(Jana Subramanian serves as APJ Principal Cybersecurity Advisor for Cloud Security and has been recognized as a Fellow of Information Privacy (FIP) by the International Association of Privacy Professionals (IAPP). As part of his responsibilities, Jana helps with strategic customer engagements related to topics such as cybersecurity, data privacy, multi-cloud security integration architecture, contractual assurance, audit, and compliance.)
Introduction
The SAP S/4HANA Cloud, Private Edition serves as the foundation for the “RISE with SAP” offering, safeguarding customers’ essential business data and their mission critical operations. SAP Enterprise Cloud Services (ECS) delivers a managed private environment featuring a multi-layered defence-in-depth and zero-trust architecture principles that covers infrastructure and technical managed services. This comprehensive approach encompasses end-to-end SLAs for the entire solution stack under SAP operations management and a robust security capability, effectively reducing cost, risk for customers and enhancing business value.
In this blog, we delve into some common cybersecurity questions frequently asked by our customers and partners. I have attempted to gather the most important cybersecurity questions and offer clear, concise answers in an easy-to-read FAQ format.
Customer Network Segregation
S.No | Description of FAQ | FAQ Explained |
1 | How does SAP segregate each customer in SAP S/4HANA cloud private edition, specifically in AWS, Azure and GCP environments? |
|
2 | How do you further segment your network to ensure resource isolation? |
|
3 | Is it necessary for SAP Development, QA, and Production environments to be part of the same Virtual Network (VPC or VNET)? In other words, do we require communication between non-production (lower) and production environments? |
|
Secure Connectivity
S.No | Description of FAQ | FAQ Explained |
4 | Do you support IPSEC VPN to connect to SAP S/4HANA cloud, private edition landscape? |
|
5 | Do you support dedicated network connection bypassing Internet? |
|
6 | Does SAP S/4HANA cloud, private edition support AWS Transit Gateway? |
|
7 | How do I establish security in case I need to integrate with other cloud services? |
|
8 | How do I securely connect to SAP Business Technology Platform? |
|
9 | What protections are available for inbound traffic from Internet accessing resources in SAP S/4HANA cloud, private edition? |
|
10 | Do you support VPC or VNET Peering to connect to own account or subscriptions? |
|
11 | How about support for Load Balancers? |
|
12 | Do you support Private Link provided by Hyperscale provider in SAP S/4HANA cloud, private edition? |
|
Encryption
S.No | Description of FAQ | FAQ Explained |
13 | How is data encryption supported for data in transit? |
|
14 | How is data at rest encryption performed in SAP S/4HANA cloud, private edition? |
|
High Availability and Disaster Recovery
S.No | Description of FAQ | FAQ Explained |
15 | Do you support High Availability? |
|
16 | Do you support Disaster Recovery and if so, what are the RTO and RPO? |
|
17 | How does S/4HANA cloud, private edition manage autoscaling, and what is the typical timeframe for this process? |
|
General Security Questions
S.No | Description of FAQ | FAQ Explained |
18 | How do you ensure that no authorized access is allowed to customer data by the cloud admins? |
|
19 | How do you protect against Lateral Movement? |
|
20 | How do you protect against Malware? |
|
21 | How do you protect against ransomware? |
|
22 | If data is corrupted or any other scenario, how system SLA is offered? |
|
23 | What are the shared services involved in managing RISE, and what are the common elements with respect to security and data privacy? |
|
24 | Where can I look for Roles and Responsibilities pertaining to SAP S/4HANA cloud, private edition? |
|
25 | What security certifications audited via external 3rd party auditors are maintained for SAP S/4HANA cloud, private edition? |
|
26 | What are the broad security responsibilities for customers in SAP S/4HANA cloud, private edition? |
|
27 | What are the broad security responsibilities of SAP as a Cloud Service Provider? |
|
28 | How do I raise a support or security incident ticket with SAP? |
|
29 | How does SAP provide security assurance? |
|
30 | Can customer perform Vulnerability and Penetration testing? |
|
31 | Security Patch Management |
|
32 | What are the other contractual assurances related to cloud services that may be applicable? |
|
33 | Do you maintain Cyber SOC operating 24×7? |
|
34 | What logs are made available to customers? |
|
35 | How does customer data is returned to customer upon contract expiry or termination? |
|
Additional References
Conclusion
The purpose of this blog is to provide answers to commonly asked cybersecurity questions by SAP customers and partners regarding RISE with SAP S/4HANA cloud, private edition. The solution offers strong and comprehensive security capabilities that ensure the protection of customers’ business data. By utilizing SAP reference architecture, secure operations, and security assurances through contracts and certifications, customers can have greater confidence that their business sensitive data is secure from emerging cyber threats. For more information on cybersecurity protections and contractual assurances, customers are encouraged to refer to SAP Trust Center or access the resources provided in references.
Acknowledgement:
The author would like to express deep appreciation for Roland Costea, Chief Information Security Officer, SAP Enterprise Cloud Services and Manoj Nair, Principal Cloud Architect and Advisory, APJ for their efforts in reviewing the content and providing valuable feedback.
Disclaimer:
© 2023 SAP SE or an SAP affiliate company. All rights reserved. See Legal Notice on www.sap.com/legal-notice for use terms, disclaimers, disclosures, or restrictions related to SAP Materials for general audiences.