https://raw.githubusercontent.com/ajmaradiaga/feeds/main/scmt/topics/Governance-Risk-Compliance-(GRC)-and-Cybersecurity-blog-posts.xml SAP Community - Governance, Risk, Compliance (GRC), and Cybersecurity 2024-05-20T11:10:42.600981+00:00 python-feedgen Governance, Risk, Compliance (GRC), and Cybersecurity blog posts in SAP Community https://community.sap.com/t5/security-and-compliance-blogs/sap-welcomes-the-release-of-nsa-cisa-top-10-cloud-security-mitigation/ba-p/13650041 SAP Welcomes the Release of NSA-CISA Top 10 Cloud Security Mitigation Strategies 2024-03-26T15:27:10.416000+01:00 npbrennan https://community.sap.com/t5/user/viewprofilepage/user-id/689951 <P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="nsa-cisa-cloud.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/86772i7792C58211708C79/image-size/large?v=v2&amp;px=999" role="button" title="nsa-cisa-cloud.png" alt="nsa-cisa-cloud.png" /></span></SPAN></P><P><EM>By Niall Brennan and Jay Thoden van Velzen, Office of the CSO, SAP Global Security &amp; Cloud Compliance</EM></P><P><SPAN>On March 7</SPAN><SPAN>th</SPAN><SPAN>, the US National Security Agency (NSA) published </SPAN><A href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3699169/nsa-releases-top-ten-cloud-security-mitigation-strategies/" target="_blank" rel="noopener nofollow noreferrer">10 strategies for securing cloud landscapes</A><SPAN>. Each strategy was detailed in a separate Cybersecurity Information Sheet (CSI), six of which were crafted jointly with the Cybersecurity and Infrastructure Security Agency (CISA). Collectively, these 10 strategies are an important contribution to cloud security, especially since the recommendations are agnostic of cloud platform and cover Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) cloud services.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>As the digital ecosystem rapidly evolves toward greater interconnectivity and migration to hybrid and multi-cloud environments, the threat landscape has become increasingly complicated. The role of responsible central authorities in establishing and encouraging the use of cybersecurity “best practices” has never been more critical and active collaboration among all stakeholders, including government, industry, academia, and the research communities, in adopting and normalizing such practices are the best path to safer and more secure digital environments. SAP regularly collaborates with NSA and CISA though the Enduring Security Framework (ESF) and Joint Cyber Defense Collaborative (JCDC) public – private partnerships and applauds their leadership role with this announcement.</SPAN><SPAN>&nbsp;</SPAN></P><P>&nbsp;</P><H1 id="toc-hId-861532383"><SPAN>Top 10 Cloud Security Mitigation Strategies</SPAN><SPAN>&nbsp;</SPAN></H1><P><SPAN>Helpfully, eight of the strategies are mapped to </SPAN><A href="https://attack.mitre.org/versions/v14/" target="_blank" rel="noopener nofollow noreferrer"><SPAN>MITRE ATT&amp;CK®</SPAN></A><SPAN> adversary tactics and techniques, as well as </SPAN><A href="https://d3fend.mitre.org/" target="_blank" rel="noopener nofollow noreferrer"><SPAN>D3FEND™</SPAN></A><SPAN> cybersecurity countermeasures (we have marked those in the list below with a “*”). Many organizations, including SAP, use the ATT&amp;CK® and D3FEND™ matrices to structure their security programs. These references are likely not included in the first and sixth strategies because there are no obvious matches for them (yet).