PDF Sec Guide Ehsm 6.0 en
PDF Sec Guide Ehsm 6.0 en
1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1 About this Document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Target Audience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 Why is Security Necessary?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
1.4 Overview of the Main Sections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
5 Authorizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5.1 Role and Authorization Concept for SAP EHS Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
5.2 Authorizations for RFC Calls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
5.3 Standard Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Scenario Health and Safety. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Scenario Environment Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Scenario Product Compliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.4 Standard Authorization Objects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Scenario Health and Safety. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Scenario Environment Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Scenario Product Compliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
5.5 Critical Combinations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
5.6 Creating Custom Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
10 Data Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
10.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
10.2 Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
10.3 Technical and Organizational Measures to Ensure Data Protraction. . . . . . . . . . . . . . . . . . . . . . . . . 52
10.4 Deletion of Personal Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
10.5 Information Retrieval. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
10.6 Read Access Logging of Personal Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Read Access Logging for Incident Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
10.7 Change Logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
The Security Guide provides an overview of the security-relevant information that applies to SAP EHS
Management.
Caution
This guide does not replace the administration or operation guides that are available for productive
operations.
Caution
This guide does not replace the administration or operation guides that are available for productive
operations.
● Technology consultants
● Security consultants
● System administrators
This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation
Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle,
whereas the Security Guides provide information that is relevant for all life cycle phases.
Master Guide The central starting point for the tech SAP Help Portal at http://
nical implementation of the SAP EHS
help.sap.com/ehs-com
Management add-on. Get an overview
of SAP EHS Management, its software
units, system landscapes, and find im
portant SAP Notes.
With the increasing use of distributed systems and the Internet for managing business data, the demands on
security are also on the rise. When using a distributed system, you need to be sure that your data and
processes support your business needs without allowing unauthorized access to critical information. User
errors, negligence, or attempted manipulation of your system should not result in loss of information or
processing time. These demands on security apply likewise to component extension 6.0 for SAP Environment,
Health, and Safety Management (SAP EHS Management). To assist you in securing SAP EHS Management, we
provide this Security Guide.
● In incident management, you have critical person-related information regarding absences or injuries.
● In risk assessment, personal data about the risk assessment lead and the other persons involved in a risk
assessment are displayed.
Component extension 6.0 for SAP EHS Management assumes that agreements for storage of personal data are
covered in individual work contracts. This also applies to notifications on initial data storage.
Note
Several business processes within SAP EHS Management use SAP Business Workflow and e-mail inbound
and outbound processing. It is not recommended that you grant the corresponding system users (such as
WF_BATCH for Workflow System or SAPCONNECT for e-mail inbound processing) all authorizations of the
system (SAP_ALL). In addition, this document describes the required authorizations and configuration for
supporting business processes using SAP Business Workflow and the e-mail inbound and outbound
scenario within the SAP EHS Management solution.
This section provides an overview of the technical components and communication paths that are used by SAP
EHS Management.
This section provides an overview of security aspects involved throughout the most widely-used processes
within SAP EHS Management.
● SAP NetWeaver
● SAP BI
● SAP Embedded Search (SAP NetWeaver Enterprise Search)
● SAP BusinessObjects
● SAP Interactive Forms
Therefore, the corresponding Security Guides also apply to the SAP EHS Management. Pay particular attention
to the most relevant sections or specific restrictions as indicated in the table below.
Application of Components
Scenario, Application or Component Security Guide
The most important SAP Notes that apply to the security of SAP EHS Management are shown in the table
below.
For a list of additional security-relevant SAP Hot News and SAP Notes, see also SAP Support Portal at https://
support.sap.com/securitynotes .
For more information about specific topics, see the Quick Links as shown in the table below.
Quick Links
Content Link
Security http://scn.sap.com/community/security
https://support.sap.com/securitynotes
The figure below shows an overview of the technical system landscape for SAP EHS Management.
For more information about the technical system landscape of SAP EHS Management, as well as integrated
systems, see the SAP EHS Management Master Guide on the SAP Help Portal at http://help.sap.com/ehs-com.
Figure 1: Process Integration System Overview depicts which functional modules are integrated into SAP EHS
Management processes and can reside on separate systems. The systems can be connected via RFC.
We assume that the central system for master data will provide the initial setup of Customizing and master
data for SAP EHS Management via Customizing transports and ALE replication (such as material master and
plants).
For these RFC calls, we recommend you distribute the SAP EHS Management users to the other systems as
needed to read HR data, for example, and to enable Single Sign-On (SSO) for those users.
For more information about the technical system landscape, see the resources listed in the table below.
Management
4.1 Introduction
SAP EHS Management uses the user management and authentication mechanisms provided with the SAP
NetWeaver platform, in particular the SAP NetWeaver Application Server ABAP and Java. Therefore, the
security recommendations and guidelines for user administration and authentication as described in the SAP
NetWeaver Application Server ABAP Security Guide [SAP Library] and SAP NetWeaver Application Server Java
Security Guide [SAP Library] also apply to SAP EHS Management.
In addition to these guidelines, we include information about user administration and authentication that
specifically applies to SAP EHS Management in the following topics:
● User Management
This topic lists the tools to use for user management, the types of users required, and the standard users
that are delivered with SAP EHS Management.
● User Data Synchronization
SAP EHS Management shares user data with:
○ SAP EHS Management system
○ BI system
○ Other ERP systems (HR, PM, QM, and CS)
This topic describes how the user data is synchronized with these other sources.
● Integration into Single Sign-On Environments
This topic describes how SAP EHS Management supports Single Sign-On mechanisms.
User management for SAP EHS Management uses the mechanisms provided with the SAP NetWeaver
Application Server ABAP and Java, for example, tools, user types, and password policies. For an overview of
how these mechanisms apply for SAP EHS Management, see the sections below. In addition, we provide a list of
the standard users required for operating SAP EHS Management.
The table below shows the tools to use for user management and user administration with SAP EHS
Management.
User and role maintenance with SAP NetWeaver AS ABAP For more information, see Users and Roles (BC-SEC-USR) on
(transactions SU01 and PFCG) SAP Help Portal at http://help.sap.com.
User Management Engine with SAP NetWeaver AS Java For more information, see User Management Engine on SAP
Help Portal at http://help.sap.com.
Central User Administration (CUA) Use the CUA to centrally maintain users for the various sys
tems used by SAP EHS Management.
