Security & Compliance
SAP secures the infrastructure. You secure the application, data, and users. Here's where the responsibility line is drawn.
own application security
secures infrastructure
critical security tasks
GDPR, your responsibility
Foundation
The Fundamental Truth
RISE is NOT a security outsourcing.
SAP is responsible for infrastructure security (hyperscaler, network, OS patches). You remain responsible for application security, data protection, user access, and compliance.
Think of it like living in a secure apartment building: the landlord locks the building entrance, but you still need to lock your apartment door and protect your belongings.
Overview
Security Responsibility Matrix
A clear view of who owns what across security domains.
| Security Domain | SAP | Customer | Key Activities |
|---|---|---|---|
| Infrastructure Security | Hyperscaler security, physical security, network firewalls | ||
| OS & Database Patching | SAP executes patches; Customer approves timing and validates | ||
| Security Hardening | SAP hardens OS/DB; Customer hardens SAP app (profile params, gateways) | ||
| SAP Application Patching | Customer downloads, tests, and applies SAP Security Notes | ||
| User Access Management | Roles, authorizations, SoD, user provisioning/deprovisioning | ||
| Data Encryption (at rest) | HANA native encryption enabled by default | ||
| Data Encryption (in transit) | SAP enforces TLS; Customer configures interface encryption | ||
| Data Classification | Customer classifies sensitive data and implements controls | ||
| Audit Logging | SAP provides SAL infrastructure; Customer configures and monitors | ||
| Vulnerability Scanning | SAP scans infrastructure; Customer scans custom code (CVA) | ||
| Incident Response | SAP notifies infrastructure issues; Customer investigates app layer | ||
| Compliance (GDPR, SOX) | SAP provides certifications; Customer ensures app compliance |
Action Required
Your Critical Security Tasks
These five areas require your direct attention and cannot be delegated to SAP.
User Access & Authorization
You design, implement, and maintain all user roles.
Application Security Configuration
SAP doesn't configure security settings - you do.
Data Protection & Privacy
You own all data - PII, financial, trade secrets.
Vulnerability Management
You monitor SAP security notes and apply patches.
Monitoring & Incident Response
SAP provides tools, but you configure and respond.
Regulatory
Compliance Frameworks
SAP provides infrastructure certifications, but you remain responsible for application-level compliance.
SAP Provides (Infrastructure Level)
- ISO 27001, ISO 27017, ISO 27018 certifications
- SOC 1 Type II, SOC 2 Type II reports
- Cloud Security Alliance (CSA) STAR
- Regional compliance (EU Model Clauses)
You Must Ensure (Application Level)
- GDPR compliance (consent, DPIAs, breach notification)
- SOX controls (financial data integrity, access controls)
- Industry-specific regulations (HIPAA, PCI-DSS)
- Audit trail completeness and retention
Pro tip: Don't assume RISE "makes you compliant." You still need to configure controls, document processes, and demonstrate compliance to auditors.
Tooling
Security Tools & Services
Included in RISE
- • SAP Enterprise Threat Detection (ETD) - cloud edition
- • Security Audit Log (SAL)
- • Code Vulnerability Analyzer (CVA)
- • SAP Cloud Connector (for hybrid scenarios)
- • Basic DDoS protection
You May Need to Add
- • GRC Access Control (SoD monitoring)
- • SIEM integration (Splunk, QRadar)
- • Identity governance (SailPoint, Saviynt)
- • Privileged access management (CyberArk)
- • Data loss prevention (DLP)
Avoid These
Common Security Mistakes
Assuming SAP handles security
SAP secures infrastructure. You secure the application.
Not monitoring Security Audit Log
If you're not watching SAL, you won't detect breaches.
Weak authorization design
Overprivileged users = SOX violations and fraud risk.
Ignoring SAP security notes
Unpatched applications are the #1 breach vector.
No incident response plan
When breach happens, panic and chaos will cost you dearly.
Evaluating RISE with SAP?
Understand the full scope of RISE responsibilities with our comprehensive assessment. Identify gaps before they become problems.
Take RISE Assessmentcritical security domains