{"id":142007,"date":"2024-04-29T08:30:03","date_gmt":"2024-04-29T06:30:03","guid":{"rendered":"http:\/\/e3mag.com\/?p=142007"},"modified":"2024-07-08T04:12:25","modified_gmt":"2024-07-08T02:12:25","slug":"securite-pour-le-paysage-sap-2","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/securite-pour-le-paysage-sap-2\/","title":{"rendered":"S\u00e9curit\u00e9 pour l'environnement SAP"},"content":{"rendered":"<p>Le 27 d\u00e9cembre 2022, la deuxi\u00e8me directive europ\u00e9enne sur la s\u00e9curit\u00e9 des r\u00e9seaux et de l'information (directive NIS-2) a \u00e9t\u00e9 publi\u00e9e. Les \u00c9tats membres doivent transposer cette directive dans leur droit national avant octobre 2024. Avec le <a href=\"https:\/\/digital-strategy.ec.europa.eu\/de\/library\/cyber-resilience-act\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber <\/a><a href=\"https:\/\/digital-strategy.ec.europa.eu\/de\/policies\/cyber-resilience-act\" target=\"_blank\" rel=\"noreferrer noopener\">R\u00e9silience<\/a><a href=\"https:\/\/digital-strategy.ec.europa.eu\/de\/library\/cyber-resilience-act\" target=\"_blank\" rel=\"noreferrer noopener\"> Acte<\/a> de l'Union europ\u00e9enne vise \u00e0 harmoniser les r\u00e8gles relatives \u00e0 l'utilisation de produits et de logiciels comportant une composante num\u00e9rique. Il y a une invitation \u00e0 faire preuve de diligence raisonnable tout au long du cycle de vie de ces solutions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Suse assure la s\u00e9curit\u00e9 avec la certification BSI<\/strong><\/h2>\n\n\n\n\n\n\n\n<p>Suse Linux Enterprise Server (SLES), et donc Suse Linux Enterprise Server for SAP Applications (SLES for SAP), a \u00e9t\u00e9 lanc\u00e9 en 2021 par le <a href=\"https:\/\/www.bsi.bund.de\/DE\/Das-BSI\/Auftrag\/Gesetze-und-Verordnungen\/NIS-Richtlinie\/nis-richtlinie_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">Office f\u00e9d\u00e9ral de la s\u00e9curit\u00e9 dans la technologie de l'information<\/a> (BSI) a obtenu la certification Common Criteria EAL 4+. Cette certification est le fruit d'une \u00e9valuation approfondie du produit et de tous les processus de d\u00e9veloppement et de mise \u00e0 jour de la s\u00e9curit\u00e9 par atsec information security et des fonctionnaires du BSI. L'Evaluation Assurance Level 4 Augmented by ALC_FLR.3 (EAL4+) confirme que SLES r\u00e9pond aux exigences de s\u00e9curit\u00e9 les plus \u00e9lev\u00e9es pour le produit et l'ensemble de la cha\u00eene d'approvisionnement pour les infrastructures critiques - et ce aussi bien sur les architectures x86 que sur les architectures IBM-Z et Arm.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\"Certifiez une fois, utilisez beaucoup\"<\/strong><\/h2>\n\n\n\n\n\n\n\n<p>Pour la certification de ses produits de syst\u00e8me d'exploitation, Suse suit le principe Certify once, use many. Cela signifie que les <a href=\"https:\/\/www.suse.com\/c\/de\/suse-und-zertifizierungen-standards-auf-die-sich-anwender-verlassen-koennen\/\" target=\"_blank\" rel=\"noreferrer noopener\">s\u00e9curit\u00e9 et normes certifi\u00e9es par SLES<\/a> peuvent \u00e9galement \u00eatre appliqu\u00e9es \u00e0 SLE Micro et SLE BCI (Base Container Images) gr\u00e2ce \u00e0 la base de code commune. En utilisant ces variantes, les clients peuvent compter sur une s\u00e9curit\u00e9 \u00e9valu\u00e9e de mani\u00e8re ind\u00e9pendante. Cela facilite le respect des exigences de conformit\u00e9 pour l'ensemble de leur informatique. Les organisations atteignent \u00e9galement un niveau de s\u00e9curit\u00e9 uniform\u00e9ment \u00e9lev\u00e9 dans la cha\u00eene d'approvisionnement lors de l'exploitation d'applications de p\u00e9riph\u00e9rie avec SLE Micro et lors de la mise \u00e0 disposition de charges de travail conteneuris\u00e9es avec SLE BCI.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Technologies Suse pour le concept d'exploitation de s\u00e9curit\u00e9 SAP<\/strong><\/h2>\n\n\n\n\n\n\n\n<p>Il est important de pouvoir r\u00e9agir rapidement aux vuln\u00e9rabilit\u00e9s sur la plate-forme SAP, aussi bien pour les serveurs d'applications que pour les serveurs de bases de donn\u00e9es SAP. Pour cela, Suse met \u00e0 disposition le \"Kernel Live Patching\", qui permet de combler rapidement les vuln\u00e9rabilit\u00e9s du noyau Linux. Avec \"Disc Remote Encryption\", les donn\u00e9es SAP Gana peuvent \u00eatre crypt\u00e9es et s\u00e9curis\u00e9es sur le disque. L'extension du cryptage de la communication entre la m\u00e9moire vive et le processeur a \u00e9t\u00e9 obtenue avec Intel dans le contexte du Confidential Computing.<\/p>\n\n\n\n<p>En outre, un pare-feu local est mis \u00e0 disposition pour SAP Hana afin d'am\u00e9liorer la s\u00e9curit\u00e9 du r\u00e9seau. Pour ce faire, seuls les ports r\u00e9seau dont SAP Hana a r\u00e9ellement besoin sont ouverts aux interfaces r\u00e9seau externes. Le guide de durcissement Suse pour le SLES pour applications SAP 15 donne des instructions sur les r\u00e9glages \u00e0 effectuer et les technologies \u00e0 utiliser pour augmenter le degr\u00e9 de durcissement de la plateforme Linux.