{"id":143284,"date":"2024-07-04T00:37:20","date_gmt":"2024-07-03T22:37:20","guid":{"rendered":"http:\/\/e3mag.com\/?p=143284"},"modified":"2025-07-16T12:45:17","modified_gmt":"2025-07-16T10:45:17","slug":"principes-de-base-pour-sap-security-combler-les-lacunes","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/grundsaetze-fuer-sap-security-luecken-schliessen\/","title":{"rendered":"Principes de s\u00e9curit\u00e9 SAP : combler les lacunes"},"content":{"rendered":"<p>Que peuvent et doivent faire les clients existants de SAP pour combler les lacunes en mati\u00e8re de s\u00e9curit\u00e9 SAP ? Les experts SAP suisses d'Itesys partagent leurs conseils pour s\u00e9curiser les environnements SAP : pour les prot\u00e9ger efficacement, les clients existants de SAP devraient partir du principe que l'attaquant a d\u00e9j\u00e0 r\u00e9ussi \u00e0 s'infiltrer, que ce soit de l'int\u00e9rieur ou de l'ext\u00e9rieur. Le bon point de d\u00e9part pour augmenter le niveau de s\u00e9curit\u00e9 dans les environnements SAP est l'approche \"zero trust\". Si l'attaquant est toujours d\u00e9j\u00e0 dans le syst\u00e8me, on ne peut faire confiance \u00e0 personne ni \u00e0 rien et on doit v\u00e9rifier tout et n'importe qui.<\/p>\n\n\n\n<p>Pour d\u00e9velopper un concept de s\u00e9curit\u00e9 efficace bas\u00e9 sur l'approche \"zero trust\", les clients existants de SAP devraient se laisser guider par les principes suivants : L'authentification s\u00e9curis\u00e9e doit \u00eatre impos\u00e9e partout et \u00e0 tout moment et toute communication doit \u00eatre s\u00e9curis\u00e9e. En outre, les autorisations ne devraient \u00eatre accord\u00e9es que dans la mesure o\u00f9 les utilisateurs en ont besoin pour pouvoir faire exactement ce qu'ils doivent faire, mais en aucun cas plus. Il est \u00e9galement important qu'il soit possible de v\u00e9rifier \u00e0 tout moment qui modifie les param\u00e8tres et lesquels ; tout cela doit \u00eatre consign\u00e9 en cons\u00e9quence. Zero-Trust signifie une m\u00e9fiance permanente, c'est pourquoi les droits des utilisateurs et leurs r\u00f4les, les transactions, les services, etc. sont r\u00e9guli\u00e8rement contr\u00f4l\u00e9s.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1144\" height=\"802\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch.jpg\" alt=\"\" class=\"wp-image-143288\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch.jpg 1144w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-400x280.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-768x538.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-100x70.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-480x337.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-640x449.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-720x505.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-960x673.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-18x12.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/07\/Stefan-Dunsch-600x421.jpg 600w\" sizes=\"auto, (max-width: 1144px) 100vw, 1144px\" \/><figcaption class=\"wp-element-caption\">Stefan Dunsch, Head of Cloud Competence Center chez ltesys, a parl\u00e9 aussi bien de s\u00e9curit\u00e9 que de SolMan et ALM lors du Customer Competence Center Summit 2024 \u00e0 Salzbourg.<\/figcaption><\/figure>\n\n\n\n<p>Il est \u00e9galement important de noter que l'ensemble de la pile informatique, du mat\u00e9riel aux bases de donn\u00e9es et aux applications SAP en passant par le syst\u00e8me d'exploitation, doit \u00eatre maintenu \u00e0 jour en permanence ; les clients SAP existants doivent donc \u00e9valuer et appliquer r\u00e9guli\u00e8rement les mises \u00e0 jour de s\u00e9curit\u00e9 apr\u00e8s leur publication. En outre, l'environnement informatique devrait \u00eatre capable de compenser les pannes partielles, par exemple en segmentant le r\u00e9seau et en le s\u00e9curisant avec des directives et des mesures sp\u00e9cifiques ou en s'exer\u00e7ant r\u00e9guli\u00e8rement \u00e0 la restauration des services. Ces principes constituent la base de toute architecture efficace \"zero trust\", que les clients SAP existants peuvent mettre en \u0153uvre \u00e0 l'aide d'outils et de processus appropri\u00e9s, mais aussi les partenaires.<\/p>\n\n\n\n<p><a href=\"https:\/\/itesys.expert\/\" target=\"_blank\" rel=\"noopener\">itesys.expert<\/a><\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-ef47806\" data-block-id=\"ef47806\"><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p>Vers l'inscription du partenaire :<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/e3mag.com\/de\/partners\/itesys-ag\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"135\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2023\/10\/Logo_itesys_300x135_2.png\" alt=\"\" class=\"wp-image-132940\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2023\/10\/Logo_itesys_300x135_2.png 300w, https:\/\/e3mag.com\/wp-content\/uploads\/2023\/10\/Logo_itesys_300x135_2-100x45.png 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2023\/10\/Logo_itesys_300x135_2-18x8.png 18w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>Les experts SAP suisses d'Itesys partagent des conseils pour combler les failles de s\u00e9curit\u00e9 dans les environnements SAP. Il s'agit notamment de v\u00e9rifier r\u00e9guli\u00e8rement les autorisations telles que les droits des utilisateurs et leurs r\u00f4les.<\/p>","protected":false},"author":2368,"featured_media":135812,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,43978],"tags":[],"coauthors":[39720],"class_list":["post-143284","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-24-07-08","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Schweizer SAP-Experten von Itesys teilen Tipps, um Sicherheitsl\u00fccken in SAP-Landschaften zu schlie\u00dfen. Dies inkludiert, Berechtigungen wie User-Rechte und ihre Rollen regelm\u00e4\u00dfig zu \u00fcberpr\u00fcfen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/category\/mag-24-07-08\/\" rel=\"category tag\">MAG 24-07 \/ 08<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/fr\/author\/e3_magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/143284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=143284"}],"version-history":[{"count":8,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/143284\/revisions"}],"predecessor-version":[{"id":152526,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/143284\/revisions\/152526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/135812"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=143284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=143284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=143284"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=143284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}