Set user for Enterprise Search data extraction (report Embedded Search extraction user and extraction roles have
ESH_EX_SET_EXTRACTION_USER to be set up with this report
Manage analysis authorizations (transaction RSECADMIN) Provides all necessary tools to maintain analysis authoriza
tions
It is often necessary to specify different security policies for different types of users. For example, your policy
may specify that individual users who perform tasks interactively have to change their passwords on a regular
basis, but not those users under which background processing jobs run.
The user types that are required for SAP EHS Management include:
● Individual users:
○ Dialog users are used for the dialog processing and for the RFC connection to the Adobe Document
Service (ADS), for example. (Used for SAP GUI for Windows or RFC connections.)
○ Communication users are used for e-mail inbound processing (such as SAPCONNECT).
○ Background users are used for Embedded Search extraction, BI extraction and the SAP Business
Workflow Engine (such as WF-BATCH).
For more information about these user types, see User Types on SAP Help Portal at http://help.sap.com in the
SAP NetWeaver AS ABAP Security Guide.
The table below shows the standard users that are necessary for operating SAP EHS Management.
Standard Users
System User ID Type Password Description
SAP EHS Management Business Processing Dialog User To be entered Business User of SAP
ERP System User EHS Management
SAP EHS Management Business Processing Dialog User To be entered Business User of SAP
BI System User for Reporting EHS Management
functionality mapped to the Busi
ness Processing User
in SAP EHS
Management ERP Sys
tem
SAP EHS Management E-mail Inbound Proc Communication user Not needed User to process the in
ERP System essing user coming e-mails of SAP
EHS Management
SAP EHS Management BI Extractor User Background user Not needed User for the BI extrac
ERP System tion of SAP EHS
Management data
SAP EHS Management Embedded Search Ex Background user Not needed User for the Embedded
ERP System tractor User
Search extraction will
be created via report
ESH_EX_SET_
EXTRACTION_USER
SAP EHS Management Workflow Engine batch Background user Not needed User for the back
ERP System user ground processing of
workflows in SAP EHS
Management
SAP EHS Management PRC Worklist Genera Background user Not needed User for the back
ERP System tion User ground processing of
product compliance
worklists
SAP EHS Management PRC Automated Background user Not needed User for the back
ERP System Change Processing ground automated
User processing of compli
ance data changes in
the product compli
ance area
SAP EHS Management PRC Supplier Change Background user Not needed User for the back
ERP System Monitor ground monitoring of
changes in supplier to
material assignment
SAP EHS Management Automatic Data Collec Background user Not needed EM-BATCH user with
ERP System tion User the role
SAP_BC_BMT_WFM_S
ERV_USER for the au
tomatic collection of
environmental data
Users are not automatically created during installation. In consequence, there is no requirement to change
their user IDs and passwords after the installation.
To avoid administrative effort, you can employ user data synchronization in your system landscape.
Since SAP EHS Management is based on SAP NetWeaver, all the mechanisms for user data synchronization of
SAP NetWeaver are available for SAP EHS Management.
SAP EHS Management supports the Single Sign-On (SSO) mechanisms provided by SAP NetWeaver.
Therefore, the security recommendations and guidelines for user administration and authentication as
described in the SAP NetWeaver Security Guide on SAP Help Portal at http://help.sap.com also apply to SAP
EHS Management.
For more information about the available authentication mechanisms, see User Authentication and Single Sign-
On on SAP Help Portal at http://help.sap.com in the SAP NetWeaver Library.
SAP EHS Management uses the authorization concept provided by the SAP NetWeaver AS ABAP or AS Java.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP and SAP NetWeaver AS Security Guide Java also apply to SAP EHS Management.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For
role maintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management
Engine’s user administration console on the AS Java.
Note
For more information about how to create roles, see Role Administration [SAP Library].
In SAP EHS Management, multiple BAPIs and RFC-enabled function modules are used to create, update, and
read the data of other SAP applications from (optional) other ERP systems. Thus, the authorization for using
these BAPIs and function modules (via Web Dynpro, for example), should be restricted to users who are
intended to have these authorizations and corresponding access to the data. For more information about
creating roles and the authorization concept, see AS ABAP Authorization Concept on SAP Help Portal at http://
help.sap.com → SAP NetWeaver 7.4.
The table below shows the standard roles that are used by SAP EHS Management.
SAP EHS Management delivers simultaneous end user roles for the ERP system to synchronize the menu
structures for end users, regardless of whether the user has decided to use a Web browser or NetWeaver
Business Client (NWBC) as a front end.
The following standard roles support the processes of SAP EHS Management. Technically, the services of these
roles are of the following types: Web Dynpro ABAP, Power Object Worklist (POWL), Report Launchpad, BI
queries, BI dashboards based on Adobe Flash Player and transactions. Unless shown in the table below, the
Standard Roles
Role Description
SAP_EHSM_MASTER Master PFCG role for all incident management, risk assess
ment and product safety and stewardship functionality. This
role is intended for use as a copy template for the menu
structures of the end user roles that are currently assigned.
SAP_EHSM_PROCESS_ADMIN End user role for the person who is technically responsible
for the workflow-based processes of EHS Management. This
role assigns the menu structure in NWBC to the end user
and the necessary authorizations in the ERP system.
SAP_EHSM_HSS_BW_ANALYTICS End user role for the person who analyzes incidents and risk
assessments, as well as the executed processes. This role
contains the navigation point Analytical Reports that in
cludes the report launchpad for the health and safety work
area with access to all dashboards and queries.
SAP_EHSM_FND_WF_BI_EXTR System user role for the extraction of BI data. This role con
tains the authorization profiles needed to extract the work
flow data for workflow reporting in BI.
SAP_EHSM_FND_WF_PERMISSION System user role for the Workflow Engine. This role contains
the additional authorization profiles needed to process the
workflows in the background.
SAP_EHSM_HSS_EML_REC System user role for the e-mail recipient. This role contains
the authorization profiles needed to receive and process e-
mails.
SAP_EHSM_FND_MIGRATION End user role for the migration. You use this role to access
the Legacy System Migration Workbench. Depending on the
content you want to migrate, you still need to configure and
assign the corresponding business role (including the pro
files).
Note
To restrict access to data for users who execute analytical reports (BI Content), proceed as follows:
The roles in the tables below are relevant for managing incident, managing EHS risk, and managing chemicals
for health and safety processes.
SAP_EHSM_HSS_INCIDENT_MANAGER / End user role for the incident manager. This role assigns the
menu structure in NWBC to the end user and the necessary
authorizations in the ERP system.
SAP_EHSM_HSS_INCIDENT_REPORTER / End user role for the incident reporter. This role assigns the
menu structure in NWBC to the end user and the necessary
authorizations in the ERP system.
