Privacy 101 Data Security Implementation for SAP Ryan

  • Slides: 13
Download presentation
Privacy 101: Data Security Implementation for SAP Ryan Victoria ryan. victoria@kaisa. com Makati, Philippines

Privacy 101: Data Security Implementation for SAP Ryan Victoria ryan. victoria@kaisa. com Makati, Philippines 22 February 2013

Issues on Computer Security • 90% of persons interviewed detected computer security breaches in

Issues on Computer Security • 90% of persons interviewed detected computer security breaches in the last twelve months. • 80% of the respondents acknowledged financial losses due to computer breaches. • 40% of the respondents were able to quantify their financial losses. • 55% of the respondents reported denial of service. Source: Computer Security Institute, http: //www. gocsi. com

Challenges on Data Security ITIL Confidentiality Integrity Availability • Protection • Cost-benefit relation •

Challenges on Data Security ITIL Confidentiality Integrity Availability • Protection • Cost-benefit relation • Efficiency

Impact of security breach • To business – Poor data quality/dispersed data – Inefficient

Impact of security breach • To business – Poor data quality/dispersed data – Inefficient processes – Poor business agility – Leak of confidential information – Expensive (TCO) • To IT – Missed SLAs – Performance issues – Limited time for value-added innovation – Audit nonconformances – Supportability and heterogeneity

Goal Protect From Through Assets Threats Measures Data Hackers Security

Goal Protect From Through Assets Threats Measures Data Hackers Security

Security in every layer Presentation Communication Web connection Application Database

Security in every layer Presentation Communication Web connection Application Database

Securing the Database • Encryption • Vulnerability patches

Securing the Database • Encryption • Vulnerability patches

Securing the Application SAP system System access control Access control System admin Authorizations Profiles

Securing the Application SAP system System access control Access control System admin Authorizations Profiles Users

Securing the Web connection SAP system ITS • Encryption • Certificates • Single Sign-on

Securing the Web connection SAP system ITS • Encryption • Certificates • Single Sign-on Internet

Securing the Communication Internet SAP system • Access control • Packet filtering • Encryption

Securing the Communication Internet SAP system • Access control • Packet filtering • Encryption

Securing the Presentation • Access control • Virus scanners • Encryption

Securing the Presentation • Access control • Virus scanners • Encryption

Summary • Data security is the responsibility of both the business and the IT

Summary • Data security is the responsibility of both the business and the IT group. • Security in every layer. • Kaisa can help you.

Visit https: //isoportal. kaisa. com/ THANK YOU!

Visit https: //isoportal. kaisa. com/ THANK YOU!