Now updated for 2023, this very practical guide has been created to help SAP customers understand the new security considerations that come with implementing SAP S/4 HANA. We want you to side-step the mistakes of retrospective security work - so prevalent with past ERP projects. So, while there is still time to plan your migration, this guide will help you do so with security and compliance very much in mind.
Identity and access management represents a significant challenge in S/4 HANA, just as it does in any cloud application. Compared to ECC, the number of areas where identities need controlling is substantially expanded.
SAP S/4 HANA removes the common obstacles associated with legacy ERP applications, such as batch latency, complex landscapes and manually driven processes. It's been designed to operate exclusively on SAP’s proprietary HANA in-memory database and significantly improve overall system performance.
From a security perspective, you can expect significant involvement in an SAP S/4 HANA implementation, as there are some fundamental changes to the way in which these simple processes are delivered to users.
One of the biggest drivers for moving to SAP S/4 HANA is to embrace the significantly enhanced user experience provided by SAP Fiori. It's important however to recognise that the use of SAP Fiori introduces many new components of security.
SAP S/4 HANA relies upon the HANA database to deliver the huge value-adding features of performance, transparency and simplicity. The database itself becomes far more visible to end users, particularly in the context of reporting and analytics.
SAP GRC is evolving to ensure customers moving to S/4 HANA can safeguard their new systems effectively. Our ebook contains a quick overview of SAP GRC and its impact on security for S/4 HANA.