SAP_EHSM_HSS_INCIDENT_NOTIFIED / End user role for a person who is notified during the process
ing of an incident. This role assigns the menu structure in
NWBC to the end user and the necessary authorizations in
the ERP system.
SAP_EHSM_HSS_INCIDENT_ESH_EXTR System user role for the Embedded Search extraction. This
role contains the authorization profiles needed to extract the
BO incident for the Embedded Search.
SAP_EHSM_HSS_INCIDENT_BI_EXTR System user role for the BI extraction. This role contains the
authorization profiles needed to extract the BO incident for
incident reporting in BI.
SAP_EHS_INC_REPORINCIDENT_APP System user role for the users of the app Report Incident.
This role contains authorization proposals needed to use the
app Report Incident.
SAP_EHSM_HSS_ENVMGR End user role for the environmental manager. This role as
signs the menu structure in NWBC to the end user and the
necessary authorizations in the ERP system.
SAP_EHSM_HSS_HYGIENIST End user role for the industrial hygienist. This role assigns
the menu structure in NWBC to the end user and the neces
sary authorizations in the ERP system.
SAP_EHSM_HSS_SAFEMGR End user role for the safety manager. This role assigns the
menu structure in NWBC to the end user and the necessary
authorizations in the ERP system.
SAP_EHSM_HSS_LINEMGR End user role for the line manager. This role assigns the
menu structure in NWBC to the end user and the necessary
authorizations in the ERP system.
SAP_EHSM_HSS_RAS_BI_EXTR System user role for the BI extraction. This role contains the
authorization profiles needed to extract the risk assessment
data for risk assessment reporting in BI.
SAP_EHSM_HSS_HSMGRCORP End user role for the corporate health and safety manager.
This role assigns the menu structure in NWBC to the end
user and the necessary authorizations in the ERP system.
SAP_EHSM_HSS_SMPLTECH End user role for the sampling technician. This role assigns
the menu structure in NWBC to the end user and the neces
sary authorizations in the ERP system.
SAP_EHSM_HSS_HAZSUBMGR End user role for the hazardous substance manager. This
role assigns the menu structure in NWBC to the end user
and the necessary authorizations in the ERP system.
SAP_EHSM_HSS_CHEMAPPR End user role for the chemical approver. This role assigns the
menu structure in NWBC to the end user and the necessary
authorizations in the ERP system.
SAP_EHSM_HSS_SDSCLERK End user role for the safety datasheet clerk. This role assigns
the menu structure in NWBC to the end user and the neces
sary authorizations in the ERP system.
SAP_EHSM_HSS_CHEMREQ End user role for the chemical requestor. This role assigns
the menu structure in NWBC to the end user and the neces
sary authorizations in the ERP system.
In the environment management component, for the automatic data collection to be set up, an RFC connection
has to be configured in the source system to use the EM-BATCH user for system access. In the target system,
the user EM-BATCH should be used for running the automatic data collection process. The EM-BATCH user
should have the SAP_BC_BMT_WFM_SERV_USER role with Execution activity authorizations for the S_RFC
authorization object.
The standard system is delivered with a restriction on the number of imported data records with their
corresponding number of external source tags per single run of the automatic data import. If you try to import
more than 1.000.000 data records with up to 1.000 external source tags in a single run of the automatic
import, the system will stop the import with a warning message.
The roles in the table below are relevant for managing emissions.
SAP_EHSM_HSS_ENVMGR End user role for the environmental manager. This role as
signs the menu structure in NWBC to the end user and the
necessary authorizations in the ERP system.
SAP_EHSM_ENV_TECHNICIAN End user role for the environmental technician. This role as
signs the menu structure in NWBC to the end user and the
necessary authorizations in the ERP system.
The roles in the table below are relevant for managing product compliance.
SAP_EHSM_PRC_COMPL_CONSUMER End user role for the compliance consumer. This role can be
adapted for use as four different sub-roles: purchasing
agent, sales and services representative, mechanical engi
neer, and electrical engineer. This user role is responsible for
maintaining awareness of regulations and compliance re
quirements and, depending on the purpose, can be responsi
ble for maintaining product knowledge and data, configuring
customer orders, scheduling service requests, research, and
evaluating product data, or designing, testing and analysis of
components.
SAP_EHSM_PRC_COMPL_MGR End user role for the compliance manager. This user role
monitors compliance-related programs for product lines,
and defines policies and procedures for other departments
to ensure compliance. The compliance manager approves
the manufacturing processes and equipment that will be
used in production, and supervises design compliance.
SAP_EHSM_PRC_COMPL_ENG End user role for the compliance engineer. This user role
monitors daily operations that contribute to ensuring com
pliance. The compliance engineer is responsible for the com
pany compliance data set. He or she maintains compliance
data in cooperation with the engineering teams, and cooper
ates with the compliance manager for up-to-date informa
tion about regulations. This role is involved in material-based
and component-based engineering changes and new prod
uct reviews.
SAP_EHSM_PRC_COMPONENT_ENG End user role for the component engineer. This user role se
lects and works with electrical or other components to be in
corporated into future products, and handles management
and documentation of purchased components. The compo
nent engineer approves parts obtained externally, works
closely with vendors, and ensures compliance by following
the established procedures and policies.
SAP_EHSM_PRC_BASMAT_SPEC End user role for the basic material specialist. This user role
is responsible for the selection of appropriate materials and
surfaces for design parts, and approves their release for use.
The basic material specialist decides the specific application
of materials and surfaces, and maintains the material data
base.
SAP_EHSM_PRC_BW_ANALYTICS End user role for the person who analyzes product safety
and stewardship assessments, as well as the executed proc
esses. This role contains the navigation point Analytical Re
ports that includes the report launchpad for the product
safety and stewardship work area with access to all dash
boards and queries.
SAP_EHSM_PRC_AUTO_CHANGE_PROC System user role for the automated change processing. This
role contains the authorization profiles needed to determine
compliance information that is affected by a relevant change
and executing the worklist of pending compliance informa
tion.
SAP_BCV_USER System user role for the display of Business Context Viewer
(BCV). This role contains the authorization profiles and me
nus needed to display a BCV side panel and the BCV config-
uration.
SAP_EHSM_PRC_BI_EXTR System user role for the BI extraction. This role contains the
authorization profiles needed to extract the compliance data
for Product and Stewardship reporting in BI.
SAP_EHSM_PRC_EML_REC System user role for the e-mail recipient. This role contains
the authorization profiles needed to receive and process e-
mails.
