{"id":25897,"date":"2017-07-25T14:53:33","date_gmt":"2017-07-25T12:53:33","guid":{"rendered":"http:\/\/e3mag.com\/?p=25897"},"modified":"2024-01-19T14:53:22","modified_gmt":"2024-01-19T13:53:22","slug":"risiko-sap-exporte","status":"publish","type":"post","link":"https:\/\/e3mag.com\/de\/risiko-sap-exporte\/","title":{"rendered":"Risiko SAP-Exporte"},"content":{"rendered":"<p>W\u00e4hrend es bislang noch ausreichte, den Zugriff auf die einzelnen Datensilos zu kontrollieren, gilt es nun die Daten selbst \u00fcber alle Prozessschritte und Anwendungen hinweg abzusichern.<\/p>\n<p>Medienbr\u00fcche erschweren jedoch die Umsetzung solcher \u00fcbergreifenden Sicherheitskonzepte. Zwischen dem SAP-Berechtigungskonzept, das bekanntlich an den Grenzen des SAP-Systems endet, und der Microsoft-Sicherheitsl\u00f6sung Azure Information Protection (AIP, vormals RMS) besteht standardm\u00e4\u00dfig keine Integration.<\/p><div class=\"great-fullsize-content-de\" style=\"float: left;\" id=\"great-3437083629\"><div id=\"great-2479091523\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div><\/div>\n<p>Alleine durch einen einfachen Copy-Paste-Vorgang oder das Weiterleiten eines Excel-Exports per E-Mail verwandeln sich strukturierte SAP-Daten schnell und unbemerkt zu unstrukturierten Microsoft-Office-Dokumenten ohne jegliche Zugriffskontrolle.<\/p>\n<p>Secude Halocore kontrolliert alle SAP-Exportfunktionen und verbindet als weltweit einzige IT-Sicherheitsl\u00f6sung die Sicherheitskonzepte von SAP mit denen von Microsoft.<\/p>\n<p>\u00dcber die Halocore-Kontextklassifikation wird der Schutzbedarf der SAP-Daten automatisch ermittelt und entsprechend auf die Microsoft-Office-Dateien angewendet.<\/p>\n<p>Dadurch verlassen nur autorisierte Exporte, die mit dem passenden AIP-Template verschl\u00fcsselt wurden, das SAP-System. Gleichzeitig wird sichergestellt, dass nur berechtigte Anwender die M\u00f6glichkeit erhalten, die entsprechenden Dokumente zu \u00f6ffnen und weiterzuverarbeiten.<\/p>\n<p>Moderne Technologien wie Data Stream Intelligence sorgen zudem f\u00fcr eine l\u00fcckenlose \u00dcberwachung des Datentransfers zwischen SAP- und Non-SAP-Satellitensystemen \u2013 ein weiterer wichtiger Baustein bei der Absicherung sensibler SAP-Daten.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mit der zunehmenden Vernetzung von Ger\u00e4ten und Applikationen haben sich auch die Anforderungen an Informationssicherheit und Datenschutz ge\u00e4ndert. <\/p>\n","protected":false},"author":38,"featured_media":25898,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2,15175],"tags":[5015,1993],"coauthors":[19920],"class_list":["post-25897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","category-mag-1707","tag-azure","tag-datenschutz","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",400,193,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-768x370.jpg",768,370,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-100x48.jpg",100,48,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-480x231.jpg",480,231,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-640x308.jpg",640,308,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-720x347.jpg",720,347,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-960x463.jpg",960,463,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",18,9,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",600,289,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",600,289,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Mit der zunehmenden Vernetzung von Ger\u00e4ten und Applikationen haben sich auch die Anforderungen an Informationssicherheit und Datenschutz ge\u00e4ndert. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/de\/category\/szene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/de\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/de\/category\/mag-1707\/\" rel=\"category tag\">MAG 17-07<\/a>","author_info_v2":{"name":"E-3 Magazin","url":"https:\/\/e3mag.com\/de\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/25897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/comments?post=25897"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/25897\/revisions"}],"predecessor-version":[{"id":138293,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/25897\/revisions\/138293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media\/25898"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media?parent=25897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/categories?post=25897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/tags?post=25897"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/coauthors?post=25897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}