The scope of Hicron’s services in the area of SAP Security Services:
We provide our Clients with expert knowledge, implementations, and advice in the following areas:
Users & Authorizations
- SAP identity management and authorization concepts: analyzing the requirements and recommending approaches tailored to the needs of particular customers or industries.
- Authorization design and configuration: developing role restrictions to meet identified requirements, based on experience and system analysis.
- Authorizations for business users, support teams, and technical users: developing and implementing an authorization matrix governing access to system operations (BASIS) and support activities throughout the SAP environment.
- Troubleshooting missing authorizations: analyzing logs to diagnose and resolve authorization errors.
- Adjusting the authorization system during SAP upgrades and other remediation activities: comparing and adjusting roles across systems, restoring inheritance relationships.
Products and technologies:
CUA; IdM; AD; UME; HR; IAS; BTP; Azure.
Secure SAP
Ensuring the security of the SAP environment is a top priority. This task includes the following activities:
- configuring secure connections to/from SAP systems,
- configuring and analyzing audits,
- managing the implementation process of SAP security notes,
- analyzing and configuring SAP security policies.
Technologies:
SAP Gateway ACL; Message Server security, SNC and SSL; SAP Web Dispatcher, SAProuter; Single Sign-On.
Compliance
Ensuring process compliance and protecting data by managing access risk involves the following tasks:
- implementing ITGC processes in relation to SAP systems,
- access risk analysis: Sensitive Access and Segregation of Duties,
- identifying access risks related to BASIS features,
- analyzing backend and FIORI transaction and application usage logs,
- implementing mechanisms for auditing data read activities,
- managing personal data consents,
- deleting expired data,
- privileged access management.
Processes:
Access Risk Analysis; Firefighter / Emergency Access Management; Compliant User & Role Management; Access Risk Review; Information Management.
Products:
SUIM Critical Authorizations; SAP GRC, IAG, SAST, and others; Security Audit Log; UI Masking and UI Logging; Read Access Logging; Consent Management; ILM.
Remote Access
This area focuses on ensuring secure access to SAP systems. Related services include:
- analysis and design of mobile access architecture,
- frontend/backend separation to improve security,
- Single Sign-On to multiple systems,
- SAP BTP or Azure as a secure gateway to Fiori applications,
- multifactor authentication.
Technologies:
Logon Tickets; X.509; Kerberos/SPNego; SAML; MFA.
Products:
SAP Secure Login; ADFS; SAP BTP; Azure App Proxy; OpenSSO; SAP Cloud IAS.