</SPAN><SPAN>&nbsp;</SPAN></P><OL><LI><A href="https://media.defense.gov/2024/Mar/07/2003407863/-1/-1/0/CSI-CloudTop10-Shared-Responsibility-Model.PDF" target="_blank" rel="noopener nofollow noreferrer">Uphold the cloud shared responsibility model</A></LI><LI><A href="https://media.defense.gov/2024/Mar/07/2003407866/-1/-1/0/CSI-CloudTop10-Identity-Access-Management.PDF" target="_blank" rel="noopener nofollow noreferrer">Use secure cloud identity and access management practices</A>&nbsp;(Joint with CISA)*</LI><LI><A href="https://media.defense.gov/2024/Mar/07/2003407858/-1/-1/0/CSI-CloudTop10-Key-Management.PDF" target="_blank" rel="noopener nofollow noreferrer">Use secure cloud key management practices</A>&nbsp;(Joint with CISA)*</LI><LI><A href="https://media.defense.gov/2024/Mar/07/2003407861/-1/-1/0/CSI-CloudTop10-Network-Segmentation.PDF" target="_blank" rel="noopener nofollow noreferrer">Implement network segmentation and encryption in cloud environments</A>&nbsp;(Joint with CISA)*</LI><LI><A href="https://media.defense.gov/2024/Mar/07/2003407862/-1/-1/0/CSI-CloudTop10-Secure-Data.PDF" target="_blank" rel="noopener nofollow noreferrer">Secure data in the cloud</A>&nbsp;(Joint with CISA)*</LI><LI><A href="https://media.defense.gov/2023/Jun/28/2003249466/-1/-1/0/CSI_DEFENDING_CI_CD_ENVIRONMENTS.PDF" target="_blank" rel="noopener nofollow noreferrer">Defending continuous integration/continuous delivery environments</A>&nbsp;(Joint with CISA)</LI><LI><A href="https://media.defense.gov/2024/Mar/07/2003407857/-1/-1/0/CSI-CloudTop10-Infrastructure-as-Code.PDF" target="_blank" rel="noopener nofollow noreferrer">Enforce secure automated deployment practices through infrastructure as code</A>*</LI><LI><A href="https://media.defense.gov/2024/Mar/07/2003407865/-1/-1/0/CSI-CloudTop10-Hybrid-Multi-Cloud.PDF" target="_blank" rel="noopener nofollow noreferrer">Account for complexities introduced by hybrid cloud and multi-cloud environments</A>*</LI><LI><A href="https://media.defense.gov/2024/Mar/07/2003407859/-1/-1/0/CSI-CloudTop10-Managed-Service-Providers.PDF" target="_blank" rel="noopener nofollow noreferrer">Mitigate risks from managed service providers in cloud environments</A>&nbsp;(Joint with CISA)*</LI><LI><A href="https://media.defense.gov/2024/Mar/07/2003407864/-1/-1/0/CSI_CloudTop10-Logs-for-Effective-Threat-Hunting.PDF" target="_blank" rel="noopener nofollow noreferrer">Manage cloud logs for effective threat hunting</A>*</LI></OL><P><SPAN>The discussion of the cloud shared responsibility model helps determine where the responsibility is to manage different tactics, techniques, and countermeasures. For Continuous Integration/Continuous Delivery (CI/CD) environments Software</SPAN><A href="https://attack.mitre.org/versions/v14/techniques/T1072/" target="_blank" rel="noopener nofollow noreferrer"><SPAN> Deployment Tools (T1072)</SPAN></A><SPAN> is likely the best fit, but it could be argued it lacks a sub-technique for precision.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>These strategies are very useful recommendations and provide strong confirmation that we at SAP have been on the right path in the development of our own cloud security programs. The mitigation strategies cover several areas where SAP has already implemented controls to remediate their associated risks and will be of great use to those working through cloud security challenges now.</SPAN><SPAN>&nbsp;</SPAN></P><P>&nbsp;</P><H1 id="toc-hId-665018878"><SPAN>Shared or Separated Security Model</SPAN><SPAN>&nbsp;</SPAN></H1><P><SPAN>The collection starts with a discussion of the Shared Security Model for cloud security. SAP is a SaaS and PaaS cloud service provider, but most of those cloud services run on public cloud providers like Amazon Web Services (AWS), Azure, Google Cloud (GCP) and Alibaba Cloud. Therefore, we need to adjust this model to one that covers three different parties, rather than two.</SPAN><SPAN>&nbsp;</SPAN></P><P style=" text-align: center; "><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="shared-separated-resp-model-sap.