{"id":813,"date":"2019-04-04T08:31:44","date_gmt":"2019-04-04T06:31:44","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=813"},"modified":"2020-07-24T12:45:11","modified_gmt":"2020-07-24T10:45:11","slug":"sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/","title":{"rendered":"SAP Security &#038; Compliance: Challenges in the Context of S\/4HANA, Code Security, and the Cloud"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-812 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903-300x169.jpg\" alt=\"SAST DAYS\" width=\"300\" height=\"169\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903-300x169.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903-768x432.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>They say that major events cast a shadow that portends their arrival. In SAP environments, this applies in particular to the transition to S\/4HANA, which companies will need to make before maintenance for SAP ERP expires in 2025.<\/p>\n<p>As we covered this pending migration from various perspectives at our SAST DAYS 2019 event, interest in the topics of authorizations and code security was especially high. Let&#8217;s take a look back at those exciting days, which presented a balanced mix of current challenges and assorted solutions.<\/p>\n<p><!--more--><\/p>\n<h2><strong>Fiori and S\/4HANA authorizations: brownfield or greenfield?<\/strong><\/h2>\n<p>To kick off SAST DAYS 2019, we highlighted a subject that is likely weighing heavily on the minds of most customers who are about to migrate to S\/4HANA: authorizations in Fiori environments. This detailed presentation focused on showing that the differences between ERP and S\/4HANA are much larger than SAP has announced. To offer just one example, S\/4HANA has around 16,000 more transactions than ECC 6.0. This and other changes should definitely be taken into account in migration projects. SAST SOLUTIONS project lead Ansgar R\u00fcmpker then demonstrated both a project procedure for greenfield approaches \u2013 that is, one involving a fresh installation of S\/4HANA \u2013 and for brownfield approaches for migrating existing systems. These approaches affect authorizations in different ways, which is why there\u2019s no universal answer as to which will work best for each individual company.<\/p>\n<h2><strong>Security and compliance for SAP Cloud<\/strong><\/h2>\n<p>The next topic was aiming at the future, and it was a big one. When it comes to the cloud, the feedback from those in attendance was clear: Many customers still want to bide their time before making the move, but prepare accordingly, as well. \u201cThe cloud is going to affect all of us at some point, so it&#8217;s all the more important that we get an early start on figuring out the ramifications in presentations like these,\u201d one participant pointed out. The impact of SAP&#8217;s \u201ccloud-first\u201d strategy is already easy to see. SAP customers who want to keep their systems secure and up-to-date in the future should therefore be sure to put the cloud on their agendas. While the topics related to cloud security and compliance don\u2019t differ significantly from those that play a role in on-premise operations, the ways in which companies approach them certainly do in some cases. Jonas Kelbert, software developer at SAST SOLUTIONS, held a presentation on this very subject.<\/p>\n<h2><strong>System interfaces in cloud environments and SoD analyses in SAP Cloud apps<\/strong><\/h2>\n<p>Meanwhile, another insight became increasingly evident as the event went on: Before moving to the cloud, you first need to safeguard your existing system. Particular attention needs to be paid to interfaces in this regard, as SAST product manager Patrick Boch emphasized in his presentation. In Boch&#8217;s experience, companies often don&#8217;t have a clear overview of the interfaces present in their current systems and the measures taken to secure them (if any!). Taking stock of these interfaces and locking them down should thus be the first steps taken on the path into the cloud. The further challenges that await in this regard were then covered by Ralf Kempf, CTO of SAST SOLUTIONS, in his presentation on identities in cloud environments. Kempf underscored how customers need to be particularly mindful of conflicts in the segregation of duties (SoD) and presented a tool-aided approach that makes it easy to maintain a corresponding overview despite the different technical services involved. Here, <a href=\"https:\/\/www.sast-solutions.de\/en\/sast-suite\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a> makes it possible to keep an eye on a user&#8217;s identities across multiple systems and identify SoD conflicts in a fast, transparent manner.<\/p>\n<h2><strong>A step-by-step guide to secure ABAP coding<\/strong><\/h2>\n<p>The presentation that followed featured plenty of practical experience on the topic of code cleanup, with lead developer Stefanie Jasser reporting on a recent code cleansing project with a major German automotive supplier. With the help of an integrated framework, the SAST team not only quickly mitigated the vulnerabilities in the customer&#8217;s own ABAP code; it was also able to use contextual information from <a href=\"https:\/\/www.sast-solutions.de\/en\/sast-suite\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a> to identify relevant flaws with the necessary precision. Thanks to our \u201csoft cleansing\u201d approach, which includes a logging phase before the changes made to productive code go live, the team even managed to clean up the code in question without affecting the customer&#8217;s ongoing operations.<\/p>\n<h2><strong>SAST Managed Services for SAP security and compliance<\/strong><\/h2>\n<p>We also have positive things to report from another customer project. In this case, a service provider for one of the largest German banks was facing the challenge of setting up a dedicated, real-time monitoring system to protect its SAP systems from potential attacks. While the customer was under tremendous pressure to meet very high security and compliance requirements, it wasn\u2019t possible to assemble own resources to handle this type of continuous scanning. This was why the customer decided to work with akquinet \u2013 the only provider on the market that offers SAP security monitoring in real time in the form of managed services.<\/p>\n<h2><strong>With all the challenges out there, SAST offers just as many solutions \u2013 and more<\/strong><\/h2>\n<p>Those who attended SAST DAYS 2019 came away focused on the future. \u201cOver the course of the day, we realized how much work we have in front of us,\u201d one customer offered in summary. \u201cThat makes it all the more comforting to know that there are tailored solutions out there.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-33 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet-300x210.jpg\" alt=\"Rald Kempf, CTO SAST SOLUTIONS\" width=\"300\" height=\"210\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet-300x210.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Ralf Kempf, CTO of SAST SOLUTIONS, also had a positive overall impression of this year\u2019s SAST DAYS. \u201cWe&#8217;re obviously happy to have customers and contract partners who want us to help them tackle the many challenges they\u2019ll be facing in the future,\u201d he affirmed. \u201cAt the same time, our conversations with them have also shown that they&#8217;re not the only ones with work to do: We \u2013 along with SAP, of course \u2013 will need to do our homework, as well. With SAST SUITE and our teams of experts, we plan to remain the first place people contact when it comes to SAP security and compliance.\u201d<\/p>\n<p>Are you interested in more information on these topics? If so, have a look through the <a href=\"https:\/\/www.sast-solutions.de\/news\/events-webinare\/index.jsp\">webinars<\/a> we currently have on offer, or browse our <a href=\"https:\/\/www.sast-solutions.de\/news\/events-webinare\/index.jsp\">webinar archive<\/a>.<\/p>\n<p>Are you facing similar challenges? Would you like to find out more about comprehensive protection of your SAP systems? Check out our <a href=\"https:\/\/sast-solutions.de\/index-2.jsp\">SAST SOLUTIONS website<\/a> or send us an e-mail at <a href=\"mailto:sast@akquinet.de\">sast@akquinet.de<\/a>.<\/p>\n<h2><strong>SAST DAYS for SAP security and compliance: Register for 2020 now!<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-811 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/03\/SAST-DAYS_Cities-300x200.png\" alt=\"SAST DAYS 2020\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/SAST-DAYS_Cities-300x200.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/SAST-DAYS_Cities-768x512.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/SAST-DAYS_Cities-1024x683.png 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>At our regular round-table discussions, our experts cover the latest developments in SAP security and compliance for both end customers and our own contract partners. We also offer insights into intriguing customer projects and a forum where participants can share their ideas and experiences. With the dates already set for 2020, <a href=\"https:\/\/www.sast-solutions.de\/en\/news\/events-webinars\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">you can now register on our event page<\/a>.<\/p>\n<p>We are looking forward to seeing you!<\/p>\n<p>&nbsp;<\/p>\n<h2>This might also be of interest to you:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/02\/05\/how-can-i-quickly-migrate-sap-custom-code-to-s-4hana\/\">How can I quickly migrate SAP custom code to S\/4HANA?<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/03\/28\/authorizations-for-batch-processing-in-netweaver-and-s-4hana-environments\/\">Authorizations for batch processing in NetWeaver and S\/4HANA environments.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>They say that major events cast a shadow that portends their arrival. In SAP environments, this applies in particular to the transition to S\/4HANA, which companies will need to make before maintenance for SAP ERP expires in 2025. As we covered this pending migration from various perspectives at our SAST DAYS 2019 event, interest in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[151,44,153,129,178,80,103],"class_list":["post-813","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-grc","tag-managed-services","tag-s-4hana","tag-sap-cloud","tag-sap-fiori","tag-sap-security","tag-sod"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SAP Security &amp; Compliance: Challenges in the Context of S\/4HANA, Code Security, and the Cloud<\/title>\n<meta name=\"description\" content=\"S\/4HANA Outlook: At the SAST DAYS we identified challenges for SAP Security &amp; Compliance and proposed solutions as part of our SAST SOLUTIONS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security &amp; Compliance: Challenges in the Context of S\/4HANA\" \/>\n<meta property=\"og:description\" content=\"S\/4HANA Outlook: At the SAST DAYS we identified challenges for SAP Security &amp; Compliance and proposed solutions as part of our SAST SOLUTIONS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-04T06:31:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T10:45:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"SAP Security &amp; Compliance: Challenges in the Context of S\/4HANA\" \/>\n<meta name=\"twitter:description\" content=\"S\/4HANA Outlook: At the SAST DAYS we identified challenges for SAP Security &amp; Compliance and proposed solutions as part of our SAST SOLUTIONS.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"SAP Security &#038; Compliance: Challenges in the Context of S\\\/4HANA, Code Security, and the Cloud\",\"datePublished\":\"2019-04-04T06:31:44+00:00\",\"dateModified\":\"2020-07-24T10:45:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/\"},\"wordCount\":1187,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Motiv_SAST-DAYS_low_1903-300x169.jpg\",\"keywords\":[\"GRC\",\"Managed Services\",\"S\\\/4HANA\",\"SAP Cloud\",\"SAP Fiori\",\"SAP Security\",\"SoD\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/\",\"name\":\"SAP Security & Compliance: Challenges in the Context of S\\\/4HANA, Code Security, and the Cloud\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Motiv_SAST-DAYS_low_1903-300x169.jpg\",\"datePublished\":\"2019-04-04T06:31:44+00:00\",\"dateModified\":\"2020-07-24T10:45:11+00:00\",\"description\":\"S\\\/4HANA Outlook: At the SAST DAYS we identified challenges for SAP Security & Compliance and proposed solutions as part of our SAST SOLUTIONS.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Motiv_SAST-DAYS_low_1903-300x169.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Motiv_SAST-DAYS_low_1903-300x169.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/04\\\/04\\\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security &#038; Compliance: Challenges in the Context of S\\\/4HANA, Code Security, and the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SAP Security & Compliance: Challenges in the Context of S\/4HANA, Code Security, and the Cloud","description":"S\/4HANA Outlook: At the SAST DAYS we identified challenges for SAP Security & Compliance and proposed solutions as part of our SAST SOLUTIONS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security & Compliance: Challenges in the Context of S\/4HANA","og_description":"S\/4HANA Outlook: At the SAST DAYS we identified challenges for SAP Security & Compliance and proposed solutions as part of our SAST SOLUTIONS.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/","og_site_name":"SAST BLOG","article_published_time":"2019-04-04T06:31:44+00:00","article_modified_time":"2020-07-24T10:45:11+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"SAP Security & Compliance: Challenges in the Context of S\/4HANA","twitter_description":"S\/4HANA Outlook: At the SAST DAYS we identified challenges for SAP Security & Compliance and proposed solutions as part of our SAST SOLUTIONS.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"SAP Security &#038; Compliance: Challenges in the Context of S\/4HANA, Code Security, and the Cloud","datePublished":"2019-04-04T06:31:44+00:00","dateModified":"2020-07-24T10:45:11+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/"},"wordCount":1187,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903-300x169.jpg","keywords":["GRC","Managed Services","S\/4HANA","SAP Cloud","SAP Fiori","SAP Security","SoD"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/","url":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/","name":"SAP Security & Compliance: Challenges in the Context of S\/4HANA, Code Security, and the Cloud","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903-300x169.jpg","datePublished":"2019-04-04T06:31:44+00:00","dateModified":"2020-07-24T10:45:11+00:00","description":"S\/4HANA Outlook: At the SAST DAYS we identified challenges for SAP Security & Compliance and proposed solutions as part of our SAST SOLUTIONS.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903-300x169.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/03\/Motiv_SAST-DAYS_low_1903-300x169.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/04\/04\/sap-security-compliance-challenges-s-4hana-code-security-and-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"SAP Security &#038; Compliance: Challenges in the Context of S\/4HANA, Code Security, and the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=813"}],"version-history":[{"count":9,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/813\/revisions"}],"predecessor-version":[{"id":1299,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/813\/revisions\/1299"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}