Taking the Taboo out of S_TABU Authorization Objects
SAP Authorization Objects for SAP NetWeaver AS ABAP technologies are not just blockers. They are the ENABLER of access.
“There are a few constants in life” – a statement that also applies to the SAP user community. It has always been a challenge for SAP customers to bring their large SAP environments to a current release level. Although the vendor has done a lot in the past to simplify this, it is still not a complex undertaking. However, the S/4HANA migration comes with more stumbling blocks that facilitate a chance to rethink the current SAP Cybersecurity approach.
In keeping with the current zeitgeist, every SAP customer is talking about S/4HANA migration or S/4HANA transformations. Although the transformation has a much broader business context, it pursues the same goals as the migration. After the project, customers intend to take full advantage of the new functions of the S/4HANA product portfolio.
With these – sometimes dramatic – changes that organizations undergo in a S/4HANA transformation, there is an opportunity to integrate cybersecurity thinking directly into the architecture and create a secure foundation for future processes and innovations. To paraphrase one of our partners: “Security should be built-in, instead of added on”.
Many of the customers we speak with have had SAP environments in place for several years. And so, it is no surprise many are practicing cyber hygiene but have not been able to integrate cybersecurity into their processes and architecture from the ground up. But that is no reason to bury your head in the sand. With the upcoming S4/HANA project, there is an opportunity to make up for this omission from the past.
I think some experienced SAP experts will ask themselves what makes this “upgrade” project different from the previous ones and what has changed that now leads to this new possibility.
In my view, there are primarily three things:
Take the opportunity and put “cyber resilience” on the list of project goals at the very beginning of a project. Include qualified consultants or in-house security architects in all project set-up discussions. Ask how to maintain the achieved security state in the long term. Additionally, please do not forget to integrate efficient SAP Vulnerability Management in the implementation of your project. This includes:
Are you looking for a qualified System Integrator (SI) to address these issues? We will be happy to provide a recommendation. Please do not hesitate to contact us.
Posted by
Find recent Security Advisories for SAP©
Looking into securing your SAP landscape? This white-paper tells you the “Top Mistakes to Avoid in SAP Security“. Download it now.
SAP Authorization Objects for SAP NetWeaver AS ABAP technologies are not just blockers. They are the ENABLER of access.
SAP Security teams can kick-start a comprehensive security platform and gain significant improvements already within a day. What they need is a holistic platform and a guided approach to SAP Security.