{"id":28999,"date":"2017-10-10T00:00:18","date_gmt":"2017-10-09T22:00:18","guid":{"rendered":"https:\/\/e326.greatsolution.dev\/?p=28999"},"modified":"2024-01-19T14:52:49","modified_gmt":"2024-01-19T13:52:49","slug":"sap-securite-des-donnees-a-lere-du-numerique","status":"publish","type":"post","link":"https:\/\/e326.greatsolution.dev\/fr\/sap-securite-des-donnees-a-lere-du-numerique\/","title":{"rendered":"La s\u00e9curit\u00e9 des donn\u00e9es SAP \u00e0 l'\u00e8re du num\u00e9rique"},"content":{"rendered":"<h3>Le d\u00e9fi de l'int\u00e9gration des syst\u00e8mes<\/h3>\n<p>Les processus num\u00e9ris\u00e9s ne connaissent pas de fronti\u00e8res entre les syst\u00e8mes. Gr\u00e2ce \u00e0 des plateformes de d\u00e9veloppement modernes comme SAP S\/4 Hana, des milliers de donn\u00e9es sensibles sont export\u00e9es chaque jour de SAP vers d'autres applications, comme Microsoft Office, sans aucun contr\u00f4le.<\/p>\n<p>Les concepts classiques d'autorisation bas\u00e9s sur les r\u00f4les atteignent ici leurs limites et les fichiers confidentiels tombent rapidement - intentionnellement ou par inadvertance - entre les mains de cybercriminels ou d'initi\u00e9s.<\/p>\n<p>Selon une \u00e9tude de Bitkom, plus de la moiti\u00e9 des entreprises allemandes ont d\u00e9j\u00e0 \u00e9t\u00e9 victimes d'espionnage \u00e9conomique, de sabotage ou de vol de donn\u00e9es au cours des deux derni\u00e8res ann\u00e9es, ce qui repr\u00e9sente un pr\u00e9judice financier de pr\u00e8s de 55 milliards d'euros par an.<\/p>\n<p>Il n'est pas rare que les fuites se trouvent dans les propres rangs. 62% des presque 600 entreprises interrog\u00e9es ont indiqu\u00e9 que les actions correspondantes \u00e9manaient de leurs propres collaborateurs. 41% ont confirm\u00e9 que les activit\u00e9s correspondantes provenaient de leur environnement d'entreprise (concurrents, clients, fournisseurs, prestataires de services).<span style=\"color: #808080;\"> <em>[1]<\/em><\/span><\/p>\n<h3>Pression d'action accrue par le nouveau RGPD de l'UE<\/h3>\n<p>Avec des mesures telles que le RGPD, la politique tente certes d'endiguer l'utilisation abusive des donn\u00e9es, mais la plupart des entreprises ne sont pas encore en mesure de faire face aux obligations de documentation des donn\u00e9es personnelles, qui s'\u00e9tendent sur plusieurs processus.<\/p>\n<p>Bien que la loi soit d\u00e9j\u00e0 entr\u00e9e en vigueur et que la phase de transition ne doive durer que jusqu'en mai 2018, la plupart des entreprises se sentent mal pr\u00e9par\u00e9es. <em><span style=\"color: #808080;\">[2]<\/span> <\/em><\/p>\n<p>Certains DSI ont m\u00eame ordonn\u00e9 d'ignorer totalement le sujet. Une d\u00e9cision qui pourrait leur \u00eatre fatale. Car ceux qui ne respectent pas les nouvelles directives risquent de se voir infliger de lourdes p\u00e9nalit\u00e9s pouvant aller jusqu'\u00e0 20 millions d'euros ou quatre pour cent du chiffre d'affaires annuel mondial.<em><span style=\"color: #808080;\"> [3]<\/span><\/em><\/p>\n<h3>Reprendre le contr\u00f4le et changer de mentalit\u00e9 \u00e0 long terme<\/h3>\n<p>Pour pouvoir s\u00e9curiser efficacement les donn\u00e9es SAP, m\u00eame dans un monde num\u00e9ris\u00e9, les entreprises doivent d'abord reprendre le contr\u00f4le des flux de donn\u00e9es inter-syst\u00e8mes.<\/p>\n<p>Les responsables doivent savoir qui exporte quelles donn\u00e9es, \u00e0 quel moment, et garantir leur protection dans toutes les applications. Il en va de m\u00eame pour le transfert de donn\u00e9es en arri\u00e8re-plan entre SAP et d'autres syst\u00e8mes tels que Microsoft ou Oracle.<\/p>\n<p>Sur le long terme, il convient \u00e9galement de repenser les concepts de s\u00e9curit\u00e9 informatique \u00e0 l'\u00e9chelle de l'entreprise - du mode de mise \u00e0 disposition des donn\u00e9es \u00e0 l'extension du syst\u00e8me d'autorisation bas\u00e9 sur les r\u00f4les \u00e0 de nouveaux concepts de s\u00e9curit\u00e9 des donn\u00e9es en fonction du contexte.<\/p>\n<p><a href=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"La s\u00e9curit\u00e9 des donn\u00e9es Sap \u00e0 l&#039;\u00e8re du num\u00e9rique\" class=\"aligncenter size-full wp-image-28634\" src=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel.jpg\" alt=\"Holger Huegel\" width=\"800\" height=\"619\" srcset=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel.jpg 800w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel-768x594.jpg 768w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel-100x77.jpg 100w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel-480x371.jpg 480w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel-640x495.jpg 640w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel-720x557.jpg 720w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/e326.greatsolution.dev\/fr\/partenaires\/secude-gmbh\/\"><img loading=\"lazy\" decoding=\"async\" title=\"La s\u00e9curit\u00e9 des donn\u00e9es Sap \u00e0 l&#039;\u00e8re du num\u00e9rique\" class=\"aligncenter wp-image-11377 size-full\" src=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE.jpg\" alt=\"https:\/\/e326.greatsolution.dev\/partners\/secude-gmbh\/\" width=\"1000\" height=\"112\" srcset=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE.jpg 1000w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-768x86.jpg 768w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-100x11.jpg 100w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-480x54.jpg 480w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-640x72.jpg 640w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-720x81.jpg 