0% found this document useful (0 votes)
505 views1 page

SIEM Process Flow

The document describes security issues that can occur in an SAP system. It shows a flowchart starting with fetching SAP logs and analyzing them to detect unauthorized access of critical roles, downloading of sensitive employee data, multiple users sharing accounts, and failed logins from one workstation. The flowchart ends with detailed analysis of security issues found in the logs.

Uploaded by

hallarmemon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
505 views1 page

SIEM Process Flow

The document describes security issues that can occur in an SAP system. It shows a flowchart starting with fetching SAP logs and analyzing them to detect unauthorized access of critical roles, downloading of sensitive employee data, multiple users sharing accounts, and failed logins from one workstation. The flowchart ends with detailed analysis of security issues found in the logs.

Uploaded by

hallarmemon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Visual Paradigm Online Free Edition

SAP debugging is used for bypassing


transaction authorizations

An unauthorized user assigned a critical


SAP role to another user

Fetch SAP Logs Generate Alerts


A user downloaded employee master data to its PC
Start
Analyze Logs

Users are sharing their SAP accounts

Detail Analysis

Failed logons of multiple SAP users from the same workstation

End

Visual Paradigm Online Free Edition

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy