﻿<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>C++博客-. . . . . . . . . . . . . . Blog Garden'  C plus plus (My technology Impire!)-文章分类-SAP BASIS</title><link>http://www.cppblog.com/stevennash/category/8693.html</link><description>................................................................ It‘s a age of economic globalization and Infomation globalization........................................</description><language>zh-cn</language><lastBuildDate>Fri, 31 Oct 2008 08:52:44 GMT</lastBuildDate><pubDate>Fri, 31 Oct 2008 08:52:44 GMT</pubDate><ttl>60</ttl><item><title> SAP BASIS (BC)  Security Components</title><link>http://www.cppblog.com/stevennash/articles/59137.html</link><dc:creator>Technical Consultant</dc:creator><author>Technical Consultant</author><pubDate>Fri, 31 Oct 2008 02:58:00 GMT</pubDate><guid>http://www.cppblog.com/stevennash/articles/59137.html</guid><wfw:comment>http://www.cppblog.com/stevennash/comments/59137.html</wfw:comment><comments>http://www.cppblog.com/stevennash/articles/59137.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cppblog.com/stevennash/comments/commentRss/59137.html</wfw:commentRss><trackback:ping>http://www.cppblog.com/stevennash/services/trackbacks/59137.html</trackback:ping><description><![CDATA[<font face=Arial><strong>
<p><a name=_Toc16661165>1.0 Introduction</a></p>
</strong>
<p align=justify><font size=2>SAP has done nothing less than change the entire systems landscape for enterprises. The benefits it can bring have led to widespread adoption across the globe. One of the key benefits SAP brings to an enterprise is the ability to integrate the data both within the enterprise, and between it and it&#8217;s partners / competitors. In many cases organizations today are both partners and competitors at the same time. Think of wholesalers and distributors, SAP and Oracle, AT&amp;T and BT, or two oil giants who have an upstream joint venture. These companies use SAP to integrate process between themselves for their mutual benefit. This ability to integrate, however, brings with it a particular risk &#8211; that of exposing their data to the un-authorized outside world. </font></p>
<p align=justify><font size=2>Entire companies have been built up around highly guarded intellectual property and process secrets ... and could easily fall if this was breached. Therefore, keeping the security of the organization intact is one of the vital aspects of any SAP implementation. </font></p>
<p align=justify><font size=2>SAP BASIS addresses all security issues by incorporating an authorization module. With increased potential for security breaches in the computer systems around the world, BASIS consultants face a tough task of maintaining the integrity and administering the security of SAP systems. Interoperability features of a SAP system makes this task a bit more difficult. </font></p>
<strong>
<p><a name=_Toc16661166>2.0 SAP Security Components &#8211; The Big Picture</a></p>
</strong>
<p align=justify><font size=2>SAP security in an integrated environment can be viewed in the form of discrete components as shown below (figure 1). </font></p>
<strong>
<p align=center><img src="http://www.cppblog.com/images/cppblog_com/stevennash/SAP%20Security/BC_Security_components.gif" border=0><br></p>
<u>
<p align=center>Figure 1</p>
</u></strong>
<p align=justify><font size=2>Tight security is required for each of the above components (Network, Workstation, Operating System and Database) as a breach made in one area can compromise the entire system.</font></p>
<p align=justify><font size=2>The scope of this article is SAP Application Security, which can be achieved with the help of SAP&#8217;s BASIS security application through the concept of authorization.</font></p>
<p><font size=2>In SAP, security is administered for objects (profiles and authorizations). Users are only authorized to see or change the parts of the system required by their respective job responsibilities.</font></p>
<p><strong>
<p><a name=_Toc16661167>2.1 SAP Authorization Concept</a></p>
</strong>
<p>&#160;</p>
</font>
<p align=justify><font size=2>The SAP authorization concept is based upon the logical relationship between a user ID and the range of system authorizations with which it can be associated. The architecture of the authorization system is based upon the utilization of several individuals but related logical components: Profiles, Objects, Fields, and Authorizations. The user ID refers exclusively to profiles. Each profile grants a set of specific system access authorizations to user. Figure 2 illustrates the hierarchical authorization concept in SAP. </font></p>
