Defense and Security
87 Blog Posts
49 Contributors
-
Here’s another magic lesson. Today we will focus on the SAP_ALL profile. This profile contains all SAP authorizations (in ABAP systems), meaning that a user with the SAP_ALL profile can perform any action in the system. That’s why SAP... Read More »6Comments25Likes
-
The new generation of road maps is here at SAP! Similar to how paper maps were reshaped by navigation systems and digital maps, classic PDF road maps are being transformed by the SAP Road Map Explorer. This interactive tool helps customers and... Read More »0Comments18Likes
-
In 2021, emerging technologies and accelerated digitalization are forcing IT departments to transform their cybersecurity strategy and approach. The transformation takes place simultaneously – from securing systems, building a secure cloud... Read More »1Comment15Likes
-
As you may know there are some basic rules in SAP Security. One of them is to prohibit direct modifications in production systems. All changes in SAP system have to be first implemented in the development system and then could be promoted through... Read More »2Comments13Likes
-
I continue my posts regarding secret knowledge of SAP Consulters to bypass your security. And today I will tell you about calling SAP transactions without authorizations for them. It is known that to invoke transaction codes users need the S_TCODE... Read More »3Comments13Likes
-
Cybersecurity is everyone’s business. Nevertheless, at the end of 2019, we (as well as the cybersecurity field in general) still have a lack of diversity in this vibrant field. By diversity, we mean all: cultural background, educational... Read More »3Comments13Likes
-
The SAP Road Map Explorer was recently released to help SAP customers customize road maps according to their needs. In 5 simple steps, customers can navigate the tool in an easy and intuitive way. To first access the tool, log-in with your S-user... Read More »3Comments10Likes
-
It will never happen to me ! When I started writing this blog article, before typing any single word, I searched on Google for “GitHub hardcoded credential data leak”, and the very first result was a very recent news from yesterday:... Read More »0Comments10Likes
-
Introduction Defense organizations must protect their information from both external and internal security threats. To protect from external threats, Cyber Security best practices are applied on network, servers, and workstations. This includes... Read More »0Comments10Likes
-
NWBC was originally designed to enable users to access data using multiple UI technologies from a single ABAP back end system. To make data access secure, we now recommend combining NWBC with SAP NetWeaver Single Sign-On. This solution is both... Read More »21Comments9Likes