Logging for SAP S/4HANA Security

  • 1h 31m
  • Sandip Dholakia
  • Rheinwerk Publishing Inc.
  • 2022

Logs are useful for more than just record-keeping. Learn how to analyze, use, and manage logs to improve your SAP S/4HANA security with this E-Bite! Start by accessing your logs, whether you’re running SAP S/4HANA on-premise or in the cloud. Then configure key tools like UI data protection logging and SAP Enterprise Threat Detection to use your logs for security. Protect your logs against threats with tips and best practices!

  • Work with system logs in SAP S/4HANA, on-premise and in the cloud
  • Secure SAP S/4HANA with tools like UI data protection logging
  • Manage, protect, and maintain logs

About the Author

Sandip Dholakia works as a principal security architect at SAP in the Global Security Group. He’s an information security professional with experience in various security domains and industries, from manufacturing to high-tech. Before joining SAP, Sandip was an information security architect for Cisco’s InfoSec Group, where he focused on application, product, and vendor security for Cisco’s business- and customer-driven portfolios. Sandip has also worked as a security architect and compliance leader at General Motors, where he supported end-to-end security activities for a large functional unit.

Sandip has published papers about SAP security topics, including log management, zero-trust architecture, encryption, and security configuration. He has presented at numerous conferences, holds a US patent for an anti-theft algorithm, and graduated from Carnegie Mellon University with dual master’s degrees in software engineering and information systems management. He holds CISSP, CCSP, CCSK, and AWS security certifications. You can find Sandip on Twitter @iSandipd.

In this Book

  • Introduction
  • Accessing and Working with Logs
  • Logging for Security and Compliance
  • Securing and Managing Logs
  • What’s Next?