SlideShare ist ein Scribd-Unternehmen logo
1 von 48
Downloaden Sie, um offline zu lesen
Securing SAP HR Data Beyond
HCM Authorizations
A presentation by
HR documents contain confidential
information including:
•  Social Security Numbers
•  Drivers License Numbers
•  Date of Birth
•  Bank details
•  Payroll
HR documents contain confidential
information including:
•  Social Security Numbers
•  Drivers License Numbers
•  Date of Birth
•  Bank details
•  Payroll
This information needs to be highly protected
HR Data is Constantly on the Move
4	
  
HR Data is exported from SAP
–  Reporting
–  Data crunching
–  Analysis
Cloud & Mobility
–  Explosion of cloud services
and providers
–  BYOD: are you losing track of
your data?
Not only that but…
•  Companies are required to abide by compliance
regulations, such as:
–  HIPAA
–  SOX
–  Safe Harbor
What is SAP HR
•  Human Resources Management Software
–  On premise and cloud solutions
–  Recruit, hire, fire talent
–  Local laws and regulation compliance
–  Standardize payroll
–  Manage attendance, schedules, and vacation time
–  Support core business operations
The Landscape
•  SAP’s HCM Module
–  Data is stored on-premise
–  Accessible by everyone with access to the server
•  Success Factors
–  Data is stored in the cloud
–  Data can be shared and manipulated by anyone –
no tracking
•  Hybrid
–  Data is stored both on-premise and in the cloud
–  Data moves between the two with no protection
7	
  
The Landscape
•  SAP’s HCM Module
–  Data is stored on-premise
–  Accessible by everyone with access to the server
•  Success Factors
–  Data is stored in the cloud
–  Data can be shared and manipulated by anyone –
no tracking
•  Hybrid
–  Data is stored both on-premise and in the cloud
–  Data moves between the two with no protection
8	
  
The Landscape
•  SAP’s HCM Module
–  Data is stored on-premise
–  Accessible by everyone with access to the server
•  Success Factors
–  Data is stored in the cloud
–  Data can be shared and manipulated by anyone –
no tracking
•  Hybrid
–  Data is stored both on-premise and in the cloud
–  Data moves between the two with no protection
9	
  
SAP HR Security
•  3 main security features
–  Infotypes
–  Structural Authorizations
–  Personnel Number Restrictions
Infotypes
•  Units containing master data in SAP HR
•  Used in recording employee data, payroll data, and
administrative data
•  Creates fields and groups them together and enables
time-dependent storage
•  Infotype restrictions are extremely important since
master data is the core of HR data and needs to be
restricted.
Structural Authorizations
•  The data a user can access can be restricted by using
either
–  Enterprise Structure: Groups/Departments, Codes,
Individual user files
–  Organizational Structure: Common areas, overall use of
the system
•  Structural authorizations allow restrictions to be
configured on the organizational structure.
Personnel Number Restrictions
•  Users can be restricted using the authorization object
P_PERNR to only accessing infotypes regarding their
own personal data
–  For example: checking your own hours or schedule
–  Known as ESS (Employee Self Service)
•  Personnel Number Restrictions can allow HR admin to
access employee data while preventing them from
viewing their own
–  For example: Remove the capability to change own hours
worked
Data needs to be protected inside &
outside of company walls
SafeNet. (2014, April 17). First Quarter Recap 2014. Retrieved May 19, 2014, from Breach Level Index:
www.breachlevelindex.com
	
  
Look Familiar?
Much of this
information is
commonly found
amongst HR
data
2010	
  Javelin	
  Strategy	
  and	
  Research	
  
