{"id":143284,"date":"2024-07-04T00:37:20","date_gmt":"2024-07-03T22:37:20","guid":{"rendered":"http:\/\/e3mag.com\/?p=143284"},"modified":"2025-07-16T12:45:17","modified_gmt":"2025-07-16T10:45:17","slug":"principios-para-la-seguridad-de-sap","status":"publish","type":"post","link":"https:\/\/e3mag.com\/es\/principios-para-la-seguridad-de-sap\/","title":{"rendered":"Principios de seguridad de SAP"},"content":{"rendered":"<p>\u00bfQu\u00e9 pueden y deben hacer los clientes actuales de SAP para colmar las lagunas de seguridad? Los expertos suizos en SAP de Itesys comparten consejos para un entorno SAP seguro: Para protegerlos eficazmente, los clientes SAP existentes deben asumir que el atacante ya ha penetrado con \u00e9xito, ya sea desde dentro o desde fuera. El punto de partida adecuado para aumentar el nivel de seguridad de los entornos SAP es el enfoque de confianza cero. Si el atacante ya est\u00e1 siempre en el sistema, no se puede confiar en nada ni en nadie y hay que verificar todo y a todos.<\/p>\n\n\n\n<p>Para desarrollar un concepto de seguridad eficaz basado en el enfoque de confianza cero, los clientes actuales de SAP deben guiarse por los siguientes principios: La autenticaci\u00f3n segura debe aplicarse siempre y en todas partes y todas las comunicaciones deben ser seguras. Adem\u00e1s, las autorizaciones s\u00f3lo deben concederse en la medida en que los usuarios las necesiten para poder hacer exactamente lo que se supone que deben hacer, pero no m\u00e1s. Tambi\u00e9n es importante que quede claro y pueda verificarse en todo momento qui\u00e9n realiza cambios en la configuraci\u00f3n y cu\u00e1les son; todo ello debe quedar debidamente registrado. Cero confianza significa desconfianza permanente, por eso se comprueban peri\u00f3dicamente los derechos de los usuarios y sus funciones, transacciones, servicios, etc.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1144\" height=\"802\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch.jpg\" alt=\"\" class=\"wp-image-143288\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch.jpg 1144w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-400x280.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-768x538.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-100x70.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-480x337.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-640x449.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-720x505.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-960x673.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-18x12.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-600x421.jpg 600w\" sizes=\"auto, (max-width: 1144px) 100vw, 1144px\" \/><figcaption class=\"wp-element-caption\">Stefan Dunsch, Director del Centro de Competencia en la Nube de ltesys, habl\u00f3 de seguridad, as\u00ed como de SolMan y ALM, en la Cumbre de Centros de Competencia de Clientes 2024 celebrada en Salzburgo.<\/figcaption><\/figure>\n\n\n\n<p>Tambi\u00e9n es importante tener en cuenta que toda la pila de TI, desde el hardware y el sistema operativo hasta las bases de datos y las aplicaciones SAP, debe mantenerse siempre al d\u00eda; en consecuencia, los clientes de SAP deben evaluar e instalar regularmente las actualizaciones de seguridad una vez anunciadas. Adem\u00e1s, el entorno de TI debe ser capaz de compensar fallos parciales, por ejemplo segmentando la red y asegur\u00e1ndola con sus propias directrices y medidas o practicando regularmente la recuperaci\u00f3n de servicios. Estos principios constituyen la base de cualquier arquitectura eficaz de confianza cero que los clientes y socios actuales de SAP puedan implantar con la ayuda de herramientas y procesos adecuados.<\/p>\n\n\n\n<p><a href=\"https:\/\/itesys.expert\/\" target=\"_blank\" rel=\"noopener\">itesys.experto<\/a><\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-ef47806\" data-block-id=\"ef47806\"><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p>A la entrada de socios:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/e3mag.com\/es\/socios\/itesys-ag\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"135\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2023\/10\/Logo_itesys_300x135_2.png\" alt=\"\" class=\"wp-image-132940\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2023\/10\/Logo_itesys_300x135_2.png 300w, https:\/\/e3mag.com\/wp-content\/uploads\/2023\/10\/Logo_itesys_300x135_2-100x45.png 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2023\/10\/Logo_itesys_300x135_2-18x8.png 18w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>Los expertos suizos en SAP de Itesys comparten consejos sobre c\u00f3mo cerrar las brechas de seguridad en los entornos SAP. Esto incluye la comprobaci\u00f3n peri\u00f3dica de las autorizaciones, como los derechos de usuario y sus funciones.<\/p>","protected":false},"author":2368,"featured_media":135812,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,43978],"tags":[],"coauthors":[39720],"class_list":["post-143284","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-24-07-08","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Schweizer SAP-Experten von Itesys teilen Tipps, um Sicherheitsl\u00fccken in SAP-Landschaften zu schlie\u00dfen. Dies inkludiert, Berechtigungen wie User-Rechte und ihre Rollen regelm\u00e4\u00dfig zu \u00fcberpr\u00fcfen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/es\/categoria\/noticias-sap\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/es\/categoria\/mag-24-07-08\/\" rel=\"category tag\">MAG 24-07 \/ 08<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/es\/author\/e3_magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/143284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/comments?post=143284"}],"version-history":[{"count":8,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/143284\/revisions"}],"predecessor-version":[{"id":152526,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/143284\/revisions\/152526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media\/135812"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=143284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/categories?post=143284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=143284"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=143284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}