Privacy 101: Data Security Implementation for SAP Ryan Victoria ryan. victoria@kaisa. com Makati, Philippines 22 February 2013
Issues on Computer Security • 90% of persons interviewed detected computer security breaches in the last twelve months. • 80% of the respondents acknowledged financial losses due to computer breaches. • 40% of the respondents were able to quantify their financial losses. • 55% of the respondents reported denial of service. Source: Computer Security Institute, http: //www. gocsi. com
Challenges on Data Security ITIL Confidentiality Integrity Availability • Protection • Cost-benefit relation • Efficiency
Impact of security breach • To business – Poor data quality/dispersed data – Inefficient processes – Poor business agility – Leak of confidential information – Expensive (TCO) • To IT – Missed SLAs – Performance issues – Limited time for value-added innovation – Audit nonconformances – Supportability and heterogeneity
Goal Protect From Through Assets Threats Measures Data Hackers Security
Security in every layer Presentation Communication Web connection Application Database
Securing the Database • Encryption • Vulnerability patches
Securing the Application SAP system System access control Access control System admin Authorizations Profiles Users
Securing the Web connection SAP system ITS • Encryption • Certificates • Single Sign-on Internet
Securing the Communication Internet SAP system • Access control • Packet filtering • Encryption
Securing the Presentation • Access control • Virus scanners • Encryption
Summary • Data security is the responsibility of both the business and the IT group. • Security in every layer. • Kaisa can help you.