{"id":6094,"date":"2015-07-23T00:00:00","date_gmt":"2015-07-22T22:00:00","guid":{"rendered":"https:\/\/e3magpmp.greatsolution.dev\/?p=6094"},"modified":"2019-07-31T13:51:45","modified_gmt":"2019-07-31T11:51:45","slug":"os-infrastructure-security-functions-for-hana","status":"publish","type":"post","link":"https:\/\/e3magpmp.greatsolution.dev\/en\/os-infrastructure-security-functions-for-hana\/","title":{"rendered":"OS infrastructure: Security functions for Hana"},"content":{"rendered":"<p>It is well known that there is a steadily increasing number of attacks from outside (and unfortunately also from inside) on internal IT systems. This has led to company and IT managers pushing protective measures against such attacks and threats.<\/p>\n<p>In many places, holistic security architectures or concepts have been and are being developed and implemented to minimize IT security risks in the long term.<\/p><div class=\"great-fullsize-content-es\" style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-2108781558\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/kit-de-medios\/\" target=\"_blank\" aria-label=\"nl_werbung_800x100_es\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-en\" id=\"great-1701139747\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/media-kit\/\" target=\"_blank\" aria-label=\"nl_advertising_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-de\" style=\"margin-bottom: 20px;margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-262294796\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/steampunk-summit-2025\/\" target=\"_blank\" aria-label=\"steampunk_2024_1_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg 1920w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1200x150.jpg 1200w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-960x120.jpg 960w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1168x146.jpg 1168w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1440x180.jpg 1440w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1536x192.jpg 1536w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-600x75.jpg 600w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" width=\"2560\" height=\"320\"   \/><\/a><\/div>\n<p>This usually includes policies (e.g., for password handling and data protection guidelines) for users and IT specialists, the protection of IT systems\/components including the use of firewalls and attack detection software, VPN\/network security, the use of encryption software and \"hardened\" servers, and the use of automated security reports.<\/p>\n<p>Regular security checks are then also carried out to ensure the maximum possible protection of an IT system landscape at all times.<\/p>\n<h3>From the whole to individual elements<\/h3>\n<p>As part of the data center readiness of Hana, the topic of security is a given, so to speak. SAP has developed a comprehensive Hana Security Guide that describes in detail security protection and mechanisms from a database perspective. It also includes the interaction of the database and database-relevant components such as the operating system (OS), network and storage from a security perspective.<\/p>\n<p>SAP also provides numerous security functions for Hana.<\/p>\n<h3>Security Package<\/h3>\n<p>As a Hana and non-Hana operating system supplier, Suse also provides SAP customers with a security package for Suse Linux Enterprise Server (SLES) for SAP Applications.<\/p>\n<p>This package takes comprehensive account of security-relevant aspects of Hana Suse deployment. This includes a dedicated Hana Security Guide developed by Suse, which describes, for example, the specific hardening of the SAP in-memory database together with SLES.<\/p>\n<p>In addition, Suse provides regular security updates and patches for SLES. And numerous security certificates (such as GCL, FIPS 140-2 Validation for Open SSL and Common Criteria Security Certifaction EAL4+) are met with SLES.<\/p>\n<h3>Special Hana Security Guide<\/h3>\n<p>The Hana Security Guide from Suse (with Security Hardening SLES for Hana Databases) offers two things. Namely, on the one hand, a concrete action guide for protection or threat prevention in Hana Suse deployment and, on the other hand, concrete software functionality.<\/p>\n<p>This makes it possible, for example, to set SLES to define various security levels (settings) according to individual prioritization.<\/p>\n<h3>Reduce attack surfaces<\/h3>\n<p>But that is not all. A Suse Firewall for Hana is also provided for use, which protects against network attacks or the opening of certain ports (from outside).<\/p>\n<p>The following can also be shown via software functionality: which OS packages should be used and which can be dispensed with under certain circumstances. After all, fewer packages offer a smaller attack surface against possible threats.<\/p>\n<p>Summary: For Hana data center readiness, especially in terms of security, protection mechanisms or software functionality that go beyond the standard are available. The OS platform SLES with its diverse security features contributes significantly to a \"secure\" Hana usage.<\/p>","protected":false},"excerpt":{"rendered":"<p>The topic of security is firmly anchored within Hana Datacenter Readiness. As an OS supplier, Suse provides sophisticated protection against attacks and threats during Hana deployment.<\/p>","protected":false},"author":38,"featured_media":26555,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[24,7,1553],"tags":[65,1516,189,3932],"coauthors":[19920],"class_list":["post-6094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","category-meinung","category-1553","tag-hana","tag-security","tag-sles","tag-suse-linux-enterprise-server"],"featured_image_urls_v2":{"full":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"thumbnail":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-150x150.jpg",150,150,true],"medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",400,172,false],"medium_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-768x331.jpg",768,331,true],"large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"image-100":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-100x43.jpg",100,43,true],"image-480":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-480x207.jpg",480,207,true],"image-640":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-640x276.jpg",640,276,true],"image-720":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-720x310.jpg",720,310,true],"image-960":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"image-1440":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"image-1920":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"1536x1536":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"2048x2048":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"bricks_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",1000,431,false],"bricks_medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux.jpg",600,259,false],"profile_24":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/07\/Linux-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Innerhalb der Hana Datacenter Readiness ist das Thema Security fest verankert. Einen hochentwickelten Schutz gegen Angriffe und Bedrohungen beim Hana-Einsatz stellt Suse als OS-Lieferant bereit.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/opinion\/linux\/\" rel=\"category tag\">Linux Kolumne<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/1507-1509\/\" rel=\"category tag\">MAG 15-07<\/a>","author_info_v2":{"name":"E-3 Magazin","url":"https:\/\/e3magpmp.greatsolution.dev\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/6094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/comments?post=6094"}],"version-history":[{"count":0,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/6094\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/media\/26555"}],"wp:attachment":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/media?parent=6094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/categories?post=6094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/tags?post=6094"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/coauthors?post=6094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}