGVO im bw
Webcast DSGVO im bwWebcast DSGVO im bw
Webcast DSGVO im bw
 
Webinar mit TakeASP: Ent-personalisierung
Webinar mit TakeASP: Ent-personalisierungWebinar mit TakeASP: Ent-personalisierung
Webinar mit TakeASP: Ent-personalisierung
 
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)
 
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt?
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt? Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt?
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt?
 
Steigern Sie Ihre Prozessexzellenz mit Celonis Process Mining
Steigern Sie Ihre Prozessexzellenz mit Celonis Process MiningSteigern Sie Ihre Prozessexzellenz mit Celonis Process Mining
Steigern Sie Ihre Prozessexzellenz mit Celonis Process Mining
 
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)
 
Data Security und Data Privacy: Read Access Logging
Data Security und Data Privacy: Read Access LoggingData Security und Data Privacy: Read Access Logging
Data Security und Data Privacy: Read Access Logging
 
Russian: Webcast Security Anonymization (TDA)
Russian: Webcast Security Anonymization (TDA)Russian: Webcast Security Anonymization (TDA)
Russian: Webcast Security Anonymization (TDA)
 
Webcast Security & Data Privacy: Anonymization
Webcast Security & Data Privacy: AnonymizationWebcast Security & Data Privacy: Anonymization
Webcast Security & Data Privacy: Anonymization
 
Doing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and doDoing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and do
 
How is GDPR relevant for US companies
How is GDPR relevant for US companies How is GDPR relevant for US companies
How is GDPR relevant for US companies
 
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud Platform
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud PlatformWebcast Nr. 3 - Java Entwicklung mit der SAP Cloud Platform
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud Platform
 
Webcast SAP Cloud Platform 2 - Developing Tools
Webcast SAP Cloud Platform 2 - Developing ToolsWebcast SAP Cloud Platform 2 - Developing Tools
Webcast SAP Cloud Platform 2 - Developing Tools
 
Webcast SAP Cloud Platform No. 1: On-Boarding
Webcast SAP Cloud Platform No. 1: On-BoardingWebcast SAP Cloud Platform No. 1: On-Boarding
Webcast SAP Cloud Platform No. 1: On-Boarding
 
Webcast Security No. 8 - Read Access Logging (RAL)
Webcast Security No. 8 - Read Access Logging (RAL)Webcast Security No. 8 - Read Access Logging (RAL)
Webcast Security No. 8 - Read Access Logging (RAL)
 
Data Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationData Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data Anonymization
 
Einfaches Sperren und Löschen / SAP Information LifeCycle Management
Einfaches Sperren und Löschen / SAP Information LifeCycle ManagementEinfaches Sperren und Löschen / SAP Information LifeCycle Management
Einfaches Sperren und Löschen / SAP Information LifeCycle Management
 
Neue umsatzsteuerliche Berechnungsgrundlage des Gemeinderabatts
Neue umsatzsteuerliche Berechnungsgrundlage des GemeinderabattsNeue umsatzsteuerliche Berechnungsgrundlage des Gemeinderabatts
Neue umsatzsteuerliche Berechnungsgrundlage des Gemeinderabatts
 
Abrechnungsprozesse im wettbewerblichen Meßstellenbetrieb
Abrechnungsprozesse im wettbewerblichen MeßstellenbetriebAbrechnungsprozesse im wettbewerblichen Meßstellenbetrieb
Abrechnungsprozesse im wettbewerblichen Meßstellenbetrieb
 

Recently uploaded

Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 

Recently uploaded (20)

Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 

Improve Data Protection and Compliance with UI-Level Logging and Masking

  • 1. PUBLIC SAP UI Data Security UI Logging and UI Masking solutions Tobias Keller, Product Manager v322 – 2018-01-31 SAP Innovative Business Solutions
  • 3. 6PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public data security threat legal requirements (compliance) internal requirements (decrease of financial risk) personal information valuable business information commercial motivation: protection of the organization political motivation: protection of individuals UI Data Security – driving factors Compliance & financial risk of data security breaches
  • 4. 7PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Data Security Data protection requirements • increasing number and severity of data protection regulations worldwide (EU-GDPR, HIPAA, PIPEDA, PIPA, SOX, DPA…) • commonly protecting personal information (employees, customers, suppliers…) • rising compliance infringement cost (discovery, fines, litigation; personal fines) • deteriorating competitive situation (recipes stolen, employees poached, customer contacts leaked, supplier prices publicized…) • lost trust = lost business (customers, suppliers, financial markets…) • efficiency impact (countermeasures, suspicious employees; management stability…) legal requirements – protection of individual information internal requirements – protection of business critical data assets
  • 5. 8PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Data Security – the threat from inside A threat vector often underestimated – but substantial and difficult to tackle
  • 7. 10PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Data Security: two step approach to protect data from insiders UI Masking: hiding unnecessary data; UI Logging: enabling analysis of data access to keep data accessible, but log & analyze access, to take appropriate measures The solution provides a detailed, structured data access log and allows for analysis who exactly received which data (output), how (input), and in which context (IP…)? è prevent illegitimate data access and theft by inducing compliant behavior è identify & prove irregular data access to conceal specific data (values in fields/columns) – unless required for tasks The solution masks sensitive (configured) values per default; unmasking requires explicit access rights (on top of existing role/authorization setup) è make data elements unavailable for data abuse (opportunistic and targeted) • awareness for data security (“human firewall”) à protect employees by decreasing inadvertent breaches • top-of-class protection measures à trust (employees, customers, and investors) UI Masking UI Logging “the speed limiter” “the speed camera”
  • 8. 11PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public SAP Backend System SAP UI (user) Dynpro Processor Request Response Database LayerBusiness Logic UI Logging observed data traffic asynchronous call of log & filtering service Enterprise Threat DetectionAlert (e.g. email) Log Analyzer • UI Masking and UI Logging can be used individually or jointly, depending on the required functionality • add-ons to SAP NetWeaver: • secure server-based logging/masking, • modification free, • minimal performance impact. UI Data Security High level solution architecture (example: SAP GUI) UI Masking masked data original data configuration & BAdIs Apply masking rules
  • 9. 12PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI technology UI Masking UI Logging SAP GUI for Windows / HTML / Java ü ü WebDynpro ABAP ü ü CRM Web Client UI ü ü RFC/BAPI and Web Services project based ü BW Access (BEx Web/Analyser, BW-IP, BICS, MDX) project based ü UI5/Fiori ü ü Availability: 10 “channels” (Q1/2018) • Based on SAP NetWeaver (cf. RCS Availability Matrix or contact product management for detailed requirements) • Available for ECC, HEC, Suite on HANA, S/4HANA • Maintenance: integrated into standard maintenance, planned until end 2025 • Enhancements and adaptations can be delivered on request
  • 10. 14PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public • Installation of add-ons with SAINT conducted by customer (ERP/basis team) • Implementation support efforts – based on experience (”typical” scope and requirements) Service option 1: enablement/jump start • Set-up workshop for requirements, installation support, baseline configuration, KT and Ramp Up session. • Effort: commonly 5 PD per channel, duration ca. 1-2 weeks, preferably onsite. • Service option 2: implementation • As above, but also implementation of functional scope, test support, go-live support. • Effort ca. 20 – 25PD per channel; preferably 1 week onsite; then remote. • Customer enablement of an in-house resource to handle the main parts of the execution phase of the implementation, and support subsequent changes in requirement and configuration. Implementation – exemplary
  • 11. 17PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Wrap-up: High quality, low TCO • UI Masking: unique functionality for SAP screens/applications • UI Logging: premium offering from SAP in data access logging Unique Coverage of the “insider” risk ècompliance & decrease risk exposure • Aligned with SAP standard è secure, performant, future proof • quick implementation, support by product team è low TCO
  • 13. 19PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Masking Refine data access into transactions Data masking: UI layer on server side • business and technical transactions • download, export, print Highly configurable • what: on field level (inside transactions) • how: pattern • who: role required for unmasked access • BADIs to introduce additional logic Aligned with SAP standard Based on SAP NetWeaver releases 7.00 – 7.50 Maintenance: planned until 31.12.2025 Further enhancements on request
