The SAP Shared Responsibility Model: Who Secures What in the Cloud Era?

Navigating Cloud Security in SAP Environments

The landscape of enterprise resource planning (ERP) is undergoing a monumental shift, driven by the increasing adoption of cloud technologies. Organizations worldwide are migrating their mission-critical SAP systems from traditional on-premise deployments to dynamic cloud environments. This transition is evident in the rise of solutions like SAP S/4HANA Cloud, the comprehensive offering known as RISE with SAP, and the flexible development capabilities of SAP Business Technology Platform (BTP). This move to the cloud promises agility, scalability, and innovation, but it also fundamentally alters the security paradigm.

What is the SAP Shared Responsibility Model?

The shift to cloud computing, particularly for critical enterprise applications like SAP, necessitates a clear understanding of security obligations. This is precisely where the Shared Responsibility Model comes into play. It’s a foundational concept in cloud security that delineates the division of security tasks between the cloud service provider (in this case, SAP or the underlying hyperscaler) and the customer.

Customer vs. Provider: Demarcating Responsibilities in SAP Cloud

A deep dive into the Shared Responsibility Model clarifies the distinct roles SAP and the customer play in maintaining a secure cloud environment. It’s not a blanket assumption of security by either party; rather, it’s a precise demarcation, often visualized as a line in the sand, determining who secures what.


SAP’s Responsibilities (Security of the Cloud)

When it comes to “Security of the Cloud,” SAP takes responsibility for the foundational elements that ensure the availability and integrity of the cloud infrastructure and the underlying services they provide. This typically includes:

Physical Infrastructure (Data Centers, Hardware)

SAP secures the physical facilities where their cloud services are hosted, including servers, storage devices, and networking hardware. This involves environmental controls, physical access security, and infrastructure resilience.

Network Infrastructure (SAP’s Network, Firewalls, Load Balancers)

SAP is responsible for securing their own global network infrastructure, including network devices, firewalls, and load balancers, to protect against network-level attacks and ensure connectivity for their cloud services.

Core Software (SAP’s Base Operating System, Virtualization, Database for the managed service)

For managed cloud services, SAP manages and secures the underlying operating systems, virtualization layers, and the databases that support their cloud offerings. This includes patching, configuration, and monitoring of these core components.

Managed Services

In scenarios like RISE with SAP, where SAP acts as the prime contractor and often manages the technical operations on a hyperscaler (like AWS, Azure, or GCP), SAP assumes responsibility for specific managed layers, such as applying patches to the hyperscaler’s operating system or database, further solidifying the secure cloud transformation.

Customer’s Responsibilities (Security in the Cloud)

While SAP handles the “Security of the Cloud,” the customer retains significant responsibilities for “Security in the Cloud.” This customer domain is where the majority of application-level security, data protection, and user management takes place. These responsibilities are crucial for a robust SAP Cybersecurity posture:

Application Layer: Configuration and Customizations

The customer is responsible for securely configuring their specific SAP applications (e.g., S/4HANA configurations), managing custom development, and ensuring that all application settings align with security best practices.

Identity & Access Management (User Roles, Authorizations, Privileged Access)

This is a critical customer responsibility. It involves defining and managing user roles, ensuring proper authorizations, implementing the principle of least privilege, and securely managing privileged user access within the SAP applications. Effective SAP Identity & Access Management (IAM) is vital, and Onapsis can assist in continuously monitoring and validating these access controls to prevent segregation of duties (SoD) conflicts and critical access risks.

Data Protection: Classification, Encryption (Application-level), Data Loss Prevention

Customers are responsible for classifying their data, implementing application-level encryption, and deploying Data Loss Prevention (DLP) strategies to protect sensitive information stored and processed within their SAP systems.

Network Controls: Customer-managed VPNs, Virtual Private Cloud (VPC) configurations

While SAP secures its own network, customers are responsible for securing their connectivity to SAP cloud services. This includes configuring customer-managed VPNs, securing their Virtual Private Cloud (VPC) or Virtual Network (VNet) settings, and managing network access controls to their SAP instances.

Integrations: Third-Party Connections and APIs

Any integrations with third-party systems or the use of APIs (Application Programming Interfaces) fall squarely within the customer’s security responsibility. This requires careful assessment of the security of connected systems and securing data flows between them. Onapsis extends visibility and threat detection to these critical integration points.

Custom Code and Development

Any custom code developed by the customer or third parties for their SAP applications must adhere to secure coding practices. Incorporating SAP DevSecOps principles ensures security is built into the development lifecycle from the start, a process Onapsis supports by integrating security into the CI/CD pipeline for custom SAP developments.

Security Monitoring and Incident Response (Application and Data Layers)

While SAP monitors its infrastructure, customers are responsible for monitoring their SAP application layer for suspicious activities, security anomalies, and potential threats. This includes setting up robust SAP security monitoring and having an incident response plan for application-level security events, often leveraging solutions for enterprise threat detection provided by Onapsis to gain real-time insights into attacks and vulnerabilities impacting SAP applications.

Compliance and Governance Validation

The ultimate responsibility for demonstrating compliance with industry regulations (like GDPR, SOX, NIST) and internal governance policies for the SAP applications and data rests with the customer. This often involves processes for SAP Automated Compliance, a key area where Onapsis excels by automating control testing and audit readiness.

Shared Responsibility in Key SAP Cloud Environments

The Shared Responsibility Model isn’t a one-size-fits-all concept. Its specific application can vary depending on the particular SAP cloud offering your organization utilizes. Understanding these nuances is crucial for pinpointing your exact security obligations.

RISE with SAP and the Shared Model

RISE with SAP represents a significant shift in how enterprises consume SAP. It’s a bundled offering that often includes S/4HANA Cloud, technical managed services, and access to the SAP Business Technology Platform. While RISE aims to simplify the cloud journey, it’s vital to clarify security roles.

Clarifying Roles in RISE with SAP

Under RISE with SAP, SAP often takes on more operational responsibility, managing the underlying infrastructure, operating systems, and database layers on a chosen hyperscaler. However, this increased management by SAP does not absolve the customer of their security duties.

Specific Customer Responsibilities

Even with SAP managing significant portions of the stack, the customer remains responsible for securing the application layer of their S/4HANA instance. This includes critical tasks such as:

  • Properly configuring S/4HANA applications
  • Managing user access, roles, and authorizations
  • Securing custom developments and integrations
  • Protecting data within the S/4HANA application
  • Monitoring for application-level threats and vulnerabilities

Leveraging Tools for RISE Security

Given these persistent customer responsibilities, organizations adopting RISE with SAP need robust solutions to gain visibility and control over their portion of the shared model. This is where a platform like Onapsis becomes invaluable. Onapsis specifically helps customers secure their configurations, manage vulnerabilities, detect threats at the application layer, and ensure compliance within their S/4HANA and SAP RISE security landscapes, effectively closing the visibility and control gaps left by the shared model. Onapsis has strong authority and dedicated offerings in this space.

SAP Business Technology Platform (BTP) Security

SAP Business Technology Platform (BTP) offers a Platform-as-a-Service (PaaS) environment for extending and integrating SAP applications, as well as building new ones. The shared responsibility model here shifts slightly due to the PaaS nature.

PaaS-Specific Responsibilities

In BTP, SAP secures the underlying platform, including the runtime environment, database services, and connectivity services. However, the customer is fully responsible for:


Data and User Access in BTP Applications


Customers are entirely responsible for the data they store and process within their BTP applications. This includes data encryption, classification, and access control. Similarly, managing user access to custom BTP applications and their underlying data remains a customer responsibility, emphasizing the need for stringent SAP Identity & Access Management (IAM) practices.

SAP S/4HANA Cloud (Public vs. Private Editions)

The shared responsibility also has nuances between the public and private editions of SAP S/4HANA Cloud.

  • Nuances in Responsibility based on Deployment Model

    The specific allocation of responsibilities between SAP and the customer depends significantly on the deployment model chosen, directly impacting the level of control and, consequently, the security tasks that fall to the customer.

  • S/4HANA Cloud (Public Edition):

    This is a highly standardized, multi-tenant SaaS offering. SAP manages more of the stack, and customer customization is limited. Consequently, SAP’s share of security responsibility is greater. The customer’s focus is primarily on user access, data within the application, and integration security.

