SlideShare a Scribd company logo
PUBLIC
SAP UI Data Security
UI Logging and UI Masking solutions
Tobias Keller, Product Manager
v322 – 2018-01-31
SAP
Innovative
Business
Solutions
Data Protection
01010100101010100
10100101001011000
10010101011011100
10010101000101110
01101010101001010
10100101010010101
01001010101001010
01010010110001001
01010110111001001
01010001011100110
6PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
data security threat
legal requirements
(compliance)
internal requirements
(decrease of financial
risk)
personal information
valuable business
information
commercial
motivation:
protection of the
organization
political
motivation:
protection of
individuals
UI Data Security – driving factors
Compliance & financial risk of data security breaches
7PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Data Security
Data protection requirements
• increasing number and severity of data
protection regulations worldwide
(EU-GDPR, HIPAA, PIPEDA, PIPA, SOX, DPA…)
• commonly protecting personal information
(employees, customers, suppliers…)
• rising compliance infringement cost
(discovery, fines, litigation; personal fines)
• deteriorating competitive situation (recipes
stolen, employees poached, customer
contacts leaked, supplier prices
publicized…)
• lost trust = lost business
(customers, suppliers, financial markets…)
• efficiency impact
(countermeasures, suspicious employees;
management stability…)
legal requirements –
protection of individual
information
internal requirements –
protection of business
critical data assets
8PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Data Security – the threat from inside
A threat vector often underestimated – but substantial and difficult to tackle
Two step approach
10PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Data Security: two step approach to protect data from insiders
UI Masking: hiding unnecessary data; UI Logging: enabling analysis of data access
to keep data accessible, but log & analyze
access, to take appropriate measures
The solution provides a detailed, structured data access
log and allows for analysis who exactly received which
data (output), how (input), and in which context (IP…)?
è prevent illegitimate data access and theft
by inducing compliant behavior
è identify & prove irregular data access
to conceal specific data (values in
fields/columns) – unless required for tasks
The solution masks sensitive (configured) values per
default; unmasking requires explicit access rights (on
top of existing role/authorization setup)
è make data elements unavailable for data abuse
(opportunistic and targeted)
• awareness for data security (“human firewall”) à protect employees by decreasing inadvertent breaches
• top-of-class protection measures à trust (employees, customers, and investors)
UI Masking UI Logging
“the speed limiter” “the speed camera”
11PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
SAP Backend System
SAP UI (user)
Dynpro Processor
Request
Response
Database LayerBusiness Logic
UI Logging
observed data
traffic
asynchronous call of
log & filtering service
Enterprise Threat DetectionAlert (e.g. email) Log Analyzer
• UI Masking and UI Logging can be used individually or jointly, depending on the required functionality
• add-ons to SAP NetWeaver:
• secure server-based logging/masking,
• modification free,
• minimal performance impact.
UI Data Security
High level solution architecture (example: SAP GUI)
UI Masking
masked data
original data configuration & BAdIs
Apply masking rules
12PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI technology UI Masking UI Logging
SAP GUI for Windows / HTML / Java ü ü
WebDynpro ABAP ü ü
CRM Web Client UI ü ü
RFC/BAPI and Web Services project based ü
BW Access (BEx Web/Analyser, BW-IP, BICS, MDX) project based ü
UI5/Fiori ü ü
Availability: 10 “channels” (Q1/2018)
• Based on SAP NetWeaver (cf. RCS Availability Matrix or contact product management for detailed requirements)
• Available for ECC, HEC, Suite on HANA, S/4HANA
• Maintenance: integrated into standard maintenance, planned until end 2025
• Enhancements and adaptations can be delivered on request
14PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
• Installation of add-ons with SAINT conducted by customer (ERP/basis team)
• Implementation support efforts – based on experience (”typical” scope and requirements)
Service option 1: enablement/jump start
• Set-up workshop for requirements, installation support, baseline configuration, KT and Ramp
Up session.
• Effort: commonly 5 PD per channel, duration ca. 1-2 weeks, preferably onsite.
• Service option 2: implementation
• As above, but also implementation of functional scope, test support, go-live support.
• Effort ca. 20 – 25PD per channel; preferably 1 week onsite; then remote.
• Customer enablement of an in-house resource to handle the main parts of the execution phase of the
implementation, and support subsequent changes in requirement and configuration.
Implementation – exemplary
17PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Wrap-up: High quality, low TCO
• UI Masking: unique functionality for SAP screens/applications
• UI Logging: premium offering from SAP in data access logging
Unique Coverage of the “insider” risk
ècompliance & decrease risk exposure
• Aligned with SAP standard è secure, performant, future proof
• quick implementation, support by product team è low TCO
UI Masking
19PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Masking
Refine data access into transactions
Data masking: UI layer on server side
• business and technical transactions
• download, export, print
Highly configurable
• what: on field level (inside transactions)
• how: pattern
• who: role required for unmasked access
• BADIs to introduce additional logic
Aligned with SAP standard
Based on SAP NetWeaver releases 7.00 – 7.50
Maintenance: planned until 31.12.2025
Further enhancements on request
24PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Please note: the following sequence is to exemplify how UI
Masking config technically works
The actual config creation would be mainly taken over by a
mass configuration utility included in the product.
