Security

Fortifying Against S/4HANA Transformation Risks

Complexity and change can expose data so taking responsibility for your own SAP Destiny is Essential

Reading time: 7 mins

Key Takeaways

⇨ t is important to understand the nuances of the shared security responsibility model between the various entities - RISE with SAP, SAP as SaaS provider, customers and hyperscale providers.

⇨ Organizations shouldn’t go for a multitude of vendors to promising to manage one or two aspects of their IT but they should look at a platform approach that has broader coverage and is easier to manage.

⇨ While SAP is providing tools to help customers manage the switch, for example, through a clean core, or managing customizations through BTP – security is just one small aspect of this and looks very different.

It would be fair to say that any organization looking to upgrade or move to SAP S/4HANA is entering into something of a twilight zone when it comes to cybersecurity. The challenge revolves around the very idea that the majority of current ERP installations are customized and complex and that organizations have evolved rapidly, with new platforms and devices that may require different forms of authentication and security measures. A shift towards S/4HANA is also not straightforward. A mix of cost, legacy technologies and data compliance demands can create a confusing transformation path that can expose data at multiple points across networks and services.

Membership Required

You must be a member to access this content.

View Membership Levels

Explore related questions

Already a member? Log in here

More Resources

See All Related Content