All too often SAP implementation projects don't take security beyond the application level, where security and authorization are often regarded as one and the same. To ensure adequate protection, security measures must be factored into all layers of the SAP infrastructure. With their client/server architecture, SAP systems include many components that exchange information, each of which constitutes a layer of the SAP security infrastructure. This article introduces you to this multilevel notion of security, and what you need to be mindful of when reviewing your overarching security measures, as well as the security measures you have in place (or lack thereof) to address each specific level.
Jose A. Hernandez
José A. Hernández is Assistant Managing Director at realTech, an SAP partner and technical IT consulting firm specializing in R/3, mySAP.com, e-commerce, and the development of Enterprise Resource Management software. José joined realTech in December 1999, and is responsible for project management and consulting services for realTech customers in Spain. José obtained experience in projects and building up business areas over the years while working for Ericsson, Telefónica Sistemas, and Digital Equipment/Compaq, before founding his own company, K2P, a knowledge management consulting firm. His last position at Compaq was as technical director for SAP projects. José also published “The SAP R/3 Handbook” in 1997, which became the best-selling SAP book worldwide. In 1998 he published the first Spanish-language SAP book (“Así es SAP R/3”), and in 1999 José published his third book, “SAP R/3 Implementation Guide,” as well as the second edition of “The SAP R/3 Handbook.”
You may contact the author at
hernandez@realTech.de.
If you have comments about this article or publication, or would like to submit an article idea, please contact the
editor.