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/86778i160316CAD60AEC49/image-size/large?v=v2&amp;px=999" role="button" title="shared-separated-resp-model-sap.png" alt="shared-separated-resp-model-sap.png" /></span><I>Shared or Separated Security Model for SAP cloud solutions deployed in public cloud landscapes</I><SPAN>&nbsp;</SPAN></P><P><SPAN>&nbsp;</SPAN><SPAN>The use of “shared” can be misleading. The three parties in this diagram have separate and distinct responsibilities for different parts of the solution stack. SAP needs to secure the IaaS and PaaS services used in the landscape, as well as the system configuration, secure provisioning, and cloud operations of the SAP solutions. That covers the primary scope of the mitigating strategies published by the NSA and CISA. In addition, SAP covers multiple security functions across the layers of the stack, as well as SAP’s corporate network, IT, and data centers, as well as the physical safety of our employees and facilities.</SPAN><SPAN>&nbsp;</SPAN></P><P>&nbsp;</P><H1 id="toc-hId-468505373"><SPAN>SAP’s Approach for Mitigating Strategies</SPAN><SPAN>&nbsp;</SPAN></H1><P><SPAN>In the sections below, we cover how SAP manages several main recommendations from the NSA/CISA remediation strategies.</SPAN> <SPAN>In past Security and Compliance blogs, we have covered the </SPAN><A href="https://community.sap.com/t5/security-and-compliance-blogs/how-sap-automates-security-scanning-and-alerting-on-over-6-000-aws-accounts/ba-p/13629418" target="_blank"><SPAN>cloud guardrails</SPAN></A><SPAN> that protect SAP and its customers against </SPAN><A href="https://community.sap.com/t5/security-and-compliance-blogs/effective-measures-to-defend-against-common-cloud-threats/ba-p/13625687" target="_blank"><SPAN>common cloud threats</SPAN></A><SPAN> by making cloud accounts, subscriptions and projects more secure-by-default. Considering the size and scope of the landscape they apply to, they are perhaps </SPAN><A href="https://community.sap.com/t5/financial-management-blogs-by-sap/cloud-guardrails-effectively-making-your-cloud-accounts-secure-by-default/ba-p/13574536" target="_blank"><SPAN>our most effective security controls</SPAN></A><SPAN>. Most of the examples below are enforced by these guardrails.</SPAN><SPAN>&nbsp;</SPAN></P><H2 id="toc-hId-401074587"><SPAN>Cloud Identity and Access Management (IAM)</SPAN><SPAN>&nbsp;</SPAN></H2><P><SPAN>Enforced by the cloud guardrails, all cloud administrators must have SAP-provisioned identities. It is, therefore, not possible for adversaries to create their own accounts under other domain names. Cloud administrators must authenticate with their SAP identities using MFA on an SAP-enrolled device. In addition, SAP has a variety of phishing detection and defensive measures in place.</SPAN><SPAN>&nbsp;</SPAN></P><H2 id="toc-hId-204561082"><SPAN>Cloud Logs</SPAN><SPAN>&nbsp;</SPAN></H2><P><SPAN>Cloud audit logs are centrally collected from all cloud accounts for ingestion into the central SIEM platform, where these logs are processed and enriched with asset inventory and organizational metadata. That makes them available for threat detection and hunting, alongside other security scanning data sources.</SPAN><SPAN>&nbsp;</SPAN></P><H2 id="toc-hId-8047577"><SPAN>Key Management</SPAN><SPAN>&nbsp;</SPAN></H2><P><SPAN>Cloud guardrails enforce the secure configuration of cloud provider Key Management Services (KMS). SAP offers customers several key management options, through software or hardware key storage, as well as SAP Data Custodian, which allows customers to manage keys themselves.</SPAN><SPAN>&nbsp;</SPAN></P><H2 id="toc-hId--188465928"><SPAN>Encryption and Network Segmentation</SPAN><SPAN>&nbsp;</SPAN></H2><P><SPAN>Transport Layer Security (TLS) 1.2+ with the weak cyphers removed is enforced on network connections for cloud infrastructure. That includes access to storage. Encryption-at-rest is enforced on disk volumes and storage buckets, where that is not already the default provided by the public cloud service provider.&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>Many of SAP’s cloud solutions are deployed “single tenant”. That means that customers have their own instance of the cloud solution. For SAP S/4HANA Cloud Private Edition that includes tenant isolation by cloud account, which means there is no network path to other landscapes other than the customer’s corporate network. In other single tenant solutions, separate instances are segmented into isolated Virtual Private Clouds (VPCs). SAP blocks several common administration ports from the internet, including Secure Shell (SSH) and Remote Desktop Protocol (RDP).