How it is used
More often then
not, the information
is used in millions
of identity fraud
incidents
How did they get the data?
Unprotected
data and
unsecure data
movement
leaves PII
(Personally
Identifiable
Information)
vulnerable
Extend Protection Beyond
Boundaries of SAP
Data is protected when it is stored in SAP
Extend Protection Beyond
Boundaries of SAP
Once the data leaves SAP, it no longer has the protection
Extend Protection Beyond
Boundaries of SAP
Employees
Employees use the
information in everyday
job-related activities
Extend Protection Beyond
Boundaries of SAP
Employees
File Server
They store the
information in various
locations
Extend Protection Beyond
Boundaries of SAP
Employees
File Server
Employees can also upload sensitive data to
cloud platforms for collaboration, without
regards to security.
Extend Protection Beyond
Boundaries of SAP
Partner
Employees
File Server
The data can be shared with partners
Extend Protection Beyond
Boundaries of SAP
Competitor
Partner
Employees
File Server
And also forwarded to competitors
Extend Protection Beyond
Boundaries of SAP
Competitor
Partner
Employees
File Server
ALL	
  HAPPENING	
  WITHOUT	
  PROTECTION	
  
HR Data Needs Protection
EVERY
WHERE
IT
GOES!
Protecting SAP NetWeaver
Protect data inside of SAP
–  Roles & Authorizations
•  Check HCM Authorizations in new and existing roles
•  Review PLOG in existing roles
•  Restrict OTYPE
•  Check P_ABAP in existing roles
Extend protection to data leaving SAP
–  Authorizations need to be extended to wherever the data
goes
28	
  
Traditional Security Solutions
Network
•  Network
–  Data Loss Prevention (DLP)
–  Firewalls
–  Virtual Private Network (VPN)
	
  
Traditional Security Solutions
Network
Storage
•  Network
–  Data Loss Prevention (DLP)
–  Firewalls
–  Virtual Private Network (VPN)
•  Storage
–  Full Disk Encryption (FDE)
–  Database Encryption	
  
Traditional Security Solutions
•  Network
–  Data Loss Prevention (DLP)
–  Firewalls
–  Virtual Private Network (VPN)
•  Storage
–  Full Disk Encryption (FDE)
–  Database Encryption
•  File
–  Pretty Good Privacy (PGP)
–  Information Rights
Management (IRM)
Network
Storage
File
Latest	
  technologies	
  apply	
  protecCon	
  at	
  the	
  file/data	
  
level,	
  which	
  results	
  in	
  persistent	
  security	
  no	
  maLer	
  
where	
  the	
  file	
  travels	
  to	
  	
  
Rights Management (RMS) are offerings from Microsoft
that help keep an organizations information
Microsoft is the leader in the file/
data centric protection
SECURE
Rights Management (RMS) are offerings from Microsoft
that help keep an organizations information
Microsoft is the leader in the file/
data centric protection
Data-centric protection
Protection is applied directly to the data and documents
	
  
Data-centric protection
Protection is applied directly to the data and documents
	
  
Wherever the data is moved
	
  
Data-centric protection
Protection is applied directly to the data and documents
	
  
Wherever the data is moved
	
  
THE PROTECTION STAYS WITH IT
	
  
HR and Other Documents are
Protected
•  At a single location
On	
  premise	
  
HR and Other Documents are
Protected
•  Inside and outside the
organization
•  At a single location
Partner	
  
On	
  premise	
  
Shared	
  
HR and Other Documents are
Protected
•  Inside and outside the
organization
•  At a single location
u  And when moving amongst various locations
Partner	
  
On	
  premise	
  
Shared	
  
CollaboraCon	
  
Fine-grained control
•  Content owners can define who can
–  Open the document
–  Edit the contents
–  Print the document
–  Forward to anyone, internal or external
–  Take other actions with the information
Can RMS data-centric protection be
extended to SAP HR data?
Halocore for SAP NetWeaver
•  Innovative: Enforces RMS protection on all data leaving SAP
•  Secure: Determines what users are authorized to access sensitive data
•  Customizable: Offers fine-tuned control over who can do what with
information (view, edit, print, forward, etc.)
•  Flexible: Works for any file type
•  Powerful: Protection persists beyond SAP, including mobile platforms
Auditing Capabilities –
Customizing your view
Auditing Capabilities –
The Log File
FOR MORE INFORMATION
Click the link below to learn how Halocore for SAP NetWeaver can
protect your confidential HR information, no matter where it goes.
Not Sure Where to Start?
•  Download FREE audit tool for SAP to monitor HR and
other sensitive data movement
•  Monitor the activities surrounding your information
–  Track, record and classify data movement
–  Identify who accesses it
–  From where they access it (IP address & terminal)
–  Where they send it to
–  Extract data for analysis
DOWNLOAD FREE
AUDIT TOOL NOW
Click HERE
PRESENTATION BY
Tweet us @secude
Contact us info@secude.com

