TEC103 - Overview of Features, Functions and Services in Security Products From SAP
TEC103 - Overview of Features, Functions and Services in Security Products From SAP
                                             Public
Speakers
The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission of
SAP. Except for your obligation to protect confidential information, this presentation is not subject to your license agreement or
any other service or subscription agreement with SAP. SAP has no obligation to pursue any course of business outlined in this
presentation or any related document, or to develop or release any functionality mentioned therein.
This presentation, or any related document and SAP's strategy and possible future developments, products and or platforms
directions and functionality are all subject to change and may be changed by SAP at any time for any reason without notice.
The information in this presentation is not a commitment, promise or legal obligation to deliver any material, code or functionality.
This presentation is provided without a warranty of any kind, either express or implied, including but not limited to, the implied
warranties of merchantability, fitness for a particular purpose, or non-infringement. This presentation is for informational
purposes and may not be incorporated into a contract. SAP assumes no responsibility for errors or omissions in this
presentation, except if such damages were caused by SAP’s intentional or gross negligence.
All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially
from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only
as of their dates, and they should not be relied upon in making purchasing decisions.
     SAP
   S/4 HANA
    3rd Party
    Systems                                      Make sure that SAP              SAP HANA Cloud                                                    SAP NetWeaver
                                                solutions run securely                                             SAP HANA
                     Platform Security                                              Platform                                                      Application Server
                                                                     Public
SAP platforms: common security capabilities
                                                                                                                  0010100
                                                                                                                  1110011
                                                                                                                  0011001
                                                                                                       Public
SAP HANA’s unified security architecture
                                                       Application
                                                                         XS Advanced
                                                         Server
JDBC/ODBC HTTP(S)
                                                                                              Cockpit   Application
                                                        Database                                   XS Classic
Authentication/SSO Encryption
                                                                                            Public
SAP HANA Cloud Platform security services
The SAP HANA Cloud Platform security services provide delegated authentication and
authorization services across applications
Key capabilities
                                                                                          Access protected resource
 Identity federation with SAML 2.0-based identity providers
 Flexible groups- and role-based authorization management
 Secure API protection with OAuth 2.0
                                                                                                                           Applications
 Protection against common web attacks (XSS and XSRF)                                                                     on SAP HANA
                                                                                       User
 Secure end-to-end identity propagation to on-premise systems                                                             Cloud Platform
                                                                              Authentication
 On-premise user directory integration via SCIM 1.1 (e.g. for user search)                                              Delegate
                                                                                                                         Authentication
 Full automation and integration of the service via platform APIs
                                                                                               Identity provider
Benefits
                                                                                      (SAP HANA Cloud Platform services:
 Out-of-the-box identity federation without changing a single line of code            identity provisioning service, identity
 Easy-to-use security mechanisms to protect and control application                  authentication service, single sign-on,
  access in pure cloud and hybrid scenarios                                                 3rd. party identity provider)
                                                                                                     Public
Spotlight on: Unified Connectivity (UCON)
Reduce the overall attack surface of your remote-enabled function modules (RFMs). Enhance
RFC security by blocking the access to a large number of RFMs
Log all access to classified or sensitive data and support the evaluation of these events
                                 Public
SAP Single Sign-On
SAP Single Sign-On provides simple, secure access to IT applications for business users. It offers
advanced security capabilities to protect your company data and business applications
Grant and manage user access to applications securely and efficiently while meeting audit and
compliance requirements
Full identity lifecycle support
●   Integration with SAP ERP HCM and SuccessFactors
●   Central workflows for permission requests                          SAP cloud              SAP Business Suite
                                                                  identity provisioning
●   Context/rule based permissions and roles
                                                                         service
●   Integration with SAP Access Control for compliance checks
●   Identity analytics
User interfaces
                                                                       SAP                SAP Identity Management
●   Flexible identity schema via configuration only               Access Control
●   RESTful interfaces for SAP UI5 on different devices
●   Eclipse-based development environment
Connectors
●   Connectors and connector framework
●   Support of new cloud-based applications
●   Simple Cloud Identity Management Schema (SCIM) support
Virtualization and Federation
●   Virtual directory server
●   Identity federation
              Monitor emergency                                            X
                                                                          SAP_ALL
                                                                                                  Find and remediate
              access and transaction                                                                 SoD and critical
              usage                                                                                 access violations
                                                                                                     Automate access
              Certify access
              assignments are still                                                               assignments across
              warranted                                                                             SAP and non-SAP
                                                                                         Legacy
                                                                                                            systems
                            Public
SAP Cloud Identity Access Governance
SAP HANA Cloud Platform, identity authentication service
Solution overview
Automatic setup and management for user accounts and
authorizations
Optimized for SAP cloud applications
Integrated with single sign-on and governance micro-services
Jointly working with the SAP Identity Management product
Simple and reliable solution for your identity lifecycle management processes
HCP
    Integrated control
    monitoring and testing                                                                   Analyze SoD and critical
                                                                                             access for on-premise and
                                                                                             cloud solutions
 Simplify and reduce the complexity of access governance          Seamless user experience with dashboard-driven UI,           Adapt and scale to grow with the business cost-
  and compliance for administrators, auditors and                   visual prompts and analytic intelligence for timely focus     efficiently, easily extending control to enterprise apps
  business users                                                    on business-critical issues                                   and users on any device, anywhere
 Achieve greater business agility with ability to                 Guided remediation and dynamic access changes make it        Gain better visibility of risk remediation and mitigation
  dynamically update user access for changing business              easier to resolve access risks, while reducing ongoing        monitoring process
  needs                                                             admin and audit costs