• Create a new entry in the general masking config transaction for the
field to be masked, here end date.
• Next to table and field name, set the role required for unmasked
access and choose when to write a trace (always, never, only if
unmasked). Further details can be configured (which digits should be
masked in which way, etc. )
• These settings are sufficient to activate masking of data in lists and
ALV grids, as exemplified for transaction SE16n (in case of conversion
exit based masking, also business transactions are covered).
• In edit mode for such table views, the masked values are offered in
display mode only (or are being hidden).
• Data masking also applies to export/ download and print of relevant
data.
• The option to generate conversion exits allows to determine which of
the available technologies to employ for masking.
UI Masking
Case study: data masking in SE16, SE16n, SE11, etc.
25PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
• For masking of data fields in Dynpro views (generated programmatically) without
conversion exits, the configuration needs to be enriched with the relevant program
names and UI number.
• A given database field can be utilized by different programs for different Dynpro
transactions, all of which need to be identified for consistent masking results.
• This task is mainly taken up by a mass configuration report.
• With these settings, data in a Dynpro field can be masked in a
modification free approach. In this example, the field content is
being replaced by stars over the whole length of the field.
Protected fields are also offered in display mode, even if the
user switches to edit mode.
UI Masking
Usage Example: Masking in dynpro-UIs
29PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Masking: supporting your GDPR project
• restrict data access
è supports “privacy by default” and “privacy by design”
• suppress/change data field values on UI level
è supports data pseudonymization and anonymization
è supports restriction of data processing
è supports compliant cross-border data transfers (display/export)
31PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Masking
Success Story: CF Industries, Chemicals (US)
A take on what other customers think:
Check out CF Industries' experience!
UI Logging
33PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
4. Aggregate &
detect (ETD, …)
Key functionality: log, notice, analyze
1. Log data
access
2. Automatic
alert
3. in-depth
analysis
35PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Logging
The log – the key element of UI Logging
• Logging based on roundtrips (frontendàserveràfrontend)
• filtering options to control log file size
• efficient analysis: log data organized with unique <name> àvalue pairs
• on demand: detailed analysis of log file via Log Analyzer
• real time: configurable alerts/notifications
• automated: integrated with ETD à usable as powerful data source
transaction: PA30
“Maintain HR Data”
Infotype 8
“Basic Pay”
40PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Logging: supporting your GDPR project
• provide information baseline of data access:
è supports personal data breach notification “in time and quality”
è supports effective co-operation in case of review
è facilitates identification and investigation of irregular data usage.
• reduces non-task related data access
è decreases the probability and magnitude of a data leak occurring.
41PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
• Log exactly which what a user requested and which data he really obtained (on screen, print, export…)
as well as context of data access (user, IP…)
• efficient identification and meaningful analysis of data threats:
• real time: configurable alerts/notifications
• on demand: detailed analysis of log file via Log Analyzer
• automated: integrated with ETD à usable as powerful data source
• “Quick start” – define on transaction level which data to log. Then refine scope (on view or field level)
• Define Users/Roles to be excluded/included for logging
• BAdI to implement complex business logic
• Based on SAP Netweaver, supporting multiple UI technologies (channels)
• Completely in background with minimal impact on system performance, and imperceptible to users
• Log is “reinforced” – access for authorized users only, and log data can be encrypted
• Archiving functionality for the log file
UI Logging
Functional scope & highlights
42PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
UI Logging
Success Story: Hannover Medical School (Germany)
A take on what customers think:
Check out Hannover Medical School's experience!
mail product management
uilogging@sap.com
uimasking@sap.com
Contact us
Deepak Gupta
Solution Manager UI Masking
T +91 124 385-7195
E deepak04.gupta@sap.com
http://www.sap.com/innovbizsolutions
SAP Innovative
Business Solutions
Martin Loitz
Solution Manager UI Logging
T +49 6227-7-48810
E martin.loitz@sap.com
http://www.sap.com/innovbizsolutions
SAP Innovative
Business Solutions
Tobias Keller
Product Manager UI Data Security
T +49 6227-7-74995
E tobias.keller@sap.com
http://www.sap.com/innovbizsolutions
SAP Innovative
Business Solutions
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company.
The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components
of other software vendors. National product specifications may vary.
These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated
companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are
set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.
In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release
any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products,
and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The
information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various
risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements,
and they should not be relied upon in making purchasing decisions.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company)
in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies.
See http://global.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices.
© 2018 SAP SE or an SAP affiliate company. All rights reserved.

More Related Content

What's hot

Modern Enterprise integration Strategies
Modern Enterprise integration StrategiesModern Enterprise integration Strategies
Modern Enterprise integration Strategies
Jesus Rodriguez
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
Aruba, a Hewlett Packard Enterprise company
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL Introduction
Ravi Kiran
 
GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization
Patric Dahse
 
webMethods 10.5 and webMethods.io Integration: Everything You Must Know
webMethods 10.5 and webMethods.io Integration: Everything You Must KnowwebMethods 10.5 and webMethods.io Integration: Everything You Must Know
webMethods 10.5 and webMethods.io Integration: Everything You Must Know
Kellton Tech Solutions Ltd
 
Cyberark training ppt
Cyberark training pptCyberark training ppt
Cyberark training ppt
Akhil Kumar
 
MuleSoft for Enterprises
MuleSoft for EnterprisesMuleSoft for Enterprises
MuleSoft for Enterprises
PrashantGolani1
 
MuleSoft Anypoint Platform and Three Tier Architecture
MuleSoft Anypoint  Platform and Three Tier ArchitectureMuleSoft Anypoint  Platform and Three Tier Architecture
MuleSoft Anypoint Platform and Three Tier Architecture
Harish Kumar
 
Client presentation disaster recovery as a service
Client presentation   disaster recovery as a serviceClient presentation   disaster recovery as a service
Client presentation disaster recovery as a service
Ajay V Singh
 
Mulesoft Connections to different companies, and different services
Mulesoft Connections to different companies, and different servicesMulesoft Connections to different companies, and different services
Mulesoft Connections to different companies, and different services
Byreddy Sravan Kumar Reddy
 
Vanrish Mulesoft Integration architect ppt
Vanrish Mulesoft Integration architect pptVanrish Mulesoft Integration architect ppt
Vanrish Mulesoft Integration architect ppt
Rajnish Kumar
 
Washington DC MuleSoft Meetup: CI/CD Pipeline with MuleSoft and Azure DevOps
Washington DC MuleSoft Meetup: CI/CD Pipeline with MuleSoft and Azure DevOpsWashington DC MuleSoft Meetup: CI/CD Pipeline with MuleSoft and Azure DevOps
Washington DC MuleSoft Meetup: CI/CD Pipeline with MuleSoft and Azure DevOps
Big Compass
 
Introducing Anypoint Exchange 2.0
Introducing Anypoint Exchange 2.0Introducing Anypoint Exchange 2.0
Introducing Anypoint Exchange 2.0
MuleSoft
 
MuleSoft PKO - C4E and Platform Insights
MuleSoft PKO - C4E and Platform InsightsMuleSoft PKO - C4E and Platform Insights
MuleSoft PKO - C4E and Platform Insights
Angel Alberici
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
Anwesh Dixit
 
Microsoft Azure Overview | Cloud Computing Tutorial with Azure | Azure Traini...
Microsoft Azure Overview | Cloud Computing Tutorial with Azure | Azure Traini...Microsoft Azure Overview | Cloud Computing Tutorial with Azure | Azure Traini...
Microsoft Azure Overview | Cloud Computing Tutorial with Azure | Azure Traini...
Edureka!
 
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...
Jitendra Bafna
 
Adelaide Global Azure Bootcamp 2018 - Azure 101
Adelaide Global Azure Bootcamp 2018 - Azure 101Adelaide Global Azure Bootcamp 2018 - Azure 101
Adelaide Global Azure Bootcamp 2018 - Azure 101
Balabiju
 
Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
danb02
 

What's hot (20)

Modern Enterprise integration Strategies
Modern Enterprise integration StrategiesModern Enterprise integration Strategies
Modern Enterprise integration Strategies
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL Introduction
 
GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization
 
webMethods 10.5 and webMethods.io Integration: Everything You Must Know
webMethods 10.5 and webMethods.io Integration: Everything You Must KnowwebMethods 10.5 and webMethods.io Integration: Everything You Must Know
webMethods 10.5 and webMethods.io Integration: Everything You Must Know
 
Cyberark training ppt
Cyberark training pptCyberark training ppt
Cyberark training ppt
 
MuleSoft for Enterprises
MuleSoft for EnterprisesMuleSoft for Enterprises
MuleSoft for Enterprises
 
MuleSoft Anypoint Platform and Three Tier Architecture
MuleSoft Anypoint  Platform and Three Tier ArchitectureMuleSoft Anypoint  Platform and Three Tier Architecture
MuleSoft Anypoint Platform and Three Tier Architecture
 
