SAP Basis Migration of an SAP system to other server landscapes - NW Admin

Direkt zum Seiteninhalt
Migration of an SAP system to other server landscapes
Release changes/migrations
Over time, the tasks associated with the base became more complex and time-consuming, so that only the consultants could handle them. A need arose to hire a person to deal only with Basis matters.

In this article on SAP Security Automation I would like to take a look at the future of automated processes in the SAP Security area. For many companies, the topic of security automation still offers a lot of potential in terms of time savings and process optimisation. Our daily work environment offers numerous tasks that could be handled excellently automatically. For this reason, in this article I present two of the possibilities that already exist in the broad area of security automation. Security Automation via SAP Security Check The first option of Security Automation, which I want to introduce here, is the automatic verification of the existing permissions. Have you ever wondered who has critical permissions in your SAP system? And have you ever tried to do this by hand? Depending on the level of expertise and experience of the privilege administrator, this is a time-consuming work. If an audit is also announced and the SAP system is to be checked for critical permissions and segregation of duties, then it is very difficult to meet all requirements and secure the eligibility landscape in this respect. For this reason, various vendors provide solutions to automate the verification of the permission system with regard to critical permissions and segregation of duties using tool support. This allows permission administrators to use their valuable time to correct the errors rather than just looking for them. For example, we use a tool that runs through the verification of over 250 rules. We then get an evaluation of which rules are violated and which points are correct. A simple example of such rules is the use of the SAP_ALL profile. Another would be to grant the jump permission in debugging (S_DEVELOP permission object with the ACTVT = 02 field). These are two relatively simple examples of Security Check tools' rulebook. In addition, queries are also made, which are located in the field of Segregation of Duties. Using this tool allowed us to move from manual validation of critical permissions to an automatic process.
SM37 Simple Job Selection
HANA optimization makes your own programs really fast. ABAP firewall: 92% less effort, 98% lower costs. Set quality standards for internal and external developments. Accurate and resource-saving analysis and evaluation. Security and compliance risks: significantly reduced.

Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page www.sap-corner.de you will find useful information on this topic.


Soft skills in particular also play an important role in this job description. Communication skills are very much in demand on a day-to-day basis, because SAP administrators are often in close contact with customers and have to respond to their wishes and questions. They also need the ability to work in a structured manner and to find creative solutions and decisions. Continuous training in the field is advisable in order not to lose touch.

Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.

The characteristics of cloud computing are the provision of standardised services in terms of performance and type of performance, results-orientated services, provision of performance to a wide range of service customers, scalability, transaction-based billing and high risk of IT service failure.

So much information... how can you keep it so that you can find it again when you need it? That's what Scribble Papers is great for.

This SAP training covers the introduction/basics of SAP administration.
NW BASIS
Zurück zum Seiteninhalt