6.4    SAP S/4HANA Security

The security strategy for SAP S/4HANA should be part of the overall landscape security strategy, including authentication and authorization. This includes user provisioning with correct roles so that the right users can perform the relevant role and have the option to access systems through Single Sign-On (SSO). There also needs to be audit logging so that a trace is available for critical user actions. Other aspects of security include encryption, network security, data center security certifications, and so on.

The SAP HANA platform provides unified security options from both the database perspective and the analytics engine perspective, as shown in Figure 6.20.

SAP HANA Security Model

Figure 6.20    SAP HANA Security Model

The key security functions of the SAP HANA database are the following:

On-premise deployments of SAP S/4HANA generally rely on the user management and authentication mechanisms provided with the SAP NetWeaver platform, specifically the SAP NetWeaver AS ABAP and the SAP HANA platform. Therefore, the security recommendations and guidelines for user administration and authentication as described in the SAP NetWeaver AS ABAP Security Guide and SAP HANA platform also apply to SAP S/4HANA.

A few example scenarios and the type of permissions required in each case are shown in Figure 6.21.

SAP HANA User Scenarios

Figure 6.21    SAP HANA User Scenarios

Following are some examples of user provisioning for the different layers of the application: