Safeguard the Message Server via Security-Centric Parameterization

  • by Kehinde Eseyin, Security Architect
  • February 11, 2010
Learn how you can enhance the security of the message server by setting profile parameters appropriately.

There is a business need to build adequate security for the technical infrastructure on which all SAP systems run. This is important in preventing hackers from perpetrating malicious acts on the SAP system as a result of technical security lapses. More often than not, security experts overlook the need to set appropriate parameters aimed at protecting the SAP system from technical attack. Most times, emphasis is on the functional environment where SAP’s authorization concepts come in handy. The need to comply with regulations such as Sarbanes-Oxley, International Financial Reporting Standards (IFRS), and Basel II, takes center stage in security and controls provisioning, thereby leading to the neglect of technical areas.

The message server is an important communication and load distribution component of the SAP system. As a matter of fact, this component must be running to allow for access to the system where the business data of an organization is processed. Regardless of the SAP systems in use in your organization, the systems are built on the ABAP stack, Java stack, or a combination of the two. Some of the components of a typical SAP system include the following:

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.
 

See more by this author


Comments

No comments have been submitted on this article. 


Please log in to post a comment.

To learn more about subscription access to premium content, click here.