Volume XII: SAP HANA System Security Review - Part 1
DownloadSAP HANA is being pushed by SAP as the absolute in-memory database for its products and more recently as a standalone platform. The vast majority of companies who have already adopted it are leveraging its capabilities to support business-critical applications. Due to its nature, SAP HANA stores an organization’s most important assets, thus requiring large efforts to secure that data.
This publication will help security officers understand the SAP HANA layout, the security risks faced and most important, how to mitigate them. SAP HANA System Security Review explores various usage scenarios, reviewing a secure configuration for each one, as well as technical aspects, default users, privileges and roles. In addition this publication analyzes different published vulnerabilities, their impact to the business, and what has to be done to fix them.