Spotlight: An SAP Security Architect Comments on Methods to Keep SAP HANA Secure

Spotlight: An SAP Security Architect Comments on Methods to Keep SAP HANA Secure

Published: 14/February/2014

Reading time: 8 mins

SAP Professional JournalIn this question-and-answer article, you’ll learn what measures to take to secure SAP HANA-based applications. SAP HANA environments typically have far more users directly accessing back-end systems than conventional environments. Therefore, it is critical to configure effective audit policies to monitor actions that include SELECT, INSERT, UPDATE, DELETE, EXECUTE, and other SQL statements...

This content is for Mastering SAP Premium Access and Mastering SAP Preferred Access members only.
Log In Join Now

More Resources