{"id":1530,"date":"2021-01-18T11:33:31","date_gmt":"2021-01-18T10:33:31","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1530"},"modified":"2021-03-23T09:02:14","modified_gmt":"2021-03-23T08:02:14","slug":"comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/","title":{"rendered":"Comprehensive SAP S\/4HANA security strategy reduces additional downstream costs"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-964 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg\" alt=\"Expert talk of IT-Onlinemagazin with SAST\" width=\"267\" height=\"200\" \/>Schott AG is considering its SAP S\/4HANA transformation from all aspects, from code and processes, down to authorizations for its SAP S\/4HANA migration.<\/p>\n<p>In this interview, Thomas Frey (SAP Authorizations Consultant, SAST SOLUTIONS) explains the requirements you need to keep track of when rolling out SAP S\/4HANA \u2013 and what you must avoid at all costs.<\/p>\n<p><!--more--><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong><em>The following interview between Helge Sanden (Editor in Chief of IT-Onlinemagazin) and Thomas Frey first appeared on January 13, 2021, in <\/em><\/strong><a href=\"https:\/\/it-onlinemagazin.de\/ganzheitliche-s-4hana-sicherheitsstrategie-spart-spaetere-extrakosten\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>IT-Onlinemagazin<\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Mr. Frey, which requirements must companies keep track of when rolling out SAP S\/4HANA? What should they avoid?<\/strong><\/h2>\n<p>In our experience, it is unfortunately still the case that too few companies planning their migration to S\/4HANA take into account security for the new systems.<\/p>\n<p>During the changeover , it is crucial to incorporate a robust, consistent foundation of security in your migration strategy. This is how companies can avoid both the typical traps in changing platforms \u2013 for example forgetting about interfaces and legacy systems \u2013 and the transfer of SAP authorizations much too late in the process.<\/p>\n<h2><strong>What challenges arise when companies do not consider all aspects of the migration to S\/4HANA?<\/strong><\/h2>\n<p>All the approaches do have one thing in common and that is that there are a number of basic decisions that must be made well before rolling out SAP S\/4HANA. Often, we see that the responsible parties aren\u2019t really aware of the challenges they face at the start of a project. This not only costs time later, but also frequently incurs significant additional costs.<\/p>\n<p>In fact, a migration project actually gives you the opportunity to take your SAP IT migration to a new level, with a cleanly designed, holistically planned security and compliance strategy for safeguarding your IT systems.<\/p>\n<p>At the same time, these challenges can be approached as opportunities to improve the security of your SAP target system, streamline your role concepts, and enable use of the new system with all its benefits.<\/p>\n<h2><strong>How do you see your role in SAP projects? What about the meaning your software tool takes on?<\/strong><\/h2>\n<p>There are so many critical decisions made directly when the project starts. This is why we support our customers right from the get-go, allowing us to tailor our responses for each customer&#8217;s company. We look at which transactions need to be replaced, or have become obsolete. We look at how to identify the Fiori apps that best fit the roles. And, of course, we look at how to do all this while remaining in compliance with the relevant authorization concept.<\/p>\n<p>When companies use the right tool, like SAST SUITE, they save time and money because the number of manual tasks is substantially reduced. Our software improves analysis results, recommends approaching authorization roles as a migration or with a new concept, and delivers default values directly. It also detects obsolete transactions, or transactions that have been replaced, and identifies which Fiori apps would be a good fit.<\/p>\n<p>All in all, this is the perfect interplay between SAP security &amp; compliance expertise and tool support. This also prevents avoidable risks from coming up in the first place in the customer&#8217;s new SAP S\/4HANA system.<\/p>\n<h2><strong>Can you give a few examples of misconceptions you come across in S\/4HANA projects?<\/strong><\/h2>\n<p>One frequent misconception is that SAP FIORI is a solution for nearly everything. On the contrary, many processes aren&#8217;t even supported yet. That\u2019s why we recommend only using Fiori where it truly adds value.<\/p>\n<p>Our second tip is to plan in more time. Typically, user departments have neither the required level of process expertise nor the understanding of how they plan to work in S\/4HANA in the future. Designing business processes that make sense and are optimized for work across multiple departments is just not something that can be done alongside daily business workloads.<\/p>\n<p>A third misconception that we encounter all too often are \u201clegacy burdens\u201d that are migrated to the new system inadvertently \u2013 the source code is a specific example here. Instead of analyzing things beforehand to determine what they really need, they simply copy everything on a 1:1 basis. However, this means that any security risks are also copied over and leave open any backdoors that could inflict damage in the systems.