  • S/4HANA Cloud (Private Edition):

    This offering provides more flexibility and control, often running on a hyperscaler within a customer’s dedicated environment. While SAP still manages the core application, the customer has more responsibility for network configurations, integrations, and deeper application-level security settings. This model more closely resembles the responsibilities seen in RISE with SAP.

  • Focus on Application-Level Security

    Regardless of the S/4HANA Cloud edition, the customer’s primary security focus remains on the application layer. This includes configurations, user management, custom code, and data protection. Tools that provide deep visibility and control over the SAP application layer are essential for mitigating risks, particularly those related to transformation with S/4HANA.

Common Misconceptions and Their Consequences

Despite the clear definitions of the Shared Responsibility Model, several persistent misconceptions continue to exist. These misunderstandings are https://onapsis.com/solutions/; they often lead to critical security gaps and severe consequences for organizations.

These examples underscore that even with the most secure cloud infrastructure provided by SAP, the customer’s active role in securing their part of the model is non-negotiable for true enterprise security.

Best Practices for Securing Cloud ERP Under Shared Responsibility

Navigating the SAP Shared Responsibility Model effectively requires a proactive and strategic approach from the customer’s side. Implementing a comprehensive security strategy that specifically addresses the “security in the cloud” aspect is paramount. Here are key best practices:

Comprehensive Visibility: Gaining Unified Oversight Across Cloud & Hybrid SAP

One of the foundational challenges in the cloud era is the loss of complete visibility that organizations once had with entirely on-premise systems. To mitigate this, establishing comprehensive visibility across all your SAP landscapes, whether fully cloud-based or in hybrid environments, is crucial. This means having tools and processes that provide a unified view of security posture, configurations, vulnerabilities, and threats at the SAP application layer, complementing the visibility provided by hyperscalers for infrastructure.

Proactive Configuration Management: Preventing Misconfigurations at Scale

Misconfigurations are a leading cause of cloud security breaches. For SAP systems, this can include incorrectly set user permissions, exposed interfaces, or insecure system parameters. Implementing proactive configuration management involves:

  • Establishing secure baseline configurations for all SAP cloud instances.
  • Continuously monitoring configurations for deviations from these baselines.
  • Automating the identification and remediation of misconfigurations at scale.

Robust Identity & Access Governance: Implementing Least Privilege, MFA, RBAC

Identity and Access Management (IAM) is arguably the customer’s most critical security responsibility in the cloud. Best practices include:

  • Implementing the Principle of Least Privilege: Users and applications should only have the minimum access necessary to perform their functions.
  • Multi-Factor Authentication (MFA): Enforcing MFA for all SAP users, especially privileged accounts, adds a crucial layer of security against credential theft.

Role-Based Access Control (RBAC): Defining clear roles and assigning permissions based on these roles streamlines management and reduces the risk of excessive access. This is fundamental for SAP Identity & Access Management (IAM).

Continuous Threat Detection & Monitoring: Real-time Alerts for Anomalies

Relying solely on infrastructure-level monitoring from cloud providers is insufficient for SAP applications. Customers need capabilities for continuous SAP security monitoring that can:

  • Detect malicious activity, suspicious user behavior, and anomalies within the SAP application layer in real-time.
  • Analyze SAP logs and system events for indicators of compromise.
  • Integrate with broader Security Information and Event Management (SIEM) systems for a holistic view of enterprise security. Such capabilities are essential for effective enterprise threat detection.

Vulnerability & Patch Management: Ensuring Application-Layer Security Notes are Applied

Relying solely on infrastructure-level monitoring from cloud providers is insufficient for SAP applications. Customers need capabilities for continuous SAP security monitoring that can:

  • Detect malicious activity, suspicious user behavior, and anomalies within the SAP application layer in real-time.
  • Analyze SAP logs and system events for indicators of compromise.
  • Integrate with broader Security Information and Event Management (SIEM) systems for a holistic view of enterprise security. Such capabilities are essential for effective enterprise threat detection.

Secure Integrations: Assessing Third-Party Risks

Modern SAP environments are rarely standalone; they integrate with numerous third-party applications and services. Customers must:

  • Thoroughly vet the security posture of all integrated third-party solutions.
  • Secure communication channels and APIs used for integrations.
  • Continuously monitor data flows and access permissions for integrated systems.

