Security Guide for SAP BWLocate this document in the navigation structure

Use
Caution

This guide does not replace the administration or operation guides provided for productive operations.

Target Group

  • Technology consultants

  • Security consultants

  • System administrators

This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. These guides are only relevant for a certain phase of the software life cycle, whereas the Security Guides provide information that is relevant for all life cycle phases.

Why is Security Necessary?

With the increasing use of distributed systems and the Internet for managing business data, security requirements are also becoming more prominent. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation of your system cannot be allowed to result in loss of information or processing time. These security requirements also apply to SAP BW (BW). We have provided this security guide to help you to make BW more secure.

SAP Business Warehouse integrates, transforms, and consolidates data from all areas of an enterprise so that it can provide this information for analysis, interpretation and distribution. This includes confidential corporate data, such as personal data from personnel administration. This data forms the basis of decisions and target-oriented actions in all enterprise areas. Secure data access and data integrity are therefore of paramount importance.

The following examples illustrate some of the risks that the BW system can be exposed to:

  • Attacks from the Internet or intranet when using SAP BEx Web functionality and Web services

  • Infringement of data protection guidelines as a result of unauthorized access to personal data

About This Document

The Security Guide provides an overview of the security-relevant information that applies to SAP BW and SAP Business Explorer (SAP BEx).

Important Security Information

SAP BW and SAP BEx build on Application Server ABAP, Application Server Java in cases where usage type BI Java is used, and on the portal. The Security Guide for SAP NetWever BW describes additional security information or information that deviates from that which applies to usage types AS ABAP and AS Java.

The table below provides an overview of other relevant security guides:

Application

Security Guide

Application Server ffor ABAP

Application Server ffor Java

SAP NetWeaver Application Server ABAP Security Guide

SAP NetWeaver Application Server Java Security Guide

Enterprise Portal

Knowledge Management

Portal Security Guide

Knowledge Management Security Guide

Process Integration

SAP Process Integration Security Guide

You can find a complete list of all available SAP Security Guides in the SAP Service Marketplace at http://service.sap.com/securityguide .

Additional Information

For more information about specific topics, see the Quick Links in the table below.

Content

Quick Link on SAP Service Marketplace or SCN

Security

http://scn.sap.com/community/security

Security Guides

http://service.sap.com/securityguide

Related SAP Notes

http://service.sap.com/notes

http://service.sap.com/securitynotes

Released platforms

http://service.sap.com/pam

Network Security

http://service.sap.com/securityguide

SAP Solution Manager

http://service.sap.com/solutionmanager

SAP NetWeaver

http://scn.sap.com/community/netweaver