1、1SAP ALM SUMMIT 2025BOOS T YOUR ALM V ALUE!Security in CALM2Agenda1Compliance.2Security By Design3Cross Border Data Transfer4Backup&Restore5Next Step Be future ready3Security at SAP https:/ at SAPSecurity at SAP4Security in SAP Cloud ALMBusinessNeedVisionWhatSecurity is fundamental in SAP Cloud ALM
2、because it is the central platform for monitoring,operations,change management,and service execution across the SAP landscape.It supports critical business processes indirectly by ensuring system health,compliance,and secure integrations.SAP Cloud ALM combines identity control,encryption,monitoring,
3、compliance,secure integrations,and resilience to safeguard the SAP ecosystem it manages.”Delivera trusted,intelligent,and resilient lifecycle management platform where security is embedded by design.Future offerings will strengthen identity and access governance,adopt zero-trust principles,leverage
4、AI-driven threat detection,and ensure regulatory compliance across global landscapes5Compliance6 Identity and Access Management Authentication Authorization Data Protection&Privacy Data classification Data Management Logging and Tracing RetentionCompliance7Identity and Access ManagementIdentity and
5、Access Management8Identity and Access ManagementIdentity and Access ManagementRoles.9 User Logon Data First and last name Email address User ID Business Personal data Integration and Exception Monitoring Business Process Monitoring Real User MonitoringData Protection&PrivacyData Protection&Privacy10
6、Usage Rights scopehttps:/ Logon Data-protection12Business Personal Data-protection13Personal Data Logging&TracingAudit Log14Retention Process15Retention User Offboarding16Retention Tenant Offboarding17Security By Design18Secure Architecture Rate Limit,Denial of Service,Memory Corruption Network Secu