{"id":11433,"date":"2020-08-03T15:59:17","date_gmt":"2020-08-03T13:59:17","guid":{"rendered":"https:\/\/www.xiting.us\/?p=11433"},"modified":"2025-10-01T10:47:21","modified_gmt":"2025-10-01T08:47:21","slug":"sap-cloud-platform-security","status":"publish","type":"post","link":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/","title":{"rendered":"Securing the SAP Business Technology Platform (BTP)"},"content":{"rendered":"\n<p>SAP Business Technology Platform (BTP), formerly SAP Cloud Platform (SCP), is a platform-as-a-service (PaaS) developed by <a aria-label=\"undefined (opens in a new tab)\" href=\"http:\/\/sap.com\" target=\"_blank\" rel=\"noreferrer noopener\">SAP<\/a> for creating new applications or extending existing applications in a secure cloud computing environment managed by the company.\u00a0<\/p>\n\n\n\n<p>The SAP Business Technology Platform integrates data and business processes and includes the in-memory SAP HANA database management system. SAP Business Technology Platform helps leverage cloud-native technologies and extends on-premise software. The cloud-based platform requires security measures from the platform provider (SAP), as well as the customer (the user of the platform).\u00a0<\/p>\n\n\n\n<p>SAP Business Technology Platform provides tools and security architecture to ensure the security and privacy of the cloud and the user (e.g., their personal information).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-on-premise-security-vs-cloud-security\">On-Premise Security vs. Cloud Security<\/h2>\n\n\n\n<p>Securing SAP systems is an increasingly vital aspect of business operations. If your SAP systems aren\u2019t secure, you risk your data being stolen or held for ransom. So it\u2019s important to address the cybersecurity aspects of a move from on-premise to cloud systems.&nbsp;<\/p>\n\n\n\n<p>The main difference between on-premise security and cloud security is the fact that in the on-prem world, the servers and data are physically stored on your property. This means you have full control, but also full responsibility.&nbsp;<\/p>\n\n\n\n<p>In the cloud world, a third-party provider (such as SAP) hosts your servers and data and is responsible for securing the platform. This shift of responsibility requires a mindset change on the customer side, as you have to trust the cloud provider and put security controls into place that the cloud provider must adhere to.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-data-centers-and-physical-security\">Data Centers and Physical Security<\/h2>\n\n\n\n<p>SAP Business Technology Platform runs on SAP-owned data centers, as well as infrastructure-as-a-service (IaaS) cloud providers stationed around the world. These relationships are the foundation for the rapid growth of SAP\u2019s global reach, as the company can leverage the existing infrastructure of trusted partners rather than creating its own infrastructure from scratch.\u00a0<\/p>\n\n\n\n<p>The data centers meet Level 3 of the SAP data center level rating system. SAP data centers are subject to high industry security standards and are ISO 27001 certified. ISO 27001 is the best-known standard for an information security management system (ISMS).<\/p>\n\n\n\n<p>The data centers also meet a number of additional security standards:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>SAP does not transfer customer data outside the predefined range and does not communicate any information to unauthorized third parties.<\/li><li>The colocation provider does not have administrative access to the SAP cloud servers.<\/li><li>The cloud provider&#8217;s services focus only on providing premises, cooling and energy.<\/li><li>All SAP data centers are monitored around the clock via video and security personnel.<\/li><\/ul>\n\n\n\n<p>SAP has 60+ data centers around the world in 16+ countries with 30+ locations from various regional data centers from major infrastructure-as-a-service (IaaS) cloud providers. SAP\u2019s customers can choose the region of data storage (for example, EU-only operations are available), which means that customers can benefit from local regulations (e.g., strong German and EU regulations). Plus, low latency speeds up access.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cornerstones-of-the-security-architecture\">Cornerstones of the Security Architecture<\/h2>\n\n\n\n<p>Many organizations do not realize the threat posed by vulnerabilities in SAP applications. Because of the number of moving pieces and the volume of affected areas and processes \u2014 including applications, infrastructure and operations \u2014 it&#8217;s critical that SAP maintains a rock-solid security strategy that&#8217;s focused on its three security &#8220;cornerstones,&#8221; as described below.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Secure Products<\/strong>: Security incorporated into all applications to deliver the ultimate protection of content and transactions.<\/li><li><strong>Secure Operations<\/strong>: End-to-end secure cloud operations to defend customer data and business operations.<\/li><li><strong>Secure Company<\/strong>: Security-aware staff, end-to-end physical security of SAPs assets, and a comprehensive business continuity framework.