SAP HANA is an in-memory database that stores and processes large amounts of data generated by SAP applications.
SAP HANA holds a lot of critical, confidential business data and compromising that data can lead to compliance and regulation infringements, as well as financial loss. So, how do you ensure that your system is protected?
SAP HANA has many uses beyond its database functionality, such as advanced analytics and operations for next-generation applications. Therefore, it’s crucial to protect data and applications from risk by utilizing specific security features like user and role management, authorizations, authentication, and encryption–all which must be carefully configured by the security administrator. You can configure SAP HANA security to protect your organization against unauthorized activity, primarily by using roles and privileges to govern authorizations and authentication
What’s New with Security in SAP HANA 2.0?
The biggest change to how you manage security in SAP HANA 2.0 is the SAP HANA cockpit. While SAP HANA Studio is still available–and mandatory for a few features, such as delivery units–SAP HANA cockpit is SAP’s go-forward solution in this area.
SAP HANA cockpit is designed to centralize and simplify the management and administration of SAP HANA throughout an IT landscape. It is a standalone, web-based HTML5 application server that provides monitoring, configuration, performance optimization, security, platform lifecycle management, along with other administration capabilities.
SAP HANA Studio provides application and development tools; however, this is not the case for SAP HANA cockpit. Instead, these tools have been migrated to SAP Web IDE for SAP HANA, another independent, web-based development tool in the SAP HANA 2.0 portfolio. Our book SAP HANA 2.0 Security Guide will help you learn about these new tools.
About the Book
Learn how to secure your system, focusing on major aspects of the SAP HANA security model. You’ll receive step-by-step instructions for configuring and maintaining SAP HANA security elements, learn how to manage the various security features, and gain insight on developing a complete security model.
SAP HANA Cockpit
The book begins with an overview of SAP HANA cockpit, the key tool for managing security in SAP HANA. Explore what it can do for your SAP HANA 2.0 system and how to navigate it, and then dive deep into a detailed workflow to help identify important security management areas within SAP HANA cockpit.
Objects, Accounts, and Roles
Explore the role catalog objects play and review the process for creating standard and repository-based schemas. This will instill baseline knowledge to help you understand the relation between catalog objects and object privileges, along with the overall SAP HANA security model architecture.
Next, review user accounts. Learn about the different types and how to set them up. Then dive deep into the concept of privileges and roles, the options for creating them, and the different ways to grant and revoke them. Explore repository roles, the alternative to standard roles, and understand how you can define roles within the SAP HANA development repository.
Discover the privilege types within the SAP HANA system and the permissions they grant to roles or users. Understand system, object, package, analytic, and application privileges, gaining clarity about the purpose of each so you have a better idea of which users should be assigned which privileges.
Become familiar with authentication, encryption, and security lifecycle management to ensure you are following best practices. Then explore the importance of auditing, and learn to configure auditing and create audit policies.
Grasp security tracing and troubleshooting concepts that will help you manage your security model. Review the required steps for enabling security-related authorization traces and how to analyze trace file results.
The book closes with a chapter dedicated to the security structure for SAP HANA XSA in SAP HANA 2.0, which warrants a new layer of security and methodology for securing application components. Get a closer look at the SAP HANA XSA platform, along with users, role collections, organizations, and spaces, and learn how they are administered and secured.
Who Is This Book For?
This book is for security teams, SAP Basis teams, and security consultants looking for a comprehensive guide to configuring SAP HANA 2.0 security and implementing an SAP HANA security model.
About the Author
Jonathan Haun is a senior director at Enowa LLC where he is responsible for managing the business intelligence and technology practices. Over the past several years, he has helped several clients implement solutions using SAP HANA. In addition to being certified in multiple SAP BusinessObjects BI tools, he also holds the certifications of SAP Certified Application Associate—SAP HANA 1.0, SAP Certified Technology Associate—SAP HANA 1.0 , and SAP Certified Technology Specialist—SAP HANA Installations.
How to Purchase
If you’re interested in purchasing SAP HANA 2.0 Security Guide, follow this link and choose the format that works best for you: e-book, print edition, or bundle (both e-book and print).
If you want to continue learning about SAP HANA security, or if you want information on other upcoming books or special offers, make sure to sign up for our HANA and administration topic newsletters or our weekly blog recap.