Posts

Showing posts with the label SAP Security

Attribute-Based Access Control: A Comprehensive Guide

Image
  Attribute-based access control (ABAC) is an access management model that takes inspiration from role-based access control. Defining a collection of attributes for the elements of your system is the foundation of   attribute-based access control . This model is made up of many parts. Attribute:  It relates to the nature of elements within the network. User characteristics such as clearance standard, agency, role, or even IP address are often used to refer to it. Among other things, it may refer to object attributes, such as creator, sensitivity, and type. An attribute may also refer to the environment’s characteristics, such as place, time, and date. Action Type:  The action that is carried out on the network. Copying, pasting, deleting, reading, or writing, for instance. Subject:  This is any person or resource within the network that can carry out actions. To assess their clearance level, the subject is also assigned attributes. Object:  An object is any...

ABAC vs. RBAC: A Comparison

Image
  In organizations, users of the network must be authenticated and authorized before accessing the system. This is especially the case for parts of the system capable of contributing to security breaches. Access control is a way of ensuring that users are who they say they are and that they have adequate access to company data. There are two key methods of controlling access for systems — role-based access control (RBAC) and attribute-based access control (ABAC). Authentication and Authorization Authentication and authorization are two main aspects of security. After entering your credentials to log in to your computer or sign in to an app or program, the system or application undertakes authentication to determine your degree of authorization. Authorization can include what accounts you can use, what services you have access to, and what functions you are required to perform. RBAC and ABAC's primary distinction is that RBAC offers access to services or information based on use...

SAP HANA's Dynamic Data Masking: The Smarter Way

Image
  SAP HANA - a high-performance in-memory database - accelerates data-driven, real-time decision-making and practice. It supports all workloads with the most extensive advanced analytics on multi-model data, both on-premise and in the cloud. SAP HANA offers a robust security system to help safeguard your data. Apart from the authentication/single sign-on, user/role and authorization management, audit logging, and encryption functionality that already existed, SAP HANA also offers native dynamic data masking functionality. Authorization is the primary means of controlling access. The privilege framework of SAP HANA is based on standard SQL privileges allowing for fine-granular control, with extensions for different use cases such as dashboards or reporting. Roles allow for efficient separation of duties. The functionality of native data masking alters how data appears in views without modifying the underlying data. Since the underlying data remains unchanged, calculations on the ma...