SAP security is not only about Segregation of Duties (SoD) and user access rights, but also the layer below application security, being the infrastructure and kernel security.

Since systems are more and more interconnected, the security on communication layer as well as on kernel level, has become one of the top security priorities. It’s all about keeping the bad guy out to avoid risk of sabotage, fraud or other cyberattacks.

Infrastructure vulnerability analysis helps with identifying security weaknesses on the layer below application security. Generally speaking, infrastructure management and SAP system administration are two different worlds and there tends to be a gap of knowledge and ownership between the two.

The technical foundation of system reliability is assessed through the infrastructure vulnerability analysis. A SAP security specialist should inspect the vulnerability of the installed SAP components, kernel and services for any (known) weaknesses.

 

ServicePortfolio Systems EN 20160209

Some of our Services include

  • All
  • Advisory
  • Audit
  • Infrastructure
  • Ruleset
  • SAP License
  • SAP Security
  • Infrastructure Vulnerability Analysis

    Infrastructure Vulnerability Analysis

    Infrastructure Vulnerability Analysis identifies security weaknesses on the layer below application security. In the infrastructure vulnerability analysis, the SAP security specialists inspect the vulnerability of the installed SAP components, kernel and services for any known weaknesses to pro-actively manage SAP system-security at infrastructure/kernel level.
    • Audit
    • Infrastructure
  • Security Governance

    Security Governance

    Security Governance focuses on healthy and good practices in the domain of security management at strategic and tactical level. Equipped with in-depth knowledge of today’s successful practices in the market as well as the commonly accepted best practices like ISO2700x and COBiT, specialists of axl & trax assess current company posture and discuss potential areas of improvement. axl & trax gives advice on how to gradually grow SAP security governance to the next maturity level.
    • Audit
    • SAP Security
  • License Optimization

    License Optimization

    License Optimization Services offer the opportunity to assess whether an organization is in control over its purchased licenses and their use within SAP. The license optimization helps with mapping the allocated user license types with granted access rights and actual use of transaction codes. This can be used to change the user license allocation and thereby reflect SAP system usage reality and/or reduce the yearly payable license fees.
    • Audit
    • SAP License
  • Quality Assurance and Coaching

    Quality Assurance and Coaching

    It has become clear that even experienced security staff members need specialist advice on specific security issues, a peer helping to keep the quality levels high or on how to deal with new features or specific issues in SAP. Involving axl & trax as a coach or quality assurance staff member allows any company to benefit from the exposure and strong experience of the axl & trax experts while staying in charge of the SAP security process.
    • Advisory
  • Security Administration

    Security Administration

    axl & trax helps companies with administering and maintaining their SAP security on a day-to-day basis or for a short period in time e.g. when in-house administrators are ill or on vacation. Onsite, remote or on-call activities can be organized to ensure appropriate level of flexibility to meet your support needs.
    • SAP Security
  • GRC ruleset Review & Tailoring

    GRC ruleset Review & Tailoring

    Tailoring the ruleset of an Access Governance software, like the SAP GRC Access Control, requires an extended level of expertise. Setting up the rules correctly to detect conflicts is a must to be able to rely on the reporting provided by the tool in place. Incorrect setup of rules can lead to incomplete and/or wrong reporting, an unacceptable situation when access rights or SoD conflicts and its pro-active detection have become key controls in the risk management approach. To get assurance, axl & trax can review, tailor and/or implement the (SoD) ruleset on any Access Control Software.
    • Audit
    • Ruleset
© 2024 axl & trax, all rights reserved - GTC Belgium - GTC The Netherlands - Cookies
Cookies help us with providing you our services. By using our services, you agree with our use of cookies.