Spotlight: An SAP Security Architect Comments on Methods to Keep SAP HANA Secure
SAP Professional JournalIn this question-and-answer article, you’ll learn what measures to take to secure SAP HANA-based applications. SAP HANA environments typically have far more users directly accessing back-end systems than conventional environments. Therefore, it is critical to configure effective audit policies to monitor actions that include SELECT, INSERT, UPDATE, DELETE, EXECUTE, and other SQL statements...