SAP Basis Very good knowledge in the area of security relevant topics of IT system operation - SAP Corner

Direkt zum Seiteninhalt
Very good knowledge in the area of security relevant topics of IT system operation
GoLive Support
The higher the degree of standardisation of operational and maintenance tasks, the more effective the technical operation and maintenance can be. At the same time, this simplifies outsourcing and, if necessary, the use of a cloud solution. CHOOSING AN APPROPRIATE SERVICE FORM Regardless of the chosen service form, as well as outsourcing and outtasking, the overall responsibility for the availability and performance of the IT-supported applications remains with the company. This still means internal coordination of maintenance windows or release booths, which remains in place. Similarly, the services provided by the external partner must be regularly monitored and their quality checked. Therefore, the chosen IT strategy must be chosen from this point of view with the lowest risk. If the technical operation is not sufficiently assessed in the decision, there is a significant business risk.

How does a blockchain build consensus? Once you decide to send a payment to someone, you must use the Private Key to "sign" it (in German: signature). This means nothing other than that you specify another public address to which you want to send the money and confirm this transaction with your own private key. You don't have a central authority to send the information to, you're going to spread the information to all the other Miners around you. The miners then forward this information to other miners, who in turn do the same. This exponential wave of information reaches the entire network of the distributed community within a few milliseconds. Every time a miner receives a transaction, it checks that the transaction is actually correct. It checks which private key has signed, which public address the transaction should go to and whether the sender has enough "coins" for this transaction. What are consensus mechanisms? Any miner that solves a transaction through complex mathematical calculations is rewarded by the sender with a "fee" (transaction fee). How will it be decided which miner will receive the transaction fee? Because only one can get this reward. Also, what happens when you try a double spending by sending one transaction to one miner and then another transaction with the same money to another one millisecond later? These two could not yet exchange and thus information would be different in the network.
Related terms
On the one hand, staff clerks (or other personnel officials) should be able to carry out their important work. On the other hand, the protection of personal data of one's own employees is one of the most important tasks of the authorisation system. Any mistake in this area can cause the company's data protection officers to wring their hands over their heads. For this reason, tools are currently being developed to provide security and visibility in the HR permissions area. The basic idea is a clear overview that shows which data certain users in the SAP system can access. Based on this, automatic checks can be developed, which run in the background and regularly check whether critical gaps have been created by changes to the permissions in the HR area. The use of such a tool can create more security, especially in the HR authorisation environment. In addition, the possibility of the overview function is very pleasant and relieving for all involved. Read more This blog post is intended to show what is already possible in the field of Security Automation. The topic will accompany us more and more in the SAP area in the next few years. Therefore, it is recommended to start thinking about how your company is prepared for security automation. If you are interested in setting up and preparing a company outside the security area, I can recommend the book 'Consulting Y' by Ferdinando Piumelli (Managing Director of mindsquare GmbH). In this book, Mr. Piumelli describes his observations and experiences of digital transformation as a strategy consultant for leading DAX30 companies. In doing so, he is focusing on the near future, which, in the spirit of the digital revolution, will have a major impact on the world's large companies and economy.

All of the above tasks have been part of SAP Basis Administration for decades. However, SAP software has changed a lot since the introduction of HANA in 2010, and with that, the SAP system administrator's job has changed as well. Here are some of the key differences:

Some missing SAP basic functions in the standard are supplied by the PC application "Shortcut for SAP Systems".

Double-spending means something that can be doubled, and by 2008, only one central institution was considered to be sustainable.

Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page www.sap-corner.de you will find useful information on this topic.


Be sure to encrypt sensitive data anyway.
SAP Corner
Zurück zum Seiteninhalt