How the Swiss Federal Administration planned their SAP S/4HANA move with security by design in mind

How the Swiss Federal Administration planned their SAP S/4HANA move with security by design in mind

Hardly any other domain has changed as much as cybersecurity in recent years and ensuring SAP security in a dynamic environment is a constant challenge.

As SAP Systems are being more integrated with other (Cloud) solutions, they are nowadays increasingly exposed to higher risks. The extensive use of cloud components is changing the attack vectors of many SAP customers as they experience how SAP S/4HANA migration rapidly leads to a hybrid SAP ecosystem. Very soon the pressure to act increases and SAP customers realize traditional concepts for SAP security are less effective within hybrid landscapes and agile methodologies.

It is time to take back control and build your SAP ecosystem securely from scratch. The earlier security is taken into account, the better, and the migration to SAP S/4HANA is an ideal time to eliminate security deficiencies.

Security must be timely considered in the migration process and "security by design" seems to be a valid approach for this challenge. In this session you will learn how the swiss federal administration adopted this principle within their SAP S/4HANA migration program that was executed with the SAFe methodology, where they defined security by design as an architecture principle.

Take a deep dive and learn how the swiss federal administration is managing SAP Security within its SAP S/4HANA migration program and attend this comprehensive session to:

- Learn what’s security by design and how it can be implemented in a SAP S/4HANA migration project
- Learn how to fill the gaps from the SAP Secure Operations Map and extend it to a holistic SAP Security Framework
- Get practical tips and lessons learned on how to plan your SAP S/4HANA migration considering security by design
- Learn how to execute and orchestrate SAP Security by design within an agile environment

This content is available to Premium Members.

Sign In Become a Member

Meet the Authors

More Resources

See All Related Content