10 Best Practices for Enforcing Data Security, Control, and Consistency in the Software Logistics Process

  • by Kehinde Eseyin, Security Architect, Turnkey Consulting Ltd.
  • March 30, 2010
Learn important best practices, tips, and guidelines that are invaluable for ensuring that the process of making changes and transporting changed data in the SAP ABAP system is well secured against possible security threats and risks.
Key Concept
In an attempt to define, reengineer, and optimize business processes via customization, development, and corrective activities in the SAP ABAP system, organizations usually have to create change requests and consequently move the changed data across different systems depending on their SAP system landscape. SAP ABAP Software Logistics encompasses all activities and processes that relate to change request and transport activities processing in the SAP ABAP stack. It is important to put appropriate security measures in place to guard against the disruption of business transaction processing (after changes have been transported) as a result of possible data corruption, data inconsistency, and even unavailability of the production system.

Your SAP system often requires technical and functional system changes due to the dynamic nature of business. The implementation and application of these changes need to be properly controlled, managed, and monitored to avoid the risk of possible data corruption, inconsistency, and inaccuracy. In addressing this challenge of modifying system configuration, objects, and data to suit current business requirements, the SAP system provides a structured process called software logistics in the ABAP environment.

Change request and transport management are an integral part of software logistics processing in the SAP ABAP environment. Change requests are created when you carry out a new activity in customizing or configuration in the system. Transport management is the coordination of the movement of objects and configuration changes from the development system to the quality assurance (QA) system and then to the production system.

These 10 proactive security measures are aimed at safeguarding and protecting change request and transport activities processing in the SAP ABAP environment:

Kehinde Eseyin

Kehinde Eseyin is a security architect at Turnkey Consulting. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.
 

See more by this author


Comments

No comments have been submitted on this article. 


Please log in to post a comment.

To learn more about subscription access to premium content, click here.