SlideShare a Scribd company logo
Towards new shores
with cross-system
SoD analyses.
AXEL DALDORF
Senior PreSales Consultant SAST SUITE
Fon: +49 40 88173-4438
Email: axel.daldorf@akquinet.de
Web: www.sast-solutions.com
WELCOME!
Introducing your host today:
With the SAST SOLUTIONS portfolio of akquinet AG, we are your world-class provider for the holistic protection
of SAP ERP as well as S/4HANA systems - with real-time monitoring. In addition to our proprietary software suite,
we offer SAP security and compliance consulting and managed services from a single source.
Worldwide, more than 200 customers with 3.5 million SAP users currently rely on our vast expertise in protecting
their SAP systems from cyberattacks, manipulation, espionage and data theft.
Facts and figures
- 3 -
SAST SOLUTIONS customers worldwide
920
305
165
325
556
796
64
845
Employees
Turnovers Mio. €
5,3
16,3
41,5
28,2
118
2002 2005 2008 2011 2014 2018 2019 2020
132
124
akquinet AG
71
Your IT security is our number one concern – in real time.
SAST gives you the choice!
SAP Security & Compliance – make or buy?!
SOFTWARE SUITE CONSULTING MANAGED SERVICES
Identity and User Access Management
Platform Security
Security Intelligence
Security Consulting
Security Advisory
Authorization Consulting
Software Implementation & Workshops
User Access Management
Platform Security
Migration of your SoD analyses into the SAP Cloud Apps.
SAP extension using external systems / cloud applications+
+
+
+
+
- 6 -
Systematics / Differences in authorizations and users
SAST Central Identity Module
Authorization analyses for ARIBA as an example
Q & A
The SAP Identity and Account Problem in Practice
Where does an Identity Account have authorizations? And which?
ID: P261165 (Max Müller)
SAP P11/100: MMUELER
SAP P21/200: P261165
Max.Mueller@Kunde.de
SAP P31/300: P261165
DB User: MUELLER
Max.Mueller@4711.kunden.sap.de
- 7 -
SAP extension using external systems / cloud applications
SoD conflict using SAP ERP and Ariba integration as examples
Account: Max.Mueller@Kunde.de
Gruppe: SUBMIT_PO
Account: P261165
Rolle: MAINTAIN_VENDOR
SoD
- 8 -
SAP Ariba Cloud Integration Gateway
 Cross-system account and permission list.
 Checking permissions:
 Single critical / sensitive.
 Separation of functions (SoD) in one system.
 Function separation (SoD) across system boundaries.
 Possibility of mitigation of risks at all levels.
 Central evaluation without double IT systems.
 Integration into existing SAST scenarios.
SAP extension using external systems / cloud applications
Requirements from Practical User and Authorization Administration
- 9 -
 Identity: Describes a unique characteristic of a natural/technical person.
 Account: Describes a user account in a defined IT system.
 Role:
 In SAP context, a set of users and their permissions (object, field, value).
 In non-SAP context, a grouping of permissions (characteristics such as CREATE_PO).
 Group: A set of users in a non-SAP context.
Systematics / Difference in user and authorization management
Terminology
- 10 -
 The Central Identity function provides the following functions:
 Import identities from
 LDAP
 HR
 SAP
 IDM
 Import of accounts from systems
 Import roles and roles assignment
 Available for customers with release 5.20
 Connection of external systems using adapters based on RFC, HTTP (SOAP/REST, XML), File.
 Support of SAP Netweaver and Ariba from SAST SUITE 5.20, then S/4 HANA Cloud, HANA DB and
others planned.
SAST Central Identity Function
Overview
- 11 -
SAST Central Identity Function
"Sync on Premise" as basis for Cross System evaluations
Identity Source Adapter SAP on Premise with SAST SUITE
Identities
Accounts
