Security Postinstallation Checklist

Configuring security after installing runtime components is dependent upon the successful completion of SAP Control Center postinstallation tasks. Perform the security postinstallation tasks once SAP Control Center is functionally stable.

Task Complete?
Secure the infrastructure of data tier components. See Securing the Data Infrastructure in the Security guide.  
Prepare the runtime environment according to your backup and recovery strategy, and secure the identified backup artifacts. See Backup and Recovery in the System Administration guide.  
Secure the data tier databases by changing default passwords and encrypted data in the database file. See Securing Data Tier Databases in the Security guide.  
(Upgrade) Create and map an SUP Push User logical role for each security configuration used to authorize incoming push notifications. See Mapping DCN or Push Roles to a User Name Defined In PreconfiguredUserLoginModule in the Security guide.  

Once these are complete, perform any other necessary security administration tasks. See Securing Data in Motion Quick Start and Securing Access Quick Start in Security.