Security Audit for SAP IDM
Comprehensive Security Audit for your SAP Identity Management


Are you interested in this service?
Xiting Audit Service for SAP IDM in Detail
Your challenge
SAP Identity Management supports companies in centrally managing their user accounts and their authorizations. Since the system distributes passwords and critical access rights to the connected systems, it should be particularly well protected. The complex and heterogeneous architecture of SAP IDM entails many risks that are often not considered when setting up the system. Thus, such a misconfiguration can lead to unauthorized access or interruptions in the normal system operation.
As part of the security audit, we analyze critical configurations according to the SAP best practice. As a result, we provide a risk analysis, which can be used as a template to optimize your system.

Our solution
As part of the security audit, we analyze critical configurations according to the SAP best practice. As a result, we provide a risk analysis, which can be used as a template to optimize your system.
Risks considered:
- Possible vulnerabilities due to misconfiguration
- Possible interruption in normal system operation due to misconfiguration
- Possible unauthorized accesses
Areas analyzed:
- Critical points on the SAP IDM components: Core, Runtime, SAP Developer Studio, AS JAVA
- Communication between systems (SNC/TLS)
- Definition of relevant SAP IDM interfaces
- Various tables in the SAP IDM database
- Encryption algorithms
Benefits:
- Our security experts analyze the system landscape and identify risks
- You will receive a report on the activities carried out and an analysis of the risks
- We make recommendations for action on the risks analyzed
All SAP IDM services from Xiting
Get to know our entire service portfolio in the field of SAP Identity Management.