Roles
Systems
ID-Sources
Info System
and
SOD Engine
and Rules
Cross System
Identity/Account Info
System
Cross System Role
Info System
Authorization and
SoD Scan Results
- 12 -
Account Adapter
Role / Group Adapter
Account Adapter
Role / Group Adapter
Account Adapter
Role / Group Adapter
Account Adapter
Role / Group Adapter
Authorization analyses using ARIBA as an example
- 13 -
Authorization analyses using ARIBA as an example
Drill Down similar to SAP user analyze
- 14 -
Case Story:
SoD analyses in a hetero-
geneous SAP landscape.
Initial situation
 Japan's largest pharmaceutical company has SAP landscapes with around 4,000 users
in 50 countries worldwide.
 User requests and authorization assignments were handled via Winword forms.
 The SAP cloud application "Ariba" is used to optimize the procurement process,
but master data maintenance takes place in SAP ERP.
 Standard software solutions on the market usually cover SoD risks only on a single system.
Example: Audit-proof SoD analyses at Takeda.
Project goals
1. Simplification and speed-up of the authorization assignment process.
2. Regular reports on potential risks/conflicts should optimize the control process additionally.
3. Protection of research projects and product innovations is of highest priority for Takeda.
- 16 -
Project implementation
 Before the implementation of SAST SUITE, the authorization process was optimized.
 Development of a cross SoD matrix with check content for SAP ERP and S/4HANA systems
in combination with Ariba and integration into the SAST SUITE.
 Identification of various user IDs of a person and assignment to a central identity.
Synchronization of the SAP Cloud Application via SAP Cloud Connector daily or on demand.
 Permanent check for SoD conflicts including recommendations for action via SAST SUITE.
Example: Audit-proof SoD analyses at Takeda.
- 17 -
Advantages for Takeda
Establishment of a transparent and secure SAP user management in only two months.
Automated reporting of role conflicts and risks.
Reduction of high and medium critical SoD conflicts by about 70%.
✓
✓
✓
- Manfred Meier -
“The SAST SUITE has given us the perfect
solution for our global SAP authorization
management.
At the same time our systems
are permanently monitored
for vulnerabilities.“
Take Home Messages for cross-system SoD analyses:
Uniform "central identity" necessary (organisation and standards).
Define your S/4HANA SoD matrix before creating the first role!
The introduction of a "mixed" architecture must be planned and
tightly controlled.
SoD analysis Hybrid-On-Premise / Cloud / Non-SAP possible.
Implement a sandbox system for "test drive" for IT and users.
- 19 -
✓
✓
✓
✓
✓
Keep the
ball rolling
with us.
- 20 -
Keep the ball rolling with us…
SAST BLOG sast-blog.akquinet.com
New expert articles, practical tips, case studies, etc. every week
SAST NEWS Registration on the website or by mail: sast@akquinet.de
Current information every 6-8 weeks.
SAST WEBINARS Were you unable to attend a live webinar?
ON DEMAND The webinar archive allows you to individually schedule when you want
to take advantage of our recommendations.
SAST WEBINARS Further topics for 2020 are available on our event page on the web.
- 21 -
DO YOU HAVE ANY QUESTIONS?
WE ANSWER. FOR SURE.
© Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright.
All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior
written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions.
The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information.
AXEL DALDORF
Senior PreSales Consultant SAST SUITE
Fon: +49 40 88173-4438
Email: axel.daldorf@akquinet.de
Web: www.sast-solutions.com