The tables below show the security-relevant authorization objects that are used by SAP EHS Management.
tion)
EHHSS_INCIDENT (Incident)
EHHSS_INCIDENT_ACTION
(Incident Action)
EHHSS_RISK_ASSESSMENT
(Risk Assessment)
EHHSS_RAS_ACTION (Risk
Assessment Action)
EHHSS_RISK (Risk)
EHHSS_AGENT (Agent)
EHHSS_JOB (Job)
EHFND_DATA_AMOUNT
(Amount)
EHFND_DATA_SERIES (Data
Series)
EHFND_CHEMICAL (Chemi
cal)
(Location) 02 (Change)
03 (Display)
06 (Delete)
A3 (Change status)
LOCPLANT Plant ID
02 (Active)
03 (Inactive)
04 (Historic)
03 (Display)
06 (Delete)
(Chips for side panel) 02 (Change) (03 and 16 are needed for
displaying the information in
03 (Display)
the side panel)
06 (Delete)
16 (Execute)
CHIP:EHFNDWD
CHIP_LOC_STRUCT
X-SAP-WDY-
CHIP:EHHSSWD
CHIP_ASSWRKF_LOC_LIST
X-SAP-WDY-
CHIP:EHHSSWD
CHIP_INC_LOC_LIST
X-SAP-WDY-
CHIP:EHHSSWD
CHIP_RSK_LOC_LIST
X-SAP-WDY-
CHIP:EHHSSWD
CHIP_RSK_LOC
X-SAP-WDY-CHIP:EHHS
SUCWCHP_ASSWRKF
X-SAP-WDY-CHIP:EHHS
SUCWCHP_INC_LOC
X-SAP-WDY-CHIP:EHHS
SUCWCHP_APPRCHEM
X-SAP-WDY-CHIP:EHFN
DUCWCHP_EASYWORKLIST
X-SAP-WDY-CHIP:EHFN
DUCWCHP_LAUNCHPAD
X-SAP-WDY-
CHIP:FND_UI_CHM_SAFETY
_INSTR_CHIP
X-SAP-WDY-
CHIP:BSSP_SW_FEEDS
X-SAP-WDY-
CHIP:BSSP_SW_ACTIVITIES
X-SAP-WDY-
CHIP:BSSP_NOTES
X-SAP-WDY-CHIP:
EHFND_UI_CHM_OVP_ALOC
_VB_CHIP
X-SAP-WDY-CHIP:
EHFND_UI_CHM_OVP_APPR
_LOC_CHIPX-SAP-WDY-
CHIP:
EHFND_UI_CHM_SAFETY_IN
STR_CHIPX-SAP-WDY-CHIP:
EHHSSUCWCHP_SPLCP
X-SAP-WDY-CHIP: EHHS
SUCWCHP_SPLCP_HEAT
MAP
X-SAP-WDY-CHIP:EHHS
SUCWCHP_SPLPH
06 (Delete)
EL
EHFND_CHM_SIDE_PANEL
EHHSS_HAZ
SUBMGR_HOMEPAGE
EHHSS_HYGIENIST_HOME
PAGE
EHHSS_INC_MANAGER
_HOMEPAGE
EHHSS_HSMGRCORP_HOM
EPAGE
EHHSS_SMPLTECH_HOME
PAGE
1 (User))
2 (View Handle)
4 (All)
5 (Configuration)
03 (Display)
06 (Delete)
LOCPLANT Plant ID
02 (Active)
03 (Inactive)
04 (Historic)
EHFND_WFF (Workflow and EHSM_COMP HSS (Health and Safety) Component of EHS Manage
Processes) ment
(Chemical) 02 (Change)
03 (Display)
06 (Delete)
03 (Display)
06 (Delete)
The following table contains authorization objects that are relevant for SAP EHS Management if you integrate
the system with other SAP components.
P_ORGIN Display authorizations are required for See Customizing for SAP EHS
specific infotypes. Management under Foundation for
(HR: Master data)
EHS Management Integration
Human Resources Integration Check
Authorizations for Person Information
HEA010 - Physician
The authorization objects in the tables below are relevant for managing incident, managing EHS risk, and
managing chemicals for health and safety processes.
General Information :
00 (Void)
01 (New)
02 (In Progress)
03 (Closed)
04 (Re-opened)
PLANT_ID Plant ID
03 (Display)
06 (Delete)
PLANT_ID Plant ID
06 (Delete)
(Unsafe action)
EHHSS_NMG_UNS_COND
(Unsafe condition)
EHHSS_NMG_UNS_EQU
(Unsafe equipment)
EHHSS_NMG_UNS_USE_EQ
U (Unsafe use of equipment)
F (Documented procedure
not followed)
EHHSS_SOG_FAIL_USE_PE
(Failure to use personal pro
tective equipment)
EHHSS_SOG_HORSEPLAY
(Horseplay)
EHHSS_SOG_UNS_LIF_CAR
(Unsafe lifting or carrying)
EHHSS_SOG_UNS_USE_ETV
(Unsafe use of equipment,
tool or vehicle)
EHHSS_SOG_UNS_USE_MA
T (Unsafe use of material)
EHHSS_SOG_USE_DEF_ETV
(Use of defective equipment,
tool or vehicle)
EHHSS_SOG_USE_DEF_MAT
(Use of defective material)
(Deviation)
EHHSS_IGR_NOT_OF_VIOL
(Notice of Violation)
EHHSS_IGR_OCC_INC (In
jury/Illness)
EHHSS_IGR_RELEASE (Re
lease)
03 (Display)
06 (Delete)
Equipment
Production Unit
Site
Work Center
02 (Active)
03 (Inactive)
04 (Historic)
LOCPLANT Plant ID
LOCCOUNTRY Country
LOCREGION Region
EHMF (Foundation)
ACTVT Activity
EHFNDWFT(Workflow tools)
(Agent) 02 (Change)
03 (Display)
06 (Delete)
03 (Display)
06 (Delete)
(Job) 02 (Change)
03 (Display)
06 (Delete)
ment)
EHHSS_RAT_HEA (Health)
EHHSS_RAT_SAF (Safety)
LOCPLANT Plant ID
06 Delete
(Chemical) 02 (Change)
03 (Display)
06 (Delete)
03 (Display)
06 (Delete)
03 (Display)
06 (Delete)
DSC_MAPPING_003
DSC_MAPPING_004
DSC_MAPPING_005
DSC_MAPPING_006
DSC_MAPPING_007
DSC_MAPPING_008
DSC_MAPPING_009
DSC_MAPPING_010
DSC_MAPPING_011
DSC_MAPPING_012
DSC_MAPPING_013
DSC_MAPPING_014
DSC_MAPPING_015
DSC_MAPPING_016
DSC_MAPPING_017
DSC_MAPPING_018
DSC_MAPPING_019
DSC_MAPPING_020
DSC_MAPPING_021
(Vendor) 02 (Change)
03 (Display)
06 (Delete)
03 (Display)
06 (Delete)
23 (Maintain)
LOCPLANT Plant ID
03 (Display)
06 (Delete)
In addition to the authorization objects in the table above, the standard authorization objects under 5.4 are also
relevant for managing chemicals for health and safety processes.