Automated Compliance Validation: Bridging the Gap from Policy to Practice

Maintaining continuous compliance with internal policies and external regulations (like SOX, GDPR, NIST for SAP compliance) is a significant customer responsibility. Manual compliance checks are often insufficient and error-prone in dynamic cloud environments. Implementing SAP Automated Compliance solutions can:

  • Automate control testing and evidence collection.
  • Provide real-time visibility into compliance posture.
  • Streamline audit readiness and reporting.

Security by Design: Integrating Security into DevOps/DevSecOps for SAP

For custom developments and extensions within SAP cloud environments (e.g., SAP BTP), embedding security early in the development lifecycle is crucial. SAP DevSecOps principles ensure that security considerations are integrated from the design phase through development, testing, and deployment, reducing vulnerabilities before they reach production.

How Onapsis Helps Operationalize the Shared Responsibility Model

While SAP and hyperscalers secure the cloud infrastructure, the onus remains on the customer to secure their business-critical applications and data in the cloud. This is precisely where solutions designed for enterprise application security become indispensable. Onapsis plays a pivotal role in empowering organizations to effectively operationalize their portion of the Shared Responsibility Model for SAP environments, providing the necessary visibility, automation, and threat intelligence.

Closing the Visibility Gap for Customer-Owned Layers

One of the biggest challenges for customers in cloud and hybrid SAP environments is gaining comprehensive visibility into their application layer. Traditional security tools often lack the deep understanding of SAP’s unique architecture. Onapsis provides unparalleled visibility into the configurations, vulnerabilities, and user access within SAP applications, whether they are running on-premise, in a hyperscaler, or as part of RISE with SAP. This unified oversight allows customers to understand their true attack surface and potential risks within their responsibility domain.

Automating Vulnerability Management & Configuration Hardening

Manual processes for identifying and remediating SAP vulnerabilities and misconfigurations are unsustainable at scale, especially in dynamic cloud environments. Onapsis automates SAP vulnerability management by continuously scanning for missing patches (including those highlighted on SAP Patch Day), insecure configurations, and custom code vulnerabilities. It provides actionable intelligence to help prioritize and remediate these findings, significantly reducing the customer’s exposure to known exploits and strengthening their overall posture. This includes proactive configuration management to prevent misconfigurations at scale.

Ensuring Continuous Compliance & Audit Readiness

Meeting regulatory requirements and internal governance policies for SAP systems is a continuous customer responsibility. Onapsis helps bridge the gap from policy to practice by facilitating SAP Automated Compliance. It provides automated control testing, continuous monitoring against compliance benchmarks (like SOX, GDPR, NIST), and simplified audit evidence collection. This ensures organizations are continuously audit-ready, reducing the burden of manual compliance checks and minimizing the risk of non-compliance fines.

Real-Time Threat Detection & Response for SAP Applications

Even with robust preventive measures, the threat landscape is constantly evolving. Customers need the capability to detect and respond to active threats targeting their SAP applications. Onapsis provides specialized SAP security monitoring and enterprise threat detection capabilities that go beyond network and endpoint security. It monitors SAP application logs and activities in real-time, identifying anomalous behavior, indicators of compromise, and active attacks, enabling rapid incident response and minimizing potential damage.

Support for Specific Cloud Offerings

Onapsis understands the nuances of different SAP cloud deployments. It offers tailored support and capabilities for securing various cloud offerings, including:

  • RISE with SAP: Providing the deep application-layer security necessary to complement SAP’s responsibilities, giving customers control over their SAP RISE security.
  • SAP Business Technology Platform (BTP): Helping secure custom applications and developments on the PaaS layer, integrating security into the SAP DevSecOps pipeline.
  • SAP S/4HANA Cloud: Delivering critical insights into application configurations and vulnerabilities, essential for effective transformation with S/4HANA and ongoing security in both public and private editions.

By partnering with Onapsis, organizations can confidently embrace cloud-based SAP, knowing they have a robust solution to fulfill their security responsibilities within the Shared Responsibility Model.

