Guide

Safety First: Security for SAP S/4HANA Building security by design into SAP S/4HANA implementations

Understand the new security considerations and opportunities that come with implementing SAP S/4HANA. We want you to side-step the mistakes of retrospective security work and unlock all the benefits and new ways of working that S/4HANA and Fiori enable. So, while there is still time to plan your migration by the 2027 deadline, this guide will help you do so with security and compliance very much in mind.

Read now

We will always keep your information safe. We ask for the information contained in this form in exchange for a valuable resource. By sharing your information it will also ensure we are able to send you educational information in future that we think will be of real value to you. We will never send you information about our products and services by email, unless it has been specifically requested.

*We respect your privacy and personal data. By submitting your details and downloading our document you are accepting Turnkey Consulting's privacy policy which can be found here.

Meet your hosts

Team Card
Ed Davis
Managing Director APAC, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Simon Persin
Simon Persin
Global Practice Director, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Shane Kennedy
Shane Kennedy,
Business Development Specialist, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Robert Budic
Robert Budic
Managing Director, Australia, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Team Card
Ed Davis
Managing Director APAC, 
Turnkey Consulting
Simon Persin
Simon Persin
Global Practice Director, 
Turnkey Consulting
Shane Kennedy
Shane Kennedy,
Business Development Specialist, 
Turnkey Consulting
Robert Budic
Robert Budic
Managing Director, Australia, 
Turnkey Consulting
Image

The eBook will cover the following in detail:

  • [Updated] SAP HANA roles & privileges

SAP S/4HANA relies upon the HANA database to deliver the huge value-adding features of performance, transparency and simplicity. The database itself becomes far more visible to end users, particularly in the context of reporting and analytics

  • The difference between SAP ECC and SAP S/4HANA security

SAP S/4HANA removes the common obstacles associated with legacy ERP applications, such as batch latency, complex landscapes and manually driven processes. It's been designed to operate exclusively on SAP’s proprietary HANA in-memory database and significantly improve overall system performance.

  • SAP S/4HANA security

From a security perspective, you can expect significant involvement in an SAP S/4HANA implementation, as there are some fundamental changes to the way in which these simple processes are delivered to users.

  • SAP Fiori architecture and security

One of the biggest drivers for moving to SAP S/4HANA is to embrace the significantly enhanced user experience provided by SAP Fiori. It's important however to recognise that the use of SAP Fiori introduces many new components of security.

  • The impact of SAP GRC on SAP S/4HANA

SAP GRC is evolving to ensure customers moving to S/4HANA can safeguard their new systems effectively. Our ebook contains a quick overview of SAP GRC and its impact on security for S/4HANA.

  • IGA in S/4HANA

Identity and access management represents a significant challenge in S/4HANA, just as it does in any cloud application. Compared to ECC, the number of areas where identities need controlling is substantially expanded.

Latest guides

Guide

Clear Skies: How vulnerability management enables a smooth migration to SAP cloud

Guide

Safeguarding SAP in an era of cyber legislation

Guide

Safety First: Security for SAP S/4HANA Building security by design into SAP S/4HANA implementations