The authorization objects in the table below are relevant for managing emissions.
23 (Maintain)
LOCCOUNTRY Country
LOCREGION Region
76 (Enter)
LOCPLANT Plant ID
LOCCOUNTRY Country
LOCREGION Region
CHIP:EHENV_CHIP_EN
TER_VALUES
X-SAP-WDY-CHIP:EHEN
VUCWCHP_ISSUESWORK
LIST
The authorization objects in the table below are relevant for managing product compliance.
03 (Display)
06 (Delete)
03 (Display)
03 (Display)
06 Delete
CHIP*
X-SAP-WDY-
CHIP:EHPRC_CW_BCV_CHIP
1
EHPRCWDCHIP_SPBN
BCV_QRY_ID Query ID
BCV_QUIKID ID of Overview
The EHFND_WFT authorization object activates buttons in the BI dashboard Process Dashboard that start an
object-based navigation to the workflow tools. The navigation targets are only delivered with the standard role
SAP_EHSM_PROCESS_ADMIN. In consequence, this authorization shall not be assigned to any users apart from
those who are assigned the SAP_EHS_PROCESS_ADMIN role.
The SAP EHS Management roles that are delivered contain specific configuration such as object-based
navigation (OBN). In consequence, customizing these roles has a certain level of complexity. Custom roles can
easily be created as follows without losing their specific configuration:
6.1 Introduction
To increase security and prevent access to the SAP logon ticket and security session cookie(s), we recommend
activating secure session management.
We also highly recommend using SSL to protect the network communications where these security-relevant
cookies are transferred.
To activate session security on the AS ABAP, set the corresponding profile parameters and to activate the
session security for the client(s) using the transaction SICF_SESSIONS.
For more information, a list of the relevant profile parameters, and detailed instructions, see http://
help.sap.com under SAP Business Suite Special Topics HTTP Session Security Protection Activating
HTTP Security Session Management on AS ABAP [SAP Library] in the AS ABAP security documentation.
On the AS Java, set the HTTP Provider properties as described here: http://help.sap.com under Technology
Administration Application management Web Container HTTP Provider Service .
7.1 Introduction
Your network infrastructure is extremely important in protecting your system. Your network needs to support
the communication necessary for your business needs without allowing unauthorized access. A well-defined
network topology can eliminate many security threats based on software flaws (at both the operating system
level and application level) or network attacks such as eavesdropping. If users cannot log on to your application
or database servers at the operating system or database layer, then there is no way for intruders to
compromise the machines and gain access to the backend system’s database or files. Additionally, if users are
not able to connect to the server LAN (local area network), they cannot exploit well-known bugs and security
holes in network services on the server machines.
The network topology for SAP EHS Management is based on the topology used by the SAP NetWeaver
platform. Therefore, the security guidelines and recommendations described in the SAP NetWeaver Security
Guide also apply to SAP EHS Management. Details that specifically apply to SAP EHS Management are
described in the following topics:
For more information, see the following sections in the SAP NetWeaver Security Guide:
The table below shows the communication channels used by SAP EHS Management the protocol used for the
connection and the type of data transferred.
Forms Processing uses HTTPS to Adobe Document XML content of the forms Standard ADS setup required
Adobe Document Service Service
E-mail Inbound Handling SMTP Inbound e-mail with interac Standard setup for inbound
tive form as attachment e-mail
E-mail Outbound Processing Outbound e-mail with inter Standard setup for BCS
(Standard Business Commu active form as attachment
nication Service [BCS] used)
SAP Product Stewardship Web Service Consumption Compliance data from SAP
Network – integration of an based on SOAP Product Stewardship Net
on demand solution for prod work
uct compliance
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP
connections are protected using the Secure Sockets Layer (SSL) protocol. SOAP connections are protected
with Web services security.
Recommendation
1. We recommend using the same protocol – either HTTP or HTTPS – consistently in all communication
channels. This means all the deployed objects have to be configured in exactly the same way regarding
HTTP(S) throughout. This is done especially to avoid problems caused by JavaScript-based
communication between the single layers.
2. We strongly recommend using the protocol HTTPS instead of HTTP on the communication channels to
protect the transferred data against unauthorized access.
3. We strongly recommend activating Secure Network Communication (SNC) for the non-HTTP
communication channels to protect the transferred data against unauthorized access.
For more information, see Transport Layer Security and Web Services Security in the SAP NetWeaver Security
Guide on SAP Help Portal at http://help.sap.com/nw.
The inquiry forms used in incident management can contain sensitive and confidential data. These forms are
sent via e-mail, for example, to an external party (such as a doctor or expert) that is unknown within the system
and has no system account. To protect this data from unauthorized users, encryption becomes necessary. The
data to be encrypted is the e-mail text, the PDF data, or both.
If you do not already use an encryption function, you can configure SAPconnect to send e-mails via a secure e-
mail gateway application that is capable of encrypting outbound and inbound e-mails. For more information,
see SAP Help Portal for SAP NetWeaver under SAP NetWeaver 7.0 (2004s) SAP NetWeaver Library
Administrator’s Guide Technical Operations Manual for SAP NetWeaver Administration of SAP NetWeaver
Systems AS ABAP (Application Server for ABAP) Administration SAPconnect Communication Interface .
Note that in SAPconnect Communication Interface under More Information, you can find general information
about SAPconnect.
SAP EHS Management is designed to run in the LAN network segment by default. Running SAP EHS
Management in multiple network segments is supported with the options provided by SAP NetWeaver AS
ABAP and SAP NetWeaver AS Java.
SAP EHS Management strictly uses the default services and ports of SAP NetWeaver AS ABAP and SAP
NetWeaver AS Java for the communication channels. For more information about the services and ports used
by SAP NetWeaver, see the topics in the SAP Help Portal under Technology → SAP NetWeaver Platform → 7.0
EHP3 in the SAP NetWeaver Security Guide.
SAP EHS Management requires the Adobe Document Service (ADS) and e-mail processing. There are no
further requirements for the default setup.