Client presentation disaster recovery as a service
Client presentation   disaster recovery as a serviceClient presentation   disaster recovery as a service
Client presentation disaster recovery as a service
 
Mulesoft Connections to different companies, and different services
Mulesoft Connections to different companies, and different servicesMulesoft Connections to different companies, and different services
Mulesoft Connections to different companies, and different services
 
Vanrish Mulesoft Integration architect ppt
Vanrish Mulesoft Integration architect pptVanrish Mulesoft Integration architect ppt
Vanrish Mulesoft Integration architect ppt
 
Washington DC MuleSoft Meetup: CI/CD Pipeline with MuleSoft and Azure DevOps
Washington DC MuleSoft Meetup: CI/CD Pipeline with MuleSoft and Azure DevOpsWashington DC MuleSoft Meetup: CI/CD Pipeline with MuleSoft and Azure DevOps
Washington DC MuleSoft Meetup: CI/CD Pipeline with MuleSoft and Azure DevOps
 
Introducing Anypoint Exchange 2.0
Introducing Anypoint Exchange 2.0Introducing Anypoint Exchange 2.0
Introducing Anypoint Exchange 2.0
 
MuleSoft PKO - C4E and Platform Insights
MuleSoft PKO - C4E and Platform InsightsMuleSoft PKO - C4E and Platform Insights
MuleSoft PKO - C4E and Platform Insights
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Microsoft Azure Overview | Cloud Computing Tutorial with Azure | Azure Traini...
Microsoft Azure Overview | Cloud Computing Tutorial with Azure | Azure Traini...Microsoft Azure Overview | Cloud Computing Tutorial with Azure | Azure Traini...
Microsoft Azure Overview | Cloud Computing Tutorial with Azure | Azure Traini...
 
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...
 
Adelaide Global Azure Bootcamp 2018 - Azure 101
Adelaide Global Azure Bootcamp 2018 - Azure 101Adelaide Global Azure Bootcamp 2018 - Azure 101
Adelaide Global Azure Bootcamp 2018 - Azure 101
 
Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 

Similar to Improve Data Protection and Compliance with UI-Level Logging and Masking

Integrating Application Security into a Software Development Process
Integrating Application Security into a Software Development ProcessIntegrating Application Security into a Software Development Process
Integrating Application Security into a Software Development Process
Achim D. Brucker
 
Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]
akquinet enterprise solutions GmbH
 
Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...
Achim D. Brucker
 
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
akquinet enterprise solutions GmbH
 
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
SAP PartnerEdge program for Application Development
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Dharma Atluri
 
SAP Systems in the Cloud (Oct 2010)
SAP Systems in the Cloud (Oct 2010)SAP Systems in the Cloud (Oct 2010)
SAP Systems in the Cloud (Oct 2010)
Frank Stienhans
 
In-Memory Database Platform for Big Data
In-Memory Database Platform for Big DataIn-Memory Database Platform for Big Data
In-Memory Database Platform for Big Data
SAP Technology
 
SAP AC020 - Investment Management
SAP AC020 - Investment ManagementSAP AC020 - Investment Management
SAP AC020 - Investment Management
Vannak9
 
CO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdfCO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdf
ssuser878ec2
 
Kamanja: Driving Business Value through Real-Time Decisioning Solutions
Kamanja: Driving Business Value through Real-Time Decisioning SolutionsKamanja: Driving Business Value through Real-Time Decisioning Solutions
Kamanja: Driving Business Value through Real-Time Decisioning Solutions
Greg Makowski
 
AI at Scale in Enterprises
AI at Scale in Enterprises AI at Scale in Enterprises
AI at Scale in Enterprises
Ganesan Narayanasamy
 
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
Codemotion
 
Sap education knoa
Sap education   knoa Sap education   knoa
Sap education knoa
Marcelo C. Rolandelli
 
In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015
Software AG
 
Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...
 Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos... Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...
Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...
Senturus
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick TourActive Base
 
Big Data for Product Managers
Big Data for Product ManagersBig Data for Product Managers
Big Data for Product Managers
Pentaho
 
From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...
Capgemini
 
SnappyFlow Presentation.pdf
SnappyFlow Presentation.pdfSnappyFlow Presentation.pdf
SnappyFlow Presentation.pdf
SnappyFlowObservabil
 

Similar to Improve Data Protection and Compliance with UI-Level Logging and Masking (20)

Integrating Application Security into a Software Development Process
Integrating Application Security into a Software Development ProcessIntegrating Application Security into a Software Development Process
Integrating Application Security into a Software Development Process
 
Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]
 
Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...
 
