SAP Basis Daily checks and responsiveness - SAP Corner

Direkt zum Seiteninhalt
Daily checks and responsiveness
SAP Security Audit & Monitoring
New risks in SAP HANA: In addition to the known risks, there are also new risks from the use of SAP HANA. A very good example are frequently used web applications that represent something new in the SAP area. In contrast to an SAP ERP system, HANA systems consist mainly of web applications, which were considered optional in the previous versions. These web applications can be found by various search engines on the Internet. This also applies to SAP Portal or Netweaver. There are URL schemes that help locate the system. This also applies to other SAP systems that use Web applications. This makes the new technology vulnerable to typical web attacks. SQL Injection, ABAP Code Injection, or XSS are all included. All risks known for a normal SAP system also apply to a SAP-HANA system. The data is stored unencrypted in RAM. Only then does the system gain this speed advantage. This results in risks such as a read-out by memory scraping malware. These pick up data in memory. Encryption costs performance, so it is not used by default. Especially during a migration HANA runs in a parallel system, therefore at least one new system comes to your landscape. Also note: HANA has its own tools and settings that need to be known and configured. The bottom line is that the system simply needs more attention when operating. Many settings often result in more errors. Three - points - HANA Security Plan 1) Roles and permissions In a previous SAP system, roles and permissions are certainly one of the main pillars of a secure system. Roles and permissions work differently in a HANA system. There are two types of users: 1) Default (limited): With this type of user, there are different access methods to the database. For example, the JDBC or HTTP technologies are used to give two examples.

A role concept according to best practice protects you from potential attacks within your SAP landscape. However, to protect your system from unauthorized access via the network, a correct configuration of the SAP gateway is required. It enables the use of external programs via interfaces or the call of ABAP programs and serves as a technical component of the application server, which manages the communication of all RFC-based functions.
(De-)installation and update/upgrade of SAP AddOns
The presentation view is used to visualize the applications and data for the user. The presentation is done with the help of a graphical user interface (GUI). Furthermore, the presentation view consists of several modules, which are also summarized as SAP GUI. SAP Fiori is the presentation layer of the next generation and is therefore particularly user-friendly.

After your user has the necessary permissions for the SQL Editor, perform the following steps: Call the DBACOCKPIT transaction. Open the following folder structure in Database Administration: Performance -> Additional Functions -> SQL Command Editor Enter your first query in the input query. Then click Run or alternatively press F8 View of the DBA Cockpit Invoke the input query and drop the first SQL query View the results of a query to query the users of a system.

With "Shortcut for SAP Systems" a tool is available that greatly facilitates some tasks in the SAP basis.

You will now get a detailed overview of which roles are assigned to which master role.

On www.sap-corner.de you will also find useful information about SAP basis.


The application programs on the application servers request the required data from the database layer, process it, prepare it for the user and pass it on to the presentation layer.
SAP Corner
Zurück zum Seiteninhalt