{"id":65049,"date":"2020-03-05T11:00:00","date_gmt":"2020-03-05T10:00:00","guid":{"rendered":"https:\/\/e3magpmp.greatsolution.dev\/?p=65049"},"modified":"2022-05-01T08:18:22","modified_gmt":"2022-05-01T06:18:22","slug":"security-for-business-critical-data","status":"publish","type":"post","link":"https:\/\/e3magpmp.greatsolution.dev\/en\/security-for-business-critical-data\/","title":{"rendered":"Security for business critical data"},"content":{"rendered":"<p>SAP applications are used in a variety of ways. A great deal of attention is paid to ensuring that the SAP systems are ideally adapted and tuned to the respective requirements and run optimally. <\/p>\n\n\n\n<p>High availability (HA) solutions are also frequently used for uninterrupted operation. But that is only one side of the coin. The other side is that SAP applications must also be backed up, because there are many sources of error that can lead to a disaster. <\/p><div class=\"great-fullsize-content-es\" style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-2873239661\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/kit-de-medios\/\" target=\"_blank\" aria-label=\"nl_werbung_800x100_es\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-en\" id=\"great-731560687\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/media-kit\/\" target=\"_blank\" aria-label=\"nl_advertising_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-de\" style=\"margin-bottom: 20px;margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-736105933\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/steampunk-summit-2025\/\" target=\"_blank\" aria-label=\"steampunk_2024_1_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg 1920w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1200x150.jpg 1200w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-960x120.jpg 960w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1168x146.jpg 1168w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1440x180.jpg 1440w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1536x192.jpg 1536w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-600x75.jpg 600w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" width=\"2560\" height=\"320\"   \/><\/a><\/div>\n\n\n\n<p>Logical errors, such as ransomware attacks, are many and backup is essential for this. It is problematic that HA solutions such as mirroring etc. are often confused with backup solutions. <\/p>\n\n\n\n<p>The misconception often exists that the very high-performance HA solution, in which, for example, the data is immediately mirrored to a second system, which may even be located in a different location, can replace a data backup solution. <\/p>\n\n\n\n<p>It is true that failed systems and data can continue to operate immediately on a second system in the event of an error. However, it is often forgotten that this only works for physical errors and not for logical errors. In the case of virus, malware or ransomware attacks, the malware is immediately transferred to the second system, and the data there is corrupt and unusable. <\/p>\n\n\n\n<p>Encryption Trojans infect file systems without any noticeable effects for the user and only encrypt the infected data in one fell swoop weeks later. For a recovery, it must therefore be possible to fall back on the data stock before the infection.<\/p>\n\n\n\n<p> A suitable backup solution should therefore be used for the SAP applications, which should meet various requirements. A data backup solution certified for SAP applications is very important. <\/p>\n\n\n\n<p>Only a backup solution certified by SAP enables SAP support to be used at any time and business-critical applications to function, be backed up and restored smoothly. <\/p>\n\n\n\n<p>Ideally, the SAP backup solution should be integrated into the enterprise-wide data protection solution, because that way everything is from a single source, easy to manage, and less training is required. In general, the backup solution should be certified for a variety of platforms, applications and databases to cover heterogeneous environments. <\/p>\n\n\n\n<p>This ensures that backup and recovery of virtual and physical environments, databases and applications are consistent and in accordance with vendor specifications. Ideally, cloud usage should also be supported. <\/p>\n\n\n\n<p> The data protection solution must be integrated into a business continuity strategy based on granular recovery point objectives (RPOs) and recovery time objectives (RTOs). <\/p>\n\n\n\n<p>This is essential for a functioning disaster recovery scenario. SLAs (Service Level Agreements) must be defined and recorded in a disaster recovery plan. <\/p>\n\n\n\n<p>The backup solution should also have the technical security to implement compliance requirements such as DSGVO, which means that the organizational requirements must also be able to be implemented through technical features.<\/p>\n\n\n\n<p> With the current security discussions and the danger of security holes in software, it is very important that there are no backdoors in it. German or European solutions are particularly recommended here.<\/p>\n\n\n\n<p> The requirements are varied and the list of dangers is long, ranging from power failures and natural disasters to logical errors and unintentional or targeted manipulation, which can be caused by user error, sabotage, ransomware or hacker attacks, for example. Backup is often the last resort to save the data including the important SAP environments respectively the affected company.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\" data-block-type=\"core\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/partners\/sep-ag\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"112\" title=\"Security for business critical data\" src=\"http:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SEP.jpg\" alt=\"https:\/\/e3magpmp.greatsolution.dev\/partners\/sep-ag\/\" class=\"wp-image-15592\" srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SEP.jpg 1000w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SEP-768x86.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SEP-100x11.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SEP-480x54.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SEP-640x72.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SEP-720x81.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SEP-960x108.jpg 960w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>SAP applications contain business-critical data and often represent the heart of the company. Backup and recovery are often unjustifiably neglected when it comes to IT security.<\/p>","protected":false},"author":2014,"featured_media":15608,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[7,21,37274],"tags":[8618,3862,619],"coauthors":[37336],"class_list":["post-65049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-it-security","category-mag-2002","tag-high-availability","tag-ransomware","tag-support"],"featured_image_urls_v2":{"full":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"thumbnail":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",400,172,false],"medium_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-768x331.jpg",768,331,true],"large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-100":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-480x207.jpg",480,207,true],"image-640":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-640x276.jpg",640,276,true],"image-720":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-720x310.jpg",720,310,true],"image-960":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1440":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1920":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"1536x1536":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"2048x2048":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"profile_24":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>SAP-Anwendungen beinhalten businesskritische Daten und stellen h\u00e4ufig das Herz des Unternehmens dar. Backup und Recovery werden dabei beim Thema IT-Security v\u00f6llig zu Unrecht oft vernachl\u00e4ssigt.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/opinion\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/mag-2002\/\" rel=\"category tag\">MAG 20-02<\/a>","author_info_v2":{"name":"Andreas Mayer, SEP","url":"https:\/\/e3magpmp.greatsolution.dev\/en\/author\/andreas-mayer\/"},"comments_num_v2":"0 comments","acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/65049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/users\/2014"}],"replies":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/comments?post=65049"}],"version-history":[{"count":0,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/65049\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/media\/15608"}],"wp:attachment":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/media?parent=65049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/categories?post=65049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/tags?post=65049"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/coauthors?post=65049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}