Importance of user master record in SAP


Task 1.1 – Importance of user master record in SAP


User master record in SAP is used for assigned role to the user where user logging into the system based on their credential and the check which roles is assigned to him. But in case of user master record it is prerequisite for the user to logging into the system for checking their role. User master record is not fixed application rather it is customized based on client requirement like if user using central administration then we should maintain central system for maintain user master record. In SAP system, user master record is to be used for authorization of right and roles of individual. User master record is to be used for following kinds of authorization in user master record –
·         It is used for assign particular project to the user by creating user master record which is equipped with particular assignment to the user and their right for complete the assignment.
·         Authorisation to the user for protects their role which is assigned to him.
·         Also used for restrict the right of user in authorization.
·         It is also used for the security of the authorization. For example in big organisation there is lot of people worked with and each person have some different authorization and right to be provided based on their job role hence, in this situation it is necessary to assign the role in the manner which is working with proper safety and security of the organisation. In case of SAP, user manual record create generic ID and password which secure all the authorised ID based on their right at initial set up of SAP.
·         Right of user can be checked by executive from RSUSR003 report generated in SAP.
·         Security and internal control in SAP is also main factor, as SAP is fully integrated business system therefore there is also risk of internal fraud, if assignment of authority and right is not provided with due care hence, in SAP there is one system i.e. SAP GRC Risk analysis and remediation should be installed in risk to manage risk of segregation of duties.

User master record help to maintain users data in SAP database with their right, there authorisation and assignment assigned to the user. As we know for big organisation safety and security is one of the big issues, as big organisation operates their business in cross border with internal as well as external entity and user of organisation include eternal user like suppliers, customers and other personal who is out from the company server hence single loop  wholes in security system lead to big trouble for organisation therefore to reduce threats of theft of information and use of unauthorised right by any other user within the system company used master record which maintained user record by their component. User master record also helps to any updates about their assigned task by message to the group of user and individual user by secured manner. User master record is accessed by transaction SU01.

 

Task 1.2.1 – Special about default users


As we know that SAP in working creates some default account automatically, this cannot be deleted from the system. Default accounts include SAP*, DDIC, SAPCPIC and EARLYWATCH of which SAP* is super account of SAP R3. Client of SAP* is 000, 001 and 066 from released of 3.0D for all new client of SAP R3. SAP*b is created in all client of SAP automatically. As being super user, SAP* is used for administrative work of SAP. It is used to provide right to access to the SAP by online way. User from online mode or from remote location login to the SAP by SAP* hence there is more vulnerability about the default password of SAP*. Remote user by login into SAP from SAP*, can modify or reads the required information needed. By using cross client or modification of table we may change the data structure from remote location. If there is SAP* user id is missing then user may login by Su01. SAP is super account of the system hence being a super account it contains the information about the other account of SAP as well as user master record. SAP* cannot be deleted from the system but by creating another super user it can be deactivated for safety from vulnerability of system.

TASK1.2.2 – Suggested measure to secure SAP R3 from misuse

SAP* account is default account of SAP, which is super account for SAP R3. With the creation of default account there is also default password of the account is generated. Default password of SAP* is 06071992 PASS. Account created by default way includes SAP* cannot be from the system. As we know it is well known by all user about the default account of SAP* hence for safety of system we should take care of safety measure. For safety measure we should take care of some extra efforts i.e.
1.      Create new upper account with some difficult password and default super account SAP* should be deactivated. And manually created super account should be used in activate position. For activation of super account we should use the link oflogin/no_automatic_user_sap* or login/no_automatic_user_sapstar”.
2.      As some time executive thought SAP* account is deactivated, hence there is not threats of insecurity but this view will be very risky and considered as likelihood to threats. Other side change of password is also difficult for us. Hence to change the password we need to stop SAP system for time being. Hence in order to reduce threats of unauthorised use of SAP*, we should change the password even though it is deactivated. Also we should create complex password for manually created super user account. One more safety measure includes password should not be written anywhere. So for default account of SAP* we should take some extra efforts for safety.


2.1.1 –Ethical Concerns of the case: In the case it is given that Helen is working as consultant about the Database management system. Mean while she is going to develop DBMS for one organisation, she believes that database should be sufficiently secured, whereas CEO of organisation believes in lesser security for it. Hence an ethical concern is about the point of IT personnel in this situation, “whether Helen should build the system as requested by CEO or refuses to build system?” In this kind of situation IT personnel should firstly guide to client about the threats and vulnerability from lower security in to database, how database is important for the organisation, why organisation should more care about the database and if DBMS is not properly secured then what kind of disaster may occurred with organisation. Even after all the understanding about the DBMS, CEO requested to build lesser security system then IT professional should have due care about the system development. As per information system security association (ISSA), IT personnel discharge their responsibility with honesty and diligence and also follow all applicable law about information system security. Therefore for following all IT security measure in the system, personnel should refuse to take the contract if entity have necessary to maintain the database in secured manner but if database security for the entity is not much important then IT professional may go ahead to build it. Here Helen believes that information is strongly sensitive hence proper security measure is necessary for the entity. In this situation Helen should refuse to build DBMS at lesser security.