SAP EHS Management runs on SAP NetWeaver and uses the ports from the AS ABAP or AS Java. For more
information, see SAP Help Portal, the topics under SAP NetWeaver Platform→7.0 EHP3for AS ABAP Ports [SAP
Library] and AS Java Ports [SAP Library] in the corresponding SAP NetWeaver Security Guides. For other
components, for example, SAPinst, SAProuter, or the SAP Web Dispatcher, see also the document TCP/IP
Ports Used by SAP Applications, which is located on SAP Developer Network at http://scn.sap.com/
community/security under Infrastructure Security Network and Communications Security .
The table below shows an overview of the communication destinations used by SAP EHS Management.
Connection Destinations
Destination Delivered Type User, Authorizations Description
For more information about GRC authorizations, see the SAP BusinessObjects Governance, Risk, and
Compliance (GRC) Security Guide.
For detailed information about communication destinations, see Customizing for SAP EHS Management under
Foundation for EHS Management Integration Specify Destinations for Integration .
For communication details, see also the SAP Interactive Forms Solution Security Guides and the standard
setup of SAP Business Workflow.
You should only activate those services that are needed for the applications running in your system.
● For the services that are relevant for the back-end system of Component extension 6.0 for SAP
Environment, Health, and Safety Management, see the SAP Note 2133413 .
● For the services that are relevant for the front-end system of Component extension 6.0 for SAP
Environment, Health, and Safety Management, activate the following UI5 services under /
default_host/sap/bc/ui5_ui5/sap/:
○ ehs_ctl_inspect (Inspect Safety Controls)
○ ehs_safety_info (Retrieve Safety Information)
○ repincidentsoh (Report Incident)
These apps are delivered with SAP Fiori 2.0 for SAP EHS Management.
If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
For more information, see Activating and Deactivating ICF Services in the SAP NetWeaver Library on SAP Help
Portal at http://help.sap.com/nw75.
For more information about ICF security, see the RFC/ICF Security Guide in the SAP NetWeaver Library on SAP
Help Portal at http://help.sap.com/nw75.
SAP EHS Management does not store any data itself beyond the data that is stored by the infrastructure used
on SAP NetWeaver Application Server ABAP and SAP NetWeaver Application Server Java.
The data storage security of SAP NetWeaver and components installed on that base is described in the SAP
NetWeaver 7.0 Security Guide.
All business data in SAP EHS Management is stored in the system database. This business data is protected by
the authorization concept of SAP NetWeaver and SAP EHS Management. In some special cases, business-
relevant data is stored in another location such as a file system. The special cases are listed below:
Whitelists
Depending on the technology you are using, you may encounter security issues when trying to display links
that are not explicitly added to the whitelist. For more information about defining whitelist entries, see the SAP
NetWeaver documentation at help.sap.com → SAP NetWeaver Business Client 7 Security Aspects 7.8
Whitelist .
The XML-Export Interface for non-BW Analytics exports XML data to the application server on the following
logical directory/file name:
XML-Export Interface
Component Logical Directory/File Name
You can set the physical location using transaction FILE. The exported XML file can be downloaded from the
application server. The directories used for the export on the application server and for the file download need
to be protected against unauthorized third-party access, since the export file may contain person-related or
otherwise confidential information.
Knowledge Management
SAP EHS Management uses standard SAP NetWeaver technology for uploading and downloading documents
(such as Web Dynpro ABAP controls or Internet Communication Framework (ICF) services). These documents
are checked into the defined storage system (content repository) using the Knowledge Provider (KPro).
For more information about security with regards to Knowledge Management, see SAP Knowledge
Management Security Guides
10.1 Introduction
Data protection is associated with numerous legal requirements and privacy concerns. In addition to
compliance with general data privacy acts, it is necessary to consider compliance with industry-specific
legislation in different countries. This section describes the specific features and functions that SAP EHS
Management provides to support compliance with the relevant legal requirements and data privacy.
Note
In SAP EHS Management, you can enter any data in free text fields and you can upload attachment
containing personal data. Free text fields are meant for entering comments, recommendation or any other
business-related information. They are not meant to contain any personal data and, therefore, are not
considered in any recording, logging, blocking, or deletion which can be performed for fields containing
personal data.
This section and any other sections in this Security Guide do not give any advice on whether these features and
functions are the best method to support company, industry, regional or country-specific requirements.
Furthermore, this guide does not give any advice or recommendations with regard to additional features that
would be required in a particular environment; decisions related to data protection must be made on a case-by-
case basis and under consideration of the given system landscape and the applicable legal requirements.
Note
In the majority of cases, compliance with data privacy laws is not a product feature. SAP software supports
data privacy by providing security features and specific data-protection-relevant functions such as
functions for the simplified blocking and deletion of personal data. SAP does not provide legal advice in any
form. The definitions and other terms used in this guide are not taken from any given legal source.
10.2 Glossary
Consent The action of the data subject confirming that the usage of
his or her personal data shall be allowed for a given purpose.
A consent functionality allows the storage of a consent re
cord in relation to a specific purpose and shows if a data
subject has granted, withdrawn, or denied consent.
End of purpose (EoP) A method of identifying the point in time for a data set when
the processing of personal data is no longer required for the
primary business purpose. After the EoP has been reached,
the data is blocked and can only be accessed by users with
special authorization (for example, tax auditors).
Residence period The period of time between the end of business and the end
of purpose (EoP) for a data set during which the data re
mains in the database and can be used in case of subse
quent processes related to the original purpose. At the end
of the longest configured residence period, the data is
blocked or deleted. The residence period is part of the over
all retention period.
Retention period The period of time between the end of the last business ac
tivity involving a specific object (for example, a business
partner) and the deletion of the corresponding data, subject
to applicable laws. The retention period is a combination of
the residence period and the blocking period.
Sensitive personal data A category of personal data that usually includes the follow
ing type of information:
Where-used check (WUC) A process designed to ensure data integrity in the case of
potential blocking of business partner data. An application's
where-used check (WUC) determines if there is any depend
ent data for a certain business partner in the database. If de
pendent data exists, this means the data is still required for
business activities. Therefore, the blocking of business part
ners referenced in the data is prevented.
Some basic requirements that support data protection are often referred to as technical and organizational
measures (TOM). The following topics are related to data protection and require appropriate TOMs in the
component extension 6.0 for SAP EHS Management:
● Access control: Authentication features as described in section User Administration and Authentication.
● Authorizations: Authorization concept as described in section Authorizations
● Communication security: as described in section Network and Communication Security
● Availability controls as described in:
○ Section Data Storage Security
○ SAP NetWeaver Database Administration documentation
○ SAP Business Continuity documentation in the SAP NetWeaver Application Help under Function-
Oriented View Solution Life Cycle Management SAP Business Continuity
● Separation by purpose: Is subject to the organizational model implemented and must be applied as part of
the authorization concept.