Conclusion: Taking Ownership of Your SAP Cloud Security Posture

The journey to the cloud for SAP systems brings undeniable benefits in terms of agility and innovation, but it fundamentally redefines the security landscape. The SAP Shared Responsibility Model is not merely a theoretical concept; it’s a critical operational framework that demands active engagement from every organization.

Frequently Asked Questions (FAQs) about SAP Cloud Security

What is the core principle of the SAP Shared Responsibility Model?

The core principle is that security is a shared obligation between SAP (or the cloud provider) and the customer. SAP is responsible for the “security of the cloud,” meaning the underlying infrastructure and services. The customer is responsible for the “security in the cloud,” which includes their data, application configurations, access management, and custom developments.

Why can’t SAP or my cloud provider secure everything for me?

While cloud providers offer a highly secure infrastructure, they do not have access to or control over your specific data, application configurations, user setups, or custom code. These elements are unique to your business operations, and securing them requires your active management and vigilance.

What are common customer responsibilities in SAP cloud security?

Key customer responsibilities include managing user identities and access, securing application configurations, protecting sensitive data, ensuring the security of custom code, managing integrations, and performing application-level security monitoring and incident response.

How does the Shared Responsibility Model apply to RISE with SAP?

With RISE with SAP, SAP typically manages more of the technical operations and underlying infrastructure. However, the customer retains responsibility for application configurations, user access, data protection, and any custom code or integrations within their S/4HANA instance. This makes SAP RISE security a collaborative effort.

Is SAP S/4HANA Cloud (Public Edition) more secure from a customer’s perspective?

In S/4HANA Cloud (Public Edition), SAP manages a larger portion of the stack due to its standardized SaaS nature. This can reduce the customer’s operational burden for certain security aspects. However, the customer still holds responsibility for user access, data management within the application, and securing specific configurations and integrations.

What role does Onapsis play in helping customers with the Shared Responsibility Model?

Onapsis helps customers operationalize their share of the security responsibility by providing deep visibility into SAP applications, automating SAP vulnerability management and configuration hardening, enabling continuous SAP security monitoring for threats, and assisting with SAP Automated Compliance validation across various cloud deployments.

What are the risks of misunderstanding the Shared Responsibility Model?

Misunderstanding can lead to critical security gaps, resulting in potential data breaches, non-compliance with regulatory requirements, operational disruptions, and significant financial losses. It often stems from the false assumption that the cloud provider handles all security.

How can organizations ensure robust access control in their cloud SAP systems?

Implementing strong SAP Identity & Access Management (IAM) practices is crucial. This includes enforcing the principle of least privilege, utilizing Multi-Factor Authentication (MFA), establishing Role-Based Access Control (RBAC), and regularly reviewing user authorizations to prevent unauthorized access.

Are SAP security products different for cloud environments compared to on-premise?

While the fundamental security principles remain, the specific tools and approaches may differ. Cloud environments often require solutions that can integrate with hyperscaler services, provide API security, and offer continuous monitoring capabilities tailored to dynamic cloud infrastructures, extending beyond traditional on-premise tooling.

How important is SAP DevSecOps in cloud SAP environments?

SAP DevSecOps is highly important for cloud SAP, especially when developing custom applications or extensions on platforms like SAP BTP. Integrating security practices early into the development lifecycle helps identify and remediate vulnerabilities before they reach production, ensuring security by design.

Does the shared responsibility model impact ERP for utilities or other specific industries?

Yes, the Shared Responsibility Model applies universally across all industries using cloud ERP. For sectors like utilities, which often face unique regulatory and operational technology (OT) security requirements, understanding and fulfilling the customer’s security responsibilities is even more critical to meet sector-specific compliance and protect vital infrastructure.

How can organizations prepare for SAP Patch Day in a cloud environment?

Customers must have a robust process for tracking SAP security notes released on SAP Patch Day, assessing their relevance to their cloud environment, prioritizing critical patches, and efficiently applying them to their SAP applications. Automated tools can greatly assist in this ongoing SAP Vulnerability Management process.

Take Action: Secure Your SAP Environment with Onapsis

Schedule a Demo

to see how Onapsis can streamline your SAP patching strategy

Contact Us

to discuss how Onapsis solutions can enhance your SAP security posture