2.1.2– In consultancy job of Helen, she have ethical dilemma about the security importance for the organisation. As per code of ethics issued by Australian computer society-
·         Every IT personnel should loyally serve to the society and community as whole.
·         It professional must serve the interest of society above the interest of individuals.
·         They must preserve the security of IT service.
·         They also advice to the client about the risk if any in security.
·         They should also maintain the privacy and confidentiality wherever necessary.
So as IT professional Helen should advice to the client. In the given scenario Helen advice to the CEO of company but they thought lesser security can handle it. When we look at the information, it is related to the medical and insurance record hence it is more important database for the organisation. Sensitivity of data is also very high. In this situation Helen should have to maintain the privacy as well, so it is advisable for Helen to refuse for building of system at lower security measure as it violation of code of ethics.

Task 2.2

2.2.1     – Ethical Concerns in the case: In the given case Fred working in state department of alcoholism and drug abuse, where agency conduct the programme for the alcohol addicted people to nullify their problem. In order to conduct the program, entity should have to maintain database about the client which includes name of client, their address, length of treatment provided to client, number of client return after treatment and  criminal record of the client. To manage the client record, entity gives access to Fred at agency’s computer. But after downloading all the data in the computer, Helen took that computer at home by CD. And after completion of work Helen leaves CD at home when he is going to office. Hence key ethical concerns about the case is –
·         Whether access provided to Fred is valid as per ACS professional ethics?
·         Whether agency should permit to Fred for took the data base at home for work?
·         Whether Fred has to take the entire data base at home?
·         Whether agency has maintained the proper care for safety of information?
In the given case information is about the medical treatment of client, their criminal record, treatment used on the client. And as per IT professional ethics medical treatment is one of the confidential information of the organisation. In order to maintain the medical information, agency should have to take extra care for security of information.

2.2.2. – In the given case organisation providing service which is covered in the medical treatment. As per the professional ethics of information technology, organisation should take extra security measure for the information related to Medical, Insurance and other information in which privacy and confidentiality needed. Professional ethics provided following guideline for maintain sensitive information in secured manner –

·         Information which is high importance for the organisation and which is considered as private should not share with any person.
·         Organisation should not permit any person to take information at home.
·         Accessing to private information should be provided to authorised person only.
·         All the secured information not shares with the non IT professional.
In the given case company provide accessing right to Fred even Fred is not authorised for accessing information. All the information of client file contains the information which is related to client’s privacy. And Responsibility to maintain private information of client in secured manner is with the entity. And for that organisation should use extra care. But in given case entity does not maintain any security measure. Even Fred take the entire database at home without information to the agency but no one in the agency is aware about it. And after completion of work Fred forget to bring information at office. Hence looking to the all scenario, it is very clear that organisation does not maintain information in secure manner. And organisation violate the professional ethics for IT security.

Task 3 – Top ten OWASP vulnerabilities and consequences for the organisation-

Top ten vulnerabilities of OWASP include following vulnerabilities –
-          Injection: One of the first ranked vulnerability of OWASP is injection which is vulnerable from poor error handling capacity of system. It is ranked as A1. For safety from zero day vulnerability organisation should separate un-trusted data from command and queries.
-          Authentication broken and management of session : This kind of vulnerabilities arise due to lower protection to the credential of the system, explosion of ID and password over URL and non availability of auto login facility in the system. For safety from this kind of vulnerability organisation should use strong efforts to avoid XSS flow and developers should have available single set of authentication control.
-          Cross site Scripting: This kind of vulnerability arise due to improper validation in the input and output page. In order reduce this kind of vulnerability organisation should use white list or positive validation into system.
-          Insecure reference directly: This kind of vulnerability arise due to direct access to the system. In order to reduce this kind of vulnerability, organisation should prevent insecure direct access in system.
-          Security mis-configuration: These kinds of vulnerability in the system arise due to improper security in system. Hence organisation should use secure configuration in servers. Security configuration should be regularly checked by the developers. In order to proper secured system it should be maintained if any defaults found.
-          Sensitive Data Exposure: Some of websites not able to protect sensitive information like credit card credential, password credential etc. Therefore sensitive information may be stealing by unauthorised person. In order to reduce this kind of vulnerability organisation should use encryption in transit of information, also used precaution while using this kind of information on browser.
-          Missing functional level access control: Almost all the websites verify the functional level access security the visibility of functional but actuality it should be verified at the time of access. Hence to reduce this kind of vulnerability, organisation should use extra care for the verification of access the information.
-          Cross site request forgery: In this kind of vulnerability attackers send HTTP request to browser for steal authentication problem. In this attack browser send the sensitive information to attackers. Hence to reduce this kind of vulnerability organisation should use token system for each HTTP request. And such token should be unique each time.
-          Using Component with known vulnerability:  Operating system with known vulnerability is also one of the risky things so organisation should organisation should fix the problem in next version of system
-          Invalidated redirects and forwards: Some web owners redirect to other pages without knowing security of that pages. Hence in order to reduce this kind of vulnerabilities organisation entity should check the security available on page before redirecting to other page.  

Comments

Popular posts from this blog

Critical Analysis of the System Design Process System Design Process related to Project- “A Mine Facility”

Quality Improvement Project

Quality Improvment by Using Six Sigma