SAP HANA Security Guide (SAP PRESS)
by: Jonathan Haun
ISBN-10: 1493214411
ISBN-13: 9781493214419
Edition 版次: 1st
Publication Date 出版日期: 2017-05-25
Print Length 页数: 542
How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options,including privileges,encryption,and more. Learn how to secure database objects,provision and maintain user accounts,and develop and assign roles. Then take an in-depth look at authentication and certificate management before seeing how to enable auditing and security tracing. Up to date for SAP HANA 2.0!
The comprehensive guide to SAP HANA security,from authentication to auditing
Learn to develop a complete security model using practical examples and case studies
Identify the critical settings necessary to pass an SAP HANA security audit
Privileges and Roles
Master the SAP HANA privilege types system,object,package,analytic,and application and learn to create and assign database and repository roles using SAP HANA Studio and SQLScript.
Authentication and Encryption
Learn to use Kerberos,SAML,and native authentication with step-by-step instructions and secure internal and external communication using encryption and SSL certificates.
Monitoring
Activate rules-based monitors to record SAP HANA security-related activities,enable auditing in your system,and use security tracing to keep an eye on your roles and privileges.
SAP HANA Studio
Privileges
Roles
Database objects
User accounts
Authentication
Lifecycle management
Auditing
Security tracing
Certificate management
Encryption
SAP HANA Security Guide
未经允许不得转载:finelybook » SAP HANA Security Guide
相关推荐
- CISA – Certified Information Systems Auditor Study Guide: Ace the CISA exam with practical examples and over 1000 exam-oriented practice questions, 3rd Edition
- Computer Vision in Smart Agriculture and Crop Management
- Cloud Native Application Protection Platforms: A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
- Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
- Federated Learning for Future Intelligent Wireless Networks
- Artificial Intelligence and Machine Learning Foundations: Learning from Experience, 2nd Edition