More Related Content

What's hot

SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
akquinet enterprise solutions GmbH
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
akquinet enterprise solutions GmbH
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
akquinet enterprise solutions GmbH
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
akquinet enterprise solutions GmbH
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
akquinet enterprise solutions GmbH
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
akquinet enterprise solutions GmbH
 
SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]
akquinet enterprise solutions GmbH
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
akquinet enterprise solutions GmbH
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
akquinet enterprise solutions GmbH
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
akquinet enterprise solutions GmbH
 
SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]
akquinet enterprise solutions GmbH
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
akquinet enterprise solutions GmbH
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
ERPScan
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
guest5bd7a1
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
akquinet enterprise solutions GmbH
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
ERPScan
 
SAP License Audit Tips
SAP License Audit TipsSAP License Audit Tips
SAP License Audit Tips
AuditBot SAP Security Audit
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 
SAP security in figures
SAP security in figuresSAP security in figures
SAP security in figures
ERPScan
 
Sap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksSap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless Attacks
Ertunga Arsal
 

What's hot (20)

SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
 
SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
 
SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
SAP License Audit Tips
SAP License Audit TipsSAP License Audit Tips
SAP License Audit Tips
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 
SAP security in figures
SAP security in figuresSAP security in figures
SAP security in figures
 
Sap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksSap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless Attacks
 

Similar to Towards new shores with cross-system SoD analyses. [Webinar]

SAP BOBJ Rapid Marts Overview I
SAP BOBJ Rapid Marts Overview ISAP BOBJ Rapid Marts Overview I
SAP BOBJ Rapid Marts Overview I
Ramakrishna Kamurthy
 
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
SAP PartnerEdge program for Application Development
 
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
Twan van den Broek
 
TDWI Roundtable: The HANA EDW
TDWI Roundtable: The HANA EDWTDWI Roundtable: The HANA EDW
TDWI Roundtable: The HANA EDW
ukc4
 
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
Codemotion
 
SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01
Argos
 
CoreToEdge Company Presentation
CoreToEdge Company PresentationCoreToEdge Company Presentation
CoreToEdge Company Presentation
Core To Edge
 
Digital Reinvention by NRB
Digital Reinvention by NRBDigital Reinvention by NRB
Digital Reinvention by NRB
William Poos
 
Improve Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingImprove Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and Masking
Patric Dahse
 
Asat Overview V1.0
Asat Overview V1.0Asat Overview V1.0
Asat Overview V1.0
pramodbizz
 
Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...
Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...
Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...
Mobile Trends
 
Onapsis SAP Backdoors
Onapsis SAP BackdoorsOnapsis SAP Backdoors
Onapsis SAP Backdoors
Onapsis Inc.
 
Mobile pulse sept 2014
Mobile pulse sept 2014Mobile pulse sept 2014
Mobile pulse sept 2014
Bjørn Sloth
 
Introduction to NEW SAP - Accenture Technology Meetup
Introduction to NEW SAP - Accenture Technology MeetupIntroduction to NEW SAP - Accenture Technology Meetup
Introduction to NEW SAP - Accenture Technology Meetup
Accenture Hungary
 
Digital Business with SAP B1 - Introduction
Digital Business with SAP B1 - IntroductionDigital Business with SAP B1 - Introduction
Digital Business with SAP B1 - Introduction
jzelynlim95
 
About Aspans
About AspansAbout Aspans
About Aspans
kadyrsizov
 
Data Engineer's Lunch #81: Reverse ETL Tools for Modern Data Platforms
Data Engineer's Lunch #81: Reverse ETL Tools for Modern Data PlatformsData Engineer's Lunch #81: Reverse ETL Tools for Modern Data Platforms
Data Engineer's Lunch #81: Reverse ETL Tools for Modern Data Platforms
Anant Corporation
 
SAP AC020 - Investment Management
SAP AC020 - Investment ManagementSAP AC020 - Investment Management
SAP AC020 - Investment Management
Vannak9
 
PaaS Decision Matrix
PaaS Decision MatrixPaaS Decision Matrix
PaaS Decision Matrix
Warren Eiserman
 

Similar to Towards new shores with cross-system SoD analyses. [Webinar] (20)

SAP BOBJ Rapid Marts Overview I
SAP BOBJ Rapid Marts Overview ISAP BOBJ Rapid Marts Overview I
SAP BOBJ Rapid Marts Overview I
 
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
 
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
 
TDWI Roundtable: The HANA EDW
TDWI Roundtable: The HANA EDWTDWI Roundtable: The HANA EDW
TDWI Roundtable: The HANA EDW
 
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...
 
SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01
 
CoreToEdge Company Presentation
CoreToEdge Company PresentationCoreToEdge Company Presentation
CoreToEdge Company Presentation
 
Digital Reinvention by NRB
Digital Reinvention by NRBDigital Reinvention by NRB
Digital Reinvention by NRB
 
Improve Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingImprove Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and Masking
 
Asat Overview V1.0
Asat Overview V1.0Asat Overview V1.0
Asat Overview V1.0
 
Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...
Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...
Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...
 
