{"id":6094,"date":"2015-07-23T00:00:00","date_gmt":"2015-07-22T22:00:00","guid":{"rendered":"https:\/\/e3magpmp.greatsolution.dev\/?p=6094"},"modified":"2019-07-31T13:51:45","modified_gmt":"2019-07-31T11:51:45","slug":"funciones-de-seguridad-de-la-infraestructura-de-os-para-hana","status":"publish","type":"post","link":"https:\/\/e3magpmp.greatsolution.dev\/es\/funciones-de-seguridad-de-la-infraestructura-de-os-para-hana\/","title":{"rendered":"Infraestructura del SO: Funciones de seguridad para Hana"},"content":{"rendered":"<p>Es bien sabido que cada vez se producen m\u00e1s ataques desde el exterior (y, por desgracia, tambi\u00e9n desde el interior) contra los sistemas inform\u00e1ticos internos. Esto ha llevado a los responsables de empresas y de TI a impulsar medidas de protecci\u00f3n contra tales ataques y amenazas.<\/p>\n<p>En muchos lugares se han desarrollado y se est\u00e1n aplicando arquitecturas o conceptos hol\u00edsticos de seguridad para minimizar los riesgos de seguridad inform\u00e1tica a largo plazo.<\/p><div class=\"great-fullsize-content-es\" style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-2268225745\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/kit-de-medios\/\" target=\"_blank\" aria-label=\"nl_werbung_800x100_es\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-en\" id=\"great-1653786330\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/media-kit\/\" target=\"_blank\" aria-label=\"nl_advertising_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-de\" style=\"margin-bottom: 20px;margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-1581962062\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/steampunk-summit-2025\/\" target=\"_blank\" aria-label=\"steampunk_2024_1_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg 1920w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1200x150.jpg 1200w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-960x120.jpg 960w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1168x146.jpg 1168w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1440x180.jpg 1440w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1536x192.jpg 1536w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-600x75.jpg 600w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" width=\"2560\" height=\"320\"   \/><\/a><\/div>\n<p>Por lo general, esto abarca desde las pol\u00edticas (como el manejo de contrase\u00f1as y las directrices de protecci\u00f3n de datos) para usuarios y especialistas inform\u00e1ticos hasta la protecci\u00f3n de los sistemas\/componentes inform\u00e1ticos, pasando por el uso de cortafuegos y software de detecci\u00f3n de ataques, la seguridad de VPN\/redes, el uso de software de encriptaci\u00f3n y servidores \"reforzados\" y el uso de informes de seguridad automatizados.<\/p>\n<p>Tambi\u00e9n se llevan a cabo controles de seguridad con regularidad para garantizar en todo momento la m\u00e1xima protecci\u00f3n posible del entorno de un sistema inform\u00e1tico.<\/p>\n<h3>Del conjunto a los elementos individuales<\/h3>\n<p>Como parte de la preparaci\u00f3n del centro de datos de Hana, el tema de la seguridad es un hecho, por as\u00ed decirlo. SAP ha desarrollado una completa Gu\u00eda de Seguridad de Hana que describe detalladamente la protecci\u00f3n y los mecanismos de seguridad desde la perspectiva de la base de datos. Tambi\u00e9n incluye la interacci\u00f3n de la base de datos y los componentes relevantes para la base de datos, como el sistema operativo (SO), la red y el almacenamiento, desde el punto de vista de la seguridad.<\/p>\n<p>SAP tambi\u00e9n proporciona numerosas funciones de seguridad para Hana.<\/p>\n<h3>Paquete de seguridad<\/h3>\n<p>Como proveedor de sistemas operativos Hana y no Hana, Suse tambi\u00e9n ofrece a los clientes de SAP un paquete de seguridad para Suse Linux Enterprise Server (SLES) for SAP Applications.<\/p>\n<p>Este paquete cubre de forma exhaustiva los aspectos relevantes para la seguridad de la implantaci\u00f3n de Hana Suse. Incluye una gu\u00eda de seguridad dedicada a Hana desarrollada por Suse, que describe, por ejemplo, el refuerzo espec\u00edfico de la base de datos en memoria de SAP junto con SLES.<\/p>\n<p>Adem\u00e1s, Suse proporciona actualizaciones y parches de seguridad peri\u00f3dicos para SLES. Y SLES cumple numerosos certificados de seguridad (como GCL, FIPS 140-2 Validation for Open SSL y Common Criteria Security Certifaction EAL4+).