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
 
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
 
SAP Systems in the Cloud (Oct 2010)
SAP Systems in the Cloud (Oct 2010)SAP Systems in the Cloud (Oct 2010)
SAP Systems in the Cloud (Oct 2010)
 
In-Memory Database Platform for Big Data
In-Memory Database Platform for Big DataIn-Memory Database Platform for Big Data
In-Memory Database Platform for Big Data
 
SAP AC020 - Investment Management
SAP AC020 - Investment ManagementSAP AC020 - Investment Management
SAP AC020 - Investment Management
 
CO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdfCO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdf
 
Kamanja: Driving Business Value through Real-Time Decisioning Solutions
Kamanja: Driving Business Value through Real-Time Decisioning SolutionsKamanja: Driving Business Value through Real-Time Decisioning Solutions
Kamanja: Driving Business Value through Real-Time Decisioning Solutions
 
AI at Scale in Enterprises
AI at Scale in Enterprises AI at Scale in Enterprises
AI at Scale in Enterprises
 
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
 
Sap education knoa
Sap education   knoa Sap education   knoa
Sap education knoa
 
In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015In-Memory Data Management Goes Mainstream - OpenSlava 2015
In-Memory Data Management Goes Mainstream - OpenSlava 2015
 
Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...
 Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos... Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...
Beyond PowerPlay: Choose the Right OLAP Tool for Your BI Environment (Cognos...
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick Tour
 
Big Data for Product Managers
Big Data for Product ManagersBig Data for Product Managers
Big Data for Product Managers
 
From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...From sensor data processing to proactive alerting and ai software ag - misja ...
From sensor data processing to proactive alerting and ai software ag - misja ...
 
SnappyFlow Presentation.pdf
SnappyFlow Presentation.pdfSnappyFlow Presentation.pdf
SnappyFlow Presentation.pdf
 

More from Patric Dahse

SAP Cloud for Energy Webinar Series Part 1
SAP Cloud for Energy Webinar Series Part 1SAP Cloud for Energy Webinar Series Part 1
SAP Cloud for Energy Webinar Series Part 1
Patric Dahse
 
Webcast DSGVO im bw
Webcast DSGVO im bwWebcast DSGVO im bw
Webcast DSGVO im bw
Patric Dahse
 
Webinar mit TakeASP: Ent-personalisierung
Webinar mit TakeASP: Ent-personalisierungWebinar mit TakeASP: Ent-personalisierung
Webinar mit TakeASP: Ent-personalisierung
Patric Dahse
 
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)
Patric Dahse
 
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt?
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt? Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt?
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt?
Patric Dahse
 
Steigern Sie Ihre Prozessexzellenz mit Celonis Process Mining
Steigern Sie Ihre Prozessexzellenz mit Celonis Process MiningSteigern Sie Ihre Prozessexzellenz mit Celonis Process Mining
Steigern Sie Ihre Prozessexzellenz mit Celonis Process Mining
Patric Dahse
 
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)
Patric Dahse
 
Data Security und Data Privacy: Read Access Logging
Data Security und Data Privacy: Read Access LoggingData Security und Data Privacy: Read Access Logging
Data Security und Data Privacy: Read Access Logging
Patric Dahse
 
Russian: Webcast Security Anonymization (TDA)
Russian: Webcast Security Anonymization (TDA)Russian: Webcast Security Anonymization (TDA)
Russian: Webcast Security Anonymization (TDA)
Patric Dahse
 
Webcast Security & Data Privacy: Anonymization
Webcast Security & Data Privacy: AnonymizationWebcast Security & Data Privacy: Anonymization
Webcast Security & Data Privacy: Anonymization
Patric Dahse
 
Doing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and doDoing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and do
Patric Dahse
 
How is GDPR relevant for US companies
How is GDPR relevant for US companies How is GDPR relevant for US companies
How is GDPR relevant for US companies
Patric Dahse
 
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud Platform
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud PlatformWebcast Nr. 3 - Java Entwicklung mit der SAP Cloud Platform
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud Platform
Patric Dahse
 
Webcast SAP Cloud Platform 2 - Developing Tools
Webcast SAP Cloud Platform 2 - Developing ToolsWebcast SAP Cloud Platform 2 - Developing Tools
Webcast SAP Cloud Platform 2 - Developing Tools
Patric Dahse
 
Webcast SAP Cloud Platform No. 1: On-Boarding
Webcast SAP Cloud Platform No. 1: On-BoardingWebcast SAP Cloud Platform No. 1: On-Boarding
Webcast SAP Cloud Platform No. 1: On-Boarding
Patric Dahse
 
Webcast Security No. 8 - Read Access Logging (RAL)
Webcast Security No. 8 - Read Access Logging (RAL)Webcast Security No. 8 - Read Access Logging (RAL)
Webcast Security No. 8 - Read Access Logging (RAL)
Patric Dahse
 
Data Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationData Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data Anonymization
Patric Dahse
 
