Secure SAP HANA systems from cyber espionage, sabotage, and fraud



Improperly configuring SAP HANA has a huge impact on security, as SAP HANA stores an organization’s most important assets, including customer data, product pricing, financial statements, employee information, supply chains, business intelligence, budgeting, planning and forecasting.

Therefore, it is indispensable to master details associated risk, and clearly identify how to properly audit an SAP HANA system. If left unsecured, an attacker could access any communication ports to perform espionage, sabotage, and fraud attacks.

Based on these realities, Onapsis has released SAP HANA System Security Review Part 2. This publication analyzes SAP HANA Internal Communication Channels, details associated risk, and identifies how to properly audit an SAP HANA system. 

One can observe that, as the 13th edition in the SAP Security In-Depth series, SAP HANA System Security Review Part 2 describes how to update the SAP HANA platform, noting new improvements in each Support Package. 

SAP HANA System Security Review Part 2 is available for download at: https://www.onapsis.com/research/publications/volume-xii-sap-hana-system-security-review-part-2.

Comments

Popular Posts