(Jana Subramanian serves as APJ Principal Cybersecurity Advisor for Cloud Security and a Fellow of Information Privacy (FIP), awarded by the International Association of Privacy Professionals (IAPP). In this role, Jana supports strategic customer engagements on cybersecurity, data privacy, multi-cloud security integration architecture, contractual assurance, audit, and compliance.) Introduction SAP customers host their business critical....
SAP UI Masking is a tool that sits between the database and GUI to protect the sensitive data. Basically the tool works at the presentation layer which can be used for making a field display only, mask using a pattern or completely hide the field itself without impacting the application layer that runs the business....
(Jana Subramanian is APJ Principal Cybersecurity Advisor for Cloud Security and Fellow of Information Privacy (FIP) awarded by International Association of Privacy Professional (IAPP). Jana supports strategic customer engagements on cybersecurity, data privacy, multi-cloud security architecture, contractual assurance, audit, and compliance domains.) Introduction Recently, major cloud service providers in a shared initiative have come up with the “Trusted....
Introduction In this blog post, we will learn how to configure Data Blocking through Manage Sensitive Attributes app provided by UI Data Protection Masking for SAP S/4HANA 2011 solution based on Attribute Based Authorization Control(ABAC) concept. Manage Sensitive Attributes app The Manage Sensitive Attributes application allows you to maintain configuration for UI data protection in a SAP Fiori-based UI. This application brings together several individual....
Introduction In this blog post, we will learn how to mask “ID Number” field in Birth Certificate (BC), Driver’s License (DL), and Social Insurance Number (SN) sub-types of Personal IDs (0185) Info-type of transaction SE16/PA20/PA30. For other Sub-types, ID Number field will remain unmasked. Attribute based authorizations are dynamic determination mechanism which determines whether a user is authorized to access specific data sets which can be based on....