on 2022 Dec 09 3:30 PM
As I attempt to implement procedures to safeguard our HANA Data, I have run into a challenge in which I need to prevent ad-hoc logins to HANA using the SAP Data Owner (SAPSID) account. This is the only account in the database with privileges that allow for the modification of SAP application data. From an auditing perspective it should only be used by the SAP application. I find no way to enforce such a safeguard.
I do not see any means of restricting connections to a whitelist of sources (hostname/address/application_name/etc).
Nor do I see any means of denying connections from a blacklist of sources (hostname/address/application_name/etc).
Worst of all, I cannot produce an audit trail of any activity done in such an ad-hoc session. (Auditing SAPSID is of course out of the question).
Logon Triggers get a bad rap, but one would be very handy given the lack of built-in functionality here.
Has anyone had success in implementing such safeguards?
Request clarification before answering.
This is really an interesting idea! - It would require a lot of testing to make sure that it works / without any unexpected impact. I am going to attempt to do some testing in a sandbox environment and update here.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
An idea, that may work but I haven't try, would by to use workload class.
You would create 2 workload classes:
- one with "no limit"
- one with "strong limit" that any statement will fail. For example by setting ADMISSION CONTROL REJECT MEMORY THRESHOLD to 1% only.
Then, you would create 2 mapping:
- one mapping for the "no limit" workload class to identify statement coming from ABAP stack. You may use the following attribute for this: APPLICATION NAME='ABAP:<SID>' and USER NAME='SAP<SID>'
- one other mapping for the "strong limit" workload class to identify statement coming from other clients. In this case, just USER NAME='SAP<SID>' would be used.
The class with the most specific match is mapped to the database client.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
The best recommendation that can be given is to put the HANA server on VLAN behind a firewall and put ACL on the firewall to restrict connections to the HANA management interface.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
| User | Count |
|---|---|
| 7 | |
| 5 | |
| 5 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 2 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.