<\/p>\n<h3>Gu\u00eda especial de seguridad de Hana<\/h3>\n<p>La Gu\u00eda de Seguridad Hana de Suse (con Security Hardening SLES for Hana Databases) ofrece dos cosas. Por un lado, una gu\u00eda de actuaci\u00f3n concreta para la protecci\u00f3n o defensa frente a amenazas al utilizar Hana Suse y, por otro, funcionalidades concretas del software.<\/p>\n<p>Esto permite, por ejemplo, configurar SLES para que defina varios niveles de seguridad (configuraciones) en funci\u00f3n de la priorizaci\u00f3n individual.<\/p>\n<h3>Reducir las superficies de ataque<\/h3>\n<p>Pero eso no es todo. Tambi\u00e9n se proporciona para su uso un Suse Firewall para Hana, que protege contra ataques de red o la apertura de determinados puertos (desde el exterior).<\/p>\n<p>Tambi\u00e9n se puede mostrar a trav\u00e9s de la funcionalidad del software: qu\u00e9 paquetes del sistema operativo deben utilizarse y de cu\u00e1les se puede prescindir en determinadas circunstancias. Al fin y al cabo, menos paquetes ofrecen una menor superficie de ataque contra posibles amenazas.<\/p>\n<p>Resumen: Existen mecanismos de protecci\u00f3n o funcionalidades de software que van m\u00e1s all\u00e1 del est\u00e1ndar para la preparaci\u00f3n del centro de datos de Hana, especialmente en t\u00e9rminos de seguridad. La plataforma de SO SLES, con sus diversas funciones de seguridad, contribuye significativamente a la utilizaci\u00f3n \"segura\" de Hana.<\/p>","protected":false},"excerpt":{"rendered":"<p>El tema de la seguridad est\u00e1 firmemente anclado dentro de Hana Datacenter Readiness. Como proveedor de sistemas operativos, Suse ofrece una sofisticada protecci\u00f3n contra ataques y amenazas al utilizar Hana.<\/p>","protected":false},"author":38,"featured_media":26555,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[24,7,1553],"tags":[65,1516,189,3932],"coauthors":[19920],"class_list":["post-6094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","category-meinung","category-1553","tag-hana","tag-security","tag-sles","tag-suse-linux-enterprise-server"],"featured_image_urls_v2":{"full":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"thumbnail":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-150x150.jpg",150,150,true],"medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",400,172,false],"medium_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-768x331.jpg",768,331,true],"large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"image-100":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-100x43.jpg",100,43,true],"image-480":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-480x207.jpg",480,207,true],"image-640":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-640x276.jpg",640,276,true],"image-720":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-720x310.jpg",720,310,true],"image-960":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"image-1440":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"image-1920":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"1536x1536":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"2048x2048":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"bricks_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"bricks_medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",600,259,false],"profile_24":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Innerhalb der Hana Datacenter Readiness ist das Thema Security fest verankert. Einen hochentwickelten Schutz gegen Angriffe und Bedrohungen beim Hana-Einsatz stellt Suse als OS-Lieferant bereit.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/opinion\/linux\/\" rel=\"category tag\">Linux Kolumne<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/1507-1509\/\" rel=\"category tag\">MAG 15-07<\/a>","author_info_v2":{"name":"E-3 Magazin","url":"https:\/\/e3magpmp.greatsolution.dev\/es\/author\/e-3-magazin\/"},"comments_num_v2":"0 comentarios","acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts\/6094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/comments?post=6094"}],"version-history":[{"count":0,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts\/6094\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/media\/26555"}],"wp:attachment":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/media?parent=6094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/categories?post=6094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/tags?post=6094"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/coauthors?post=6094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}