Security Guide EN
Security Guide EN
Security Guide
SAP Engineering Control Center 5.2
DOCUMENT HISTORY
Note
Before you start the implementation, make sure you have the latest version of this document.
This guide is valid as of SAP Engineering Control Center 5.2.6.0
The latest version is available on SAP Service Marketplace at
https://help.sap.com/viewer/p/SAP_ENGINEERING_CONTROL_CENTER
2
TABLE OF CONTENTS
1 INTRODUCTION ..................................................................................................................................... 4
1.1 TARGET GROUP .................................................................................................................................... 4
1.2 WHY IS SECURITY NECESSARY? ....................................................................................................... 4
2 BEFORE YOU START ............................................................................................................................ 5
3 TECHNICAL SYSTEM LANDSCAPE .................................................................................................... 7
3.1 USAGE .................................................................................................................................................... 7
4 SECURITY ASPECTS FOR DATA, IN THE FLOW OF DATA AND IN PROCESSES ......................... 8
5 JAVA IMPLEMENTATIONS IN SAP ECTR ......................................................................................... 12
6 DATA PROTECTION ............................................................................................................................ 13
6.1 HANDLING OF PERSONAL DATA....................................................................................................... 13
6.2 BLOCKING OF PERSONAL DATA....................................................................................................... 13
6.3 DELETING OF PERSONAL DATA ....................................................................................................... 13
Security Guide 3
1 INTRODUCTION
This guide does not replace the Administrator's or Operations Guides that are available for production
operation.
The Security Guide provides an overview of security-relevant information for SAP ECTR.
Security Guide 4
2 BEFORE YOU START
SAP ECTR is based on SAP ERP 6.0 EHP5. Hence the corresponding security guides also apply to SAP
ECTR.
A complete list of available SAP Security Guides is available on SAP Service Marketplace at
http://service.sap.com/securityguide.
The following table shows the most important SAP notes regarding the security of SAP ECTR.
Title SAP Note
CDESK_SRV_GET_FILE_UPLOAD_URL: 1957344
Check can be Deactivated
Security Guide 5
Title SAP Note
A list of additional security relevant SAP HotNews and SAP Notes is also available on SAP Service
Marketplace at https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html.
Security Guide 6
3 TECHNICAL SYSTEM LANDSCAPE
3.1 Usage
For more information on the technical system landscape refer to the sources listed in the following table.
Topic Guide/tool Quick Link to the SAP Help Portal or SDN
Security Guide 7
4 SECURITY ASPECTS FOR DATA, IN THE FLOW OF DATA AND IN PROCESSES
The following figure provides an overview of the following processes for SAP ECTR:
Save
Take into editing mode
Password processing
Save
Security Guide 8
Step Description Security Measure
Security Guide 9
Step Description Security Measure
Password processing
Security Guide 10
Step Description Security Measure
1 The user logs on with The password is not displayed when entered
the user data.
Security Guide 11
5 JAVA IMPLEMENTATIONS IN SAP ECTR
Several Java implementations exist. SAP ECTR is based on SAP JVM and SAP JVM is in turn based on
Java SE 8. Java implementations other than those provided by SAP are not tested and therefore not
supported.
SAP pays attention to security in its Java implementations. No browser add-ins are used. Only various .dll
and .exe files are saved on the hard disk. An installation does not take place. The mentioned files are only
called with user rights at runtime.
Security Guide 12
6 DATA PROTECTION
Data protection is associated with numerous legal requirements and data protection concerns. In addition to
compliance with the general data protection laws, compliance with industry-specific legislation in various
countries must be observed. This Guide describes how you can support compliance with legal regulations
and data protection.
This section and all other sections in this Guide do not indicate whether these features and functions are the
best way to support business, industry, regional, or country-specific requirements. In addition, this Guide
does not provide advice or recommendations on additional features that would be required in an
environment; data protection decisions must be made on a case-by-case basis and in compliance with the
given system landscape and applicable regulatory requirements.
PLM_DATAROOT %PLM_INSTDIR%\customize\config\plm_initialize.bat
PLM_TEMPBASE %PLM_INSTDIR%\customize\config\plm_initialize.bat
PLM_COMMONDIR %PLM_INSTDIR%\customize\config\plm_setenv.bat
PLM_LOGDIR %TEMP%\SAP\ECTR\%PLM_INSTID%\logs
Data can also be stored in the following files, depending on the customizing:
%PLM_INSTDIR%\customize\config\ attributes-from-sap.xml
%PLM_INSTDIR%\customize\config\ attributes-to.sap.xml
In addition, personal data may be stored in the temporary Windows folder. To find them, please enter %TEMP%
in your Windows Explorer.
Deleting this data has no effect on SAP ECTR operation. However, if the log files are deleted, SAP SE can
no longer track errors.
Security Guide 13
www.sap.com/contactsap
The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors.
National product specifications may vary.
These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated companies shall not be liable
for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty statements
accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.
In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality
mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are
all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation
to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are
cautioned not to place undue reliance on these forward-looking statements, and they should not be relied upon in making purchasing decisions.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other
countries. All other product and service names mentioned are the trademarks of their respective companies. See www.sap.com/copyright for additional trademark information and notices.