</SPAN><SPAN>&nbsp;</SPAN></P><H2 id="toc-hId--384979433"><SPAN>Infrastructure as Code and CI/CD</SPAN><SPAN>&nbsp;</SPAN></H2><P><SPAN>The scale at which SAP operates means that we have long since moved to automated deployments through Infrastructure as Code (IaC) and CI/CD pipelines for SAP cloud solutions. This ensures that deployments are the same across instances, that the same release is deployed as has gone through development and pre-production testing and can be restored or rolled back more easily in case of incidents. IaC is checked into source code repositories just like any other code and managed through the secure Software Development and Operations Lifecycle (SDOL).</SPAN><SPAN>&nbsp;</SPAN></P><P>&nbsp;</P><H1 id="toc-hId--710575657"><SPAN>Mitigate Risks From Managed Service Providers (MSPs)</SPAN><SPAN>&nbsp;</SPAN></H1><P><SPAN>A particularly interesting and welcome strategy in the list is the ninth on </SPAN><A href="https://media.defense.gov/2024/Mar/07/2003407859/-1/-1/0/CSI-CloudTop10-Managed-Service-Providers.PDF" target="_blank" rel="noopener nofollow noreferrer"><SPAN>mitigating risks from managed service providers</SPAN></A><SPAN>. This recommends exercising due diligence, considering the provider’s security posture, and establishing audit mechanisms when choosing service providers. The concept of shared responsibility for risk must be fully understood in the MSP/customer relationship. A clear delineation and acceptance of responsibility for individual risk elements between the MSP and its customer should be an essential foundation of the relationship. The trust and transparency engendered through audit mechanisms, such as SOC 2, further contributes to a secure environment. SAP does this with its service providers, and we expect to be held to the same standards by our customers. SAP customers and prospects considering SAP cloud solutions as well as alternatives should use this strategy as a guide in their evaluations.</SPAN><SPAN>&nbsp;</SPAN></P><P>&nbsp;</P><H1 id="toc-hId--907089162"><SPAN>More Information</SPAN><SPAN>&nbsp;</SPAN></H1><P><SPAN>The following resources provide more information on SAP’s cloud security practices, including the cloud guardrails mentioned in the article. Given how many of the NSA/CISA mitigation strategies they can help with, we strongly recommend organizations to explore implementing similar controls. Visit the </SPAN><A href="https://www.sap.com/about/trust-center.html" target="_blank" rel="noopener noreferrer"><SPAN>SAP Trust Center</SPAN></A><SPAN> for broader information on security, compliance, privacy, and cloud service performance.&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><UL><LI><A href="https://community.sap.com/t5/security-and-compliance-blogs/how-sap-automates-security-scanning-and-alerting-on-over-6-000-aws-accounts/ba-p/13629418" target="_blank"><SPAN>How SAP Automates Security Scanning and Alerting on over 6,000 AWS Accounts</SPAN></A><SPAN>&nbsp;</SPAN></LI><LI><A href="https://community.sap.com/t5/security-and-compliance-blogs/effective-measures-to-defend-against-common-cloud-threats/ba-p/13625687" target="_blank"><SPAN>Effective Measures to Defend Against Common Cloud Threats</SPAN></A><SPAN>&nbsp;</SPAN></LI><LI><A href="https://community.sap.com/t5/financial-management-blogs-by-sap/cloud-guardrails-effectively-making-your-cloud-accounts-secure-by-default/ba-p/13574536" target="_blank"><SPAN>Cloud Guardrails: Effectively Making Your Cloud Accounts Secure-by-Default</SPAN></A><SPAN>&nbsp;</SPAN></LI></UL> 2024-03-26T15:27:10.416000+01:00 https://community.sap.com/t5/technology-blogs-by-members/bcp-business-continuity-planning-for-sap-s-4hana-made-easy-with-enterprise/ba-p/13647824 BCP: Business Continuity Planning for SAP S/4HANA - made easy with Enterprise Blockchain 🚀 2024-03-26T20:33:44.142000+01:00 AndySilvey https://community.sap.com/t5/user/viewprofilepage/user-id/1397601 <P><STRONG>The <EM>Threat - Why do we have to care for Business Continuity Planning ?