Protecting a company's or an organization's critical data from unauthorized access and ensuring compliance with the growing number of rules and regulations is becoming increasingly important for SAP customers. The purpose of this document is to give IT security experts a starting point and overview of what they need to understand about SAP HANA in order to comply with security-relevant regulations and policies and to protect their SAP HANA implementation and the data within from unauthorized access.
↧