The extent to which data protection is ensured depends on secure system operation. Network security,
security note implementation, adequate logging of system changes, and appropriate usage of the system
are the basic technical requirements for compliance with data privacy legislation and other legislation.
In the handling personal data, it is necessary to comply with general data protection regulation and industry-
specific legislation in different countries. A typical requirement in certain countries and regulations is that
personal data shall no longer be handled after the specified, explicit, and legitimate purpose of the processing
of personal data has ended. Data that has reached its end of purpose (EoP) must be deleted if no other
retention periods are specified in legislation, such as retention periods for occupational health documents. If
there are legal requirements to retain personal data after the end of purpose, this data needs to be blocked.
Blocked data is retained in the database, but only persons with special authorizations can view it.
To enable complex scenarios, SAP simplifies the existing deletion functionality to cover data objects that are
personal data by default. For this purpose, SAP uses SAP Information Lifecycle Management (ILM) to help you
set up a compliant information lifecycle management process in an efficient and flexible manner. The SAP
Information Lifecycle Management component supports the entire software lifecycle, including the storage,
retention, blocking, and deletion of data.
All applications register either an EoP check in the Customizing settings for the blocking and deletion of
application data, such as the customer and vendor master or the business partner, or a where-used check
(WUC). Component extension for SAP EHS Management delivers end of purpose (EoP) checks and uses SAP
ILM to support the deletion of personal data as described in the following sections.
The following tables list the relevant application objects and the available deletion functionality for Incident
Management, Risk Assessment, and Environment Management.
For more information about application objects and deletion functionality in component extension for SAP EHS
Management, see the product assistance on the SAP Help Portal at http://help.sap.com/ehs-com. Open the
Application Help and go to:
Product Compliance provides the deletion report R_EHPRC_DPP_CLEANUP which verifies if any CDOs that are
marked as end of business are used in any composition or supplier listing. If this is the case, it changes the
lifecycle status to active which prevents the CDO from being archived.
An end of purpose check determines whether data is still relevant for business activities based on the retention
period defined for the data. The retention period of data consists of the following phases:
The following end of purpose checks are available for component extension for SAP EHS Management:
● Incidents
● Tasks in incidents
Health and Safety (EHS_HS) EHHSS_HS_EOP_CHECK_BP The check determines whether the
business partner is used in:
● Risk assessments
● Tasks in risk assessments
● Risks
● Control inspections
● Control evaluations
● Control replacements
Health and Safety (EHS_HS_EXPO EHHSS_EXP_EOP_CHECK_BP The check determines whether the
SURE) business partner is assigned to:
● Job positions
● Location positions
● Samplings as sampled person
● Campaigns
● Supplier parts (CDOs)
● Supplier responses
You register the application for an end of purpose check in Customizing under Cross-Application
Components Data Protection Blocking and Unblocking of Data Business Partner Define and Store
Application Names for EoP Check .
Certain central functions that support data protection compliance are grouped in Customizing for Cross-
Application Components under Data Protection.
You configure the settings related to the blocking and deletion of business partner master data in Customizing
under Cross-Application Components Data Protection Blocking and Unblocking of Data Business
Partner .
Data subjects have the right to get information regarding their personal data undergoing processing, including
the reason (purpose) for processing.
The SAP NetWeaver component Information Retrieval Framework (IRF) can be used to carry out a cross-
application search for personal data of a specified data subject. The data is retrieved from the system and
displayed in a structured, easy-to-read list, subdivided according to the purposes for which the data was
initially collected and processed.
Note
To be able to use the IRF, you must set up your own data model which is the basis for the retrieval process.
Once your data model is set up, you can start the actual data collection process.
For more information about the Information Retrieval Framework, see the SAP NetWeaver documentation on
the SAP Help Portal at http://help.sap.com/nw74. In the Application Help section, open the SAP NetWeaver
Library: Function-Oriented View documentation and go to Solution Lifecycle Management Information
Retrieval Framework .
Legislation requires logging of read and write access of person-related sensitive data.
You can use the Read Access Logging (RAL) component to monitor, to log, and to update read access to
person-related sensitive data, and to provide information such as which business users accessed person-
related sensitive data (for example, fields related to bank account data), and when they did so.
In RAL, you can configure which person-related sensitive data you want to log and how to log it.
SAP delivers sample configurations for applications. You can display the configurations in the system by
performing the following steps:
1. In the Read Access Logging Manager (transaction SRALMANAGER), on the Administration tab page,
choose Configuration.
2. Choose the desired channel, for example, WebDynpro.
3. Choose Search.
○ The system displays the available configurations for the selected channel.
4. Choose Display Configuration for detailed information on the configuration.
Note
For a list of the delivered log domains, see the product assistance at SAP Help Portal under http://
help.sap.com/erp. Open the Application Help and go to SAP ERP Cross-Application Functions Cross-
Application Components Data Protection Security Safeguards Regarding Data Protection Read Access
Logging (RAL) .
Before you can use the delivered RAL configurations, the following prerequisites are met:
● You have checked the required particular kernel and SAP GUI version that are described in 1969086 .
● The RAL configurations have been activated.
● You have enabled RAL in each system client.
More Information
For more information, see Read Access Logging (RAL) in the documentation for SAP NetWeaver on SAP Help
Portal at http://help.sap.com/netweaver. Choose an SAP NetWeaver platform and open the function-oriented
view of the application help. You can find the documentation about read access logging under Security
System Security System Security for SAP NetWeaver Application Server ABAP Only Read Access Logging .
For more information on delivered log conditions in component extension 6.0 of SAP EHS Management, see the
following chapter of this Security Guide.
Incident Management logs data of illnesses or injuries that are maintained in the Edit Incident screen (web
dynpro application EHHSS_INC_REC_OIF_V3). Since this information is potentially sensitive and access to this
information is in some cases legally regulated, you can use RAL to log the date when the data was accessed
and by whom.
Involved Person - Basic Information <concatenate name> Logs basic information of the person
who is involved in the incident,
● Injured Person Name
● Phone Number
● Email
Role(s)
Incident Type
Privacy Case
Injured on Site
Injured on Duty
Additional Criteria
Fatality
Location of Death
Cause of Death
Involved Person - Injury-Illness Informa <concatenate name> Logs information on the injuries or the
tion illness of the person who is involved in
● Injured Person Name the incident.