Weitere ähnliche Inhalte

Was ist angesagt?

Sap enterprise asset_management
Sap enterprise asset_managementSap enterprise asset_management
Sap enterprise asset_managementkamalKRahangdale
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infosapdocs. info
 
Sap Hr Presentation 08052002
Sap Hr Presentation 08052002Sap Hr Presentation 08052002
Sap Hr Presentation 08052002Anand Shanmugam
 
Sap demo with focus on FICO
Sap demo with focus on FICOSap demo with focus on FICO
Sap demo with focus on FICORitesh Solanki
 
Simplifying SAP Plant Maintenance
Simplifying SAP Plant MaintenanceSimplifying SAP Plant Maintenance
Simplifying SAP Plant MaintenanceDeeDee Kato
 
Plant maint p pt-wisdom
Plant maint p pt-wisdomPlant maint p pt-wisdom
Plant maint p pt-wisdomjskishore
 
Sap fico configuration
Sap fico configurationSap fico configuration
Sap fico configurationRanjith Patil
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 trainingsuresh
 
SAP HCM - OM PRESENTATION
SAP HCM - OM PRESENTATIONSAP HCM - OM PRESENTATION
SAP HCM - OM PRESENTATIONAditi Sinha
 
Sap payroll schema. functions , rules and operations – an overview
Sap payroll schema. functions , rules and operations – an overviewSap payroll schema. functions , rules and operations – an overview
Sap payroll schema. functions , rules and operations – an overviewgetsarath
 
Us payroll configuration
Us payroll configurationUs payroll configuration
Us payroll configurationgayathri166
 
Organizational Management in SAP HCM
Organizational Management in SAP HCMOrganizational Management in SAP HCM
Organizational Management in SAP HCMDivyasri_G
 

Was ist angesagt? (20)

SAP HR / HCM Advance Level Training Demo
SAP HR / HCM Advance Level Training DemoSAP HR / HCM Advance Level Training Demo
SAP HR / HCM Advance Level Training Demo
 
SAP Security interview questions
SAP Security interview questionsSAP Security interview questions
SAP Security interview questions
 
Sap workflow training
Sap workflow trainingSap workflow training
Sap workflow training
 
Sap enterprise asset_management
Sap enterprise asset_managementSap enterprise asset_management
Sap enterprise asset_management
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.info
 
Sap Hr Presentation 08052002
Sap Hr Presentation 08052002Sap Hr Presentation 08052002
Sap Hr Presentation 08052002
 
Saphcm presentation
Saphcm presentationSaphcm presentation
Saphcm presentation
 
SAP HR Part 1.pptx
SAP HR Part 1.pptxSAP HR Part 1.pptx
SAP HR Part 1.pptx
 
Sap demo with focus on FICO
Sap demo with focus on FICOSap demo with focus on FICO
Sap demo with focus on FICO
 
Simplifying SAP Plant Maintenance
Simplifying SAP Plant MaintenanceSimplifying SAP Plant Maintenance
Simplifying SAP Plant Maintenance
 
Plant maint p pt-wisdom
Plant maint p pt-wisdomPlant maint p pt-wisdom
Plant maint p pt-wisdom
 
Sap fico configuration
Sap fico configurationSap fico configuration
Sap fico configuration
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
 
SAP HCM - OM PRESENTATION
SAP HCM - OM PRESENTATIONSAP HCM - OM PRESENTATION
SAP HCM - OM PRESENTATION
 
SAP EASY DMS
SAP EASY DMSSAP EASY DMS
SAP EASY DMS
 
Sap security tasks
Sap security tasksSap security tasks
Sap security tasks
 
Sap payroll schema. functions , rules and operations – an overview
Sap payroll schema. functions , rules and operations – an overviewSap payroll schema. functions , rules and operations – an overview
Sap payroll schema. functions , rules and operations – an overview
 
Us payroll configuration
Us payroll configurationUs payroll configuration
Us payroll configuration
 
Organizational Management in SAP HCM
Organizational Management in SAP HCMOrganizational Management in SAP HCM
Organizational Management in SAP HCM
 
SAP FICO Overview
SAP FICO OverviewSAP FICO Overview
SAP FICO Overview
 

Andere mochten auch

SAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data securitySAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data securitySven Ringling
 
SAP HCM Structural Authorization Overview Presentation
SAP HCM Structural Authorization Overview PresentationSAP HCM Structural Authorization Overview Presentation
SAP HCM Structural Authorization Overview PresentationKenBowers
 
Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshoplarrymcc
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0Latha Kamal
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsRohan Andrews
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access ControlNasir Gondal
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityMatthew Rosenquist
 
Etkin Yetki Yönetimi - SAP GRC Access Control
Etkin Yetki Yönetimi - SAP GRC Access ControlEtkin Yetki Yönetimi - SAP GRC Access Control
Etkin Yetki Yönetimi - SAP GRC Access ControlArtius Consulting
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPUL Transaction Security
 
Hans Henseler - Intelligent data analysis for improving public security - Da...
Hans Henseler - Intelligent data analysis for improving public security -  Da...Hans Henseler - Intelligent data analysis for improving public security -  Da...
Hans Henseler - Intelligent data analysis for improving public security - Da...DataValueTalk
 
Smarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoftSmarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoftSmart ERP Solutions, Inc.
 
SAP HANA SPS08 Security
SAP HANA SPS08 SecuritySAP HANA SPS08 Security
SAP HANA SPS08 Security SAP Technology
 
People soft profile management 9 1
People soft profile management 9 1People soft profile management 9 1
People soft profile management 9 1Nagaraj K P
 
Security in HR... How secure are your files, really?
Security in HR... How secure are your files, really?Security in HR... How secure are your files, really?
Security in HR... How secure are your files, really?Chapelle Ryon
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsPECB
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)SAP Latinoamérica
 

Andere mochten auch (20)

SAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data securitySAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data security
 
Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security
 
SAP HCM Structural Authorization Overview Presentation
SAP HCM Structural Authorization Overview PresentationSAP HCM Structural Authorization Overview Presentation
SAP HCM Structural Authorization Overview Presentation
 
Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshop
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
 
Hris
HrisHris
Hris
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
Etkin Yetki Yönetimi - SAP GRC Access Control
Etkin Yetki Yönetimi - SAP GRC Access ControlEtkin Yetki Yönetimi - SAP GRC Access Control
Etkin Yetki Yönetimi - SAP GRC Access Control
 
HR Outsourced Services
HR Outsourced Services HR Outsourced Services
HR Outsourced Services
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAP
 
Hans Henseler - Intelligent data analysis for improving public security - Da...
Hans Henseler - Intelligent data analysis for improving public security -  Da...Hans Henseler - Intelligent data analysis for improving public security -  Da...
Hans Henseler - Intelligent data analysis for improving public security - Da...
 
Smarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoftSmarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoft
 
SAP HANA SPS08 Security
SAP HANA SPS08 SecuritySAP HANA SPS08 Security
SAP HANA SPS08 Security
 
People soft profile management 9 1
People soft profile management 9 1People soft profile management 9 1
People soft profile management 9 1
 
Security in HR... How secure are your files, really?
Security in HR... How secure are your files, really?Security in HR... How secure are your files, really?
Security in HR... How secure are your files, really?
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)
 

Ähnlich wie HR Security in SAP: Securing Data Beyond HCM Authorizations

Fuse Analytics - HR & Payroll Cloud Transformation Pitfalls, Lessons Learned
 Fuse Analytics - HR & Payroll Cloud Transformation Pitfalls, Lessons Learned Fuse Analytics - HR & Payroll Cloud Transformation Pitfalls, Lessons Learned
Fuse Analytics - HR & Payroll Cloud Transformation Pitfalls, Lessons LearnedCharles Eubanks
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Data Governance for Data Lakes
Data Governance for Data LakesData Governance for Data Lakes
Data Governance for Data LakesKiran Kamreddy
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?Albert Hoitingh
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365Don Daubert
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscapeDharma Atluri
 
Distributed Data Across Cloud and On-Premises: Opportunities and Challenges
Distributed Data Across Cloud and On-Premises: Opportunities and ChallengesDistributed Data Across Cloud and On-Premises: Opportunities and Challenges
Distributed Data Across Cloud and On-Premises: Opportunities and ChallengesDenodo
 
Application Architectures with Hadoop
Application Architectures with HadoopApplication Architectures with Hadoop
Application Architectures with Hadoophadooparchbook
 
Application Architectures with Hadoop | Data Day Texas 2015
Application Architectures with Hadoop | Data Day Texas 2015Application Architectures with Hadoop | Data Day Texas 2015
Application Architectures with Hadoop | Data Day Texas 2015Cloudera, Inc.
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Cloudera, Inc.
 
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...Precisely
 
Architecting Applications with Hadoop
Architecting Applications with HadoopArchitecting Applications with Hadoop
Architecting Applications with Hadoopmarkgrover
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceDavid Broussard
 
GDPR/CCPA Compliance and Data Governance in Hadoop
GDPR/CCPA Compliance and Data Governance in HadoopGDPR/CCPA Compliance and Data Governance in Hadoop
GDPR/CCPA Compliance and Data Governance in HadoopEyad Garelnabi
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 

Ähnlich wie HR Security in SAP: Securing Data Beyond HCM Authorizations (20)

Fuse Analytics - HR & Payroll Cloud Transformation Pitfalls, Lessons Learned
 Fuse Analytics - HR & Payroll Cloud Transformation Pitfalls, Lessons Learned Fuse Analytics - HR & Payroll Cloud Transformation Pitfalls, Lessons Learned
Fuse Analytics - HR & Payroll Cloud Transformation Pitfalls, Lessons Learned
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Data Governance for Data Lakes
Data Governance for Data LakesData Governance for Data Lakes
Data Governance for Data Lakes
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
 
Distributed Data Across Cloud and On-Premises: Opportunities and Challenges
Distributed Data Across Cloud and On-Premises: Opportunities and ChallengesDistributed Data Across Cloud and On-Premises: Opportunities and Challenges
Distributed Data Across Cloud and On-Premises: Opportunities and Challenges
 
Application Architectures with Hadoop
Application Architectures with HadoopApplication Architectures with Hadoop
Application Architectures with Hadoop
 
Application Architectures with Hadoop | Data Day Texas 2015
Application Architectures with Hadoop | Data Day Texas 2015Application Architectures with Hadoop | Data Day Texas 2015
Application Architectures with Hadoop | Data Day Texas 2015
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
 
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
 
Architecting Applications with Hadoop
Architecting Applications with HadoopArchitecting Applications with Hadoop
Architecting Applications with Hadoop
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data Governance
 
GDPR/CCPA Compliance and Data Governance in Hadoop
GDPR/CCPA Compliance and Data Governance in HadoopGDPR/CCPA Compliance and Data Governance in Hadoop
GDPR/CCPA Compliance and Data Governance in Hadoop
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 

Mehr von UL Transaction Security

Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataUL Transaction Security
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsUL Transaction Security
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...UL Transaction Security
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldUL Transaction Security
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...UL Transaction Security
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesUL Transaction Security
 

Mehr von UL Transaction Security (8)

Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management Services
 

Kürzlich hochgeladen

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 

Kürzlich hochgeladen (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

HR Security in SAP: Securing Data Beyond HCM Authorizations

  • 1. Securing SAP HR Data Beyond HCM Authorizations A presentation by
  • 2. HR documents contain confidential information including: •  Social Security Numbers •  Drivers License Numbers •  Date of Birth •  Bank details •  Payroll
  • 3. HR documents contain confidential information including: •  Social Security Numbers •  Drivers License Numbers •  Date of Birth •  Bank details •  Payroll This information needs to be highly protected
  • 4. HR Data is Constantly on the Move 4   HR Data is exported from SAP –  Reporting –  Data crunching –  Analysis Cloud & Mobility –  Explosion of cloud services and providers –  BYOD: are you losing track of your data?
  • 5. Not only that but… •  Companies are required to abide by compliance regulations, such as: –  HIPAA –  SOX –  Safe Harbor
  • 6. What is SAP HR •  Human Resources Management Software –  On premise and cloud solutions –  Recruit, hire, fire talent –  Local laws and regulation compliance –  Standardize payroll –  Manage attendance, schedules, and vacation time –  Support core business operations
  • 7. The Landscape •  SAP’s HCM Module –  Data is stored on-premise –  Accessible by everyone with access to the server •  Success Factors –  Data is stored in the cloud –  Data can be shared and manipulated by anyone – no tracking •  Hybrid –  Data is stored both on-premise and in the cloud –  Data moves between the two with no protection 7  
  • 8. The Landscape •  SAP’s HCM Module –  Data is stored on-premise –  Accessible by everyone with access to the server •  Success Factors –  Data is stored in the cloud –  Data can be shared and manipulated by anyone – no tracking •  Hybrid –  Data is stored both on-premise and in the cloud –  Data moves between the two with no protection 8  
  • 9. The Landscape •  SAP’s HCM Module –  Data is stored on-premise –  Accessible by everyone with access to the server •  Success Factors –  Data is stored in the cloud –  Data can be shared and manipulated by anyone – no tracking •  Hybrid –  Data is stored both on-premise and in the cloud –  Data moves between the two with no protection 9  
  • 10. SAP HR Security •  3 main security features –  Infotypes –  Structural Authorizations –  Personnel Number Restrictions
  • 11. Infotypes •  Units containing master data in SAP HR •  Used in recording employee data, payroll data, and administrative data •  Creates fields and groups them together and enables time-dependent storage •  Infotype restrictions are extremely important since master data is the core of HR data and needs to be restricted.
  • 12. Structural Authorizations •  The data a user can access can be restricted by using either –  Enterprise Structure: Groups/Departments, Codes, Individual user files –  Organizational Structure: Common areas, overall use of the system •  Structural authorizations allow restrictions to be configured on the organizational structure.
  • 13. Personnel Number Restrictions •  Users can be restricted using the authorization object P_PERNR to only accessing infotypes regarding their own personal data –  For example: checking your own hours or schedule –  Known as ESS (Employee Self Service) •  Personnel Number Restrictions can allow HR admin to access employee data while preventing them from viewing their own –  For example: Remove the capability to change own hours worked
  • 14. Data needs to be protected inside & outside of company walls SafeNet. (2014, April 17). First Quarter Recap 2014. Retrieved May 19, 2014, from Breach Level Index: www.breachlevelindex.com  
  • 15. Look Familiar? Much of this information is commonly found amongst HR data 2010  Javelin  Strategy  and  Research  
  • 16. How it is used More often then not, the information is used in millions of identity fraud incidents
  • 17. How did they get the data? Unprotected data and unsecure data movement leaves PII (Personally Identifiable Information) vulnerable
  • 18. Extend Protection Beyond Boundaries of SAP Data is protected when it is stored in SAP
  • 19. Extend Protection Beyond Boundaries of SAP Once the data leaves SAP, it no longer has the protection
