SAP Basis Creation of reports - SAP Basis

Direkt zum Seiteninhalt
Creation of reports
System copy
In addition to scanning and identifying the respective security vulnerabilities of a program, it is also possible to stop tasks that are to be transported to other SAP systems with security vulnerabilities in the further transport process This applies, for example, to the CHARM process based on SAP Solution Manager. This forces a programmer to securely check the programs he or she is responsible for according to the same security criteria. If a program then still has security problems, it can either be released via the dual control principle or returned for further processing. Do you know of any other solutions for improving ABAP code security or have you already gained experience with the products mentioned above? I look forward to your comments!

Soft skills in particular also play an important role in this job description. Communication skills are very much in demand on a day-to-day basis, because SAP administrators are often in close contact with customers and have to respond to their wishes and questions. They also need the ability to work in a structured manner and to find creative solutions and decisions. Continuous training in the field is advisable in order not to lose touch.
Synonym(s): SAP Basis Consulting, Consulting
Expand your SAP landscape by adding new functionalities or installing SAP Enhancement Packages (EHP). Even if you want to update your SAP system to the latest version, we will be at your side to ensure that your systems remain up-to-date and functional. All services at a glance:

SAP on Azure or on Amazon Web Services (AWS) is a scalable, reliable platform for your current and future SAP HANA requirements. Achieve optimal performance for your entire system by migrating to Azure or AWS. Get the best of both worlds!

Use "Shortcut for SAP Systems" to accomplish many tasks in the SAP basis more easily and quickly.

Based on the qualified documentation provided and the transfer of know-how, you are able to evaluate the security of your SAP system and know what concrete measures need to be taken.

This defines rules that allow certain usernames from the SAP system to use certain external programmes.
SAP BASIS
Zurück zum Seiteninhalt