{"id":147452,"date":"2024-12-05T07:00:00","date_gmt":"2024-12-05T06:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=147452"},"modified":"2024-12-09T13:43:26","modified_gmt":"2024-12-09T12:43:26","slug":"securise-sur-sap-s-4-avec-suse-et-edge-integration","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/sicher-auf-sap-s-4-mit-suse-und-edge-integration\/","title":{"rendered":"Passer en toute s\u00e9curit\u00e9 \u00e0 SAP S\/4 avec Suse et Edge Integration"},"content":{"rendered":"<p>Pour les entreprises qui souhaitent p\u00e9renniser leurs syst\u00e8mes informatiques, SAP S\/4 Hana est souvent le pivot et le c\u0153ur de leur informatique d'entreprise. Les donn\u00e9es et processus commerciaux sensibles qui y sont trait\u00e9s doivent \u00eatre enti\u00e8rement prot\u00e9g\u00e9s. C'est pourquoi la s\u00e9curit\u00e9 doit \u00eatre une priorit\u00e9 absolue d\u00e8s la planification de la nouvelle infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Avec CC EAL 4+ : SLES vers la conformit\u00e9 NIS-2<\/h2>\n\n\n\n<p>Le choix d'une infrastructure s\u00e9curis\u00e9e, indispensable pour les utilisateurs SAP, est une \u00e9tape d\u00e9cisive pour la s\u00e9curit\u00e9 informatique. Suse Linux Enterprise Server (SLES) est certifi\u00e9 par l'Office f\u00e9d\u00e9ral allemand pour la s\u00e9curit\u00e9 des technologies de l'information (BSI) selon les crit\u00e8res communs EAL 4+ et r\u00e9pond ainsi aux exigences de s\u00e9curit\u00e9 les plus \u00e9lev\u00e9es. Cette certification confirme que SLES ne garantit pas seulement la protection des donn\u00e9es sensibles, mais qu'il offre \u00e9galement une s\u00e9curit\u00e9 fiable \u00e0 l'ensemble de la cha\u00eene d'approvisionnement gr\u00e2ce \u00e0 une \u00e9valuation ind\u00e9pendante. Pour les utilisateurs SAP, cela signifie qu'ils peuvent prouver sans effort suppl\u00e9mentaire que leurs syst\u00e8mes sont conformes aux exigences NIS 2 et EU Cyber Resilience Act.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cellule d'int\u00e9gration p\u00e9riph\u00e9rique pour les donn\u00e9es sensibles<\/h2>\n\n\n\n<p>De nombreux clients SAP sont confront\u00e9s au d\u00e9fi de migrer vers S\/4 Hana et de remplacer les solutions middleware existantes telles que SAP PO\/PI d'ici 2027. Cependant, tous les clients ne sont pas pr\u00eats \u00e0 passer \u00e0 une solution d'int\u00e9gration enti\u00e8rement bas\u00e9e sur le cloud et souhaitent continuer \u00e0 garder le contr\u00f4le des donn\u00e9es et interfaces sensibles en interne. Les organisations des secteurs fortement r\u00e9glement\u00e9s peuvent \u00e9galement y \u00eatre contraintes par des exigences de conformit\u00e9 ou des dispositions l\u00e9gales. <\/p>\n\n\n\n<p>Pour ces clients, SAP a d\u00e9velopp\u00e9 la SAP Edge Integration Cell. La SAP Edge Integration Cell est une solution hybride pour SAP Integration Suite qui permet aux entreprises d'ex\u00e9cuter des API et des services d'int\u00e9gration localement dans leur propre centre de donn\u00e9es ou dans un environnement de cloud priv\u00e9. Les d\u00e9veloppeurs con\u00e7oivent donc leurs flux d'int\u00e9gration avec Integration Designer dans le cloud et les d\u00e9ploient ensuite dans un environnement d'ex\u00e9cution sur leur propre r\u00e9seau. Les entreprises peuvent ainsi \u00e9viter que des donn\u00e9es sensibles ne quittent leur r\u00e9seau.<\/p>\n\n\n\n<p>Technologiquement, la premi\u00e8re version de SAP Edge Integration Cell est bas\u00e9e sur la pile de solutions de Suse. L'application conteneuris\u00e9e fonctionne dans un environnement Kubernetes, qui est g\u00e9r\u00e9 avec Suse Rancher Prime. Le syst\u00e8me d'exploitation utilis\u00e9 est Suse Linux Enterprise (SLE) Micro. En outre, la SAP Edge Integration Cell utilise d'autres composants open source comme MetalLB, Redis, PostgreSQL et la plateforme de stockage distribu\u00e9e cloud-native Longhorn.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protection de l'ensemble de la cha\u00eene logistique logicielle<\/h2>\n\n\n\n<p>Les utilisateurs de la SAP Edge Integration Cell b\u00e9n\u00e9ficient \u00e9galement de tous les avantages de s\u00e9curit\u00e9 de la pile de solutions Suse et sont ainsi en mesure, par exemple, de pr\u00e9parer la SAP Edge Integration Cell aux exigences NIS-2. Gr\u00e2ce \u00e0 la base de code commune, SLE Micro r\u00e9pond aux normes de s\u00e9curit\u00e9 du syst\u00e8me d'exploitation SLES certifi\u00e9 Common Criteria EAL-4+ - y compris la cha\u00eene logistique logicielle valid\u00e9e de mani\u00e8re ind\u00e9pendante.<\/p>\n\n\n\n<p>Suse Rancher Prime - la plate-forme de gestion de conteneurs de SAP Edge Integration Cell - dispose \u00e9galement d'une cha\u00eene d'approvisionnement logicielle s\u00e9curis\u00e9e. La solution a r\u00e9cemment \u00e9t\u00e9 certifi\u00e9e Supply-Chain-Levels for Software Artifacts (SLSA). Ce framework d\u00e9velopp\u00e9 par Google vise \u00e0 assurer l'int\u00e9grit\u00e9 des logiciels lors de la cr\u00e9ation des binaires. Des mesures telles qu'un processus de construction automatis\u00e9 et une documentation d'origine compl\u00e8te (Software Bill of Material = SBOM) prot\u00e8gent le logiciel contre les manipulations et permettent une tra\u00e7abilit\u00e9 s\u00fbre du code source.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-3d9c938\" data-block-id=\"3d9c938\"><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p>Vers l'inscription du partenaire :<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/e3mag.com\/de\/partners\/suse-linux-gmbh\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"722\" height=\"172\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo.jpg\" alt=\"\" class=\"wp-image-142008\" style=\"width:300px\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo.jpg 722w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-400x95.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-100x24.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-480x114.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-640x152.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-720x172.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-18x4.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/suse-logo-600x143.jpg 600w\" sizes=\"auto, (max-width: 722px) 100vw, 722px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>Les r\u00e9glementations telles que NIS 2 augmentent les exigences en mati\u00e8re de protection des donn\u00e9es et de s\u00e9curit\u00e9. Le serveur Suse Linux Enterprise Server (SLES), certifi\u00e9 CC EAL 4+ par le BSI, r\u00e9pond \u00e0 ces exigences.<\/p>","protected":false},"author":10,"featured_media":142009,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[7,24,44051],"tags":[],"coauthors":[25625],"class_list":["post-147452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-linux","category-mag-24-12","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/04\/2405-54-Suse-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Durch Regularien wie NIS 2 steigen die Anforderungen an Datenschutz und Sicherheit. Der vom BSI nach CC EAL 4+ zertifizierte Suse Linux Enterprise Server (SLES) erf\u00fcllt diese Anforderungen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/category\/meinung\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/category\/meinung\/linux\/\" rel=\"category tag\">Linux Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/category\/mag-24-12\/\" rel=\"category tag\">MAG 24-12<\/a>","author_info_v2":{"name":"Friedrich Krey, Suse","url":"https:\/\/e3mag.com\/fr\/author\/friedrich-krey-suse\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/147452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=147452"}],"version-history":[{"count":3,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/147452\/revisions"}],"predecessor-version":[{"id":147661,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/147452\/revisions\/147661"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/142009"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=147452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=147452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=147452"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=147452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}