● Phone Number
● Email
Classification
Injury/Illness Type
Injury/Illness Description
Body Part
Body Side
Involved Person - Treatment Informa <concatenate name> Logs information on the treatment of
tion the person who is involved in the inci
● Injured Person Name dent.
● Phone Number
● Email
First Physician
Emergency Room
Inpatient Overnight
Unconsciousness
Immediate Resuscitation
Comment
To First Aid
To Further Treatment
Involved Person - Reports and <concatenate name> Logs the files of reports and documents
that are assigned to the involved per
Documents ● Injured Person Name son.
● Phone Number
● Email
Incident - Reports and Documents File Name (of report forms) Logs the files of reports and documents
that are assigned to the incident.
Reference (Report forms of person ref
erences)
Personal data may be subject to changes. If these changes are logged, you can check which employee made
which change and when. Component extension for SAP EHS Management generates change documents for
changes in specific fields of the relevant objects that contain personal data.
Under Display Change Document Objects (transaction SCDO), you can find the delivered change document
objects. (EHS change document objects start with EH*.) Under Maintain Logging Setting (transaction
S_AUT01), you can specify the fields to be logged.
More Information
● For more information about the use of change documents in component extension for SAP EHS
Management, see the Product Assistance documentation on the SAP Help Portal at http://help.sap.com/
ehs-comp. Select your release, open the Product Assistance, and go to Foundation for EHS Management
(EHS-MGM-FND) Technical Solution Information Creation of Change Documents .
● For more technical information about logging changes, see the SAP NetWeaver documentation on the SAP
Help Portal at http://help.sap.com/nw. Select your release, and in the Application Help section, open the
SAP NetWeaver Library: Function-Oriented View. Go to Other Services Audit Trail (BC-SRV-ASF-AT)
Changing Table and Data Element Logging .
● For more information about change documents, see the SAP NetWeaver documentation on the SAP Help
Portal at http://help.sap.com/nw. Select your release, and in the Security section, open the SAP NetWeaver
Security Guide. Go to Security Guides for SAP NetWeaver Functional Units Security Guides for the
Application Server Security Guides for AS ABAP SAP NetWeaver Application Server ABAP Security
Guide Auditing and Logging Logging of Specific Activities Logging Using Change Documents .
For security information about Adobe Flash Player used by the BI dashboards, refer to the SAP NetWeaver
Business Warehouse Security Guide.
For security information about the Embedded Search used by SAP EHS Management, refer to the SAP
NetWeaver Enterprise Search 7.2 Security Guide.
SAP EHS Management can be integrated with HR Time Management in Customizing. If the personnel time
management (PT) integration is activated, time data (including absences) from HR is displayed in the incident.
An additional option is available to directly create HR Absences from the incident. For all actions (such as read
or create), HR authorizations are checked.
For more information about SAP NetWeaver Business Client (SAP NWBC) with PFCG connection, see the SAP
NetWeaver documentation on SAP Help Portal at http://help.sap.com/nw74. Go to section Application Help and
open the documentation for UI Technologies in SAP NetWeaver. Go to SAP NetWeaver Business Client SAP
NetWeaver Business Client Administration Guide Security Aspects .
SAP EHS Management uses standard SAP NetWeaver technology for uploading and downloading documents
(such as Web Dynpro ABAP controls or Internet Communication Framework (ICF) services). These documents
are checked into the defined storage system (content repository) using the Knowledge Provider (KPro).
Using the standard NetWeaver technology, you can use the standard NetWeaver virus scan interface (VSI) to
check documents (including attachments) for viruses. To do this, you must have installed and configured a
virus scanner. It is highly recommended that you integrate a virus scanner. For more information, see http://
help.sap.com/saphelp_nw74/helpdata
The Interactive forms of SAP EHS Management can contain Java Script. Therefore, Java Script must be
enabled in Adobe Acrobat Reader.
In addition, e-mails with PDF attachments that contain Java Script must not be filtered out in the e-mail
inbound and outbound process.
You use the mobile service for SAP Fiori to implement the app Report Incident. For more information on the
security settings of the mobile service for SAP Fiori, see the SAP Help Portal at http://help.sap.com. There,
search for SAP Cloud Platform, mobile service for SAP Fiori User Guide.
SAP EHS Management uses all logging and tracing functionality provided by the SAP NetWeaver AS ABAP and
AS Java. Refer to the NetWeaver Security Audit and Logging documentation at http://help.sap.com/
saphelp_nw74/helpdata.
The inbound e-mail process logs the data in the application log. For more information about the object and sub-
object, see Customizing for SAP EHS Management under Incident Management Print Forms and Interactive
Forms Define Inbound Processing for E-Mails .
15.1 Introduction
The following services are available from Active Global Support to assist you in maintaining security in your
SAP systems on an ongoing basis.
This service regularly monitors the Security chapter in the EarlyWatch Alert report of your system. It tells you:
● Whether SAP Security Notes have been identified as missing on your system.
In this case, analyze and implement the identified SAP Notes if possible. If you cannot implement the SAP
Notes, the report should be able to help you decide on how to handle the individual cases.
● Whether an accumulation of critical basis authorizations has been identified.
In this case, verify whether the accumulation of critical basis authorizations is okay for your system. If not,
correct the situation. If you consider the situation okay, you should still check for any significant changes
compared to former EWA reports.
● Whether standard users with default passwords have been identified on your system.
In this case, change the corresponding passwords to non-default values.
The Security Optimization Service can be used for a more thorough security analysis of your system, including:
This service is available as a self-service within SAP Solution Manager, as a remote service, or as an on-site
service. We recommend you use it regularly (for example, once a year) and in particular after significant system
changes or in preparation for a system audit.
The Security Configuration Validation can be used to continuously monitor a system landscape for compliance
with predefined settings, for example, from your company-specific SAP Security Policy. This primarily covers
configuration parameters, but it also covers critical security properties like the existence of a non-trivial
Gateway configuration or making sure standard users do not have default passwords.
With the E2E Solution Operations Standard Security service, a best practice recommendation is available on
how to operate SAP systems and landscapes in a secure manner. It guides you through the most important
security operation areas and links to detailed security information from SAP’s knowledge base wherever
appropriate.
Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:
● Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your
agreements with SAP) to this:
● The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
● SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.
● Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering a SAP-hosted Web site. By using such
links, you agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this
information.
Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax
and phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of
example code unless damages have been caused by SAP's gross negligence or willful misconduct.
Gender-Related Language
We try not to use gender-specific word forms and formulations. As appropriate for context and readability, SAP may use masculine word forms to refer to all genders.
SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.