<\/li><\/ol>\n\n\n\n<p>These cornerstones are the foundation of <strong>secure SAP<\/strong>.<\/p>\n\n\n\n<p>Furthermore, the platform&#8217;s security architecture aims to isolate customer data and customer systems from the services that utilize it.<\/p>\n\n\n\n<p>This is achieved by sandboxing the application and network:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Application sandboxing<\/strong>: Restrict and manage the functionality of an application only within the container in which the application is running.<\/li><li><strong>Network sandboxing<\/strong>: Restrict and manage the application&#8217;s access to other system landscapes.<\/li><\/ul>\n\n\n\n<p>Without sandboxing, an application or other system processes could gain unlimited access to all the customer data and system resources on the platform. This segregation is mainly required because SAP Business Technology Platform allows the execution of custom code.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-sap-business-technology-platform-security-services\">SAP Business Technology Platform Security Services<\/h2>\n\n\n\n<p>The SAP Business Technology Platform offers three security services to authenticate and provision users and privileges across the SAP cloud applications, as well as to manage them from a governance perspective.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-sap-cloud-identity-authentication-service-ias\">SAP Cloud Identity Authentication Service (IAS)<\/h3>\n\n\n\n<p>The SAP Cloud Identity Authentication service enables organizations to provide their employees, customers, and partners with cloud-based access to the enterprise processes, applications, and data they need. Authentication mechanisms such as single sign-on functionality, on-premise integration, and self-service options are built-in features for SAP cloud applications.<\/p>\n\n\n\n<p>OAuth is an open security protocol that replaces a person&#8217;s username and password with a token. As a result, OAuth clients provide secure delegated access to server resources on behalf of a resource owner. The SAP Business Technology Platform supports the OAuth 2.0 protocol as a method of protecting application APIs and resources.<\/p>\n\n\n\n<p>Learn more about <a href=\"https:\/\/www.xiting.us\/sap-identity-authentication-service-overview\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">IAS<\/a> here.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-sap-cloud-identity-provisioning-service-ips\">SAP Cloud Identity Provisioning Service (IPS)<\/h3>\n\n\n\n<p>SAP Cloud Identity Provisioning automates identity lifecycle processes. It enables you to provision identities and their authorizations to various cloud and on-premise business applications. Identity provisioning software improves IT security and reduces compliance costs. User accounts and permissions can be automated. Existing identity stores, such as enterprise-based Active Directory, can be used to provide support for heterogeneous landscapes.\u00a0<\/p>\n\n\n\n<p>In addition to deploying on-premise or third-party cloud users to SAP cloud applications, customers can also provide the appropriate user permissions for each SAP cloud application during the deployment process. This is done by defining the access policies before the deployment process and by mapping the user groups to the user roles in the cloud. In addition, the SAP Business Technology Platform supports dynamic role assignments.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-sap-cloud-identity-access-governance-iag\">SAP Cloud Identity Access Governance (IAG)<\/h3>\n\n\n\n<p>SAP Cloud Identity Access Governance service offers a range of identity and access management capabilities, including (among others) self-service access requests for on-premise and cloud applications, access risk analysis, and role design. Each of the services that come with SAP Cloud IAG can work independently or in combination with one another.<\/p>\n\n\n\n<p>Learn more about <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.xiting.us\/sap-cloud-iag\/\" target=\"_blank\" rel=\"noreferrer noopener\">IAG<\/a> here.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-faqs\">FAQs<\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1596462394839\"><strong class=\"schema-faq-question\"><strong>Is the SAP Business Technology Platform (BTP) based on SAP NetWeaver ABAP?<\/strong><\/strong> <p class=\"schema-faq-answer\">The SAP Business Technology Platform is not based on an SAP NetWeaver ABAP. However, with the SAP Business Technology Platform ABAP environment, you can develop ABAP code in the cloud.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1596462410393\"><strong class=\"schema-faq-question\"><strong>Which open standards does SAP Business Technology Platform integrate with?<\/strong><\/strong> <p class=\"schema-faq-answer\">SAP Business Technology Platform relies on open standards like Java, JavaScript, Node.js, and Cloud Foundry for integration options.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1596462419095\"><strong class=\"schema-faq-question\"><strong>Can you host the BTP on Microsoft Azure, Google Cloud, or Amazon\u2019s AWS?<\/strong><\/strong> <p class=\"schema-faq-answer\">The SAP Business Technology Platform (BTP) is a platform-as-a-service (PaaS) offering from SAP that cannot be hosted elsewhere. You can, however, host your on-premise SAP S\/4HANA system on Microsoft Azure and connect to BTP.