{"id":63826,"date":"2020-01-08T08:00:18","date_gmt":"2020-01-08T07:00:18","guid":{"rendered":"http:\/\/e3mag.com\/?p=63826"},"modified":"2020-02-07T19:39:16","modified_gmt":"2020-02-07T18:39:16","slug":"cyber-attaques-tu","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/cyber-attaques-tu\/","title":{"rendered":"Cyber-attaques : l'universit\u00e9 technique de Darmstadt mise sur Virtual Forge"},"content":{"rendered":"<p>Avec environ 26 000 \u00e9tudiants et 4700 employ\u00e9s, l'universit\u00e9 technique de Darmstadt compte parmi les principales universit\u00e9s techniques d'Allemagne.<\/p>\n<p>Ici, SAP est utilis\u00e9 aussi bien dans l'administration centrale de l'universit\u00e9 que dans les d\u00e9partements, les instituts et les institutions d\u00e9centralis\u00e9es pour piloter les processus commerciaux centraux : de la gestion du budget et du personnel \u00e0 la gestion des fonds de tiers et au contr\u00f4le de gestion, en passant par la gestion des constructions et des biens immobiliers.<\/p>\n<p><em>\"Si un syst\u00e8me SAP tombe en panne, des processus administratifs essentiels peuvent \u00eatre paralys\u00e9s\".<\/em><\/p>\n<p>rapporte Dorothee Krohberger-Stock, qui dirige le CCoE SAP ainsi que la coordination informatique et des processus \u00e0 l'universit\u00e9 technique de Darmstadt.<\/p>\n<p>Afin de pr\u00e9venir les perturbations op\u00e9rationnelles et de se pr\u00e9munir contre les cyber-attaques externes et internes, les responsables SAP ont pr\u00e9vu de mettre en place un concept de s\u00e9curit\u00e9 SAP efficace.<\/p>\n<p>Pour ce faire, trois domaines ont d'abord \u00e9t\u00e9 identifi\u00e9s : les configurations du syst\u00e8me, les autorisations critiques pour le syst\u00e8me et les d\u00e9veloppements propres \u00e0 Abap. Comme les analyses manuelles de ces domaines de contr\u00f4le auraient d\u00e9pass\u00e9 les ressources disponibles, il a \u00e9t\u00e9 d\u00e9cid\u00e9 d'utiliser les outils de s\u00e9curit\u00e9 SAP de Virtual Forge.<\/p>\n<h3><a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-63827\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka.jpg\" alt=\"Silke Kubelka\" width=\"800\" height=\"800\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-150x150.jpg 150w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-768x768.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-100x100.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-480x480.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-640x640.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-720x720.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-24x24.jpg 24w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-48x48.jpg 48w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-96x96.jpg 96w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Silke-Kubelka-300x300.jpg 300w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/h3>\n<h3>D\u00e9tection des configurations erron\u00e9es<\/h3>\n<p>Ainsi, l'universit\u00e9 technique de Darmstadt a introduit en 2014 le SystemProfiler pour identifier et \u00e9liminer automatiquement les configurations erron\u00e9es ou non optimales dans les syst\u00e8mes SAP.<\/p>\n<p>L'outil combine le savoir-faire de longue date en mati\u00e8re de s\u00e9curit\u00e9 avec les directives de s\u00e9curit\u00e9 et les recommandations actuelles, par exemple de SAP, du groupe d'utilisateurs SAP germanophones (DSAG) et de l'Office f\u00e9d\u00e9ral allemand pour la s\u00e9curit\u00e9 des technologies de l'information (BSI).<\/p>\n<p><em>\"Avec SystemProfiler, nous pouvons analyser tous les param\u00e8tres du syst\u00e8me SAP en appuyant sur un bouton\".<\/em><\/p>\n<p>Silke Kubelka, qui dirige les applications SAP \u00e0 l'universit\u00e9 technique de Darmstadt, en r\u00e9sume les avantages.<\/p>\n<p><em>\"Si des erreurs et des points faibles sont d\u00e9couverts, de nombreux param\u00e8tres et r\u00e9glages peuvent \u00eatre adapt\u00e9s rapidement et facilement\".<\/em><\/p>\n<p>En compl\u00e9ment, la solution est utilis\u00e9e pour v\u00e9rifier les autorisations SAP critiques pour le syst\u00e8me. L'outil d\u00e9tecte automatiquement si un utilisateur dispose, en raison de plusieurs r\u00f4les qui lui ont \u00e9t\u00e9 attribu\u00e9s, de droits d'acc\u00e8s qui, combin\u00e9s, pourraient entra\u00eener un risque pour la s\u00e9curit\u00e9 SAP.<\/p>\n<p>Utilis\u00e9 lors de l'installation de mises \u00e0 jour SAP, le SystemProfiler aide \u00e0 adapter les adaptations de maintenance effectu\u00e9es ou les nouveaux syst\u00e8mes avec la configuration des meilleures pratiques.