|
For administrator who handle the Unix system, here are
some idea where you can review on the security and control over the Unix
operating system.
1. Determine who has access to execute program SAPMSOS0. This program has access to the UNIX command prompt. This program is run by Transaction SM52.
$ cat etc/passwd
$ cat etc/group
4. Obtain a listing of the SAP directories and determine who has read and write authorities to these directories and files: /usr/sap Many of the files and sub-directories hold pertinent information: /usr/sap/trans/buffer - information on which transports are to be imported /usr/sap/trans/cofiles - information on transport requests /usr/sap/trans/sapnames - information for users on transport request status /usr/sap/trans/tmp - temporary data /usr/sap/trans/log - local system log /usr/sap/trans/work - runtime data
/etc/inittab
6. List the trusted environment within UNIX to ensure that any trust relationships are also properly protected. etc/hosts.equiv .rhost
7. List the exported file system to determine if any SAP file is exported over the network. etc/exports
/usr/spool/cron/crontabs/root RDDIMPDP migrates to production queued up jobs (every 5 minutes)
/etc/services /etc/inetd.conf
11. Perform a find command to identify all suid and sgid programs that are owned by root. Using this output sum the result to compare from one day to the next to track differences. The diff command can be used to identify any changes that have occurred. # find / -name root -perm -4000 -print # find / -name root -perm -2000 -print # find / -name root -perm -4000 | sum > today |
|
See Also
Get help for your Basis problems
SAP Basis Admin Books
SAP Basis Tips
Administration In SAP - Sapgui, Unix, SAP ITS, Router, Client Copy and IDES Main Index
All the site contents are Copyright © www.erpgreat.com
and the content authors. All rights reserved.
|