  • 20. Extend Protection Beyond Boundaries of SAP Employees Employees use the information in everyday job-related activities
  • 21. Extend Protection Beyond Boundaries of SAP Employees File Server They store the information in various locations
  • 22. Extend Protection Beyond Boundaries of SAP Employees File Server Employees can also upload sensitive data to cloud platforms for collaboration, without regards to security.
  • 23. Extend Protection Beyond Boundaries of SAP Partner Employees File Server The data can be shared with partners
  • 24. Extend Protection Beyond Boundaries of SAP Competitor Partner Employees File Server And also forwarded to competitors
  • 25. Extend Protection Beyond Boundaries of SAP Competitor Partner Employees File Server ALL  HAPPENING  WITHOUT  PROTECTION  
  • 26. HR Data Needs Protection
  • 28. Protecting SAP NetWeaver Protect data inside of SAP –  Roles & Authorizations •  Check HCM Authorizations in new and existing roles •  Review PLOG in existing roles •  Restrict OTYPE •  Check P_ABAP in existing roles Extend protection to data leaving SAP –  Authorizations need to be extended to wherever the data goes 28  
  • 29. Traditional Security Solutions Network •  Network –  Data Loss Prevention (DLP) –  Firewalls –  Virtual Private Network (VPN)  
  • 30. Traditional Security Solutions Network Storage •  Network –  Data Loss Prevention (DLP) –  Firewalls –  Virtual Private Network (VPN) •  Storage –  Full Disk Encryption (FDE) –  Database Encryption  
  • 31. Traditional Security Solutions •  Network –  Data Loss Prevention (DLP) –  Firewalls –  Virtual Private Network (VPN) •  Storage –  Full Disk Encryption (FDE) –  Database Encryption •  File –  Pretty Good Privacy (PGP) –  Information Rights Management (IRM) Network Storage File Latest  technologies  apply  protecCon  at  the  file/data   level,  which  results  in  persistent  security  no  maLer   where  the  file  travels  to    
  • 32. Rights Management (RMS) are offerings from Microsoft that help keep an organizations information Microsoft is the leader in the file/ data centric protection
  • 33. SECURE Rights Management (RMS) are offerings from Microsoft that help keep an organizations information Microsoft is the leader in the file/ data centric protection
  • 34. Data-centric protection Protection is applied directly to the data and documents  
  • 35. Data-centric protection Protection is applied directly to the data and documents   Wherever the data is moved  
  • 36. Data-centric protection Protection is applied directly to the data and documents   Wherever the data is moved   THE PROTECTION STAYS WITH IT  
  • 37. HR and Other Documents are Protected •  At a single location On  premise  
  • 38. HR and Other Documents are Protected •  Inside and outside the organization •  At a single location Partner   On  premise   Shared  
  • 39. HR and Other Documents are Protected •  Inside and outside the organization •  At a single location u  And when moving amongst various locations Partner   On  premise   Shared   CollaboraCon  
  • 40. Fine-grained control •  Content owners can define who can –  Open the document –  Edit the contents –  Print the document –  Forward to anyone, internal or external –  Take other actions with the information
  • 41. Can RMS data-centric protection be extended to SAP HR data?
  • 42. Halocore for SAP NetWeaver •  Innovative: Enforces RMS protection on all data leaving SAP •  Secure: Determines what users are authorized to access sensitive data •  Customizable: Offers fine-tuned control over who can do what with information (view, edit, print, forward, etc.) •  Flexible: Works for any file type •  Powerful: Protection persists beyond SAP, including mobile platforms
  • 45. FOR MORE INFORMATION Click the link below to learn how Halocore for SAP NetWeaver can protect your confidential HR information, no matter where it goes.
  • 46. Not Sure Where to Start? •  Download FREE audit tool for SAP to monitor HR and other sensitive data movement •  Monitor the activities surrounding your information –  Track, record and classify data movement –  Identify who accesses it –  From where they access it (IP address & terminal) –  Where they send it to –  Extract data for analysis
  • 47. DOWNLOAD FREE AUDIT TOOL NOW Click HERE
  • 48. PRESENTATION BY Tweet us @secude Contact us info@secude.com