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1596462427582\"><strong class=\"schema-faq-question\"><strong>Who is responsible for SAP security in BTP?<\/strong><\/strong> <p class=\"schema-faq-answer\">The responsibility in BTP is shared between the service provider of the cloud (SAP) and the customer\u2019s SAP security team. That\u2019s why it\u2019s important that contracts are put in place that clearly defines the responsibilities and liabilities of all parties involved.\u00a0<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1596462443286\"><strong class=\"schema-faq-question\"><strong>How do you manage identities in BTP?<\/strong><\/strong> <p class=\"schema-faq-answer\">Identity management can be achieved by using the IPS as your identity provider.\u00a0<\/p> <\/div> <\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n\n\n\n<p>SAP Business Technology Platform (BTP) is a PaaS (platform-as-a-service) offering from SAP that provides services for the development, integration, and deployment of modern cloud applications, as well as for customer-specific expansion of cloud and on-premise landscapes.\u00a0<\/p>\n\n\n\n<p>Securing the cloud platform is a mixed responsibility between the provider (SAP) and the customer. While the platform security is handled by SAP, customers are still responsible for taking care of the users of the cloud solutions.&nbsp;<\/p>\n\n\n\n<p>With the SAP Business Technology Platform security services, you can authenticate and provision your end-users to SAP\u2019s cloud services and applications. An access governance structure, similar to what SAP Access Control (GRC) offers on-premise, can be achieved with the IAG service.<\/p>\n\n\n\n<p>Learn more about SAP Cloud Security:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.xiting.us\/sap-cloud-iag\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">SAP Cloud Identity Access Governance (IAG)<\/a><\/li><li><a href=\"https:\/\/www.xiting.us\/sap-identity-authentication-service-overview\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">SAP Identity Authentication Service (IAS) <\/a><\/li><\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SAP Cloud Platform (SCP) is a platform-as-a-service (PaaS) developed by SAP for creating new applications or extending existing applications in a secure cloud computing environment managed by the company. <\/p>\n","protected":false},"author":7,"featured_media":11435,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1835],"tags":[],"class_list":["post-11433","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing the SAP Business Technology Platform (BTP) - Xiting<\/title>\n<meta name=\"description\" content=\"SAP Cloud Platform (SCP) is a platform-as-a-service (PaaS) developed by SAP for creating new applications or extending existing applications in a secure cloud computing environment managed by the company.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the SAP Business Technology Platform (BTP)\" \/>\n<meta property=\"og:description\" content=\"SAP Cloud Platform (SCP) is a platform-as-a-service (PaaS) developed by SAP for creating new applications or extending existing applications in a secure cloud computing environment managed by the company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XitingAG\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-03T13:59:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T08:47:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiting.com\/wp-content\/uploads\/2020\/08\/shutterstock_790656991-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alessandro Banzer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Banzer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/\"},\"author\":{\"name\":\"Alessandro Banzer\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\"},\"headline\":\"Securing the SAP Business Technology Platform (BTP)\",\"datePublished\":\"2020-08-03T13:59:17+00:00\",\"dateModified\":\"2025-10-01T08:47:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/\"},\"wordCount\":1372,\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/shutterstock_790656991-scaled.jpg\",\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/\",\"name\":\"Securing the SAP Business Technology Platform (BTP) - Xiting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/shutterstock_790656991-scaled.jpg\",\"datePublished\":\"2020-08-03T13:59:17+00:00\",\"dateModified\":\"2025-10-01T08:47:21+00:00\",\"description\":\"SAP Cloud Platform (SCP) is a platform-as-a-service (PaaS) developed by SAP for creating new applications or extending existing applications in a secure cloud computing environment managed by the company.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462394839\"},{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462410393\"},{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462419095\"},{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462427582\"},{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462443286\"}],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/shutterstock_790656991-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/shutterstock_790656991-scaled.jpg\",\"width\":2560,\"height\":1506,\"caption\":\"Cloud Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xiting.