<strong>
<p align=center><img src="http://www.cppblog.com/images/cppblog_com/stevennash/SAP%20Security/BC_Authorization_Concept.gif" border=0><br></p>
<p align=center>Figure 2</p>
<strong></strong>
<p><a name=_Toc16661168>2.2 Composite Profiles</a></p>
</strong>
<p align=justify><font size=2>Composite profiles refer to the various employee roles available in the corporation (for instance: Purchasing / Receiving Clerk or Accounts Agent). As the name suggests, composite profiles may contain multiple user IDs necessary to perform all the business operations associated with a particular role. A composite profile may encapsulate another composite profile(s). In practice, a model composite profile should be recognized for each possible role in the organization, which may be used to produce hybrid composite profiles. The over-existence of the hybrids can defy the very purpose of composite profiles and they should be created only when specific needs arise.</font></p>
<strong>
<p><a name=_Toc16661169>2.3 User Ids</a></p>
</strong>
<p align=justify><font size=2>User ids allow access to SAP applications.</font></p>
<p align=justify><font size=2>Each user must have a corresponding profile specifically assigned. In many situations, multiple composite profiles can be assigned to a user ID, depending on the role(s) an individual user is responsible for, in the business processes.</font></p>
<strong>
<p><a name=_Toc16661170>2.4 Authorizations</a></p>
</strong>
<p align=justify><font size=2>Authorizations are the key building blocks of SAP security. Authorization is the process of assigning values to fields present in authorization objects. In SAP, access to all system functionality is achieved through a complex array of authorizations. Sometimes users find that they lack the necessary authorizations to perform a certain function in the system, in which case the message: "You are not authorized..." is displayed at the bottom of the screen.</font></p>
<p><font size=2>An authorization process may ask for second associated authorization process which in turn asks for third and so on. For example, the task of paying a vendor invoice may require 10 different authorizations. <br></font></p>
<p><font face=Arial><strong>
<p><a name=_Toc16661171>3.0 Security Configuration in SAP</a> </p>
</strong></font>
<p>&#160;</p>
<p align=justify><font face=Arial><font size=2>Security configuration and administration in SAP is a multi-phase process. Four key security components are required to ensure the adequate security, privacy, and integrity of information. The phases are as follows:</font></font></p>
<font face=Arial><strong>
<p><a name=_Toc16661172>3.1 User Authentication</a></p>
</strong></font>
<p align=justify><font face=Arial><font size=2>The first phase comprises confirmation of user identity and results in authentication of user. Unauthorized access to SAP system is prevented through this initial check. This ensures system integrity by regulating secure access through genuine user authentication. </font></font></p>
<font face=Arial><strong>
<p><a name=_Toc16661173>3.2 Creating and Assigning Authorization Profiles</a></p>
</strong></font>
<p align=justify><font face=Arial><font size=2>A Profile Generator (PG) is used to automatically generate and assign authorization profiles. This tool was released with SAP version 3.1g and above. The administrator can also create authorization profiles manually. </font></font></p>
<font face=Arial><strong><font face=Arial size=2><strong></strong>
<p align=justify><strong>Note:</strong> Profile Generator can be retroactively installed in SAP versions 3.0f and above. </p>
</font></strong></font>
<p align=justify><font face=Arial><font size=2>The authorization objects can be selected using the SAP Profile Generator. Administrators can automatically generate authorization profiles for function-specific access to SAP users after configuring initial settings. </font></font></p>
<font face=Arial></font>
<p align=justify><font face=Arial><font size=2>The entire authorization functionality of SAP signifies a new approach to authorization. The administrator can define user authorization based on SAP functions. Based on the selected function, the PG groups objects in administrator-created authorization profiles.</font></font></p>
<font face=Arial></font>
