Introduction into SAP authorisation security flaws

Learn about common user authorisation flaws in SAP systems.

Security flaws by permissive authorizations can pose severe threats. They are a ubiquitous security challenge for SAP customers. To identify authorization security flaws, you'll learn how to determine the criticality of assigned authorizations and how to use the standard analytical tools to detect authorization flaws.

General Information

  • Each e-learning lasts 1 hour and costs one Kujambel Credit (or 100 Euro plus VAT)
  • all e-learnings are available regardless of the time of day and location
  • all e-learnings are available in the English language

Technical Requirements

Access

  • Participants have an HTML5 capable browser (Chrome, Firefox, Edge) on their desktop operating system
  • The firewall of the computer or network firewall does not block outgoing connections to NO MONKEY domains

Infrastructure

  • The computer has at least downstream bandwidth of at least 3 MBit/s and upstream of 1 MBit/s

Please consider here further and more detailed requirements for access and infrastructure.

Wolfgang SteigerManaging Director of Access & Integrity Consulting GmbH
  • More than 20 years experience in securing user access in SAP core technologies
  • Trusted SAP access management adviser of DAX30 corporate
  • SAP Authorization Specialist
Fundamentals of Assessing User Access in SAP ABAP® Systems

We'll let you know when this course is ready

Please note that this e-learning module is not yet in production.

If you'd like to be notified when this course goes live, please use the contact form below.

Reach Out to NO MONKEY