SAP Basis Server Administration - SAP Corner

Direkt zum Seiteninhalt
Server Administration
SWEL Display event trace
Today, "SAP Basis" often does not mean (only) the software architecture. Instead, the term is not infrequently a task description. This refers to the basic administration of the system: installation and configuration, resource management, maintenance and monitoring of a company's SAP setups. This can include user management, patch management and system monitoring. Backup policy, rights management and daily maintenance tasks are also responsibilities of Basis admins.

Why should we even have an individual SAP Security Check performed? Your SAP authorisation concept is designed to ensure the security and protection of data against unauthorised access and abuse. The technical complexity of SAP systems and the ongoing adaptations of business processes often lead to unknown security vulnerabilities. In addition, the increasing digital networking with business partners offers further attack points on your SAP system. SAP Security Check gives you an overview of the security situation of your SAP systems. This will identify potential risks that could jeopardise the safe operation of your IT landscape. Your starting situation The ongoing changes in your IT systems lead to unrecognised security vulnerabilities and your auditors will regularly report to you in the final report on abuses in the authorisation concept. The legal requirements (e.g. EU guidelines) to secure your business processes and IT systems have not yet been implemented and the increasing networking with business partners presents new challenges to your security system. The security-related system settings and permissions settings applied to your SAPS systems are poorly documented, which in many cases causes the system settings to allow extensive critical access unchecked. Critical SAP permissions, profiles, and roles identify permissions that allow critical operations to be performed in terms of security or from a legal or business perspective are called "critical permissions" by SAP. The granting of critical allowances must therefore generally be carried out with particular care and should therefore be planned in advance. Technical and organisational measures and processes must then ensure that the desired level of safety is implemented.
Preparation of the migration to the SAP HANA database
The SAP Authorization Concept course provides a fundamental overview of the SAP authorization concept. The goal is to understand the authorization concept and the ability to define individual authorization profiles. The delivered roles and the profile generator of SAP are used.

The tasks described above, which occur at rather irregular intervals and involve a certain degree of complexity due to the lack of routine or process know-how, should be examined in order to determine whether they can be performed more efficiently by an external service provider. One question to be answered is whether it is necessary to keep the necessary knowledge in the company in order to be able to react faster than the external service provider. For example, for business critical systems. Security aspects should also be considered, as external persons gain access to the system. From now on, outtasking performance must be regularly monitored and checked for quality and documentation. A complete dependence on the external partner must not arise.

"Shortcut for SAP Systems" makes it easier and quicker to complete a number of SAP basis tasks.

Every SAP system develops over many years.

Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page www.sap-corner.de you will find useful information on this topic.


It should be a matter of course for users to have implemented secure password rules.
SAP Corner
Zurück zum Seiteninhalt