{"id":60326,"date":"2019-09-12T08:00:14","date_gmt":"2019-09-12T06:00:14","guid":{"rendered":"http:\/\/e3mag.com\/?p=60326"},"modified":"2020-02-08T16:25:32","modified_gmt":"2020-02-08T15:25:32","slug":"it-security-please-no-lametta-more","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/it-security-bitte-kein-lametta-mehr\/","title":{"rendered":"IT security - no more tinsel please"},"content":{"rendered":"<p>I'm a big fan of the Pessimists Archive podcast. Jason Feifer gives a stirring and not at all dusty account of the history of resistance to change.<\/p>\n<p>Things that today are classified as rather conservative and established were revolutionary and also often \"of the devil\" when they were introduced. For example, the waltz was as scandalous in the early 1800s as rock 'n' roll was later. People even fought duels over the honorability of the waltz. Can't be?<\/p><div id=\"great-897484999\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>I can tell whether something is taken seriously by whether someone is willing to pay money for it. And security for SAP is now taken seriously. Today, I see that companies are willing to change something.<\/p>\n<p>However, only enough to change as little as possible of the established system. New SAP authorizations are then requested, which should be conflict-free and fit into the existing concept. But the concept for operations is usually to do mass work manually with human power.<\/p>\n<p>Dull, error-prone, boring and completely replaceable. Administrators in dozens of companies I've personally met are still working on IT security as they did before the iPhone was introduced. That was 2007.<\/p>\n<p>While many companies are now working on how employees and customers can access the SAP system via pretty new Fiori interfaces, the mood in the engine room is gloomy and sinister. There is no orchestration or control, just a blunt shoveling of coal into the fire.<\/p>\n<p>Keeping hundreds of roles in sync on front-end and back-end servers without investing in role and identity management concepts and tools is - outdated concept.<\/p>\n<p>Operating an SAP system without having established security monitoring is - outdated concept. Not investing in the systematic training of employees with regard to SAP security is - you guessed it - an outdated concept.<\/p>\n<p>And new employees are increasingly unwilling to accept this. Why should they? They have a choice - there are enough employers who are urgently looking for skilled and motivated personnel.<\/p>\n<p>Why should a young employee then get involved in dull jobs with old concepts? Whereas at other companies he can develop concepts and configure tools that do the repetitive work for him?<\/p>\n<p>The \"get in IT Study 2017-2018\" states:<\/p>\n<p><em>\"IT talent wants to innovate and become experts in their field.\"<\/em><\/p>\n<p>So we have the crazy situation here that the budget is there, but success will not materialize. Because a sustainable security concept still has to be operated by expert personnel. And they're not in the mood for \"there used to be more tinsel\".<\/p>\n<p>It's not that anyone has done anything wrong. But if SAP's existing customers want to continue to exist securely in the current reality and not end up in the headlines as a data slinger or in bankruptcy when it comes to company secrets such as recipes, then employees must also be recruited to help. And companies must also accept that there is more to change than just \"damp wiping through the SAP system\" once.<\/p>\n<p>In the history of all innovations, there have always been one or more people who have not let themselves be dissuaded from the idea of the new. Even if everyone grumbled, grumbled or grumbled. There must be this one person in every company. The one who patiently explains the advantages of the new without snubbing those who still strive for the old.<\/p>\n<p>At the end of the day, it's like waltzing: The young won't be dissuaded because they understand the new world and take IT security as seriously as it needs to be today.<\/p>\n<p>Not by manually tinkering with roles or creating users. Instead, a concept is developed and established tools are used. So that you also have the time to find out about new security risks and can plan countermeasures.<\/p>","protected":false},"excerpt":{"rendered":"<p>Where the topic of IT security gets serious budget, it could become harder to attract qualified employees. IT talent wants employers that focus on automation rather than manual mass changes.<\/p>","protected":false},"author":1767,"featured_media":15608,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[21,7,31140],"tags":[1507,1790,1516],"coauthors":[31339],"class_list":["post-60326","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-meinung","category-mag-1907","tag-fiori","tag-it-security","tag-security","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",400,172,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-768x331.jpg",768,331,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-480x207.jpg",480,207,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-640x276.jpg",640,276,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-720x310.jpg",720,310,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Wo das Thema IT-Security ernsthaft Budget bekommt, k\u00f6nnte es schwerer werden, qualifizierte Mitarbeiter zu gewinnen. IT-Talente wollen Arbeitgeber, die auf Automatisierung setzen und nicht auf manuelle Massen\u00e4nderungen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-1907\/\" rel=\"category tag\">MAG 19-07<\/a>","author_info_v2":{"name":"Tobias Harmes, mindsquare GmbH","url":"https:\/\/e3mag.com\/en\/author\/tobias-harmes\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/60326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/1767"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=60326"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/60326\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/15608"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=60326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=60326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=60326"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=60326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}