Your complete reference to securing SAP HANA!

Cover of SAP HANA Security Cover of SAP HANA Security

SAP HANA Security

written by
approx. $69.99

coming soon

approx. $79.95

coming soon

approx. $89.99

coming soon

475 pages, , Print edition hardcover
ISBN 978-1-4932-1441-9
475 pages,
E-book formats: EPUB, MOBI, PDF, online
ISBN 978-1-4932-1443-3
475 pages, , Print edition hardcover
E-book formats: EPUB, MOBI, PDF, online
ISBN 978-1-4932-1442-6
How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an in-depth look at authentication and certificate management before seeing how to enable auditing and security tracing. Protect your SAP HANA system!
  • The comprehensive guide to SAP HANA security, from authentication to auditing
  • Learn to develop a complete security model using practical examples and case studies
  • Identify the critical settings necessary to pass an SAP HANA security audit
About the Book About the E-book 475 pages, hardcover. Reference book format 6.9 x 9 in. Printed black and white on 60# offset paper from sustainable sources. Casebound for durability. Reader-friendly serif font (Linotype Syntax 9.5 Pt.). One-column layout. E-book in full color. PDF, EPUB, and MOBI file for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application.

In this book, you'll learn about:

  1. Privileges and Roles

    Master the SAP HANA privilege types—system, object, package, analytic, and application—and learn to create and assign database and repository roles using SAP HANA Studio and SQLScript.

  2. Authentication and Encryption

    Learn to use Kerberos, SAML, and native authentication with step-by-step instructions and secure internal and external communication using encryption and SSL certificates.

  3. Monitoring

    Activate rules-based monitors to record SAP HANA security-related activities, enable auditing in your system, and use security tracing to keep an eye on your roles and privileges.

Highlights include:

  • SAP HANA Studio
  • Privileges
  • Roles
  • Database objects
  • User accounts
  • Authentication
  • Lifecycle management
  • Auditing
  • Security tracing
  • Certificate management
  • Encryption

Jonathan Haun currently serves as a director within Protiviti’s Data and Analytic Group.

more >

You may also like:

  • Cover of Implementing SAP Fiori Security
    Implementing SAP Fiori Security

    Gary Prewett, Michael Pytel

    108 pages

    Understand the who, what, when, and how of securing SAP Fiori applications with this E-Bite! Dive into the architecture of SAP Fiori to see what needs to be protected. Next, answer the how with the tools you'll use: SAP Mobile More about the book

    $19.99

    Available

    E-Bite
  • Cover of SAP S/4HANA
    SAP S/4HANA
    An Introduction

    Axel Baumgartl, Dmitry Chaadaev, Nga-Sze Choi, Mark Dudgeon, Asidhara Lahiri, Bert Meijerink, Andrew Worsley-Tonks, Devraj Bardhan

    449 pages, hardcover

    Looking to make the jump to SAP S/4HANA? Explore what SAP S/4HANA offers, from the Universal Journal in SAP S/4HANA Finance to supply chain management in SAP S/4HANA Materials Management and Operations. Understand your deployment options—on-premise and in the cloud—and More about the book

    from $59.99

    Available

    E-book | Print edition | Bundle