<\/p>\n<p>These examples are all absolutely avoidable by devising an end-to-end strategy for SAP S\/4HANA security from the start.<\/p>\n<h3><strong>What will you be talking about at the IT online conference 2021?<\/strong><\/h3>\n<p>We&#8217;ll be sharing our day-to-day practical experiences in the Expert Talk. We&#8217;ll go over what frequently causes projects to flounder, what is truly crucial for intelligent project management, talk about the how the opportunities for completely rethinking authorization concepts, and, last but not least, cover the advantages of tool support during a migration.<\/p>\n<p>In addition, our customer SCHOTT AG will present a comprehensive deep dive into how their migration of authorizations to S\/4HANA \u2013 in the middle of the corona pandemic \u2013 is going. They&#8217;ll also share their experiences and lessons learned.<\/p>\n<h2><strong>What do you expect the dominating topic to be in the SAP community in 2021?<\/strong><\/h2>\n<p>In our eyes, the dominating topic will most certainly be whether or not more companies learn from the early adopters and truly take a holistic view of their SAP S\/4HANA transformations.<\/p>\n<p>We are also exciting to see how those companies who have decided to delay their migrations, for example due to the pandemic, will cope with the expected ongoing shortage of consultant expertise.<\/p>\n<h2><strong>Thank you for the interview.<\/strong><\/h2>\n<p><em>Helge Sanden, Editor in Chief of IT-Onlinemagazin, asked the questions.<\/em><\/p>\n<p>Would you like to dive deeper into this subject? Then we recommend <a href=\"https:\/\/sast-solutions.de\/webinare-on-demand.html\" target=\"_blank\" rel=\"noopener noreferrer\">the recording of our SAST Expert Talk<\/a> from 27 January 2021 (in German). Christian Puscher (SCHOTT AG) and Thomas Frey (SAST SOLUTIONS) were guests and speakers at the IT-Onlinekonferenz 2021 \u201cSAP S\/4HANA, SAP Optimization, Increase in Efficiency, and Digital Transformation\u201d and reported together about the transformation of the SAP system landscape at SCHOTT AG.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1531\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/01\/Abb_ThomasFrey_SAST-SOLUTIONS-300x207.jpg\" alt=\"Thomas Frey (SAST SOLUTIONS)\" width=\"300\" height=\"207\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/01\/Abb_ThomasFrey_SAST-SOLUTIONS-300x207.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/01\/Abb_ThomasFrey_SAST-SOLUTIONS-1024x708.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/01\/Abb_ThomasFrey_SAST-SOLUTIONS-768x531.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/01\/Abb_ThomasFrey_SAST-SOLUTIONS-1536x1062.jpg 1536w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/01\/Abb_ThomasFrey_SAST-SOLUTIONS-2048x1416.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Thomas Frey\u00a0 (SAP Authorizations Consultant, SAST SOLUTIONS)\u00a0 \u00a0 \u00a0<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/strong><strong><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-788 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458-300x200.jpg\" alt=\"Helge Sanden IT-Onlinemagazin\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458-300x200.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458-768x512.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><br \/>\nHelge Sanden (Editor in Chief of IT-Onlinemagazin)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Further articles on S\/4HANA migration:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"KhoS3pBfkd\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/\">Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/embed\/#?secret=KhoS3pBfkd\" data-secret=\"KhoS3pBfkd\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"TBUWh33UmM\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/08\/10\/starting-migration-project-consider-converting-sap-erp-authorizations-to-sap-s-4hana\/\">Starting a migration project? Consider these things when converting SAP ERP authorizations to SAP S\/4HANA<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Starting a migration project? Consider these things when converting SAP ERP authorizations to SAP S\/4HANA&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/08\/10\/starting-migration-project-consider-converting-sap-erp-authorizations-to-sap-s-4hana\/embed\/#?secret=TBUWh33UmM\" data-secret=\"TBUWh33UmM\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Schott AG is considering its SAP S\/4HANA transformation from all aspects, from code and processes, down to authorizations for its SAP S\/4HANA migration. In this interview, Thomas Frey (SAP Authorizations Consultant, SAST SOLUTIONS) explains the requirements you need to keep track of when rolling out SAP S\/4HANA \u2013 and what you must avoid at all [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[153,163,68,178,80],"class_list":["post-1530","post","type-post","status-publish","format-standard","hentry","category-references-best-cases","tag-s-4hana","tag-s4hana-migration","tag-sap-authorizations","tag-sap-fiori","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comprehensive S\/4HANA security strategy reduces downstream add costs<\/title>\n<meta name=\"description\" content=\"What you should keep track of when rolling out S\/4HANA: Take an overall view of the migration project - coding, processes and authorizations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comprehensive SAP S\/4HANA security strategy reduces additional downstream costs\" \/>\n<meta property=\"og:description\" content=\"What you should keep track of when rolling out S\/4HANA: Take an overall view of the migration project - coding, processes and authorizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-18T10:33:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-23T08:02:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"267\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Comprehensive SAP S\/4HANA security strategy reduces additional downstream costs\" \/>\n<meta name=\"twitter:description\" content=\"What you should keep track of when rolling out S\/4HANA: Take an overall view of the migration project - coding, processes and authorizations.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Comprehensive SAP S\\\/4HANA security strategy reduces additional downstream costs\",\"datePublished\":\"2021-01-18T10:33:31+00:00\",\"dateModified\":\"2021-03-23T08:02:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/\"},\"wordCount\":1042,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"keywords\":[\"S\\\/4HANA\",\"S\\\/4HANA Migration\",\"SAP Authorizations\",\"SAP Fiori\",\"SAP Security\"],\"articleSection\":[\"References &amp; Best Cases\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/\",\"name\":\"Comprehensive S\\\/4HANA security strategy reduces downstream add costs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"datePublished\":\"2021-01-18T10:33:31+00:00\",\"dateModified\":\"2021-03-23T08:02:14+00:00\",\"description\":\"What you should keep track of when rolling out S\\\/4HANA: Take an overall view of the migration project - coding, processes and authorizations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"width\":267,\"height\":200,\"caption\":\"Expert talk of IT-Onlinemagazin with SAST\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/01\\\/18\\\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comprehensive SAP S\\\/4HANA security strategy reduces additional downstream costs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comprehensive S\/4HANA security strategy reduces downstream add costs","description":"What you should keep track of when rolling out S\/4HANA: Take an overall view of the migration project - coding, processes and authorizations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/","og_locale":"en_US","og_type":"article","og_title":"Comprehensive SAP S\/4HANA security strategy reduces additional downstream costs","og_description":"What you should keep track of when rolling out S\/4HANA: Take an overall view of the migration project - coding, processes and authorizations.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/","og_site_name":"SAST BLOG","article_published_time":"2021-01-18T10:33:31+00:00","article_modified_time":"2021-03-23T08:02:14+00:00","og_image":[{"width":267,"height":200,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Comprehensive SAP S\/4HANA security strategy reduces additional downstream costs","twitter_description":"What you should keep track of when rolling out S\/4HANA: Take an overall view of the migration project - coding, processes and authorizations.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Comprehensive SAP S\/4HANA security strategy reduces additional downstream costs","datePublished":"2021-01-18T10:33:31+00:00","dateModified":"2021-03-23T08:02:14+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/"},"wordCount":1042,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","keywords":["S\/4HANA","S\/4HANA Migration","SAP Authorizations","SAP Fiori","SAP Security"],"articleSection":["References &amp; Best Cases"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/","url":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/","name":"Comprehensive S\/4HANA security strategy reduces downstream add costs","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","datePublished":"2021-01-18T10:33:31+00:00","dateModified":"2021-03-23T08:02:14+00:00","description":"What you should keep track of when rolling out S\/4HANA: Take an overall view of the migration project - coding, processes and authorizations.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","width":267,"height":200,"caption":"Expert talk of IT-Onlinemagazin with SAST"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/01\/18\/comprehensive-sap-s4hana-security-strategy-reduces-additional-downstream-costs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Comprehensive SAP S\/4HANA security strategy reduces additional downstream costs"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1530"}],"version-history":[{"count":10,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1530\/revisions"}],"predecessor-version":[{"id":1611,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1530\/revisions\/1611"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}