Was this page helpful to you?
Do you have any additional feedback?
Business Rules Management Security Guide
This security guide is an integral part of the CE Security Guide and provides security measures specific to Business Rules Management.
This guide does not replace the administration or operation guides that are available for productive operations.
This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software lifecycle, whereas the Security Guides provide information that is relevant for all lifecycle phases.
Why Is Security Necessary?
With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation of your system should not result in loss of information or processing time. These demands on security apply likewise to SAP NetWeaver Business Rules Management (BRM). This security guide assists you in making SAP NetWeaver BRM secure.
About this Document
This security guide provides an overview of the security-relevant information that applies to SAP NetWeaver BRM. The security guide comprises of the following main sections:
Before You Start
This section contains information about why security is necessary, how to use this document, and references to other security guides that build the foundation for this security guide.
Technical System Landscape
This section provides an overview of the technical components and communication paths that are used by SAP NetWeaver Business Rules Management.
User Administration and Authentication
This section provides an overview of the following user administration and authentication aspects:
Recommended tools to use for user management.
User types that are required by SAP NetWeaver Business Rules Management.
Standard users that are delivered with SAP NetWeaver Business Rules Management.
This section provides an overview of the authorization concept that applies to the BRM user authentication in Business Rules Management component of the SAP NetWeaver application.
Network and Communication Security
This section provides an overview of the communication paths used by the exporting of decision table in Microsoft Excel, importing of decision table from Microsoft Excel, downloading the runtime version in Business Rules Management component of the SAP NetWeaver application, and the security mechanisms that apply to them. It also includes the network topology to restrict access at the network level.
Data Storage Security
This section provides an overview of any critical data that is used by the exporting decision table in excel in Business Rules Management component of the SAP NetWeaver application.
The following content is not part of SAP product documentation. For more information, see the following disclaimer .