Einfaches Sperren und Löschen / SAP Information LifeCycle Management
Einfaches Sperren und Löschen / SAP Information LifeCycle ManagementEinfaches Sperren und Löschen / SAP Information LifeCycle Management
Einfaches Sperren und Löschen / SAP Information LifeCycle Management
Patric Dahse
 
Neue umsatzsteuerliche Berechnungsgrundlage des Gemeinderabatts
Neue umsatzsteuerliche Berechnungsgrundlage des GemeinderabattsNeue umsatzsteuerliche Berechnungsgrundlage des Gemeinderabatts
Neue umsatzsteuerliche Berechnungsgrundlage des Gemeinderabatts
Patric Dahse
 
Abrechnungsprozesse im wettbewerblichen Meßstellenbetrieb
Abrechnungsprozesse im wettbewerblichen MeßstellenbetriebAbrechnungsprozesse im wettbewerblichen Meßstellenbetrieb
Abrechnungsprozesse im wettbewerblichen Meßstellenbetrieb
Patric Dahse
 

More from Patric Dahse (20)

SAP Cloud for Energy Webinar Series Part 1
SAP Cloud for Energy Webinar Series Part 1SAP Cloud for Energy Webinar Series Part 1
SAP Cloud for Energy Webinar Series Part 1
 
Webcast DSGVO im bw
Webcast DSGVO im bwWebcast DSGVO im bw
Webcast DSGVO im bw
 
Webinar mit TakeASP: Ent-personalisierung
Webinar mit TakeASP: Ent-personalisierungWebinar mit TakeASP: Ent-personalisierung
Webinar mit TakeASP: Ent-personalisierung
 
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)
Ent-Personalisierung von IT Systemen (Anonymisierung & Pseudonymisierung)
 
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt?
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt? Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt?
Wie laufen Prozesse im Unternehmen wirklich ab? Wie wird der Einkauf gelebt?
 
Steigern Sie Ihre Prozessexzellenz mit Celonis Process Mining
Steigern Sie Ihre Prozessexzellenz mit Celonis Process MiningSteigern Sie Ihre Prozessexzellenz mit Celonis Process Mining
Steigern Sie Ihre Prozessexzellenz mit Celonis Process Mining
 
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)
UI-basierte Datenschutz | SAP UI Logging & Masking (Deutsch)
 
Data Security und Data Privacy: Read Access Logging
Data Security und Data Privacy: Read Access LoggingData Security und Data Privacy: Read Access Logging
Data Security und Data Privacy: Read Access Logging
 
Russian: Webcast Security Anonymization (TDA)
Russian: Webcast Security Anonymization (TDA)Russian: Webcast Security Anonymization (TDA)
Russian: Webcast Security Anonymization (TDA)
 
Webcast Security & Data Privacy: Anonymization
Webcast Security & Data Privacy: AnonymizationWebcast Security & Data Privacy: Anonymization
Webcast Security & Data Privacy: Anonymization
 
Doing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and doDoing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and do
 
How is GDPR relevant for US companies
How is GDPR relevant for US companies How is GDPR relevant for US companies
How is GDPR relevant for US companies
 
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud Platform
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud PlatformWebcast Nr. 3 - Java Entwicklung mit der SAP Cloud Platform
Webcast Nr. 3 - Java Entwicklung mit der SAP Cloud Platform
 
Webcast SAP Cloud Platform 2 - Developing Tools
Webcast SAP Cloud Platform 2 - Developing ToolsWebcast SAP Cloud Platform 2 - Developing Tools
Webcast SAP Cloud Platform 2 - Developing Tools
 
Webcast SAP Cloud Platform No. 1: On-Boarding
Webcast SAP Cloud Platform No. 1: On-BoardingWebcast SAP Cloud Platform No. 1: On-Boarding
Webcast SAP Cloud Platform No. 1: On-Boarding
 
Webcast Security No. 8 - Read Access Logging (RAL)
Webcast Security No. 8 - Read Access Logging (RAL)Webcast Security No. 8 - Read Access Logging (RAL)
Webcast Security No. 8 - Read Access Logging (RAL)
 
Data Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationData Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data Anonymization
 
Einfaches Sperren und Löschen / SAP Information LifeCycle Management
Einfaches Sperren und Löschen / SAP Information LifeCycle ManagementEinfaches Sperren und Löschen / SAP Information LifeCycle Management
Einfaches Sperren und Löschen / SAP Information LifeCycle Management
 
Neue umsatzsteuerliche Berechnungsgrundlage des Gemeinderabatts
Neue umsatzsteuerliche Berechnungsgrundlage des GemeinderabattsNeue umsatzsteuerliche Berechnungsgrundlage des Gemeinderabatts
Neue umsatzsteuerliche Berechnungsgrundlage des Gemeinderabatts
 
Abrechnungsprozesse im wettbewerblichen Meßstellenbetrieb
Abrechnungsprozesse im wettbewerblichen MeßstellenbetriebAbrechnungsprozesse im wettbewerblichen Meßstellenbetrieb
Abrechnungsprozesse im wettbewerblichen Meßstellenbetrieb
 

Recently uploaded

Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
QuickwayInfoSystems3
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
abdulrafaychaudhry
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
ShamsuddeenMuhammadA
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Nidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, TipsNidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, Tips
vrstrong314
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 

Recently uploaded (20)

Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Nidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, TipsNidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, Tips
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 

Improve Data Protection and Compliance with UI-Level Logging and Masking

  • 1. PUBLIC SAP UI Data Security UI Logging and UI Masking solutions Tobias Keller, Product Manager v322 – 2018-01-31 SAP Innovative Business Solutions
  • 3. 6PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public data security threat legal requirements (compliance) internal requirements (decrease of financial risk) personal information valuable business information commercial motivation: protection of the organization political motivation: protection of individuals UI Data Security – driving factors Compliance & financial risk of data security breaches
  • 4. 7PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Data Security Data protection requirements • increasing number and severity of data protection regulations worldwide (EU-GDPR, HIPAA, PIPEDA, PIPA, SOX, DPA…) • commonly protecting personal information (employees, customers, suppliers…) • rising compliance infringement cost (discovery, fines, litigation; personal fines) • deteriorating competitive situation (recipes stolen, employees poached, customer contacts leaked, supplier prices publicized…) • lost trust = lost business (customers, suppliers, financial markets…) • efficiency impact (countermeasures, suspicious employees; management stability…) legal requirements – protection of individual information internal requirements – protection of business critical data assets
  • 5. 8PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Data Security – the threat from inside A threat vector often underestimated – but substantial and difficult to tackle
  • 7. 10PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Data Security: two step approach to protect data from insiders UI Masking: hiding unnecessary data; UI Logging: enabling analysis of data access to keep data accessible, but log & analyze access, to take appropriate measures The solution provides a detailed, structured data access log and allows for analysis who exactly received which data (output), how (input), and in which context (IP…)? è prevent illegitimate data access and theft by inducing compliant behavior è identify & prove irregular data access to conceal specific data (values in fields/columns) – unless required for tasks The solution masks sensitive (configured) values per default; unmasking requires explicit access rights (on top of existing role/authorization setup) è make data elements unavailable for data abuse (opportunistic and targeted) • awareness for data security (“human firewall”) à protect employees by decreasing inadvertent breaches • top-of-class protection measures à trust (employees, customers, and investors) UI Masking UI Logging “the speed limiter” “the speed camera”
  • 8. 11PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public SAP Backend System SAP UI (user) Dynpro Processor Request Response Database LayerBusiness Logic UI Logging observed data traffic asynchronous call of log & filtering service Enterprise Threat DetectionAlert (e.g. email) Log Analyzer • UI Masking and UI Logging can be used individually or jointly, depending on the required functionality • add-ons to SAP NetWeaver: • secure server-based logging/masking, • modification free, • minimal performance impact. UI Data Security High level solution architecture (example: SAP GUI) UI Masking masked data original data configuration & BAdIs Apply masking rules
  • 9. 12PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI technology UI Masking UI Logging SAP GUI for Windows / HTML / Java ü ü WebDynpro ABAP ü ü CRM Web Client UI ü ü RFC/BAPI and Web Services project based ü BW Access (BEx Web/Analyser, BW-IP, BICS, MDX) project based ü UI5/Fiori ü ü Availability: 10 “channels” (Q1/2018) • Based on SAP NetWeaver (cf. RCS Availability Matrix or contact product management for detailed requirements) • Available for ECC, HEC, Suite on HANA, S/4HANA • Maintenance: integrated into standard maintenance, planned until end 2025 • Enhancements and adaptations can be delivered on request
  • 10. 14PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public • Installation of add-ons with SAINT conducted by customer (ERP/basis team) • Implementation support efforts – based on experience (”typical” scope and requirements) Service option 1: enablement/jump start • Set-up workshop for requirements, installation support, baseline configuration, KT and Ramp Up session. • Effort: commonly 5 PD per channel, duration ca. 1-2 weeks, preferably onsite. • Service option 2: implementation • As above, but also implementation of functional scope, test support, go-live support. • Effort ca. 20 – 25PD per channel; preferably 1 week onsite; then remote. • Customer enablement of an in-house resource to handle the main parts of the execution phase of the implementation, and support subsequent changes in requirement and configuration. Implementation – exemplary
  • 11. 17PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Wrap-up: High quality, low TCO • UI Masking: unique functionality for SAP screens/applications • UI Logging: premium offering from SAP in data access logging Unique Coverage of the “insider” risk ècompliance & decrease risk exposure • Aligned with SAP standard è secure, performant, future proof • quick implementation, support by product team è low TCO