</EM></STRONG></P><P>In most large Enterprise IT we have the High Availability, we have the Disaster Recovery, so why do we have to care for Business Continuity Planning ? Business Continuity Planning is that one layer higher than HA and DR, Business Continuity Planning comes in to play when HA and DR don't solve the problem.</P><P><EM>Cincinnati Insurance Companies</EM> have a made <EM>a <A href="https://www.cinfin.com/business-insurance/loss-control/business-continuity-planning/business-continuity-threat-matrix" target="_self" rel="nofollow noopener noreferrer">very useful Business Continuity Threat Matrix</A> </EM>to help Enterprises identify&nbsp; the threats across all dimensions of their business:</P><P>&nbsp;</P><P><A href="https://www.cinfin.com/business-insurance/loss-control/business-continuity-planning/business-continuity-threat-matrix" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_2-1711354164129.png" style="width: 781px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85840i2C9F3F889B39A265/image-dimensions/781x445?v=v2" width="781" height="445" role="button" title="AndySilvey_2-1711354164129.png" alt="AndySilvey_2-1711354164129.png" /></span></A></P><P>&nbsp;</P><P>This is the thing with Business Continuity Planning and the threats and the risk and the why to do it, a Business Continuity situation can come individually from different angles, or alternatively it could be the contagion of a number of unrelated events which when combined together lead to the Business Continuity situation.</P><P><EM><A href="https://www.gartner.com/en/information-technology/glossary/bcp-business-continuity-planning" target="_self" rel="nofollow noopener noreferrer">Gartner in their Glossary</A> describe it as:</EM></P><P><EM><A href="https://www.gartner.com/en/information-technology/glossary/bcp-business-continuity-planning" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1711352221261.png" style="width: 771px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85819i76D0AF34583492FC/image-dimensions/771x239?v=v2" width="771" height="239" role="button" title="AndySilvey_0-1711352221261.png" alt="AndySilvey_0-1711352221261.png" /></span></A></EM></P><P>For me, coming from the SAP Enterprise Technical Architecture side of the house<EM>,&nbsp;</EM></P><P style=" padding-left : 30px; "><EM><STRONG>Business Continuity Planning is about The Data</STRONG></EM></P><P style=" padding-left : 30px; "><EM><STRONG>At the heart of the Business Continuity Plan there needs to be Business Data</STRONG></EM></P><P style=" padding-left : 30px; "><EM><STRONG>No Data - No Business !</STRONG></EM></P><P>Every Enterprise has a Business Continuity Plan, and SAP has got a whole <A href="https://www.sap.com/norway/insights/contingency-continuity-planning-best-practices.html" target="_self" rel="noopener noreferrer">library of helpful document on it over here</A>&nbsp;to help with designing the Business Continuity Plan:</P><P><STRONG>The Solution for Protecting Business Critical Data for the Business Continuity Plan</STRONG></P><P>This blog is going to walk through and show, how very easily, and cost effectively and robustly and simply a basic Enterprise Blockchain can provide the "<EM>sleep well at night</EM>" technical foundation of a Business Continuity Plan solution.</P><P>This is one of my favourite easy peasy Enterprise Blockchain use cases, it is sooo easy to implement for SAP S/4HANA Customers using their SAP technologies, including the SAP BTP, and so simple, and so effective, and it really shows from the perspective of the Business Requirements and the Enterprise Blockchain capabilities how natively out of the box Enterprise Blockchain Databases are so secure and so resilient.