
This guide does not replace the administration or operation guides provided for productive operations.
Target Group
Technology consultants
Security consultants
System administrators
This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. These guides are only relevant for a certain phase of the software life cycle, whereas the Security Guides provide information that is relevant for all life cycle phases.
Why is Security Important?
With the increasing use of distributed systems and the Internet for managing business data, security requirements are also becoming more prominent. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. It is very important that user errors, negligence, or attempted manipulation do not result in loss of information or affect processing time. These security requirements also apply to SAP BW (BW). We have provided this security guide to help you to make BW more secure.
SAP Business Warehouse integrates, transforms, and consolidates data from all areas of an enterprise so that it can then provide this information for analysis, interpretation and distribution. This includes confidential corporate data, such as personal data from personnel administration. This data forms the basis of decisions and target-oriented actions in all enterprise areas. Secure data access and data integrity are therefore of paramount importance.
The following examples illustrate some of the risks that the BW system can be exposed to:
Attacks from the Internet or intranet when using SAP BEx Web functionality and Web services
Infringement of data protection guidelines as a result of unauthorized access to personal data
About This Document
The security guide provides an overview of the security-relevant information that applies to SAP BW and SAP Business Explorer (SAP BEx).
Important Security Information
SAP BW and SAP BEx build on Application Server ABAP, Application Server Java in cases where usage type BI Java is used, and on the portal. The security guide for SAP BW describes additional security information or information that deviates from that which applies to usage types AS ABAP and AS Java.
The table below provides an overview of other relevant security guides:
Application |
Security Guide |
Application Server for ABAP |
SAP NetWeaverSAP NetWeaver Application Server ABAP Security Guide |
Application Server for Java |
SAP NetWeaver Application Server for JavaSAP NetWeaver Application Server for Java Security Guide |
Enterprise Portal Knowledge Management |
|
Process Integration |
SAP Process Integration Security Guide |
You can find a complete list of all available SAP Security Guides in the SAP Service Marketplace at http://service.sap.com/securityguide.
More Information
For more information about specific topics, see the Quick Links in the table below.
Content |
Quick Link on SAP Service Marketplace or SCN |
Security |
http://scn.sap.com/community/security |
Security Guides |
http://service.sap.com/securityguide |
Related SAP Notes |
http://service.sap.com/notes http://service.sap.com/securitynotes |
Released Platforms |
http://service.sap.com/pam |
Network Security |
http://service.sap.com/securityguide |
SAP Solution Manager |
http://service.sap.com/solutionmanager |
SAP NetWeaver |
http://scn.sap.com/community/netweaver |