<\/p>\n\n\n\n<p>Le Suse Manager offre, en plus de la fonction de gestion des correctifs (Dev-Test-Prod), la possibilit\u00e9 d'analyser l'\u00e9tat de la situation CVE pour la plate-forme Linux (Suse Manager Audit). Il est ainsi possible de combler rapidement une faille CVE avec Live Patching, en d\u00e9ployant automatiquement le patch via le canal de production du Suse Manager. Il est possible d'analyser l'impl\u00e9mentation avec OpenScap \u00e0 partir du gestionnaire Suse.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-daa3e09\" data-block-id=\"daa3e09\"><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p>Litt\u00e9rature compl\u00e9mentaire :<\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\">\n<p><a href=\"https:\/\/digital-strategy.ec.europa.eu\/de\/policies\/cyber-resilience-act\" target=\"_blank\" rel=\"noreferrer noopener\">EU Cyber Resilience Act (loi europ\u00e9enne sur la cyber-r\u00e9silience) | Fa\u00e7onner l'avenir num\u00e9rique de l'Europe<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.bsi.bund.de\/DE\/Das-BSI\/Auftrag\/Gesetze-und-Verordnungen\/NIS-Richtlinie\/nis-richtlinie_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">BSI - Directive NIS (bund.de)<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.suse.com\/c\/de\/suse-und-zertifizierungen-standards-auf-die-sich-anwender-verlassen-koennen\/\" target=\"_blank\" rel=\"noopener\">SUSE et les certifications : Des normes auxquelles les utilisateurs peuvent se fier | Communaut\u00e9s SUSE<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/documentation.suse.com\/sbp\/sap-15\/html\/OS_Security_Hardening_Guide_for_SAP_HANA_SLES15\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">SUSE Linux Enterprise Server for SAP Applications 15 GA, SP1 | Guide de renforcement de la s\u00e9curit\u00e9 du syst\u00e8me d'exploitation pour SAP HANA pour SUSE Linux Enterprise Server 15 GA et SP1<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.suse.com\/support\/security\/certifications\/\" target=\"_blank\" rel=\"noopener\">Certifications et fonctionnalit\u00e9s de s\u00e9curit\u00e9 Enterprise Linux | SUSE<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-fabb103\" data-block-id=\"fabb103\"><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p>Cliquez ici pour acc\u00e9der \u00e0 l'entr\u00e9e partenaire :<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><a href=\"https:\/\/e3mag.com\/de\/partners\/suse-linux-gmbh\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"722\" height=\"172\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo.jpg\" alt=\"\" class=\"wp-image-142008\" style=\"width:424px;height:auto\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo.jpg 722w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-400x95.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-100x24.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-480x114.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-640x152.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-720x172.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-18x4.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-600x143.jpg 600w\" sizes=\"auto, (max-width: 722px) 100vw, 722px\" \/><\/a><\/figure>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>La directive NIS2 et la loi sur la cyber-r\u00e9silience sont les r\u00e9actions<br \/>\nau nombre croissant de cyberattaques. Dans ce contexte, il est utile<br \/>\nde miser sur la plate-forme Suse-Linux certifi\u00e9e par le BSI pour SAP.<\/p>","protected":false},"author":10,"featured_media":142009,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[7,24,43945],"tags":[],"coauthors":[25625],"class_list":["post-142007","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-linux","category-mag-24-05","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die NIS2 Directive und der Cyber Resilience Act sind die Reaktionen<br \/>\nauf die steigende Anzahl von Cyberattacken. Hierbei ist es hilfreich,<br \/>\nauf die vom BSI zertifizierte Suse-Linux-Plattform f\u00fcr SAP zu setzen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/categorie\/avis\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/avis\/linux\/\" rel=\"category tag\">Linux Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/mag-24-05\/\" rel=\"category tag\">MAG 24-05<\/a>","author_info_v2":{"name":"Friedrich Krey, Suse","url":"https:\/\/e3mag.com\/fr\/author\/friedrich-krey-suse\/"},"comments_num_v2":"1 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/142007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=142007"}],"version-history":[{"count":6,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/142007\/revisions"}],"predecessor-version":[{"id":142322,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/142007\/revisions\/142322"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/142009"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=142007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=142007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=142007"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=142007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}