SAP HANA Security Guide Front Cover

SAP HANA Security Guide

  • Length: 542 pages
  • Edition: 1st
  • Publisher:
  • Publication Date: 2017-05-25
  • ISBN-10: 1493214411
  • ISBN-13: 9781493214419
  • Sales Rank: #1326861 (See Top 100 Books)
Description

How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an in-depth look at authentication and certificate management before seeing how to enable auditing and security tracing. Up to date for SAP HANA 2.0!

  • The comprehensive guide to SAP HANA security, from authentication to auditing
  • Learn to develop a complete security model using practical examples and case studies
  • Identify the critical settings necessary to pass an SAP HANA security audit

Privileges and Roles
Master the SAP HANA privilege types system, object, package, analytic, and application and learn to create and assign database and repository roles using SAP HANA Studio and SQLScript.
Authentication and Encryption
Learn to use Kerberos, SAML, and native authentication with step-by-step instructions and secure internal and external communication using encryption and SSL certificates.
Monitoring
Activate rules-based monitors to record SAP HANA security-related activities, enable auditing in your system, and use security tracing to keep an eye on your roles and privileges.

  • SAP HANA Studio
  • Privileges
  • Roles
  • Database objects
  • User accounts
  • Authentication
  • Lifecycle management
  • Auditing
  • Security tracing
  • Certificate management
  • Encryption

Table of Contents

Chapter 1 Managing Security With Sap Hana Studio
Chapter 2 Introduction To Sap Hana Privileges
Chapter 3 Catalog Objects
Chapter 4 User Accounts
Chapter 5 Database Roles
Chapter 6 Repository Roles
Chapter 7 System Privileges
Chapter 8 Object Privileges
Chapter 9 Package Privileges
Chapter 10 Analytic Privileges
Chapter 11 Application Privileges
Chapter 12 Authentication
Chapter 13 Certificate Management And Encryption
Chapter 14 Security Lifecycle Management
Chapter 15 Auditing
Chapter 16 Security Tracing And Troubleshooting
Chapter 17 Security Recommendations
Chapter 18 Sap Hana 2.0 Security

To access the link, solve the captcha.