Onapsis SAP Backdoors
Onapsis SAP BackdoorsOnapsis SAP Backdoors
Onapsis SAP Backdoors
 
resume
resumeresume
resume
 
Mobile pulse sept 2014
Mobile pulse sept 2014Mobile pulse sept 2014
Mobile pulse sept 2014
 
Introduction to NEW SAP - Accenture Technology Meetup
Introduction to NEW SAP - Accenture Technology MeetupIntroduction to NEW SAP - Accenture Technology Meetup
Introduction to NEW SAP - Accenture Technology Meetup
 
Digital Business with SAP B1 - Introduction
Digital Business with SAP B1 - IntroductionDigital Business with SAP B1 - Introduction
Digital Business with SAP B1 - Introduction
 
About Aspans
About AspansAbout Aspans
About Aspans
 
Data Engineer's Lunch #81: Reverse ETL Tools for Modern Data Platforms
Data Engineer's Lunch #81: Reverse ETL Tools for Modern Data PlatformsData Engineer's Lunch #81: Reverse ETL Tools for Modern Data Platforms
Data Engineer's Lunch #81: Reverse ETL Tools for Modern Data Platforms
 
SAP AC020 - Investment Management
SAP AC020 - Investment ManagementSAP AC020 - Investment Management
SAP AC020 - Investment Management
 
PaaS Decision Matrix
PaaS Decision MatrixPaaS Decision Matrix
PaaS Decision Matrix
 

More from akquinet enterprise solutions GmbH

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
akquinet enterprise solutions GmbH
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
akquinet enterprise solutions GmbH
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
akquinet enterprise solutions GmbH
 
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
akquinet enterprise solutions GmbH
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
akquinet enterprise solutions GmbH
 
SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]
akquinet enterprise solutions GmbH
 

More from akquinet enterprise solutions GmbH (6)

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
 
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
 
SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Towards new shores with cross-system SoD analyses. [Webinar]