<\/p>\n<h3><a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-63828\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock.jpg\" alt=\"Dorothee Krohberger Stock\" width=\"800\" height=\"800\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-150x150.jpg 150w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-768x768.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-100x100.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-480x480.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-640x640.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-720x720.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-24x24.jpg 24w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-48x48.jpg 48w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-96x96.jpg 96w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/Dorothee-Krohberger-Stock-300x300.jpg 300w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/h3>\n<h3>Les modifications d'Abap en ligne de mire<\/h3>\n<p>Le CodeProfiler, qui identifie les risques et le potentiel d'optimisation dans le code client Abap (espace de noms Z), est \u00e9galement utilis\u00e9 r\u00e9guli\u00e8rement. L'universit\u00e9 technique de Darmstadt l'utilise pour v\u00e9rifier la s\u00e9curit\u00e9, la conformit\u00e9, la qualit\u00e9 et l'ad\u00e9quation \u00e0 S\/4-Hana des d\u00e9veloppements internes SAP existants.<\/p>\n<p>Parall\u00e8lement, l'outil sera utilis\u00e9 \u00e0 l'avenir lors de l'acceptation de nouveaux programmes et add-ons d\u00e9velopp\u00e9s en interne ou par des partenaires et prestataires de services externes. Si des points faibles apparaissent dans le code, des mesures seront prises pour les corriger.<\/p>\n<p>Cela permet d'\u00e9viter que du code d\u00e9fectueux ne soit introduit dans les syst\u00e8mes SAP existants. Afin de r\u00e9duire au maximum les frais d'exploitation, l'universit\u00e9 technique de Darmstadt utilise le CodeProfiler \"as a Service\".<\/p>\n<p><em>\"Comme nous ne d\u00e9veloppons ou faisons d\u00e9velopper notre propre code Abap que dans une mesure limit\u00e9e, l'offre cloud r\u00e9pond \u00e0 notre souhait d'utiliser l'outil \u00e0 la demande\".<\/em><\/p>\n<p>explique Dorothee Krohberger- Stock.<\/p>\n<p><em>\"Notre objectif \u00e0 long terme est que l'ensemble de nos d\u00e9veloppements internes SAP soient robustes, s\u00fbrs, maintenables et compatibles avec les nouvelles exigences telles que Hana\".<\/em><\/p>\n<p><em>\"L'utilisation combin\u00e9e des deux outils d'analyse nous a permis d'am\u00e9liorer la s\u00e9curit\u00e9 et la qualit\u00e9 de nos applications SAP\".<\/em><\/p>\n<p>Silke Kubelka, responsable des applications SAP, dresse le bilan.<\/p>\n<p><em>\"Dans les trois domaines de contr\u00f4le d\u00e9finis, ces outils r\u00e9pondent largement \u00e0 nos exigences de s\u00e9curit\u00e9 et de conformit\u00e9\".<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>La s\u00e9curit\u00e9 SAP au bout des doigts : c'est la devise que l'universit\u00e9 technique (TU) de Darmstadt met en pratique avec les outils d'analyse de Virtual Forge, qui fait aujourd'hui partie d'Onapsis.<\/p>","protected":false},"author":38,"featured_media":63829,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[4,36983],"tags":[453,4780,273,1790,6174,4981],"coauthors":[19920],"class_list":["post-63826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","category-mag-1911","tag-abap","tag-cyber-security","tag-dsag","tag-it-security","tag-it-sicherheit","tag-virtual-forge","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/11\/shutterstock_557329258-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>SAP-Sicherheit auf Knopfdruck: Dieses Motto setzt die Technische Universit\u00e4t (TU) Darmstadt mit den Analysewerkzeugen von Virtual Forge, das heute zu Onapsis geh\u00f6rt, um.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/categorie\/gestion\/\" rel=\"category tag\">Business-Management<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/mag-1911\/\" rel=\"category tag\">MAG 19-11<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/63826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=63826"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/63826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/63829"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=63826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=63826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=63826"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=63826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}