Aug 02, 2019 SAP HANA databases now need new security settings and authorization setups to not only reduce the chances of improper access but ensure that it’s operated correctly as well. If you’d like to make the most of your SAP HANA engine and take advantage of SAP HANA extended application services, advanced model.
![]() ![]() ![]()
Hi Vishal,The standard SoD matrices provided by SAP are a good foundation but you willneed to tailor them to your own organisational requirements.MarkFrom: sapvish via sap-security mailto:[email protected]: Thursday, 11 March 2010 10:53 AMTo: meconsultingSubject: Re: sap-security GRC Implementation guidePosted by sapvish (SQA)on Mar 10 at 6:53 PM Mark this reply ashelpfulMark as helpfulHi AllHow gud are the standard SoDs provided by SAP, with some tweaking can thesesolve the purpose.Regards,Vishal.
Protecting a company's or an organization's critical data from unauthorized access and ensuring compliance with the growing number of rules and regulations is becoming increasingly important for SAP customers. The purpose of this document is to give IT security experts a starting point and overview of what they need to understand about SAP HANA in order to comply with security-relevant regulations and policies and to protect their SAP HANA implementation and the data within from unauthorized access.
![]() Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |