Connect Your IAM solution with XSP for Risk Analysis and Mitigation.
The Xiting Security Platform (XSP) enhances SAP security by serving as a versatile connector for Identity Access Management (IAM) solutions. Here are three key use cases where XSP demonstrates its capabilities
Information
What you need to know
Versatile connector
XSP improves SAP security as a versatile connector for Identity Access Management (IAM) solutions.
Comprehensive risk analysis
Provides risk analysis and mitigation as well as efficient calculation of business roles.
Seamless integration
Enables seamless provisioning with SAP Cloud Identity Services and improves security, compliance and integration in the SAP ecosystem.
Xiting security Platform
Connectors for IAM Solutions with XSP
Risk Analysis and Mitigation
XSP provides comprehensive tools for analyzing single and cross-system risks associated with users and roles, particularly focusing on Segregation of Duties (SoD) risks and critical authorizations. It incorporates mitigation workflows that allow for compensating risks that need to be accepted, ensuring that security measures align with organizational policies and compliance requirements.
Provisioning Framework
Utilizing SAP Cloud Identity Services (CIS) and its Identity Provisioning Service (IPS), XSP facilitates the provisioning of users and their role assignments within the SAP ecosystem and extends this functionality to third-party applications. This integration ensures a seamless, secure, and efficient management of identity and access across diverse platforms.
Calculation of Business Roles
XSP excels in calculating and designing cross-system business roles, enabling organizations to mine and analyze existing role assignments to create optimized, coherent business roles. This capability supports effective governance and compliance by ensuring roles are appropriately designed and aligned with the actual operational needs of the business.
The Xiting Content Portal is used to obtain current security-relevant content for SAP, such as rule sets, SIEM security patterns, and SAP Security Notes.