<p align=justify><font face=Arial><font size=2>Authorization profiles created by a Profile Generator are based on the given authorizations. It also speeds up the process and simplifies administrator/user communication facilitating both the administrator and users to use the same SAP function terminology. To auto-generate an Authorization profile, an Activity Group needs to be created.</font></font></p>
<font face=Arial></font>
<p align=justify><font face=Arial><font size=2>Activity Groups contain simple profiles and usually represent employee or job roles. They are user-defined and allow administrator to organize and maintain system activities. Activity group when used as an information database reduces data entry time. Administrators can define activity groups in two steps:</font><strong> </strong></font></p>
<font face=Arial><strong></strong></font>
<ol><font face=Arial>
    <li><font size=2>Selecting the criteria, such as access controls. </font>
    <li><font size=2>Dividing the activities into appropriate groups. </font></font></li>
</ol>
<font face=Arial></font>
<p align=justify><font face=Arial><font size=2>For example, activities can be organized by functions, such as human resources, payroll, or administration or by job classes, such as computer programming activities, or accounting activities. A combination of function-specific activity and job-specific activity can also be implemented. </font></font></p>
<font face=Arial></font>
<p align=justify><font face=Arial><font size=2>Security implementation with the new Profile Generator is based on the creation of activity groups or a collection of linked or associated activities, such as tasks, reports, and transactions. </font></font></p>
<font face=Arial></font>
<p align=justify><font face=Arial><font size=2>Consider a business situation involving a company, ABC Inc. faced with transaction security hiccups in business dealings with its dealers. To address this problem, the company can create authorization profiles for its dealers using the profile generator features. This can be done by implementing the following instruction set:</font></font></p>
<font face=Arial></font>
<ul><font face=Arial>
    <li>
    <p align=justify><font size=2>Instruction 1: A dealer activity group should be created. Name this activity group as Dealer.</font> </p>
    <li>
    <p align=justify><font size=2>Instruction 2: All dealer-specific business transactions should be included in the activity group.</font> </p>
    <li>
    <p align=justify><font size=2>Instruction 3: Generate an authorization profile for Dealers. </font></p>
    <li>
    <p align=justify><font size=2>Instruction 4: Assign Dealer to a "new user" or in your system and update master records.</font> </p>
    </font></li>
</ul>
<font face=Arial></font>
<p><font face=Arial><font size=2>Following this procedure will ensure complete functional access to the new user using the system as Dealer.</font></font></p>
<p><font face=Arial><strong>
<p><a name=_Toc16661174>3.3 Auditing and Monitoring</a></p>
</strong></font>
<p>&#160;</p>
<p align=justify><font face=Arial><font size=2>In this subsequent phase, a track of the authorizations created (previous phase) is kept. Detailed accounts of system events are used to record the actions of a user corresponding to that unique user account identifier. Auditing/Monitoring activities should be in compliance with enterprise&#8217;s overall IT strategy and should be performed on a weekly, monthly, quarterly, and yearly basis. </font></font></p>
<font face=Arial><strong>
<p align=center><img src="http://www.cppblog.com/images/cppblog_com/stevennash/SAP%20Security/BC_Auditing_Monitoring.gif" border=0><br></p>
<u>
<p align=center>Figure 3</p>
</u></strong></font>
<p align=justify><font face=Arial><font size=2>There are some key tasks that should be included in a monitoring plan. The following reviews should be a part of an ideal monitoring plans. </font></font></p>
<font face=Arial><strong>
<p>Using System Logs and Security Audit Logs</p>
</strong></font><font face=Arial><font size=2>The system log records critical information important events.</font></font><font face=Arial><font size=2>Each individual application server maintains local log files to which the information is written periodically. The security audit log records areas such as successful and unsuccessful dialog log-on attempts, RFC log-on attempts, changes to user master records, and transaction starts.</font></font> <font face=Arial></font>