  • 1. Towards new shores with cross-system SoD analyses.
  • 2. AXEL DALDORF Senior PreSales Consultant SAST SUITE Fon: +49 40 88173-4438 Email: axel.daldorf@akquinet.de Web: www.sast-solutions.com WELCOME! Introducing your host today:
  • 3. With the SAST SOLUTIONS portfolio of akquinet AG, we are your world-class provider for the holistic protection of SAP ERP as well as S/4HANA systems - with real-time monitoring. In addition to our proprietary software suite, we offer SAP security and compliance consulting and managed services from a single source. Worldwide, more than 200 customers with 3.5 million SAP users currently rely on our vast expertise in protecting their SAP systems from cyberattacks, manipulation, espionage and data theft. Facts and figures - 3 - SAST SOLUTIONS customers worldwide 920 305 165 325 556 796 64 845 Employees Turnovers Mio. € 5,3 16,3 41,5 28,2 118 2002 2005 2008 2011 2014 2018 2019 2020 132 124 akquinet AG 71
  • 4. Your IT security is our number one concern – in real time.
  • 5. SAST gives you the choice! SAP Security & Compliance – make or buy?! SOFTWARE SUITE CONSULTING MANAGED SERVICES Identity and User Access Management Platform Security Security Intelligence Security Consulting Security Advisory Authorization Consulting Software Implementation & Workshops User Access Management Platform Security
  • 6. Migration of your SoD analyses into the SAP Cloud Apps. SAP extension using external systems / cloud applications+ + + + + - 6 - Systematics / Differences in authorizations and users SAST Central Identity Module Authorization analyses for ARIBA as an example Q & A
  • 7. The SAP Identity and Account Problem in Practice Where does an Identity Account have authorizations? And which? ID: P261165 (Max Müller) SAP P11/100: MMUELER SAP P21/200: P261165 Max.Mueller@Kunde.de SAP P31/300: P261165 DB User: MUELLER Max.Mueller@4711.kunden.sap.de - 7 -
  • 8. SAP extension using external systems / cloud applications SoD conflict using SAP ERP and Ariba integration as examples Account: Max.Mueller@Kunde.de Gruppe: SUBMIT_PO Account: P261165 Rolle: MAINTAIN_VENDOR SoD - 8 - SAP Ariba Cloud Integration Gateway
  • 9.  Cross-system account and permission list.  Checking permissions:  Single critical / sensitive.  Separation of functions (SoD) in one system.  Function separation (SoD) across system boundaries.  Possibility of mitigation of risks at all levels.  Central evaluation without double IT systems.  Integration into existing SAST scenarios. SAP extension using external systems / cloud applications Requirements from Practical User and Authorization Administration - 9 -
  • 10.  Identity: Describes a unique characteristic of a natural/technical person.  Account: Describes a user account in a defined IT system.  Role:  In SAP context, a set of users and their permissions (object, field, value).  In non-SAP context, a grouping of permissions (characteristics such as CREATE_PO).  Group: A set of users in a non-SAP context. Systematics / Difference in user and authorization management Terminology - 10 -
  • 11.  The Central Identity function provides the following functions:  Import identities from  LDAP  HR  SAP  IDM  Import of accounts from systems  Import roles and roles assignment  Available for customers with release 5.20  Connection of external systems using adapters based on RFC, HTTP (SOAP/REST, XML), File.  Support of SAP Netweaver and Ariba from SAST SUITE 5.20, then S/4 HANA Cloud, HANA DB and others planned. SAST Central Identity Function Overview - 11 -
  • 12. SAST Central Identity Function "Sync on Premise" as basis for Cross System evaluations Identity Source Adapter SAP on Premise with SAST SUITE Identities Accounts Roles Systems ID-Sources Info System and SOD Engine and Rules Cross System Identity/Account Info System Cross System Role Info System Authorization and SoD Scan Results - 12 - Account Adapter Role / Group Adapter Account Adapter Role / Group Adapter Account Adapter Role / Group Adapter Account Adapter Role / Group Adapter
  • 13. Authorization analyses using ARIBA as an example - 13 -
  • 14. Authorization analyses using ARIBA as an example Drill Down similar to SAP user analyze - 14 -
  • 15. Case Story: SoD analyses in a hetero- geneous SAP landscape.
  • 16. Initial situation  Japan's largest pharmaceutical company has SAP landscapes with around 4,000 users in 50 countries worldwide.  User requests and authorization assignments were handled via Winword forms.  The SAP cloud application "Ariba" is used to optimize the procurement process, but master data maintenance takes place in SAP ERP.  Standard software solutions on the market usually cover SoD risks only on a single system. Example: Audit-proof SoD analyses at Takeda. Project goals 1. Simplification and speed-up of the authorization assignment process. 2. Regular reports on potential risks/conflicts should optimize the control process additionally. 3. Protection of research projects and product innovations is of highest priority for Takeda. - 16 -
  • 17. Project implementation  Before the implementation of SAST SUITE, the authorization process was optimized.  Development of a cross SoD matrix with check content for SAP ERP and S/4HANA systems in combination with Ariba and integration into the SAST SUITE.  Identification of various user IDs of a person and assignment to a central identity. Synchronization of the SAP Cloud Application via SAP Cloud Connector daily or on demand.  Permanent check for SoD conflicts including recommendations for action via SAST SUITE. Example: Audit-proof SoD analyses at Takeda. - 17 - Advantages for Takeda Establishment of a transparent and secure SAP user management in only two months. Automated reporting of role conflicts and risks. Reduction of high and medium critical SoD conflicts by about 70%. ✓ ✓ ✓
  • 18. - Manfred Meier - “The SAST SUITE has given us the perfect solution for our global SAP authorization management. At the same time our systems are permanently monitored for vulnerabilities.“
  • 19. Take Home Messages for cross-system SoD analyses: Uniform "central identity" necessary (organisation and standards). Define your S/4HANA SoD matrix before creating the first role! The introduction of a "mixed" architecture must be planned and tightly controlled. SoD analysis Hybrid-On-Premise / Cloud / Non-SAP possible. Implement a sandbox system for "test drive" for IT and users. - 19 - ✓ ✓ ✓ ✓ ✓
  • 21. Keep the ball rolling with us… SAST BLOG sast-blog.akquinet.com New expert articles, practical tips, case studies, etc. every week SAST NEWS Registration on the website or by mail: sast@akquinet.de Current information every 6-8 weeks. SAST WEBINARS Were you unable to attend a live webinar? ON DEMAND The webinar archive allows you to individually schedule when you want to take advantage of our recommendations. SAST WEBINARS Further topics for 2020 are available on our event page on the web. - 21 -
  • 22. DO YOU HAVE ANY QUESTIONS? WE ANSWER. FOR SURE. © Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright. All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions. The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information. AXEL DALDORF Senior PreSales Consultant SAST SUITE Fon: +49 40 88173-4438 Email: axel.daldorf@akquinet.de Web: www.sast-solutions.com