Enterprise Compensation Management

About This Chapter

This chapter of the Security Guide provides an overview of the security-relevant information for the Enterprise Compensation Management (PA-EC) application component.

References to Cross Chapters

The following aspects relevant to security apply to SAP ERP Central Component (ECC) or Human Resources overall and thus also to Enterprise Compensation Management:

  • Before You Start

    This section provides information on why security is necessary and how the document is used, as well as references to other Security Guides on which this Security Guide is based.

    For more information, see the section Before You Start of the SAP ECC Security Guide.

  • Technical System Landscape

    For more information, see the section Technical System Landscape of the SAP ECC Security Guide.

  • Mechanisms for user management and user authentication:

  • Session Security Protection

    For more information, see the section Session Security Protection of the SAP ECC Security Guide.

  • Network Security

    For more information, see the section Network Security of the SAP ECC Security Guide.

  • Enterprise Services Security

    For more information, see the section Enterprise Services Security of the SAP ECC Security Guide.

  • Services in Lifecycle Management for Security

    For more information, see the section Services in Lifecycle Management for Security of the SAP ECC Security Guide.

Overview of the Main Sections of This Chapter

The following sections contain the security-relevant information that is specific to “Enterprise Compensation Management”:

  • Important SAP Notes

    This section lists the most important SAP Notes with regard to the security of Enterprise Compensation Management.

  • Security Aspects for Data, Data Flow, and Processes

    This section provides an overview of the security aspects of the most frequently used processes in Enterprise Compensation Management.

  • Authorizations

    This section provides an overview of the authorization concept used for Enterprise Compensation Management.

  • Communication Channel Security

    This section describes the communication paths and logs that Enterprise Compensation Management uses.

  • Internet Communication Framework Security

    This section provides an overview of the services for the Internet Communication Framework (ICF) used by Enterprise Compensation Management.

  • Data Storage Security

    This section provides an overview of all critical data used by Enterprise Compensation Management, as well as the security mechanisms used.

  • Security-Relevant Logging and Tracing

    This section provides an overview of the trace and log files that contain security-relevant information and that enable you to reproduce activities, for example, if there is a security violation.