White Paper

Protecting sensitive data in and around SAP HANA

Protecting sensitive data in and around SAP HANA

Pages 7 Pages

SAP HANA’s native encryption protects data inside the database but not the many surrounding files where sensitive data can appear. Pages 3 to 5 show that redo logs, archive logs, tablespaces, undo areas, temp files, trace files, backups, reports and ETL scripts may all hold sensitive information, sometimes in clear text. Errors, logging and user reporting can also unintentionally expose data. The paper stresses that securing HANA requires encrypting and controlling access to all these external files, not just the database instance, to prevent leakage and maintain compliance.

Join for free to read