SAP Basis SU01 User maintenance - SAP Basis

Direkt zum Seiteninhalt
SU01 User maintenance
Server Administration
SAP Basis Support ensures secure operation of the SAP system landscape. For proper operation of the SAP system, the database and operating systems must be checked on a daily basis.

There is no way around containers, and even SAP will soon have to reorient itself here and allow the NetWeaver stack to be run in containers. There are many indications that Kubernetes will win the battle for supremacy among container management tools. SAP has also already invested in Gardener and is also intensifying its partnerships with IBM and Red Hat Openshift.
Hiring Requirements
In addition to scanning and identifying the respective security vulnerabilities of a program, it is also possible to stop tasks that are to be transported to other SAP systems with security vulnerabilities in the further transport process This applies, for example, to the CHARM process based on SAP Solution Manager. This forces a programmer to securely check the programs he or she is responsible for according to the same security criteria. If a program then still has security problems, it can either be released via the dual control principle or returned for further processing. Do you know of any other solutions for improving ABAP code security or have you already gained experience with the products mentioned above? I look forward to your comments!

The website www.sap-corner.de offers many useful information about SAP basis.

A note box in which data of all kinds can be quickly filed and retrieved. This is what Scribble Papers promises. At first, the program looks very spartan. But once a small structure is in place, you realise the great flexibility of this little helper.

Daily monitoring and maintenance of your systems. Together with you, we create a catalog of measures to ensure the optimal operation of your SAP landscape.

Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.

Many companies that use or would like to use an SAP Basis system seek advice from external service providers or completely outsource the administration of the system.

Attackers quickly gain a dangerous leap of knowledge over these user groups.
SAP BASIS
Zurück zum Seiteninhalt