The relationship between SAP HANA and Hadoop can be described as that of friendship and camaraderie. While SAP can be used to control temporary, high-valued data which is accessed frequently, Hadoop can be used to store data that is not used every day, but is very important as an archive for reference and analysis. It is archival data is retrieved in creative new ways and does not need to be structured in advance.
HANA can be connected to Hadoop for running batch-jobs in Hadoop so that extra information can be stored on HANA and it can be aggregated with lightning fast speed.
An environment of peaceful co-existence can be established.
HANA provides a great way to parallelize data even if the company has large volumes of data along with almost-linear scalability. Hadoop is taking the data mining and data analysis route.
However, whether it is a small-scale business or a business conglomerate that avails to any new technology, security is always a major concern. This concern is extended during the use of SAP HANA as well.
The best security practices in SAP HANA include a strong focus on authentication of data, good integrity of the data which is fed in the database along with a stringent control of user access to the database. However, these security needs have to be adapted and modified from the old traditional SAP security model to fit the unique requirements of the cloud-based business application.
SAP HANA best security practices
These practices are compulsory before the installation of the software in any company. Stechies will help you sort out all this with free tutorials and study materials on SAP.
- Least Access Rights Model should be implemented-
The employee of the company should always have a limited access as they can cause potential damage to the company through a prejudiced leak or an unintentional breach. The information that is provided to the employees of any company should be carefully monitored because SAP HANA deals with the company’s financials and business strategies. SAP HANA best security practices should be implemented efficiently to control even display access or read-only privileges as they can cause irreparable damage to the organization. An innocuous glance at company bills can give its rivals a list of suppliers and customers, along with the strategies implemented by the company in any project.
- Make sure that the correct expertise is present-
SAP users were able to access a wide range of SAP applications and development tools by interacting with the SAP GUI. However, with SAP HANA, users need to leverage SAP HANA Studio or SAP Web IDE to directly access the database. The traditional SAP permissions are termed as “transactions” and “authorizations” but SAP HANA terms them as “privileges”. Even though they are conceptually the same, they have different implementations. For instance, a developer that works on the ABAP backend will have a hard time comprehending the administration in the SAP HANA database.
- Comprehension of how HANA handles objects-
The applications in HANA are built from development objects that have been deposited in the HANA repository. During the assignment of the user and role administrations which are performed as design time objects, the roles are owned by the technical user. This allows personnel swapping without affecting the objects.