</P><P>In this blog we will focus on the heart of the holistic Business Continuity Plan, and that is the Data, Master and Transaction.</P><P>A sound Business Continuity Plan will include a <SPAN>solution to enable OCD Operationally Critical Data to be available to Key Users in the event of a Business Continuity Scenario.</SPAN></P><DIV>&nbsp;</DIV><DIV><SPAN>What is Operational Critical Data? OCD is critical data required to execute to Key Business Processes as defined in BCP playbook.&nbsp;</SPAN><SPAN>A Business Continuity Scenario would mean that the Company is without access to the S/4HANA for period of up to 4 weeks (or more), along with which there must be a guarantee of business continuity on the most critical operations and availability of the (OCD).&nbsp;</SPAN></DIV><DIV>&nbsp;</DIV><DIV><DIV>All Enterprises need to be prepared for a Business Continuity Scenario, where the Company will be running in Emergency Mode, kind of like when a car goes in to Emergency Mode, the car drives, but the car does not perform to the full possibility. We are happy the car is running and we are happy that we can still use the car.&nbsp;</DIV><DIV>&nbsp;</DIV><DIV>And this would be the same for Company in a Business Continuity Scenario, not everything in the Enterprise IT will be available, the S/4HANA, the Digital Core, in the worst case could be down for up to 4 weeks, but, what needs to be available is the most basic foundational Business Master and Transactional Data. And that most basic foundational Business Master Data is the Business Partner Master Data, the Customers and Suppliers, the most basic Data which any Company depends on to operate, large or small, you need to know who your Customers are and who your Suppliers are.</DIV></DIV><DIV>&nbsp;</DIV><DIV><SPAN>Requirements for a Business Continuity Planning solution would look something like this:</SPAN></DIV><DIV>&nbsp;</DIV><DIV><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Blockchain SAP Business Continuity Planning Requirements atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85625i1F42FE0E995B8BE7/image-size/large?v=v2&amp;px=999" role="button" title="Blockchain SAP Business Continuity Planning Requirements atkrypto.io .png" alt="Blockchain SAP Business Continuity Planning Requirements atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Blockchain SAP Business Continuity Planning Requirements atkrypto.io</span></span></DIV><DIV>&nbsp;</DIV><DIV><SPAN><SPAN>With the Business Requirements in hand, t</SPAN></SPAN><SPAN>he next step in the SAP Enterprise Architect Demand Process would be to make an Architecture Review of the Demand from the Business Lead.</SPAN><DIV>&nbsp;</DIV><DIV>The first step of the Architecture Review takes the Business Lead's non-Functional requirements, and matches them to the Enabling Technology Capabilities:</DIV><DIV>&nbsp;</DIV><DIV><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Blockchain SAP Business Continuity Planning Requirements Technology Capabilities Analysis atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85626i2580CCB138C53095/image-size/large?v=v2&amp;px=999" role="button" title="Blockchain SAP Business Continuity Planning Requirements Technology Capabilities Analysis atkrypto.io .png" alt="Blockchain SAP Business Continuity Planning Requirements Technology Capabilities Analysis atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Blockchain SAP Business Continuity Planning Requirements Technology Capabilities Analysis atkrypto.io</span></span></DIV><DIV>&nbsp;</DIV><DIV><DIV>Now that we have the key Enabling Technology Capabilities we can look in our SAP Enterprise Technology Standards and see which of our Technology Standards would be the most appropriate to enable the non-Functional Requirements.