Security Guide SAP BWLocate this document in the navigation structure

Use
Caution

This guide does not replace the administration or operation guides provided for productive operations.

Target Group

  • Technology consultants

  • Security consultants

  • System administrators

This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. These guides are only relevant for a certain phase of the software life cycle, whereas the Security Guides provide information that is relevant for all life cycle phases.

Why is Security Important?

With the increasing use of distributed systems and the Internet for managing business data, security requirements are also becoming more prominent. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. It is very important that user errors, negligence, or attempted manipulation do not result in loss of information or affect processing time. These security requirements also apply to SAP BW (BW). We have provided this security guide to help you to make BW more secure.

SAP Business Warehouse integrates, transforms, and consolidates data from all areas of an enterprise so that it can then provide this information for analysis, interpretation and distribution. This includes confidential corporate data, such as personal data from personnel administration. This data forms the basis of decisions and target-oriented actions in all enterprise areas. Secure data access and data integrity are therefore of paramount importance.

The following examples illustrate some of the risks that the BW system can be exposed to:

  • Attacks from the Internet or intranet when using SAP BEx Web functionality and Web services

  • Infringement of data protection guidelines as a result of unauthorized access to personal data

About This Document

The security guide provides an overview of the security-relevant information that applies to SAP BW and SAP Business Explorer (SAP BEx).

Important Security Information

SAP BW and SAP BEx build on Application Server ABAP, Application Server Java in cases where usage type BI Java is used, and on the portal. The security guide for SAP BW describes additional security information or information that deviates from that which applies to usage types AS ABAP and AS Java.

The table below provides an overview of other relevant security guides:

Application

Security Guide

Application Server for ABAP

SAP NetWeaverSAP NetWeaver Application Server ABAP Security Guide

Application Server for Java

SAP NetWeaver Application Server for JavaSAP NetWeaver Application Server for Java Security Guide

Enterprise Portal

Knowledge Management

Portal Security Guide

Knowledge Management Security Guide

Process Integration

SAP Process Integration Security Guide

You can find a complete list of all available SAP Security Guides in the SAP Service Marketplace at http://service.sap.com/securityguide.

More Information

For more information about specific topics, see the Quick Links in the table below.

Content

Quick Link on SAP Service Marketplace or SCN

Security

http://scn.sap.com/community/security

Security Guides

http://service.sap.com/securityguide

Related SAP Notes

http://service.sap.com/notes

http://service.sap.com/securitynotes

Released Platforms

http://service.sap.com/pam

Network Security

http://service.sap.com/securityguide

SAP Solution Manager

http://service.sap.com/solutionmanager

SAP NetWeaver

http://scn.sap.com/community/netweaver