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the SAP Business Technology Platform (BTP)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"name\":\"Xiting\",\"description\":\"Your Expert for SAP Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xiting.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\",\"name\":\"Xiting\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Xiting\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XitingAG\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1345129\\\/\",\"https:\\\/\\\/www.instagram.com\\\/xiting.global\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\",\"name\":\"Alessandro Banzer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"caption\":\"Alessandro Banzer\"},\"description\":\"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/author\\\/admin\\\/\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462394839\",\"position\":1,\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462394839\",\"name\":\"Is the SAP Business Technology Platform (BTP) based on SAP NetWeaver ABAP?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The SAP Business Technology Platform is not based on an SAP NetWeaver ABAP. However, with the SAP Business Technology Platform ABAP environment, you can develop ABAP code in the cloud.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462410393\",\"position\":2,\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462410393\",\"name\":\"Which open standards does SAP Business Technology Platform integrate with?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"SAP Business Technology Platform relies on open standards like Java, JavaScript, Node.js, and Cloud Foundry for integration options.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462419095\",\"position\":3,\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462419095\",\"name\":\"Can you host the BTP on Microsoft Azure, Google Cloud, or Amazon\u2019s AWS?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The SAP Business Technology Platform (BTP) is a platform-as-a-service (PaaS) offering from SAP that cannot be hosted elsewhere. You can, however, host your on-premise SAP S\\\/4HANA system on Microsoft Azure and connect to BTP.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462427582\",\"position\":4,\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462427582\",\"name\":\"Who is responsible for SAP security in BTP?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The responsibility in BTP is shared between the service provider of the cloud (SAP) and the customer\u2019s SAP security team. That\u2019s why it\u2019s important that contracts are put in place that clearly defines the responsibilities and liabilities of all parties involved.\u00a0\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462443286\",\"position\":5,\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-cloud-platform-security\\\/#faq-question-1596462443286\",\"name\":\"How do you manage identities in BTP?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Identity management can be achieved by using the IPS as your identity provider.\u00a0\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing the SAP Business Technology Platform (BTP) - Xiting","description":"SAP Cloud Platform (SCP) is a platform-as-a-service (PaaS) developed by SAP for creating new applications or extending existing applications in a secure cloud computing environment managed by the company.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"Securing the SAP Business Technology Platform (BTP)","og_description":"SAP Cloud Platform (SCP) is a platform-as-a-service (PaaS) developed by SAP for creating new applications or extending existing applications in a secure cloud computing environment managed by the company.","og_url":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/","og_site_name":"Xiting","article_publisher":"https:\/\/www.facebook.com\/XitingAG","article_published_time":"2020-08-03T13:59:17+00:00","article_modified_time":"2025-10-01T08:47:21+00:00","og_image":[{"width":2560,"height":1506,"url":"https:\/\/xiting.com\/wp-content\/uploads\/2020\/08\/shutterstock_790656991-scaled.jpg","type":"image\/jpeg"}],"author":"Alessandro Banzer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alessandro Banzer","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#article","isPartOf":{"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/"},"author":{"name":"Alessandro Banzer","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e"},"headline":"Securing the SAP Business Technology Platform (BTP)","datePublished":"2020-08-03T13:59:17+00:00","dateModified":"2025-10-01T08:47:21+00:00","mainEntityOfPage":{"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/"},"wordCount":1372,"publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"image":{"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2020\/08\/shutterstock_790656991-scaled.jpg","articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/","url":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/","name":"Securing the SAP Business Technology Platform (BTP) - Xiting","isPartOf":{"@id":"https:\/\/xiting.