720w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-960x108.jpg 960w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p><strong>Vers le guide :<\/strong><br \/>\n<a href=\"https:\/\/bit.ly\/2xzyUrN\" target=\"_blank\" rel=\"noopener noreferrer\"> https:\/\/bit.ly\/2xzyUrN<\/a><\/p>\n<p><em>R\u00e9f\u00e9rences des sources :<\/em><br \/>\n<em>[1] Protection \u00e9conomique dans le monde num\u00e9rique, \u00e9tude Bitkom 2017<\/em><br \/>\n<em>[2] Rapport GDPR, \u00e9tude Veritas 2017<\/em><br \/>\n<em>[3] R\u00e8glement g\u00e9n\u00e9ral de l'UE sur la protection des donn\u00e9es (RGPD), r\u00e8glement de l'UE 2016<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Digitale Plattformen wie SAP S\/4 Hana und die zunehmende Applikationsintegration stellen SAP-Sicherheitsverantwortliche vor neue Herausforderungen. Wer geistiges Eigentum und sensible Daten k\u00fcnftig wirksam absichern will, muss \u00fcber Systemgrenzen hinausdenken und neue datenzentrierte Sicherheitskonzepte etablieren. Ein neuer Leitfaden von SECUDE zeigt, was Unternehmen mittelfristig und langfristig tun k\u00f6nnen, um Prozesse system\u00fcbergreifend gegen Datenmissbrauch abzusichern und die Dokumenatationspflichten der neuen EU-DSGVO zu erf\u00fcllen.<\/p>","protected":false},"author":355,"featured_media":29000,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2],"tags":[606,11281,5959],"coauthors":[23277],"class_list":["post-28999","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","tag-daten","tag-dsgvo","tag-sap-s4-hana","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"thumbnail":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-150x150.png",150,150,true],"medium":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",400,180,false],"medium_large":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-768x346.png",768,346,true],"large":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"image-100":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-100x45.png",100,45,true],"image-480":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-480x216.png",480,216,true],"image-640":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-640x288.png",640,288,true],"image-720":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-720x324.png",720,324,true],"image-960":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-960x432.png",960,432,true],"image-1168":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"image-1440":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"image-1920":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"1536x1536":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"2048x2048":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"trp-custom-language-flag":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",18,8,false],"bricks_large_16x9":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"bricks_large":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"bricks_large_square":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"bricks_medium":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",600,270,false],"bricks_medium_square":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",600,270,false],"profile_24":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-24x24.png",24,24,true],"profile_48":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-48x48.png",48,48,true],"profile_96":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-96x96.png",96,96,true],"profile_150":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-150x150.png",150,150,true],"profile_300":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-300x300.png",300,300,true]},"post_excerpt_stackable_v2":"<p>Digitale Plattformen wie SAP S\/4 Hana und die zunehmende Applikationsintegration stellen SAP-Sicherheitsverantwortliche vor neue Herausforderungen. Wer geistiges Eigentum und sensible Daten k\u00fcnftig wirksam absichern will, muss \u00fcber Systemgrenzen hinausdenken und neue datenzentrierte Sicherheitskonzepte etablieren. Ein neuer Leitfaden von SECUDE zeigt, was Unternehmen mittelfristig und langfristig tun k\u00f6nnen, um Prozesse system\u00fcbergreifend gegen Datenmissbrauch abzusichern und die Dokumenatationspflichten der neuen EU-DSGVO zu erf\u00fcllen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e326.greatsolution.dev\/fr\/categorie\/scene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e326.greatsolution.dev\/fr\/categorie\/sap-nouvelles\/\" rel=\"category tag\">Community Nachrichten<\/a>","author_info_v2":{"name":"Holger H\u00fcgel, Secude","url":"https:\/\/e326.greatsolution.dev\/fr\/author\/holger-huegel\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/posts\/28999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/users\/355"}],"replies":[{"embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/comments?post=28999"}],"version-history":[{"count":1,"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/posts\/28999\/revisions"}],"predecessor-version":[{"id":138214,"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/posts\/28999\/revisions\/138214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/media\/29000"}],"wp:attachment":[{"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/media?parent=28999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/categories?post=28999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/tags?post=28999"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/fr\/wp-json\/wp\/v2\/coauthors?post=28999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}