SAP
NetWeaver Security Guide

This guide does not replace the daily operations handbook that we recommend you create for specific productive operations.
● Technical consultants
● System administrators
This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereby the Security Guides provide information that is relevant for all time frames.
With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation on your system should not result in loss of information or processing time. These demands on security apply likewise to the SAP NetWeaver platform. To assist you in securing your SAP NetWeaver platform and products, we provide this SAP NetWeaver Security Guide.
The SAP NetWeaver Security Guide provides an overview of the security-relevant information that applies to SAP NetWeaver. It contains an overall overview of security with SAP NetWeaver as well as links to the individual guides for each of the usage types, standalone engines, connectivity and interoperability technologies, database and operating system platforms and the various scenarios.
See the tables below:
Introduction to Security with the SAP NetWeaver Platform
Topic |
More Information |
Technical System Landscape |
|
User Administration and Authentication |
|
Network and Transport Layer Security |
Security Guides for SAP NetWeaver According to Usage Types
Usage Type |
More Information |
Application Server (AS) |
|
EP Core (EPC) |
|
Enterprise Portal (EP) |
|
Business Information (BI) |
|
Development Infrastructure (DI) |
Security Aspects for Usage Type DI and Other Development Technologies |
Mobile Infrastructure (MI) |
|
Process Integration (PI) |
Security Guides for Standalone Engines, Clients and Tools
Engine |
More Information |
Search and Classification (TREX) |
|
SAP Content Server |
|
SAP Web Dispatcher |
|
SAP NetWeaver Business Client |
Business Client Security Issues (for ABAP) Business Client Security Issues (for Portal) |
J2EE Adapter Engine |
The security aspects to consider when using the non-central version of the J2EE Adapter Engine are the same as for the central version. These aspects are described in detail in the SAP NetWeaver PI Security Guide. |
J2SE Adapter Engine |
The Plain J2SE Adapter Engine is only supported for compatibility reasons. It hosts only a subset of the adapter functionality and does not support standard security features as security logs or integrated user management. You should only use the Plain J2SE Adapter Engine if it is a precondition in your environment. |
Security Guides for Connectivity and Interoperability Technologies
Technology |
More Information |
Remote Function Calls (RFC) or Internet Communication Framework (ICF) |
|
Application Link Enabling (ALE) |
|
Connectivity with the J2EE Engine |
|
Web services |
|
Business Communication Broker (BCB), which is part of the Integrated Communication Interfaces (ICI) |
Security Guides for Operating System and Database Platforms
OS Platform |
More Information |
UNIX/LINUX |
|
Windows |
|
IBM i |
|
DB Platform |
More Information |
Oracle |
|
Microsoft SQL Server |
|
IBM DB2 for Linux, UNIX, and Windows |
|
MySQL Max DB |
|
IBM DB2 for i |
|
IBM DB2 for z/OS |
|
Informix |
Security Aspects for System Management
Topic / Product |
More Information |
Solution Manager Diagnostics |
|
SAP NetWeaver Administrator |
|
Computing Center Management System (CCMS) |
|
SAP System Landscape Directory (SLD) |
|
Software Lifecycle Manager (SLM) |
|
Archiving |
|
Auditing and Logging |
Security Guides for SAP NetWeaver Scenarios
The security aspects and recommendations for the SAPNetWeaver scenarios primarily use the information provided with the above security guides. To determine which of these guides apply in particular for each scenario, see Security Guides for the SAP NetWeaver Scenarios.
Your security requirements are not limited to the SAP NetWeaver platform, but apply to your entire system landscape. Therefore, we recommend establishing a security policy that reflects the security issues that apply at a company-wide level. Your security policy should cover aspects such as:
● User authentication
● Authorizations
● Data integrity
● Privacy
● Auditing and Logging
Once you have established your security policy, use this guide to implement and enforce security for those products that you use within the SAP NetWeaver platform.