Skip to Content
Author's profile photo Jennifer Lemmen

Securing your BI deployment

I hope everyone is having a nice, relaxing summer.  The Vancouver summer so far has been full of great weather, and I’ve been enjoying every moment of it.

A question I am seeing frequently from our customers is “how do I secure my BI deployment?” – and for good reason.  The headlines in my RSS reader are still filled with security breaches and data protection incidents, and I don’t anticipate that going away any time soon.

My colleague Greg Wcislo has written a three-part series on answering this question.

Part 1,  securing Identity Provider communication and a review on how the data is stored

Part 2,  configuring the web tier which is likely the most critical if you have your installation exposed to the outside world.

Part 3,  securing the BI servers, including ports, firewalls and database encryption

As a bonus, here’s another excellent write up by Greg on Encryption and Data Security in BI 4.0.

I strongly recommend implementing HTTPS and CORBA SSL in your deployment, along with having a regular password expiration for your users, use complex passwords and regularly reviewing authorizations in your BI system, even if the web application is not public-facing.

In addition, don’t forget about SAP’s security note portal.  It’s located here:

Other links of interest:

Assigned Tags

      Be the first to leave a comment
      You must be Logged on to comment or reply to a post.