<p><font face=Arial><font size=2>Reviewing User Activity<br>All SAP system users must be continuously monitored so that their problems can be rectified as soon as they occur. The timely attention to user problems can reduce administration overheads. </font></font></p>
<font face=Arial></font>
<p align=justify><font face=Arial><font size=2>For example, if a SAP administrator wants to check for unrecognizable user Ids or the users trying to use non-permitted transactions, administrator can execute transaction AL08 and review user activity. </font></font></p>
<font face=Arial><strong>
<p>Monitoring User access in BASIS User Group</p>
</strong></font>
<p align=justify><font face=Arial><font size=2>The BASIS users in a SAP system have access to sensitive areas of an organization. Therefore it is vital to monitor their access. Following instructions can be performed to check the access of BASIS User group. </font></font></p>
<font face=Arial><strong><u></u></strong></font>
<p align=justify><font face=Arial><strong><u>Instruction Set </u></strong></font></p>
<font face=Arial><strong><u></u></strong></font>
<ul><font face=Arial><strong><u></u></strong>
    <li><font size=2>Enter transaction SUIM to view Repository Information of the system. </font>
    <li><font size=2>Follow the Menu Path: </font>
    <ul>
        <li><font size=2>User &gt; Lists of users (according to selection criteria) &gt; user IDS (Double Click).</font> </li>
    </ul>
    </font></li>
</ul>
<font face=Arial><strong>
<p>Monitoring Change Requests</p>
</strong></font>
<p align=justify><font face=Arial><font size=2>All change requests need to be properly reviewed and controlled prior to being applied. This formal process needs to be detailed enough to ensure that separation of duties and other control features are not breached. Strong integration knowledge of the SAP system is required for this review. Critical profiles, authorizations, and transactions need to be identified and treated even more carefully. </font></font></p>
<font face=Arial><strong>
<p>Checking Important Default SAP Profiles</p>
</strong></font>
<p align=justify><font face=Arial><font size=2>Administrators must check that default profiles act a template for user defined profiles and are not directly used in production. Default profiles contain values, which apply to all application servers. These include: SAP_ALL, SAP_NEW, S_A.ADMIN, S_A.CUSTOMIZ, S_A.DEVELOP, S_A.DOKU, S_A.SYSTEM, S_A.USER, S_ENT_IMG_GE, S_WF_ALL, and P_ALL. </font></font></p>
<font face=Arial><strong>
<p>Changing Default SAP User ID&#8217;s</p>
</strong></font>
<p><font face=Arial><font size=2>SAP comes with some pre-configure clients (independent business units). They are client 000, 001 and 066 in the non-IDES system. In the IDES system, client 800 is the default client. SAP installation process automatically creates default user Ids and their corresponding passwords. SAP administrators must ensure that they are not used to access the system. The following table explains default user Ids in various SAP clients. </font></font></p>
<font face=Arial><strong></strong>
<table height=172 cellSpacing=1 cellPadding=7 width=590 border=1>
    <tbody>
        <tr>
            <td vAlign=top width=116 bgColor=#c0c0c0 height=1><font face=Arial><strong>User Ids</strong></font></td>
            <td vAlign=top width=145 bgColor=#c0c0c0 height=1><font face=Arial><strong>Client Name</strong></font></td>
            <td vAlign=top width=275 bgColor=#c0c0c0 height=1><font face=Arial><strong>User Function</strong></font></td>
        </tr>
        <tr>
            <td vAlign=top width=116 height=19><font face=Arial size=2></font>
            <p align=justify><font face=Arial size=2>SAP*</font></p>
            </td>
            <td vAlign=top width=145 height=19><font face=Arial size=2></font>
            <p align=justify><font face=Arial size=2>000 and 001</font></p>
            </td>
            <td vAlign=top width=275 height=19><font face=Arial size=2></font>
            <p align=justify><font face=Arial size=2>SAP* denotes the default super user and has all administrative powers.</font></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=116 height=42><font face=Arial size=2></font>
            <p align=justify><font face=Arial size=2>DDIC</font></p>
            </td>
            <td vAlign=top width=145 height=42><font face=Arial size=2></font>
            <p align=justify><font face=Arial size=2>000 and 001</font></p>
            </td>
            <td vAlign=top width=275 height=42><font face=Arial size=2></font>
