The document describes security issues that can occur in an SAP system. It shows a flowchart starting with fetching SAP logs and analyzing them to detect unauthorized access of critical roles, downloading of sensitive employee data, multiple users sharing accounts, and failed logins from one workstation. The flowchart ends with detailed analysis of security issues found in the logs.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
505 views1 page
SIEM Process Flow
The document describes security issues that can occur in an SAP system. It shows a flowchart starting with fetching SAP logs and analyzing them to detect unauthorized access of critical roles, downloading of sensitive employee data, multiple users sharing accounts, and failed logins from one workstation. The flowchart ends with detailed analysis of security issues found in the logs.