SAP System Security

個数:

SAP System Security

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 700 p.
  • 言語 ENG
  • 商品コード 9781493214815
  • DDC分類 005.8

Full Description

If you're a Basis administrator looking to keep your SAP system under lock and key, this is the book for you. Discover information on security-relevant issues, from identity and access management to network and backend security. Then get the technical know-how to identify vulnerabilities and defend your system from internal and external threats. Secure your SAP system from the ground up. Highlights include: Password security, CommonCryptoLib, Single sign-on (SSO), Authorizations, Transport security, Audit logging, Patching, Client locking, RFC security, Operating system and database security. With this book, you will be able to: Configure application, network, and infrastructure security. Set up identity and access management: roles, authorizations, SSO. Prepare for audits and learn to maintain your security setup long-term.

Contents

Preface
Target Audience
System Administration: A Vast Field of Options
What Is Basis?
Structure of This Book
Introduction
Potential Threats
The Onion Concept
Risk and True Cost of Security
The Administrator's Role in Security
Summary
Configuring Profiles and Parameters
Understanding System Parameters
System Profiles
Profile and Parameter Structure
Static and Dynamic Parameters
Viewing and Setting Parameters
Key Security-Related Parameters
Controlling Access to Change Parameters
Summary
Restricting Transactional Access
Clients
Who Should Be Able to Lock and Unlock Transactions?
Which Transactions to Lock
Locking Transactions
Viewing Locked Transactions
Summary
Securing Clients
Client Settings
Client Logon Locking
Summary
Securing the Kernel
Understanding the Kernel
Common Cryptographic Library
Kernel Update
Summary
Managing Users
What Is a User ID in SAP?
Different User Types
The User Buffer
Creating and Maintaining a User
Copy a User
Change Documents for Users
Mass User Changes with Transaction SU10
User Naming Convention
Security Policies
Maintain User Groups
Central User Administration
User Lock Status
User Classification
User-Related Tables
Securing Default Accounts
User Access Reviews
Inactive Users
Password and Logon Security
Segregation of Duties
Summary
Configuring Authorizations
Authorization Fundamentals
SAP Role Design Concepts
The Profile Generator
Assign and Remove Roles
Lock and Unlock Transactions
Transaction SUIM: User Information System
Role Transport
Common Standard Profiles
Types of Transactions
Table Authorizations
Printer Authorizations
Other Important Authorization Objects
Transaction SACF: Switchable Authorizations
Customizing Entries in Tables PRGN_CUST and SSM_CUST
Mass Maintenance of Values within Roles
Upgrading to a New Release
ABAP Debugger
Authorization Redesign and Cleanup
Introduction to SAP GRC Access Control
Summary
Authentication
What Is Single Sign-On?
Single Sign-On Technologies
SAP GUI Single Sign-On Setup
SAML
Summary
Patching
Patching Concepts: SAP's Approach to Patching
Application of Security SAP Notes
Implications of Upgrades and Support Packages
Evaluating Security with SAP Solution Manager
Summary
Securing Transports
Transport System Concepts
Transport Authorizations
Operating System-Level Considerations
Landscape Considerations
Summary
Auditing and Logging
External Audits
Internal Audits
Auditing Tools
Summary
Securing Network Communications
Choosing a Network Security Strategy
Securing Using Access Controls
Securing the Transport Layer
Connecting to the Internet and Other Networks
Summary
Configuring Encryption
Introduction to Cryptography
Enabling SSL/TLS
The Internet Connection Manager
SAP Web Dispatcher
Summary
Database Security
Platform-Independent Database Considerations
Securing the Database Connection
Logging and Encrypting Your Database
Summary
Infrastructure Security
Business Secure Cell Concept
Secure Landscape
Policy
Operating System Considerations
Monitoring
Virtualization Security Considerations
Network Security Considerations
Physical Security
Summary
The Authors
Index

最近チェックした商品