            <p align=justify><font face=Arial size=2>DDIC user is responsible for the maintenance of the ABAP/4 Dictionary and the software logistics.</font></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=116 height=50><font face=Arial size=2></font>
            <p align=justify><font face=Arial size=2>EarlyWatch</font></p>
            </td>
            <td vAlign=top width=145 height=50><font face=Arial size=2></font>
            <p align=justify><font face=Arial size=2>066</font></p>
            </td>
            <td vAlign=top width=275 height=50><font face=Arial size=2></font>
            <p align=justify><font face=Arial size=2>The EarlyWatch user has access only to monitoring and performance data.</font></p>
            </td>
        </tr>
    </tbody>
</table>
<strong><u>
<p>Instruction Set </p>
</u></strong></font><font face=Arial><strong></strong></font>
<ul><font face=Arial>
    <li><font size=2>Change all default passwords and verifying the password change by logging into various client areas. </font></font></li>
</ul>
<font face=Arial></font>
<ul><font face=Arial>
    <li><font size=2>Assign SAP* to the Super user group. </font>
    <ul>
        <li><font size=2>Enter transaction SE16. </font>
        <li><font size=2>Enter SAP* into the field called BNAME. </font>
        <li><font size=2>Click "Execute" and verify. </font></li>
    </ul>
    </font></li>
</ul>
<font face=Arial></font>
<ul><font face=Arial>
    <li><font size=2>As a final step, check that the secret super user has been created (with a different user ID and password). All of the authorizations assigned to SAP* should then be removed (an empty profile list followed by a password change. </font></font></li>
</ul>
<font face=Arial><strong>
<p>Auditing Information System (AIS)</p>
</strong></font>
<p><font face=Arial><font size=2>SAP Audit Information System (AIS) serves as a centralized repository for reports, queries, and views of interest to auditors. It is designed to address the overall system configuration as well as SAP business processes and their related control features, providing audit and security practitioners with the critical information they need to conduct effective reviews of their SAP systems. SAP administrators can use AIS for security auditing. The AIS plays a supportive role in providing security services for SAP systems. The primary function of AIS is auditing but auditing features can derive the measures that help in developing the security policy for SAP systems.</font></font></p>
<font face=Arial><strong>
<p><a name=_Toc16661175>3.4 Administration and Maintenance</a></p>
</strong></font>
<p align=justify><font face=Arial><font size=2>A successful security set up of a SAP system concludes with proper management and administration of user IDs, password resetting, audit trails, audit logs, access control list, and personnel responsibilities. </font></font></p>
<font face=Arial></font>
<p align=justify><font face=Arial><font size=2>Security administration in SAP includes maintenance of the overall SAP security environment using the SAP Profile Generator, creating user-level activity groups and creating user master records.</font></font></p>
<font face=Arial></font>
<p align=justify><font face=Arial><font size=2>The concept of SAP security is flexible as well as complex. SAP has a multi-layered integrated framework. To ensure adequate protection, security measures must be factored into all layers of the SAP infrastructure. With client/server architecture, SAP systems include many components that exchange information, each of which constitutes a layer of the SAP security infrastructure. Security is often not a priority in an implementation and as a result, the default security is not strong. SAP security functionality could be enhanced using various measures as discussed above. </font></font></p>
<font face=Arial></font>
<p align=justify><font face=Arial><font size=2>Enterprises must develop a security strategy to ensure a secure and functional SAP system. A business critical application like SAP needs continuous monitoring and improvement of its security features.</font></font></p>
<img src ="http://www.cppblog.com/stevennash/aggbug/59137.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cppblog.com/stevennash/" target="_blank">Technical Consultant</a> 2008-10-31 10:58 <a href="http://www.cppblog.com/stevennash/articles/59137.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item></channel></rss>