{"id":880,"date":"2019-06-10T22:16:11","date_gmt":"2019-06-10T20:16:11","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=880"},"modified":"2020-07-09T14:50:36","modified_gmt":"2020-07-09T12:50:36","slug":"ui-data-security-ensures-conformity-in-sap-system-data-protection","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/","title":{"rendered":"UI Data Security ensures conformity in SAP system data protection"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-881 size-medium\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/06\/admin-ajax-300x181.jpg\" alt=\"UI Data Security ensures conformity in SAP system data protection\" width=\"300\" height=\"181\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/06\/admin-ajax-300x181.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/06\/admin-ajax.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>SAP has developed a new product, SAP UI Data Security, to support data protection requirements in the SAP environment. UI Data Security comprises two components: UI Masking and UI Logging.<br \/>\n<!--more--><\/p>\n<p>UI Masking permits users to conceal individual fields to protect their data from being made available outside a selected group of people. Whenever field content configured for masking is to be shown on the screen, an authorization control determines which users are permitted to see the data in plain text and which users see the masking. The authorization control supplements the existing SAP authorization concept, adding more components and supporting increased data protection.<\/p>\n<h2><strong>UI Logging reduces data misuse<\/strong><\/h2>\n<p>UI Logging offers detailed logging for configurable data fields via user interfaces and technical interfaces. By contrast to other technologies, it is possible to trace when a data record was displayed &#8211; in addition to when it was created or edited. Creating awareness among employees can lower the probability of data misuse. The analysis function is another feature that cuts down follow-up effort in the case of actual misuse.<\/p>\n<p>Little effort is necessary to implement UI Data Security in production. For example, it is possible in just a short time to mask and log dialog transactions, remote function calls, and web dynpro applications. The only thing that is missing is masking and logging for the F4 Help.<\/p>\n<h2><strong>Protect sensitive data with UI Data Security<\/strong><\/h2>\n<p>The UI Data Security functions provide options for approaching the data protection requirements for employee and customer data, and for sensitive business data. To achieve this, the challenge is to identify, for example, critical transactions and reports in the customer&#8217;s system landscape and to use UI Data Security to mask and log the fields requiring protection.<\/p>\n<p>Do you want to learn more about your options for securing your SAP systems with UI Data Security? We will be more than happy to advise you and provide support for your targeted rollout. Get in touch with us today: <a href=\"mailto:sast@akquinet.de\"><u>sast@akquinet.de<\/u><\/a> Check out our <a href=\"https:\/\/www.sast-solutions.com\">SAST SOLUTIONS website<\/a> for more information on our portfolio.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-882\" title=\"Thomas Tenberge, SAST SOLUTIONS\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/06\/Thomas_Tenberge-300x300.jpg\" alt=\"Thomas Tenberge, SAST SOLUTIONS\" width=\"200\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/06\/Thomas_Tenberge-300x300.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/06\/Thomas_Tenberge-300x300-150x150.jpg 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><br \/>\n<b>Thomas Tenberge (SAP Security Consultant, SAST SOLUTIONS)<\/b><\/p>\n<h2>This might also be of interest to you<strong>:<\/strong><\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/05\/10\/10kblaze-and-sap-security\/\">10KBlaze and SAP Security II: Hype &amp; Scaremongering<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/\" rel=\"bookmark\">SAP Security &amp; Compliance: Challenges in the Context of S\/4HANA, Code Security, and the Cloud<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SAP has developed a new product, SAP UI Data Security, to support data protection requirements in the SAP environment. UI Data Security comprises two components: UI Masking and UI Logging.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[80],"class_list":["post-880","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UI Data Security ensures conformity in SAP system data protection<\/title>\n<meta name=\"description\" content=\"SAP has developed a new product to support data protection requirements in the SAP environment: SAP UI Data Security with UI Masking and UI Logging.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UI Data Security ensures conformity in SAP system data protection\" \/>\n<meta property=\"og:description\" content=\"SAP has developed a new product to support data protection requirements in the SAP environment: SAP UI Data Security with UI Masking and UI Logging.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-10T20:16:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-09T12:50:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/06\/admin-ajax-300x181.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"UI Data Security ensures conformity in SAP system data protection\",\"datePublished\":\"2019-06-10T20:16:11+00:00\",\"dateModified\":\"2020-07-09T12:50:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/\"},\"wordCount\":393,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/admin-ajax-300x181.jpg\",\"keywords\":[\"SAP Security\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/\",\"name\":\"UI Data Security ensures conformity in SAP system data protection\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/admin-ajax-300x181.jpg\",\"datePublished\":\"2019-06-10T20:16:11+00:00\",\"dateModified\":\"2020-07-09T12:50:36+00:00\",\"description\":\"SAP has developed a new product to support data protection requirements in the SAP environment: SAP UI Data Security with UI Masking and UI Logging.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/admin-ajax-300x181.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/admin-ajax-300x181.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/06\\\/10\\\/ui-data-security-ensures-conformity-in-sap-system-data-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UI Data Security ensures conformity in SAP system data protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UI Data Security ensures conformity in SAP system data protection","description":"SAP has developed a new product to support data protection requirements in the SAP environment: SAP UI Data Security with UI Masking and UI Logging.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/","og_locale":"en_US","og_type":"article","og_title":"UI Data Security ensures conformity in SAP system data protection","og_description":"SAP has developed a new product to support data protection requirements in the SAP environment: SAP UI Data Security with UI Masking and UI Logging.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/","og_site_name":"SAST BLOG","article_published_time":"2019-06-10T20:16:11+00:00","article_modified_time":"2020-07-09T12:50:36+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/06\/admin-ajax-300x181.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"UI Data Security ensures conformity in SAP system data protection","datePublished":"2019-06-10T20:16:11+00:00","dateModified":"2020-07-09T12:50:36+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/"},"wordCount":393,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/06\/admin-ajax-300x181.jpg","keywords":["SAP Security"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/","url":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/","name":"UI Data Security ensures conformity in SAP system data protection","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/06\/admin-ajax-300x181.jpg","datePublished":"2019-06-10T20:16:11+00:00","dateModified":"2020-07-09T12:50:36+00:00","description":"SAP has developed a new product to support data protection requirements in the SAP environment: SAP UI Data Security with UI Masking and UI Logging.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/06\/admin-ajax-300x181.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/06\/admin-ajax-300x181.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/06\/10\/ui-data-security-ensures-conformity-in-sap-system-data-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"UI Data Security ensures conformity in SAP system data protection"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=880"}],"version-history":[{"count":2,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/880\/revisions"}],"predecessor-version":[{"id":885,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/880\/revisions\/885"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}