Security Guide

This guide does not replace the daily operations handbook that we recommend you create for specific productive operations.
● Technical consultants
● System administrators
This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereby the Security Guides provide information that is relevant for all time frames.
With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation on your system should not result in loss of information or processing time. These demands on security apply likewise to the SAP NetWeaver platform. To assist you in securing SAP NetWeaver Process Integration (PI), we provide this security guide.
The security guide provides an overview of the security-relevant information that applies to SAP NetWeaver PI. It contains an overall overview of security with SAP NetWeaver as well as links to the individual guides for each of the SAP NetWeaver PI components, standalone engines, connectivity and interoperability technologies, database and operating system platforms and the various scenarios.
Introduction to Security with SAP NetWeaver PI
Topic |
See |
Technical System Landscape |
|
Network and Transport Layer Security |
Security Guides for Usage Types used with SAP NetWeaver PI
Usage Type |
See |
Application Server (AS) |
|
Process Integration (PI) |
Security Guides for Standalone Engines
Engine |
See |
Search and Classification (TREX) |
|
Advanced Adapter Engine |
The security aspects to consider when using the non-central version of the Advanced Adapter Engine are the same as for the central version. These aspects are described in detail in the SAP NetWeaver PI Security Guide. |
Adapter Engine (Java SE) |
The Adapter Engine (Java SE) is only supported for compatibility reasons. It hosts only a subset of the adapter functionality and does not support standard security features as security logs or integrated user management. You should only use the Adapter Engine (Java SE) if it is a precondition in your environment. |
Security Guides for Connectivity and Interoperability Technologies
Technology |
See |
Connectivity and Communication with the AS ABAP |
|
Connectivity with the AS Java |
|
Web services |
Security Guides for Operating System and Database Platforms
OS Platform |
See |
UNIX/LINUX |
|
Windows |
|
DB Platform |
See |
Oracle |
|
Microsoft SQL Server |
|
IBM DB2 for Linux, UNIX and Windows |
|
MySQL Max DB |
|
IBM DB2 for i5/OS |
|
IBM DB2 for z/OS |
Security Aspects for System Management
Topic / Product |
See |
AS ABAP |
|
AS Java |
|
Archiving |
Security Guides for SAP NetWeaver PI Scenarios
The security aspects and recommendations for the SAP NetWeaver PI scenarios primarily use the information provided with the above security guides. To determine which of these guides apply in particular for each scenario, see Security Guides for the SAP NetWeaver PI Scenarios.
Your security requirements are not limited to SAP NetWeaver PI, but apply to your entire system landscape. Therefore, we recommend establishing a security policy that reflects the security issues that apply at a company-wide level. Your security policy should cover aspects such as:
● User authentication
● Authorizations
● Data integrity
● Privacy
● Auditing and Logging
Once you have established your security policy, use this guide to implement and enforce security for SAP NetWeaver PI.