<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Encryption and Decryption critical fields using 3rd party tools in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/encryption-and-decryption-critical-fields-using-3rd-party-tools/m-p/10618046#M1863337</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12px; color: #333333; background: #ffffff;"&gt;We are looking at a use case scenario to encrypt certain personnel data (for e.g. Social Security Number or Bank Account No) using AES algorithm. We would like to encrypt and decrypt the personnel data so that unauthorized user won't be able to see the critical data. I know SAP has limitations and it is not straight forward mechanism.&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333; background: #ffffff;"&gt;Are there any third party vendors/tools or partners who can provide solution to encrypt/decrypt critical fields. I found one such service provider called "Dolphin" who is SAP Partner too. similarly are there any more such service providers. Please provide the information.&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333; background: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333; background: #ffffff;"&gt;Thanks&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333; background: #ffffff;"&gt;Vik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Sep 2014 18:18:45 GMT</pubDate>
    <dc:creator>former_member183953</dc:creator>
    <dc:date>2014-09-24T18:18:45Z</dc:date>
    <item>
      <title>Encryption and Decryption critical fields using 3rd party tools</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/encryption-and-decryption-critical-fields-using-3rd-party-tools/m-p/10618046#M1863337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12px; color: #333333; background: #ffffff;"&gt;We are looking at a use case scenario to encrypt certain personnel data (for e.g. Social Security Number or Bank Account No) using AES algorithm. We would like to encrypt and decrypt the personnel data so that unauthorized user won't be able to see the critical data. I know SAP has limitations and it is not straight forward mechanism.&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333; background: #ffffff;"&gt;Are there any third party vendors/tools or partners who can provide solution to encrypt/decrypt critical fields. I found one such service provider called "Dolphin" who is SAP Partner too. similarly are there any more such service providers. Please provide the information.&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333; background: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333; background: #ffffff;"&gt;Thanks&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333; background: #ffffff;"&gt;Vik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Sep 2014 18:18:45 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/encryption-and-decryption-critical-fields-using-3rd-party-tools/m-p/10618046#M1863337</guid>
      <dc:creator>former_member183953</dc:creator>
      <dc:date>2014-09-24T18:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption and Decryption critical fields using 3rd party tools</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/encryption-and-decryption-critical-fields-using-3rd-party-tools/m-p/10618047#M1863338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The best strategy to follow is not to have the data at all, and rather use tokenization services to access the data from a service. Your system only contains a token for the data and at runtime the&amp;nbsp; system retrieves the data via an encrypted webservice call to the service provider.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use the SAP built in encryption, then it only supports selected fields (payment cards and credit card data) to encrypt the data in the DB / data browsers. But if user has access to the application or function which decrypts, then they can access the data in plain text. So you have more requirements to protect your application and basis authorizations and client copies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not aware of anything for the US Social Security Number encrytion (either as supported service or encrypted field), however if you take a look on wikipedia you will see that the whole mechanism is about as secure as your birthday in the internet...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Julius&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Sep 2014 19:30:31 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/encryption-and-decryption-critical-fields-using-3rd-party-tools/m-p/10618047#M1863338</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2014-09-24T19:30:31Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption and Decryption critical fields using 3rd party tools</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/encryption-and-decryption-critical-fields-using-3rd-party-tools/m-p/10618048#M1863339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12px; color: #333333;"&gt;Similar to the answer which Julius has given, an option you may consider is using an external Tokenization solution.&amp;nbsp; In this approach, assuming the data in question is entered and stored in an SAP system, the sensitive data you wish to protect is sent to an external server or service provider where it is encrypted and a random "token" is assigned to it.&amp;nbsp; The token is returned to be stored in the SAP database in the same field where the data would have originally been stored.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333;"&gt;By using tokenization, you can still access the data by sending the token to the external tokenization server/service and retrieving the original data.&amp;nbsp; However, because the original data does NOT reside in the SAP DB, should there be a data breach or a DBA downloads some SAP tables, only the token will be compromised.&amp;nbsp; In order to retrieve the original data the token must be sent to the server/service.&amp;nbsp; Thus, theft of the token provides little to no value to the thief.&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333;"&gt;Paymetric offers this tokenization service in SAP.&amp;nbsp; It is possible to tokenize nearly any type of data in SAP that you wish, although credit card numbers tend to be the most commonly tokenized data.&amp;nbsp; That said, there seems to be a surge in the desire to tokenize other sensitive data (PII) in the recent months.&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; color: #333333;"&gt;Eric&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Apr 2015 16:05:50 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/encryption-and-decryption-critical-fields-using-3rd-party-tools/m-p/10618048#M1863339</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2015-04-10T16:05:50Z</dc:date>
    </item>
  </channel>
</rss>

