filmov
tv
SAP CYBER SECURITY SAP* Parameter
Показать описание
Surviving an SAP Audit: A Practical Guide to SAP Audit
Security, Audit and Control Features SAP ERP, 4th EditioN
SAP License Management Step by Step Guide
Auditing and GRC Automation in SAP
In SAP there is parameter login/no_automatic_user_sapstar whose default value is 1. If the value is set to 1, automatic login of sap* into SAP System using password PASS won’t be allowed.
When the parameter login/no_automatic_user_sapstar to 0 in both the default profile and the instance profile and restart the instance. So, of sap* with default password will be enabled.
When login/no_automatic_user_sapstar is set to 0, the worst thing you can do from a security point of view is to delete the SAP* user, because it enables the hardcoded SAP* user in the SAP kernel. The hardcoded SAP* user will always have password 'pass' and since this is well known, it is a big security breach.
The way to disable SAP* user, is to assign a secure password, lock the user and set a validity date in the past. The SAP* user should always be locked, except when the system administrator needs it from time to time.
[ Free Webinar] See how Automating Detecting and implementing SAP Notes can help you improve your operations, and secure your SAP Landscape
#ExpressGRC #SAPGRC #SAPSECURITY #GRC #SAPCYBERSECURITY
Click Here to Register
Security, Audit and Control Features SAP ERP, 4th EditioN
SAP License Management Step by Step Guide
Auditing and GRC Automation in SAP
In SAP there is parameter login/no_automatic_user_sapstar whose default value is 1. If the value is set to 1, automatic login of sap* into SAP System using password PASS won’t be allowed.
When the parameter login/no_automatic_user_sapstar to 0 in both the default profile and the instance profile and restart the instance. So, of sap* with default password will be enabled.
When login/no_automatic_user_sapstar is set to 0, the worst thing you can do from a security point of view is to delete the SAP* user, because it enables the hardcoded SAP* user in the SAP kernel. The hardcoded SAP* user will always have password 'pass' and since this is well known, it is a big security breach.
The way to disable SAP* user, is to assign a secure password, lock the user and set a validity date in the past. The SAP* user should always be locked, except when the system administrator needs it from time to time.
[ Free Webinar] See how Automating Detecting and implementing SAP Notes can help you improve your operations, and secure your SAP Landscape
#ExpressGRC #SAPGRC #SAPSECURITY #GRC #SAPCYBERSECURITY
Click Here to Register