{"id":26798,"date":"2020-04-06T12:29:29","date_gmt":"2020-04-06T10:29:29","guid":{"rendered":"https:\/\/www.blue.works\/security-insights-end-to-end-mit-sap-application-lifecycle-management\/"},"modified":"2026-02-17T14:40:51","modified_gmt":"2026-02-17T13:40:51","slug":"end-to-end-security-insights-with-sap-application-lifecycle-management","status":"publish","type":"post","link":"https:\/\/www.blue.works\/en\/end-to-end-security-insights-with-sap-application-lifecycle-management\/","title":{"rendered":"End-to-end security insights with SAP Application Lifecycle Management"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">Even today, the security of SAP systems is often neglected. Companies should not focus on whether a solution works, but should also think about how the solution was made to &#8220;work&#8221;, i.e. how the business requirement was technically realized, developed and implemented.  <\/p>\n\n\n\n<p>SAP systems often form the core of a company&#8217;s business applications. The sensitive data stored there must be protected: Whether in production, the service sector, web stores or other application areas that are based on an SAP solution, they are usually the linchpin for many companies. An attack can lead to sensitive information being published and thus cause legal consequences or reputational damage. Data protection guidelines such as the GDPR also provide for a reporting obligation in the event of data leaks.  <\/p>\n\n\n\n<p>SAP already provides a number of tools to minimize such risks. For example, <em>Configuration<\/em><em> Validation<\/em> (ConfVal), together with the <em>Security Baseline<\/em> and <em>Focused<\/em><em> <\/em><em>Insights<\/em>, the operation of SAP and the introduction of further developments can be made more secure and displayed and monitored end-to-end.  <\/p>\n\n\n\n<p>SAP Solution Manager 7.2 is at the heart of the program, providing all the necessary information and an overview of your SAP system landscape. If this is implemented correctly, it is child&#8217;s play to check the SAP systems, filter out crucial information, implement it and also monitor it after the initial configuration.  <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Configuration Validation  <\/h3>\n\n\n\n<p><em>Configuration Validation<\/em> checks the SAP systems for correct configuration. System parameters of all SAP components are collected and stored on the SolMan. Regardless of whether it is an ABAP, JAVA or peripheral systems, but critical systems such as Webdispatcher or SAProuter, SolMan knows where improvements should be made.  <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"487\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image.jpeg\" alt=\"\" class=\"wp-image-26765\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image.jpeg 1024w, https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-768x365.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Check for system-relevant notes  <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"179\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-1.jpeg\" alt=\"\" class=\"wp-image-26767\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-1.jpeg 1024w, https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-1-768x134.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Result Systemically important notes  <\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">SAP Security Baseline  <\/h3>\n\n\n\n<p>In conjunction with SAP Security Baseline, Configuration Validation now provides relevant evaluations regarding system security. Reports can be configured and evaluated in relation to user authorizations, encryption, database security and more.  <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"363\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-2.jpeg\" alt=\"\" class=\"wp-image-26769\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-2.jpeg 1024w, https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-2-768x272.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Query whether SAP* is configured correctly  <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"85\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-3.jpeg\" alt=\"\" class=\"wp-image-26771\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-3.jpeg 1024w, https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-3-768x64.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Evaluation SAP* Configuration  <\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Focused Insights  <\/h3>\n\n\n\n<p>Focused Insights, the dashboarding tool, comes into play so that the extensive data collected can be analyzed quickly and easily. Focused Insights is part of the <a title=\"\" href=\"https:\/\/support.sap.com\/en\/alm\/focused-build.html\">Focused Build extensions<\/a> and has been available free of charge since <a href=\"https:\/\/www.blue.works\/en\/focused-build-and-insights-now-free\/\">January 2020<\/a>.<\/p>\n\n\n\n<p>Focused Insights now makes it possible to quickly and easily create appealing dashboards that meet the needs of the respective application area: in our case, the security of SAP solution landscapes. Focused Insights can query and display various key figures and evaluations from Configuration Validation with the Security Baseline.  <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"502\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-4.jpeg\" alt=\"\" class=\"wp-image-26773\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-4.jpeg 1024w, https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/image-4-768x377.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Example dashboard<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">On top: Alert in case of violation  <\/h3>\n\n\n\n<p>In addition to the visual display, the results from configuration validation can be integrated into alerting and monitoring. This makes it possible to trigger alerts by e-mail or SMS as soon as a security requirement is no longer met.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even today, the security of SAP systems is often neglected. Companies should not focus on whether a solution works, but should also think about how the solution was made to &#8220;work&#8221;, i.e. how the business requirement was technically realized, developed and implemented.  <\/p>\n","protected":false},"author":5,"featured_media":26776,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[262],"class_list":["post-26798","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-alm-insights","tag-security"],"acf":[],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.blue.works\/wp-content\/uploads\/2020\/04\/security-camera.jpg","_links":{"self":[{"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/posts\/26798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/comments?post=26798"}],"version-history":[{"count":5,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/posts\/26798\/revisions"}],"predecessor-version":[{"id":45335,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/posts\/26798\/revisions\/45335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/media\/26776"}],"wp:attachment":[{"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/media?parent=26798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/categories?post=26798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/tags?post=26798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}