Volume IX: Assessing and Defending SAP BusinessObjects
Please complete the registration form in order to download the publication. We will send you an email with your download link.
Implementing proper security controls for a BusinessObjects implementation is a complex
process. There are a number of moving parts, complicated Access Controls, and many
client access points. For those tasked with auditing an implementation it can be difficult
to know where to begin.
In this white paper we discuss the BusinessObjects architecture
landscape, discuss common security practices, target areas for an attacker, and make
recommendations that, if not already implemented, will increase the security posture of
your BusinessObjects deployment.