Spotlight: An SAP Security Architect Comments on Methods to Keep SAP HANA Secure

Spotlight: An SAP Security Architect Comments on Methods to Keep SAP HANA Secure

Reading time: 8 mins

SAP Professional JournalIn this question-and-answer article, you’ll learn what measures to take to secure SAP HANA-based applications. SAP HANA environments typically have far more users directly accessing back-end systems than conventional environments. Therefore, it is critical to configure effective audit policies to monitor actions that include SELECT, INSERT, UPDATE, DELETE, EXECUTE, and other SQL statements...

This content is for SAPinsider Monthly Subscription, SAPinsider Annual Subscription, and SAPinsider Premium Annual Subscription members only.
Log In Join Now

More Resources