</DIV><DIV>&nbsp;</DIV><DIV>The required Enabling Technology Capabilities are as follows:</DIV><DIV>&nbsp;</DIV><DIV><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP Blockchain Required Enabling Technology Capabilities atkrypto.io" style="width: 956px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85627i7F6FFC72943F0DF3/image-size/large?v=v2&amp;px=999" role="button" title="SAP Blockchain Required Enabling Technology Capabilities atkrypto.io .png" alt="SAP Blockchain Required Enabling Technology Capabilities atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP Blockchain Required Enabling Technology Capabilities atkrypto.io</span></span></DIV><DIV>&nbsp;</DIV><DIV><DIV>Looking through our Technology Standards, when we&nbsp;<A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_blank">"Let the Use Case find the Blockchain</A>" we find 1 Technology Standard which meets the non-Functional Enabling Technology requirements, and that is,<SPAN>&nbsp;</SPAN><EM><STRONG>The Enterprise Blockchain Platform</STRONG></EM>.</DIV><DIV>&nbsp;</DIV><DIV>The Enterprise Blockchain Platform and the Enterprise Blockchain Database have all of these non-Functional requirements Enabling Technology Capabilities natively built in and out of the box.</DIV><DIV>&nbsp;</DIV><DIV>We can consider potential alternatives, but, what is so special about Blockchain Databases and Enterprise Blockchain Platforms, and this was discussed in the previous blogs, is that, out of the box, natively,<SPAN>&nbsp;</SPAN><STRONG>traditional Database Products do not have the characteristics that the Blockchain Databases have</STRONG>:</DIV><DIV>&nbsp;</DIV><DIV><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="atkrypto.io what is a blockchain" style="width: 930px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85628iE809ABF5D540FA4E/image-size/large?v=v2&amp;px=999" role="button" title="atkrypto.io what is a blockchain.jpg" alt="atkrypto.io what is a blockchain" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">atkrypto.io what is a blockchain</span></span></DIV><DIV>&nbsp;</DIV><DIV><DIV>For our Business Continuity Business Demand, the requirements are solved out of the box natively by the Enterprise Blockchain Platform.&nbsp;</DIV><DIV>&nbsp;</DIV><DIV>Immutable, tick that box, the Blockchain Database has immutability built in.&nbsp;</DIV><DIV>&nbsp;</DIV><DIV>Resilience and availability, tick that box, the Blockchain Database Platform is distributed and decentralised, again we have this requirement baked in to the capabilities of the platform.&nbsp;</DIV><DIV>&nbsp;</DIV><DIV><SPAN>As discussed in the previous blog, [&nbsp;</SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">SAP Enterprise Architecture: Positioning Blockchain Database as an Enterprise Technology Standard<SPAN>&nbsp;</SPAN></A><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1711306427501.png" style="width: 21px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85634i7E9A9837CBA26E49/image-dimensions/21x21?v=v2" width="21" height="21" role="button" title="AndySilvey_0-1711306427501.png" alt="AndySilvey_0-1711306427501.png" /></span>&nbsp;<P>&nbsp;</P><SPAN>] when we look in to our Enterprise Architecture Technology Standards we see there is only 1 Technology Standard in the Enterprise which is positioned with the capabilities to fulfill all of those requirements out of the box, and that is the,&nbsp;</SPAN><STRONG>Enterprise Blockchain Platform and Enterprise Blockchain Databases.</STRONG></DIV><DIV>&nbsp;</DIV><DIV><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85633iCFE8512530C37C97/image-size/large?v=v2&amp;px=999" role="button" title="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io .png" alt="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io</span></span></DIV><DIV>&nbsp;</DIV><DIV>Back to the Business Requirements for the Business Continuity Planning solution:</DIV><DIV>&nbsp;</DIV><DIV>Availability of data across three Continents, we can tick that box, we can install the Enterprise Blockchain Platform on SAP Business Technology Platform BTP Kyma Runtime