  • 14. 24PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Please note: the following sequence is to exemplify how UI Masking config technically works The actual config creation would be mainly taken over by a mass configuration utility included in the product. • Create a new entry in the general masking config transaction for the field to be masked, here end date. • Next to table and field name, set the role required for unmasked access and choose when to write a trace (always, never, only if unmasked). Further details can be configured (which digits should be masked in which way, etc. ) • These settings are sufficient to activate masking of data in lists and ALV grids, as exemplified for transaction SE16n (in case of conversion exit based masking, also business transactions are covered). • In edit mode for such table views, the masked values are offered in display mode only (or are being hidden). • Data masking also applies to export/ download and print of relevant data. • The option to generate conversion exits allows to determine which of the available technologies to employ for masking. UI Masking Case study: data masking in SE16, SE16n, SE11, etc.
  • 15. 25PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public • For masking of data fields in Dynpro views (generated programmatically) without conversion exits, the configuration needs to be enriched with the relevant program names and UI number. • A given database field can be utilized by different programs for different Dynpro transactions, all of which need to be identified for consistent masking results. • This task is mainly taken up by a mass configuration report. • With these settings, data in a Dynpro field can be masked in a modification free approach. In this example, the field content is being replaced by stars over the whole length of the field. Protected fields are also offered in display mode, even if the user switches to edit mode. UI Masking Usage Example: Masking in dynpro-UIs
  • 16. 29PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Masking: supporting your GDPR project • restrict data access è supports “privacy by default” and “privacy by design” • suppress/change data field values on UI level è supports data pseudonymization and anonymization è supports restriction of data processing è supports compliant cross-border data transfers (display/export)
  • 17. 31PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Masking Success Story: CF Industries, Chemicals (US) A take on what other customers think: Check out CF Industries' experience!
  • 19. 33PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public 4. Aggregate & detect (ETD, …) Key functionality: log, notice, analyze 1. Log data access 2. Automatic alert 3. in-depth analysis
  • 20. 35PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Logging The log – the key element of UI Logging • Logging based on roundtrips (frontendàserveràfrontend) • filtering options to control log file size • efficient analysis: log data organized with unique <name> àvalue pairs • on demand: detailed analysis of log file via Log Analyzer • real time: configurable alerts/notifications • automated: integrated with ETD à usable as powerful data source transaction: PA30 “Maintain HR Data” Infotype 8 “Basic Pay”
  • 21. 40PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Logging: supporting your GDPR project • provide information baseline of data access: è supports personal data breach notification “in time and quality” è supports effective co-operation in case of review è facilitates identification and investigation of irregular data usage. • reduces non-task related data access è decreases the probability and magnitude of a data leak occurring.
  • 22. 41PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public • Log exactly which what a user requested and which data he really obtained (on screen, print, export…) as well as context of data access (user, IP…) • efficient identification and meaningful analysis of data threats: • real time: configurable alerts/notifications • on demand: detailed analysis of log file via Log Analyzer • automated: integrated with ETD à usable as powerful data source • “Quick start” – define on transaction level which data to log. Then refine scope (on view or field level) • Define Users/Roles to be excluded/included for logging • BAdI to implement complex business logic • Based on SAP Netweaver, supporting multiple UI technologies (channels) • Completely in background with minimal impact on system performance, and imperceptible to users • Log is “reinforced” – access for authorized users only, and log data can be encrypted • Archiving functionality for the log file UI Logging Functional scope & highlights
  • 23. 42PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Logging Success Story: Hannover Medical School (Germany) A take on what customers think: Check out Hannover Medical School's experience!
  • 24. mail product management uilogging@sap.com uimasking@sap.com Contact us Deepak Gupta Solution Manager UI Masking T +91 124 385-7195 E deepak04.gupta@sap.com http://www.sap.com/innovbizsolutions SAP Innovative Business Solutions Martin Loitz Solution Manager UI Logging T +49 6227-7-48810 E martin.loitz@sap.com http://www.sap.com/innovbizsolutions SAP Innovative Business Solutions Tobias Keller Product Manager UI Data Security T +49 6227-7-74995 E tobias.keller@sap.com http://www.sap.com/innovbizsolutions SAP Innovative Business Solutions
  • 25. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, and they should not be relied upon in making purchasing decisions. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. See http://global.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. © 2018 SAP SE or an SAP affiliate company. All rights reserved.