SAP HANA Security
SAP S/4HANA brings not only a change in processes, but also a change in technologies. And when speaking of changes in technologies, the matter of security becomes more important than ever. This also applies to the new platform for SAP S/4HANA. New interfaces, new functions and new tools bring new challenges. That’s why Xiting focuses on helping you secure your SAP HANA environment.
SAP HANA Database Authorization Concept and Check
The user groups using the SAP HANA database often changes. Many more user groups (particularly developers) are operating in SAP HANA databases. What is new in SAP S/4HANA is that the need for access to the SAP HANA database is mostly limited to developers (for example, for mixed, complex modeling in BW), as users use analytical Fiori apps.
We are available to discuss these access requirements with you in workshops meant to clarify security relevant aspects of your overall user role system depending on the application scenario. We support you in mapping security relevant aspects in a role concept and in creating an effective control environment in SAP HANA. If you’re already using SAP HANA, we will help you assess your situation, identify optimization potential, and establish best practice approaches.
SAP HANA Services in Detail
If your answer is “yes” to one or more of the following questions, the SAP HANA Services developed by Xiting can be of great value:
We help you to analyze these questions in order to gain a better understanding of the concepts above – regardless of whether you use SAP HANA for an ERP 6.0 or SAP S/4HANA.
With the aid of SAP HANA Services developed by Xiting, we clearly explain the different tools for administration and management. We present the advantages and disadvantages of SAP HANA Cockpit, Web IDE and SAP HANA Studio, and show you which authorizations are required. We explain what role the SAP HANA Extended Application Services (XS Classic/XS Advanced) play, and how to deal with them from an authorization and compliance point of view. We support you in setting up and implementing the authorization roles in your SAP
HANA database, or if it already exists, in assessing the quality of your SAP HANA authorization concept.
Authorization administrators must be able to create roles, manage password rules and user (groups), and track down authorization problems. Our services provide you with the necessary know-how and help you master these challenges.
We help you to be optimally prepared for emergency situations, as well as to meet the recommendations of SAP to block critical users, such as SYSTEM. We will show you what contribution the XAMS can have when it comes to quality assurance of the role concept, emergency user management and risk analysis.