SAP Business Technology Platform_ Security and Compliance
SAP Business Technology Platform_ Security and Compliance
SAP Business Technology Platform_ Security and Compliance
June 2024
Public
SAP BTP is the foundation
Of the intelligent sustainable enterprise
1. Build securely
We build secure-by-design solutions.
2. Run securely
We run cloud operations securely.
3. Act securely
We foster a security-first culture in
everything we do.
Public 2
Cloud Solutions from SAP
Deliver trusted cloud operations while helping protect customers’ SAP applications and data
Software Development Security Solutions and Features Cloud Environments Data Security to
Build Secure software development help protect
Securely Solutions & features to Secure-by-design environments
and operations lifecycle confidentiality and
help ensure security (SAP and cloud service providers)
integrity of data
Business Process
Security to support
Automated Integrated Transparent compliance with
Run Preventive and Intelligence, operations and Attestations and reports into our regulatory
Securely detective controls response orchestration security processes and controls requirements
Risk
Mitigation with
continuous
Employees Customers Partners improvement across
Act Security is part of our DNA in Feedback loop for continuous Vast partner ecosystem to operations
Securely how we organize, train and improvement enhance security
protect people and assets
Public 3
Three pillars of SAP BTP security: Build securely
Public 4
Secure software development for SAP BTP
Public 5
SAP’s secure development and operations lifecycle
Continuous improvement and development
PRERELEASE
Public 6
Threat modeling
Evaluating threats in the early stages
Public 7
Security assessment and testing
Internal and external security assessments including penetration tests
Penetration tests
• Internal and external
• Web applications (SAP BTP, SAPUI5, Web Dynpro, and others)
Public 8
Build securely – security, data protection, and privacy features
Public 9
SAP BTP – application layer security
Public 10
Secure user access and permissions
End User
SAP Business Applications
Authentication and
Identity Single Sign-on
Authentication IBP
Public 11
SAP audit log service
Public 12
SAP BTP connectivity
Features: Destination
• Access on-premise systems Application Clients
Mobile or Desktop
Connectivity
• Secure tunnel Service
SAP On-Premise
Solutions
SAP S/4HANA
Public 13
Secure communication and encryption
SAP BTP
• Communication protocols of
SAP BTP support encryption,
such as HTTPS with up to TLS1.3 SAP BTP user interfaces
and AES-256 SAP Launchpad, Work Zone,
Task Center
• Data at rest encryption is Secure communication
provided by the storage (up to TLS 1.3/HTTPS)
SAP BTP applications
encryption of the persistence
CF env, Kyma, ABAP env
services
Encryption of data
• They use SAP HANA or the IaaS at rest using SAP
SAP BTP persistence services
HANA capabilities
layer underlying the SAP BTP.
HANA DB, Redis, PostgreSQL,
This is configured in the ObjectStore as a Service
respective IaaS accounts used
by SAP BTP Secure communication
Self-encrypting drives, (HTTPS)
• Storage-level encryption is Software encryption, Infrastructure and Storage
supported on hardware level by Data at rest encryption
On hardware level
SAP BTP and SAP HANA
Public 14
SAP BTP – APIs to develop secure software
Public 15
Additional solutions from SAP for securing applications and data
Public 16
Secure-by-design cloud environments
Data center
Compliance,
on tier-level
confidentiality,
III or IV
and integrity
Public 17
Three pillars of SAP BTP security: Run securely
Public 18
Automation enables a scalable approach to security
Governance
Public 19
Security monitoring: Detection, protection, and response
Customer security
Cloud provider security monitoring
monitoring
Access and
Host Network Infrastructure Authentication
application
EVENTS
CASES
Incident response
Public 20
SAP’s secure development and operations lifecycle
Continuous security monitoring and operations
PRERELEASE
Public 21
SAP’s Cyber Fusion Center
Public 22
Comprehensive contracts and independent audits
Public 23
Security, data protection, and privacy safeguards
Change control
Physical access control Ability to document all changes to personal data
Preventing unauthorized persons from gaining with standard change logging
access to data processing systems
Encryption
Technical and
Standard encryption of personal data during transit
Disclosure control Organizational and at rest
Ability to document all access to personal data
with logging features
Measures (TOMs)
Availability control
Procedures such as backup, disaster recovery,
and business continuity
Pseudonymization
Changing the data in a way that the data subject is
not identifiable without using secret key or
information Transmission control
Job control Transmission control of personal data such as
Data controller required to ensure that the data processor is through encryption
following their instructions and guidelines; this organizational
task has some technical aspects such as system audit
Public 24
Management system, regulation and best practices1
Market Region
TISAX, PCI DSS3 KRITIS, HDS, ISMAP3, ECC/CCC3
Regulation
Management system
ISO 27000, ISO 22300, NIST CSF
Foundation
SAP BTP Cloud standards and best practices
1. The management systems are used across all SAP Cloud Secure services, execution of independent certification, and audit depend on service and organizational unit respectively.
Details are available at www.sap.com/about/trust-center/certification-compliance.html.
2. Component of the Integrated Information Security Management System (IISMS) of SAP.
3. Limited product scope.
Public 25
Three pillars of SAP BTP security: Act securely
Our Employees
Automated Our Customers
Integrated Our Partners
Transparent
Software Development Security solutions and features Cloud Environments
Security is partand
Preventive of our DNA in Feedback loopoperations
Intelligence, for continuous
and Vast partner ecosystem
Attestations and reportstointo our
Secure
how we software
organize, development
train and Solutions &
improvement features to Secure-by-design
enhance security environments
detective controls response orchestration security processes and controls
and operations lifecycle
protect people and assets help ensure security (SAP and cloud service providers)
Public 26
Security is part of our DNA
SAP CEO,
SAP executive board
Protection of people
Employee preparation:
and assets:
• Global awareness SAP chief security officer • Threat modeling training
• Role-based training • Interconnected physical
and cybersecurity
Public 27
SAP BTP shared responsibility model
Customer Account Management Customer application access
Or SAP SAP HANA Service Management Cloud operations from SAP and Customers
SAP or
Network Storage Compute
Hyperscaler
Physical fabric
Data Center and Hardware
Public 29
Security recommendations
Security Dashboard
Blog posts:
Public 30
Report security incidents
Proven way for SAP customers and security researchers
www.sap.com/about/trust-center/security/incident-management.html
Public 31
Partnership with customers supports
Continuous feedback and improvement
Our focus on
Customers your security SAP
requirements
Customer advisory board SAP Customer Connection program SAP Continuous Influence program
Public 32
Ecosystem partnerships for enhanced security
Security
Cloud service researchers
providers Collaborate to improve
Optimized environments security posture and
with multiple deployment readiness
options
We
partner with:
Software
Technology vendors
partners + 500 partner
Leverage leading solutions available on
technologies to enhance SAP store
security
Public 33
Three key messages to take away
Public 34
Further information
SAP Community
SAP Business Technology Platform Security
Shared responsibility
Shared Responsibility Model Between You and SAP
Public 35
Thank you
Contact information:
Juergen Adolf
[email protected]
© 2024 SAP SE or an SAP affiliate company. All rights reserved. See Legal Notice on www.sap.com/legal-notice for use terms, disclaimers, disclosures, or restrictions related to this material.