Interview Questions
SAP HANA Security
-
While processing data at a high-speed analytic appliance, it is very important to make sure that the organization’s data is not compromised to any unauthorized access or usage. In order to ensure that, SAP HANA has certain security compliance and standards protecting the business data. Different security policies are available in SAP HANA that can be easily enabled by the customers to implement different procedures and to meet compliance requirements of the company.
SAP HANA introduces multiple database maintenances in a single high-performance analytic system called multitenant database containers. Its system can also involve more than one multitenant database containers with exactly one system database and any number of multitenant database containers.
Single System ID (SID)
SAP HANA is installed in an environment which is identified by a single system ID (SID). Likewise, the database containers in the SAP HANA system are identified by a SID and database name. SAP HANA client, known as HANA studio, connects to specific databases. The complete security constraints of the system are effectively address by various security related features such as Authentication, Authorization, Encryption and Auditing, and some add-on features, which are not supported in other multitenant databases.
Below given is a list of security related features, provided by SAP HANA −
- Authentication and SSO
- User and Role Management
- Authorization
- Encryption of data in Persistence Layer
- Encryption of data communication in Network
What are the security features built into the SAP HANA database system?
- Database Isolation − It involves preventing cross tenant attacks through operating system mechanism to protect the database from any security breaches.
- Configuration Change blacklist − It involves preventing certain system properties from being changed by tenant database administrators. It also provides optimum settings and configuration to block any suspicious access to the SAP HANA system.
- Restricted Features − It involves disabling certain database features that provide direct access to file system, the network or other resources. In many occasions, the inbuilt features and facilities would attract granting of default access to the confidential data. If the organization doesn’t feel providing them, the access to that particular feature can be blocked effectively.
Get in touch with training experts Get Free Quotes