Securing SAP S/4HANA

Look inside! View a sample excerpt.

Securing SAP S/4HANA

Part of our online library flat rate.

  • By
  • Chris Walravens,
  • Christophe Decamps,
  • Bert Vanstechelman

191 Pages, 1. Edition , ISBN: 9783960122494

Print Edition

Share this Product

Get Custom offer

  • 10+ Users
  • For departments or complete companies
  • Premium analytics













Explore how to protect and defend your SAP S/4HANA applications, Fiori, Gateway, and the SAP HANA database platform. Learn how to create a consistent cross-system authorization concept and translate the technical specifics for each system into a comprehensive and consistent security model. Explore technical security aspects such as privileges and roles, authentication and encryption, and monitoring for S/4HANA. Compare and contrast SAP S/4HANA applications to the SAP ERP security model and identify what has changed. This book is up to date for SAP HANA 2.0! Dive into SAP S/4HANA authorizations and gain an understanding of the impact on the new front-end and database security setup, and why the different levels need to be consistent. Get best practices for SAP Fiori and Gateway. Find out why it is important to secure SAP HANA from an application layer point of view, as well as a database point of view. Take an in-depth look at how to secure the SAP Application Server, database, operating system, and the network infrastructure.

  • Effectively secure SAP S/4HANA, Fiori, and Gateway
  • Privileges and roles, authentication, encryption, and monitoring
  • Mobile access and SSO considerations
  • Cross-system authorization concepts and implementation