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#primaryimage"},"image":{"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2020\/08\/shutterstock_790656991-scaled.jpg","datePublished":"2020-08-03T13:59:17+00:00","dateModified":"2025-10-01T08:47:21+00:00","description":"SAP Cloud Platform (SCP) is a platform-as-a-service (PaaS) developed by SAP for creating new applications or extending existing applications in a secure cloud computing environment managed by the company.","breadcrumb":{"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462394839"},{"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462410393"},{"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462419095"},{"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462427582"},{"@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462443286"}],"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiting.com\/en\/sap-cloud-platform-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#primaryimage","url":"https:\/\/xiting.com\/wp-content\/uploads\/2020\/08\/shutterstock_790656991-scaled.jpg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2020\/08\/shutterstock_790656991-scaled.jpg","width":2560,"height":1506,"caption":"Cloud Security"},{"@type":"BreadcrumbList","@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiting.com\/en\/"},{"@type":"ListItem","position":2,"name":"Securing the SAP Business Technology Platform (BTP)"}]},{"@type":"WebSite","@id":"https:\/\/xiting.com\/en\/#website","url":"https:\/\/xiting.com\/en\/","name":"Xiting","description":"Your Expert for SAP Security","publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiting.com\/en\/#organization","name":"Xiting","url":"https:\/\/xiting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","width":1,"height":1,"caption":"Xiting"},"image":{"@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XitingAG","https:\/\/www.linkedin.com\/company\/1345129\/","https:\/\/www.instagram.com\/xiting.global\/"]},{"@type":"Person","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e","name":"Alessandro Banzer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","caption":"Alessandro Banzer"},"description":"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.","url":"https:\/\/xiting.com\/en\/author\/admin\/"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462394839","position":1,"url":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462394839","name":"Is the SAP Business Technology Platform (BTP) based on SAP NetWeaver ABAP?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The SAP Business Technology Platform is not based on an SAP NetWeaver ABAP. However, with the SAP Business Technology Platform ABAP environment, you can develop ABAP code in the cloud.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462410393","position":2,"url":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462410393","name":"Which open standards does SAP Business Technology Platform integrate with?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"SAP Business Technology Platform relies on open standards like Java, JavaScript, Node.js, and Cloud Foundry for integration options.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462419095","position":3,"url":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462419095","name":"Can you host the BTP on Microsoft Azure, Google Cloud, or Amazon\u2019s AWS?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The SAP Business Technology Platform (BTP) is a platform-as-a-service (PaaS) offering from SAP that cannot be hosted elsewhere. You can, however, host your on-premise SAP S\/4HANA system on Microsoft Azure and connect to BTP.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462427582","position":4,"url":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462427582","name":"Who is responsible for SAP security in BTP?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The responsibility in BTP is shared between the service provider of the cloud (SAP) and the customer\u2019s SAP security team. That\u2019s why it\u2019s important that contracts are put in place that clearly defines the responsibilities and liabilities of all parties involved.\u00a0","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462443286","position":5,"url":"https:\/\/xiting.com\/en\/sap-cloud-platform-security\/#faq-question-1596462443286","name":"How do you manage identities in BTP?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Identity management can be achieved by using the IPS as your identity provider.\u00a0","inLanguage":"en-US"},"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/11433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/comments?post=11433"}],"version-history":[{"count":8,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/11433\/revisions"}],"predecessor-version":[{"id":15800,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/11433\/revisions\/15800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media\/11435"}],"wp:attachment":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media?parent=11433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/categories?post=11433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/tags?post=11433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}