SAP BTP Security Dec 2021
SAP BTP Security Dec 2021
Security
Allan van Lelyveld, SAP
PUBLIC
Housekeeping rules
2014 Latest
2019
2013
2018
2012
2017
2011
2016
2010
2015
2009
© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Security Operations Map
Regulatory Process
Process Data Privacy & Protection Audit & Fraud Management
Compliance
▪ SAP Process Control ▪ SAP Access Control ▪ SAP Enterprise Threat Detection ▪ SAP Global Trade Services
▪ SAP Risk Management ▪ SAP Cloud Identity Access ▪ SAP Privacy Governance ▪ SAP S/4HANA for international
▪ SAP Audit Management Governance ▪ SAP Customer Data Cloud trade
▪ SAP Single Sign On ▪ SAP Data Custodian ▪ SAP Watch List Screening
▪ SAP Cloud Identity Services – ▪ UI masking for SAP
Identity Authentication
▪ SAP Identity Management
▪ SAP Cloud Identity Services –
Identity Provisioning
Risk & Compliance SAP Business Technology • SAP Cloud Identity Access and
Security Partners
Platform Governance
❑ Data Retention Manager • SAP Customer Data Cloud
Management
Key capabilities
▪ Authorization of business users Authorization Service
▪ Authentication and Authorization of system to system
communication SAP Cloud Identity Services
XSUAA
▪ Use of standards like SAML, Oauth, JWT tokens
IAS
Benefits
▪ Integration with SAML Identity Provider (IDP) from SAP (IAS) or
non-SAP
Benefits
▪ Flexible authorization management
▪ Fast implementation of authorization management
Assigned to
(static assignment)
User Role
Assigned by
mapping rule Role “Manager” Role “AccountExec”
“Groups”
Assigned by
mapping rule Role “Controller”
“Groups”
Key capabilities
▪ Fine grained access control lists of allowed cloud and on-premise resources Connectivity
service
▪ Fine grained audit logging for traceability
▪ Principal propagation from cloud to on-premise Cloud
▪ Trust relation with on-premise system based on X.509 certificates
Corporate network
Benefits
▪ Consume APIs and data from APIs and data provided by any Internet service
via HTTP(s) using destinations
▪ Consume APIs, data and users provided by on-premise systems via HTTP,
RFC, or even with TCP using destinations and the Cloud Connector
Destination 1 Destination 2
Benefits
▪ Separation of concerns
▪ Security
▪ Reusability
▪ Access via Tools Connectivity
Scenarios
▪ CF app to CF app
▪ CF app to on premise SAP system
▪ CF app to 3rd party cloud app
▪ CF app to SAP Cloud solution
▪ Secure storage of data objects ensuring confidentiality and integrity Credential Key Management
SCP Cockpit Store backend Service
▪ Secure key management, such as storage, exchange, use and
deletion
▪ Audit logs are written in the customer subaccount
Space
Developer
Benefits
▪ Compliance to several standards can be achieved Service Broker
CLI
▪ Keys can be shared between interconnected applications
Key capabilities
▪ Internal service used by various SAP applications Business Technology Platform
▪ Scanning of documents
▪ Scans are limited to the tenants they serve
Benefits
▪ Secure SAP Applications, like the SAP Documents Center, on
the SAP BTP
▪ Nearly no performance impact for the SAP BTP landscape
SAP Business Technology Platform Audit Log Service records security-related system information such as user
record changes and unsuccessful logon attempts. Records that are considered as relevant for auditing can be
retrieved by the customer SIEM* system via the audit log retrieval API.
Benefits
▪ Recording of audit relevant activities
▪ Providing a higher level of transparency
▪ Enables the reconstruction of a series of events
Benefits
• Efficient and rapid development
• Minimal complexity of models and code
• No lock-in to specific language, DB and tools
• Full-stack development from persistence to UI
• Cloud native platform services integration
• 1st-class support for S/4HANA extension scenario
• Built-in security qualities
All platform regions launched before the 1st of July 2018 support
all three versions of the TLS protocol: 1.0, 1.1, and 1.2.
See Regions. TLS
Following July 2018, future platform regions will support only the
more secure TLS version 1.2.
Business Technology Platform
Applications
5 of 5
▪ Trusted source, where users can initiate requests and engage with SAP
Cloud Service Status Security Data Center Data Protection and Compliance Agreements
Availability data of our cloud Measures to ensure SAP Cloud Virtually and physically Privacy Shows the vast variety of Overview of the building blocks
services showing the current security protected data with state-of-the- SAP respects and protects the ISO/BS, as well as certificates of a SAP Cloud contract
live status art technologies rights of individuals
Authentication &
Single Sign-On
SAP S/4HANA
Delegated
Authentication
Corporate
Identity Provider User Store
SAP Cloud Identity Services - Identity Authentication enables single sign-on for SAP’s cloud-
based business applications, with two usage options
1. As IdP proxy for a seamless, flexible integration with customers’ existing IAM infrastructure
▪ Simple central configuration
▪ Flexible configuration options
Identity Authentication
Username/password
X.509
Authentication
SAML /
Kerberos / SPNEGO OpenID Connect
Business
2FA (TOTP, WebAuthn, RSA, SMS)
User Identity Federation
Corporate user store
Cloud
SAML Connector
Microsoft
3rd party IdP AS ABAP MS Active Directory LDAP
ADFS / Azure
Cloud Applications
Interoperable
SAML
or
OIDC
with all applications supporting SAML* 2.0
standard
Cloud Applications
User Identity
or OpenID Connect (OIDC) Authentication
SAML
On-premise
Applications
User Corporate
Identity Provider
*SAML = Security Assertion Markup Language
© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 31
Delegated authentication
Identity Authentication as a proxy to a corporate identity provider (IdP)
SPNEGO* authentication
▪ Users authenticated with
Microsoft Active Directory enjoy single
sign-on to cloud applications without Applications
re-authentication Identity
Authentication
▪ Reuse of existing corporate identity
SPNEGO
infrastructure
▪ Secure authentication and SSO for cloud
and on-premise web applications
Active
Directory
User Kerberos
Token
Member of
User Group Partner Identity Providers
Partners
IP-Address
Range
Externals Identity
Email Authentication
Domain
User
Corporate Identity Provider
Type
Employees
In the proxy relationship, the proxy IdP can have an influence over the ultimate result of
authentication process.
For example, in an Identity Federation set-up, SAML response may contain attributes not just from
the Corporate IdP, but also the proxy IdP.
The proxy IdP may have the final word on whether authentication process ultimately succeeds or
fails.
Authentication patterns:
IAS acting purely as Identity IAS as an Identity Provider proxy, • IAS acting as Identity Provider IAS acting as ultimate Identity
Provider proxy, with Corporate with Corporate IDP as ultimate proxy, with Corporate IDP as Provider, based on user record
authentication authority. ultimate authentication authority.
IDP as ultimate authentication attributes in IAS.
authority. • However, all users have user
However, certain user attributes record in IAS local user store. Risk-Based Authentication (RBA) is
(within SAML assertion response) • With this configuration, Risk-Based also possible in this case.
are sourced from IAS user record Authentication (RBA) can be used
(where available). - based on user record attributes in
IAS
Basic authentication
▪ User ID / email and password
****** Code
Logon
Client certificates 631 951
▪ X.509
Two-factor authentication
▪ Second factor via soft-tokens
▪ Second factor via Web Authentication Applications
▪ Second factor via Radius* User Identity
▪ Second factor via SMS** Authentication
Delegated logon
▪ Social IdPs
▪ Corporate IdP
*Radius support enabled upon request
© 2021 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC **SMS requires the license of SAP Authentication 365 42
Custom password policy configuration
Member of
User Group
Authentication
Method
IP-Address
Range
Allow
User 2-factor
Type Authentication Application
Self- Email
registered? verified?
Member of
User Group
Authentication
Method
IP-Address
Range
User Allow
Type Application
“employee”
User Identity
Authentication
Assignment
to Application
Self- Email
registered? verified?
Member of
User Group
Authentication “Admin”
Method
IP-Address
Range
“10.55.0.0/16”
User 2-factor
Type Authentication Application
User Identity
Authentication
Assignment
to Application
Self- Email
registered? verified?
Customization features
▪ Company logo
▪ Application name and logo
▪ Color style
▪ Full customization via CSS
▪ Terms of use & privacy policy, incl. IdP proxy
▪ Adjust UI texts via API
▪ Email templates
Product features
▪ Responsive UIs
▪ Multi-language support
▪ Can programmatically be
integrated by the application
Create user
account Update De-provision
Update user and
Assign authorizations authorizations authorizations
authorizations
Policy-based assignments
▪ Define rules for assignments based on the input data
Source System
▪ Take for example the value of an identity’s organizational unit to decide
on the required roles
Filtering
▪ Decide in detail which objects shall be read or written Target System
Identity
Provisioning
Corporate
User Store
Identity Provisioning
SAP C/4HANA SAP SuccessFactors
IPS System
Provision
Connectors
Users/Groups
SAP S/4HANA SAP BTP
…
Provision Users/ Business Role/User
Groups Attribute Update
CLOUD
ON-PREMISE
On-Premise Applications
SAP Identity Management
Manage and IDM System SAP NetWeaver 3rd Party
Provision
Users/Groups Connectors
Manage Business
Roles SAP S/4HANA ...
Identity Provisioning
SAP C/4HANA SAP SuccessFactors
IPS System
Provision Connectors
Users/Groups SAP S/4HANA SAP BTP
…
User Sync
Identity Management
Business Roles
Subscribe
www.sap.com/contactsap
www.sap.com/germany/contactsap