  • 13. 19PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Masking Refine data access into transactions Data masking: UI layer on server side • business and technical transactions • download, export, print Highly configurable • what: on field level (inside transactions) • how: pattern • who: role required for unmasked access • BADIs to introduce additional logic Aligned with SAP standard Based on SAP NetWeaver releases 7.00 – 7.50 Maintenance: planned until 31.12.2025 Further enhancements on request
  • 14. 24PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Please note: the following sequence is to exemplify how UI Masking config technically works The actual config creation would be mainly taken over by a mass configuration utility included in the product. • Create a new entry in the general masking config transaction for the field to be masked, here end date. • Next to table and field name, set the role required for unmasked access and choose when to write a trace (always, never, only if unmasked). Further details can be configured (which digits should be masked in which way, etc. ) • These settings are sufficient to activate masking of data in lists and ALV grids, as exemplified for transaction SE16n (in case of conversion exit based masking, also business transactions are covered). • In edit mode for such table views, the masked values are offered in display mode only (or are being hidden). • Data masking also applies to export/ download and print of relevant data. • The option to generate conversion exits allows to determine which of the available technologies to employ for masking. UI Masking Case study: data masking in SE16, SE16n, SE11, etc.
  • 15. 25PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public • For masking of data fields in Dynpro views (generated programmatically) without conversion exits, the configuration needs to be enriched with the relevant program names and UI number. • A given database field can be utilized by different programs for different Dynpro transactions, all of which need to be identified for consistent masking results. • This task is mainly taken up by a mass configuration report. • With these settings, data in a Dynpro field can be masked in a modification free approach. In this example, the field content is being replaced by stars over the whole length of the field. Protected fields are also offered in display mode, even if the user switches to edit mode. UI Masking Usage Example: Masking in dynpro-UIs
  • 16. 29PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Masking: supporting your GDPR project • restrict data access è supports “privacy by default” and “privacy by design” • suppress/change data field values on UI level è supports data pseudonymization and anonymization è supports restriction of data processing è supports compliant cross-border data transfers (display/export)
  • 17. 31PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Masking Success Story: CF Industries, Chemicals (US) A take on what other customers think: Check out CF Industries' experience!
  • 19. 33PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public 4. Aggregate & detect (ETD, …) Key functionality: log, notice, analyze 1. Log data access 2. Automatic alert 3. in-depth analysis
  • 20. 35PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Logging The log – the key element of UI Logging • Logging based on roundtrips (frontendàserveràfrontend) • filtering options to control log file size • efficient analysis: log data organized with unique <name> àvalue pairs • on demand: detailed analysis of log file via Log Analyzer • real time: configurable alerts/notifications • automated: integrated with ETD à usable as powerful data source transaction: PA30 “Maintain HR Data” Infotype 8 “Basic Pay”
  • 21. 40PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Logging: supporting your GDPR project • provide information baseline of data access: è supports personal data breach notification “in time and quality” è supports effective co-operation in case of review è facilitates identification and investigation of irregular data usage. • reduces non-task related data access è decreases the probability and magnitude of a data leak occurring.
  • 22. 41PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public • Log exactly which what a user requested and which data he really obtained (on screen, print, export…) as well as context of data access (user, IP…) • efficient identification and meaningful analysis of data threats: • real time: configurable alerts/notifications • on demand: detailed analysis of log file via Log Analyzer • automated: integrated with ETD à usable as powerful data source • “Quick start” – define on transaction level which data to log. Then refine scope (on view or field level) • Define Users/Roles to be excluded/included for logging • BAdI to implement complex business logic • Based on SAP Netweaver, supporting multiple UI technologies (channels) • Completely in background with minimal impact on system performance, and imperceptible to users • Log is “reinforced” – access for authorized users only, and log data can be encrypted • Archiving functionality for the log file UI Logging Functional scope & highlights
  • 23. 42PUBLIC© 2018 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public UI Logging Success Story: Hannover Medical School (Germany) A take on what customers think: Check out Hannover Medical School's experience!
  • 24. mail product management uilogging@sap.com uimasking@sap.com Contact us Deepak Gupta Solution Manager UI Masking T +91 124 385-7195 E deepak04.gupta@sap.com http://www.sap.com/innovbizsolutions SAP Innovative Business Solutions Martin Loitz Solution Manager UI Logging T +49 6227-7-48810 E martin.loitz@sap.com http://www.sap.com/innovbizsolutions SAP Innovative Business Solutions Tobias Keller Product Manager UI Data Security T +49 6227-7-74995 E tobias.keller@sap.com http://www.sap.com/innovbizsolutions SAP Innovative Business Solutions
  • 25. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, and they should not be relied upon in making purchasing decisions. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. See http://global.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. © 2018 SAP SE or an SAP affiliate company. All rights reserved.