                                                                                                                                 Manage and reduce enterprise access risks with
 Obtain instant value with minimal upfront investment as          Optimize security through greater accuracy in access          immediate insights to control performance at low TCO
  well as lower ongoing costs                                       assignments
                                                                    Public
SAP Enterprise Threat Detection
Provide insight into suspicious security events throughout the system landscape
Detection
   Readily and efficiently identify security lapses in the
    landscape
   Use the power of a real-time data platform to detect
    threats
   Optimally protect your key business data
Insight
   Gain insight into what is happening in
    your IT landscape
   Integrate with SAP and non-SAP data
   Make use of attack detection patterns
   Enable custom integration and configuration
   Find SAP software-specific threats related to know attacks
Analysis & prevention
   Perform forensic investigations and discover new patterns
   Efficiently analyze and correlate logs
                                                                           Public
SAP NetWeaver Application Server,
add-on for code vulnerability analysis
Find vulnerabilities in customer code to prevent cyber attacks against SAP systems
                                             Public
Protecting your SAP systems
                           Public
SAP HANA Cloud Platform infrastructure security
Benefits at a glance
• Certified operations
                                                                  • State-of-the-art security
                                                                    platform services
                                                                                          High Availability
                                                                                                                     • Role-based access: On-
                                                                                               BS25999                 demand solutions support role-
                                                                                               CERTIFIED               based access with user
                                                                                                                       profiles to allow segregation of
                                                                                          Quality Management           duties
                                                                                                ISO 9001             • Audit logging:
                                                                                               CERTIFIED               On-demand solutions log all
•    Planned coverage for SAP            •   Reverse proxy farms                                                       user activities
     Cloud data centers: Two             •   Multiple redundant                           International Accounting
                                                                                                                     • Data encryption: Encryption
     data centers per major                  internet connections                         Regulations                  of confidential data at rest
     region                              •   Data encryption                                   ISAE3402              • Operations:
•    SAP HANA Cloud currently            •   Intrusion Detection                               TESTIFIED*              Two-factor authentication
     hosted in data centers in               System (IDS)                                                            • Authorization on need-to-
                                                                                                SSAE16
     Germany, Netherlands,               •   Multiple firewalls                                TESTIFIED*              know basis
     Australia, and the USA                                                                                          • Minimal privileges and
                                         •   Sandboxed application                        Energy Efficiency
•    Roadmap for global                                                                                                segregation of duties
                                             environment
     coverage available from                                                                   GREEN IT              • Personalized log traces
                                         •   Regular third party
     SAP upon request                                                                          CERTIFIED             • Controlling system and regular
                                             audits and penetration                                                    reviews
•    Location is subject of                  tests                                        IT Operations
     choice by customers
                                                                                               ISO 27001
                                                                                              CERTIFIED
         BS25999
       CERTIFIED
        ISO 27001                             ISO 27001               ISO 27001
       CERTIFIED                              CERTIFIED               CERTIFIED
© 2016 SAP SE or an SAP affiliate company. All rights reserved.                                                                       Public         35
Secure software development
                              Public
Secure software development
protect&&develop
© 2016 SAP SE or an SAP affiliate company. All rights reserved.                          Public   37
Prevent, detect, react
PRODUCT SECURITY
SAP Secure Software Development Lifecycle                                Surveillance of Threat Landscape                 Incident Handling
S2DL                                                                                                                        Security response
                                                                           SAP Product Security Social Media
   • People, tools, and processes for building secure                       Analytics                                       SAP Security Patch Day
     products
                                                                           Security conferences                            Optimizing patch
   • Our guidance: ISO 27034
                                                                         Customer-Specific Services                          management
Enhanced Security Features
   • SAP Single Sign-On (Cloud / On-Premise)                               SAP Enterprise Threat Detection solution      Emergency Handling
   • Common Crypto Lib (FIPS 140-2)                                        SAP NetWeaver Code Vulnerability              Security Service Offerings
Security Research                                                           Analyzer available for customers
                                                                                                                            Active Global Support
   • Encryption in the cloud                                               Automated detection of misconfigurations in
                                                                            customer systems                                Consulting
   • JavaScript security
   • Big Data for security: Content creation for SAP
     Enterprise Threat Detection
Security awareness            SECURIM                         Plan product standard    Secure programming   Dynamic testing       Independent security   Execute the security
Secure programming            (Security Risk Identification   compliance               Static code scan     Manual testing        assessment             response plan
                              and Management)                 Plan security features   Code review          External security
Threat modelling
                              Data Privacy Impact             Plan security tests                           assessment
Security static analysis      Assessment                      Plan security response
Data protection and privacy   Threat Modeling
                                                                                                                       SAP Secure Software Development Lifecycle S2DL
Security expert curriculum
Common denominator: Product standard security as knowledge base across all phases
                                Public
SAP security services offerings
          Public
SAP security strategy – solutions, services, infrastructure
                             Significant investments into security for networked solutions, identity and access
                             governance, and integrated security management allow customers to implement
                             secure business processes on premise and in the cloud
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate
company) in Germany and other countries. Please see http://www.sap.com/corporate-en/about/legal/copyright/index.html for additional trademark information and notices.
Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors.
These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP SE or its
affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or SAP affiliate company products and
services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as
constituting an additional warranty.
In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop
or release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future
developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time
for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-
looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place
undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions.