The global and independent platform for the SAP community.

Success factor data classification

Data that could previously be protected by SAP authorization concepts is now increasingly exported from secure SAP systems and redistributed via third-party applications such as MS Office. Anyone who wants to protect their data should think about new, data-centric security concepts and anchor them as a core process in operational IT operations.
Holger Hügel, Secude
September 21, 2017
Success factor data classification
avatar
This text has been automatically translated from German to English.

Classic role-based access concepts are static and initially only describe the user's role abstractly with profiles such as "employee" or "project manager".

Many SAP administrators establish the reference to departments and project groups by defining variants such as "Employee Dept. 1", "Employee Dept. 2" or "Project Manager Project A". In this way, they force organizational dynamics into an inherently static concept that is neither administrable nor effective in the long term.

Limits of the SAP authorization concept

As soon as an employee changes departments or works on several projects at the same time, an enormous maintenance effort is created that is almost impossible for IT departments to manage.

In many cases, the complexity of the profiles even increases to such an extent that no one knows any more which access rights are de facto assigned. The response of IT administrators then often lies in a very restrictive handling of authorizations.

The result: users are impaired in their day-to-day operations and process efficiency suffers. Not infrequently, this leads to a short-term, generous relaxation of individual rights corsets without conducting an in-depth analysis of the security risk.

For the moment, the problem seems to be solved, but due to the high resource commitment in IT departments, the measure is often not reversed and the once secure authorization concept develops into a free pass for insider attacks and data theft.

The increasing digitization and networking of applications is also pushing proven processes to their limits. Both SAP S/4 Hana and numerous connected third-party applications have their own authorization concepts that are not integrated into the traditional SAP authorization system.

The security risks that arise as a result are recognized by many departments, but continuous synchronization often fails due to a lack of budgets and resources: The CISOs (Chief Information Security Officers), who are actually responsible for the topic, usually have no resources of their own and receive little support from operational IT, because the employees are already busy with other projects.

While the CIO still relies on his specialists at this point, the topic of data security ends up on the desks of the CEOs and CFOs, who, however, are far too removed from the topic in terms of content. And yet, in most cases, it is they who are liable when an incident occurs - a Bermuda Triangle that needs to be broken.

Holger Huegel

Establish data-centric security concepts

In order to be able to effectively secure SAP data in the digitalized world, new types of dynamic IT security concepts are needed that tie in with the SAP authorization concept but place the data itself in the foreground.

For this purpose, a company-wide standardized data classification is essential. To implement this in the company, those responsible should first focus on the processes. They help to understand, but also to critically question, what the data is needed for and how it is processed.

As soon as these findings are available, the significance for the company's success and the respective protection requirements can be derived. To speed up the process, the use of modern process analysis software is recommended. Afterwards, clearly delimitable data and protection requirement classes should be defined and described.

There are two key challenges to be overcome here: The first concerns the general comprehensibility and comprehensibility of the individual protection requirement classes.

In other words, what does it mean when data is classified as "confidential," for example? Which user groups and roles are allowed to access which data, and to what extent?

Effective data classification must answer these questions in a way that is comprehensible to all users and must not contradict the requirements that arise from the individual process steps.

The second challenge is of a more technical nature and concerns the dynamic or adaptive implementation of the protection requirement. A contextual classification is helpful, in which the organizational and technical environment of the data generation or use is used and automatically compared with the definitions of the protection requirement classes.

This approach has several advantages over the classic, content-based classification: First, it is less dependent on changes that occur, for example, when content or file types are adjusted.

On the other hand, it enables other dimensions to be taken into account, such as the time reference. Financial data or product innovations, for example, lose their confidentiality when they are published.

An effective data security concept is aware of these dynamics and automatically adjusts access rights at the right time. The same applies to organizational structures and hierarchies.

Ideally, during the authorization check, the security solution uses a centrally maintained, digital organization chart to query which hierarchy level the user belongs to and automatically applies the appropriate protection classes.

2017 09 E3 Figure Data classification
Model of multidimensional contextual data classification for financial data.

Secure SAP data across system boundaries

For SAP administrators, the new, data-centric approach means that they must think beyond SAP system boundaries when it comes to security. If data for which SAP is the original and authoritative data source leaves the SAP system through user downloads or background data transfers, it should be classified multidimensionally in any case.

SAP provides a very extensive context of attributes for this purpose, which facilitates an automated implementation of the classification. However, this does not prevent the data from leaving the secure SAP boundaries. Anyone who wants to secure SAP data effectively outside the SAP world needs additional technologies.

This is exactly where Secude's Halocore comes in. Based on contextual data classification, the data security solution controls SAP user downloads and exports. Unauthorized downloads are blocked so that critical or sensitive data does not leave the SAP system in the first place.

Data that is required outside SAP is automatically provided with the corresponding Microsoft AIP/RMS protection profile (Azure Information Protection/Rights Management Service) and encrypted. This transfers the classification and authorization profile from SAP to the exported file.

For the first time, this enables cross-process protection that does not affect either operational IT or users in the business departments. Data security follows the data and is not constantly reinterpreted by the individual application silos.

Conclusion

The core of the implementation of new types of security concepts is a multidimensional, context-related classification of all company data with an increased need for protection. This can be derived from the business processes with the help of automated analyses. A decisive factor in defining the data and protection requirement classes is the clear traceability of which user groups and roles are allowed to access the corresponding data and to what extent.

It must be obvious to the user which data class must be selected when saving the document. Adding the dimensions time and hierarchy can also ensure that the data can be effectively protected in all further SAP-supported process steps.

However, in order to secure the data across application boundaries, additional technical solutions are required that ensure the transfer of the protection requirement outside the SAP systems as well. Cross-application data security solutions that can map data classes in addition to user roles are recommended here.

In any case, one should rely on established standard platforms that are supported by all common applications as a "security instance". For example, Halocore uses Microsoft standard technologies to enable required data exports beyond SAP's
Protect borders.
[/av_promobox]

https://e3magpmp.greatsolution.dev/partners/secude-gmbh/

avatar
Holger Hügel, Secude

Holger Hügel is Vice President Products and Sercvices at Secude


Write a comment

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the second time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork.

Venue

More information will follow shortly.

Event date

Wednesday, May 21, and
Thursday, May 22, 2025

Early Bird Ticket

Available until Friday, January 24, 2025
EUR 390 excl. VAT

Regular ticket

EUR 590 excl. VAT

Venue

Hotel Hilton Heidelberg
Kurfürstenanlage 1
D-69115 Heidelberg

Event date

Wednesday, March 5, and
Thursday, March 6, 2025

Tickets

Regular ticket
EUR 590 excl. VAT
Early Bird Ticket

Available until December 20, 2024

EUR 390 excl. VAT
The event is organized by the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes attendance at all presentations of the Steampunk and BTP Summit 2025, a visit to the exhibition area, participation in the evening event and catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due course.