Secure SAP HANA systems from cyber espionage, sabotage, and fraud
Improperly configuring SAP HANA has a huge impact on security, as SAP HANA stores an organization’s most
important assets, including customer data, product pricing, financial
statements, employee information, supply chains, business intelligence,
budgeting, planning and forecasting.
Therefore, it is indispensable to master details
associated risk, and clearly identify how to properly audit an SAP HANA system.
If left unsecured, an attacker could
access any communication ports to perform espionage, sabotage, and fraud
attacks.
Based on these realities, Onapsis has released SAP HANA System Security Review Part 2. This
publication analyzes SAP HANA Internal Communication Channels, details
associated risk, and identifies how to properly audit an SAP HANA system.
One can observe that, as the 13th edition in the SAP
Security In-Depth series, SAP HANA System Security Review Part 2 describes
how to update the SAP HANA platform, noting new improvements in each Support
Package.
SAP HANA System Security Review Part 2 is available for
download at: https://www.onapsis.com/research/publications/volume-xii-sap-hana-system-security-review-part-2.
Comments