Spotlight: An SAP Security Architect Comments on Methods to Keep SAP HANA Secure

Spotlight: An SAP Security Architect Comments on Methods to Keep SAP HANA Secure

Reading time: 8 mins

SAP Professional JournalIn this question-and-answer article, you’ll learn what measures to take to secure SAP HANA-based applications. SAP HANA environments typically have far more users directly accessing back-end systems than conventional environments. Therefore, it is critical to configure effective audit policies to monitor actions that include SELECT, INSERT, UPDATE, DELETE, EXECUTE, and other SQL statements...

This content is available to Premium Members.

Sign In Become a Member

More Resources

See All Related Content