Financial Management Blogs by SAP
Get financial management insights from blog posts by SAP experts. Find and share tips on how to increase efficiency, reduce risk, and optimize working capital.
cancel
Showing results for 
Search instead for 
Did you mean: 
T_Frenehard
Product and Topic Expert
Product and Topic Expert
1,869


Data privacy and data protection regulations, and best practices, require organizations to implement both technical and organisational measures appropriate to the nature of data access and processing, and the associated risks of course.

Organizations need to ensure there are appropriate processes in place to test the effectiveness of both technical controls and policies, but also to undertake any required improvements.

This fourth blog on the “What is really SAP Governance, Risk, and Compliance (GRC)?” series will focus on the cybersecurity, data protection and privacy aspects of the portfolio.

 

Managing data protection and privacy


 

With that in mind, SAP solutions for Cybersecurity and Data Protection help customers:

  • Develop, maintain and implement policies and regulatory compliance, with auditable evidence of gaps and remediation

  • Provide technical access, masking and logging controls, geopolitical fencing, and management of digital identities

  • Protect system and landscape security, and perform early watches

  • Perform risk analysis and records of processing activities, linked technical measures, and data protection events to document and manage the appropriate and legal response

  • Implement security frameworks such as the one from the National Institute of Standards and Technology (NIST)



 

SAP Enterprise Threat Detection – Address cyber-threats with real-time intelligence

 









Features and functionalities:

* Analyze and efficiently enrich and correlate logs for review

* Evaluate for automated detection of attack patterns with real-time alerting

* Investigate with forensic analysis and modeling of existing and new attack detection patterns and dashboards

* Integrate to collect SAP and non-SAP log data

 

SAP Privacy Governance – Manage and comply with evolving data privacy regulations

 









Features and functionalities:

* Manage policies by creating, disseminating, and acknowledging data protection and privacy (DPP) policies

* Survey and track to gather and report on records of processing activities (RoPA)

* Access business impact by performing data privacy (DPIA) and cybersecurity business impact analysis

* Manage risks and controls to identify and audit related risks and mitigating controls

* Monitor and report on status and details via a unified cockpit

 

SAP Data Custodian – Gain greater visibility and control of your data in the public Cloud

 









Features and functionalities:

* Data transparency to monitor and report on data access, storage, movement, processing, and location in the public Cloud

* Data control to create and enforce public Cloud data access, location, movement, and processing policies

 

SAP UI Logging – Data access transparency and analysis

 









Features and functionalities:

* Log data access for coherent log of users’ input and system output on the user interface level, enriched with meta information for analysis

* Gain insight to understand how and which data is accessed, and set up alerts in case of access to critical or sensitive data

* Investigate by receiving alerts to specific, questionable activities, and enabling deep-dive into the log file to identify and prove improper data access

* Report to draw on comprehensive access data to report internally and externally

* Integrate with SAP UI Masking for better data protection, and with SAP Enterprise Threat Detection for advanced and automated analysis of access

 

SAP UI Masking – Protect sensitive information in the user interface layer

 









Features and functionalities:

* Secure access by determining sensitive fields and applying protective actions in runtime based on users’ authorizations

* Automate authorization by determining users’ special authorization in runtime, based on static roles or dynamic attribute-role settings

* Gain insights to understand who tries and who succeeds in accessing sensitive data, and whether to refine the solution setup

* Integrate by leveraging SAP UI Logging and SAP Enterprise Threat Detection to identify potential data abuse

I hope this helps in introducing the cybersecurity, data protection, and privacy offering from SAP’s Governance, Risk, and Compliance portfolio.

As a reminder, you can find all the other blogs in this series listed below:

I look forward to reading your thoughts and comments either on this blog or on Twitter @TFrenehard
2 Comments