Service on three separate SAP BTP Instances running in three different continents. We could install the SAP BTP on a Cloud Provider in the USA, we could install SAP BTP on a Cloud Provider in Europe, and we could install the SAP BTP on a Cloud Provider in Asia. And what's more, in each Continent we could use a different Cloud Provider, so we could for example have SAP BTP on AWS in the USA, SAP BTP on Azure in Europe, and SAP BTP on Google&nbsp; Cloud in Asia, this way we would take the resilience and diversification of Cloud Providers to an even higher level, and that's one of the beautiful flexibilities of the SAP BTP.</DIV><DIV>&nbsp;</DIV><DIV>Let's just pause on that one, one of the most beautiful things about the SAP BTP is, it is so easy to set up, to spin up the SAP BTP, and when you are spinning up the SAP BTP, you get a list of Cloud Providers that you can set it up on, Google Cloud, Azure, AWS and others, and you just click the one you want and press go.</DIV><DIV>This is something very special, amazing, because, you are able to spin up your SAP BTP on pretty much any of the largest Cloud Providers, and......&nbsp; without having to onboard that Cloud Provider as a Vendor ! Because SAP have done that bit for you, SAP have taken care of onboarding the Cloud Providers as a Vendor and you just select the one you want.&nbsp;</DIV><DIV>&nbsp;</DIV><DIV>Anybody who has gone through, or has to go through, the process in the Large Enterprise of onboarding a new Vendor will know first hand how painful that is, and how elegant and nice it is that SAP have done that for you with the BTP.</DIV><DIV>&nbsp;</DIV><DIV>That's one dimension, but in this Business Continuity Scenario it goes further than that. We have said we will spin up the SAP&nbsp; BTP in three Regions, three Continents, and by spinning up the SAP BTP on a different Cloud Provider in each Continent, each Region, and then running the Blockchain on the BTP across those Cloud Providers we build in even more resilience because we make our solution Multi-Cloud !</DIV><DIV>&nbsp;</DIV><DIV>Regarding the Security requirement, the Data Store should be secured to the highest level possible, we can tick that box as well, Blockchain Databases out of the box are not only immutable, but also have the Hash Mechanism and the Consensus Mechanism, which no other Database Products on the planet have natively. The Consensus Mechanism and the Hash Mechanism of Blockchain Databases raises the bar of built in security hardening to a level never seen before natively in Enterprise Database Products.</DIV><DIV>&nbsp;</DIV><DIV>And finally, the S/4HANA Data will be sent to the Enterprise Blockchain Platform which is running on SAP Business Technology Platform kyma Runtime Service because of the four dimensions which were discussed in the previous blog, w<SPAN>hy place the Enterprise Blockchain Platform in the SAP BTP ?</SPAN><P>It's very very simple....</P><P style=" padding-left : 30px; ">Proximity to the Data (of the Digital Core)</P><P style=" padding-left : 30px; ">Ethnicity of the Data (in the Digital Core)</P><P style=" padding-left : 30px; ">Proximity to the Process(es) (in the Digital Core)</P><P style=" padding-left : 30px; ">Proximity to the Technology (of the Digital Core)</P></DIV><DIV>&nbsp;</DIV><DIV>So, we're following our Company's Demand Process, we've taken the Business Demand, and the Requirements, we have processed them according to our Company's Enterprise Architecture Demand Process and we have identified by matching requirements to Enabling Technology capabilities that the Technology Standard which we have in the house to fulfill these Requirements is the Enterprise Blockchain Database Platform.</DIV><DIV>&nbsp;</DIV><DIV>The next step is to design the Solution Architecture, the Technical Solution Architecture and show the options for fulfilling this requirement.</DIV><DIV>&nbsp;</DIV><DIV>The basics of the Technical Solution Architecture are:</DIV><DIV>&nbsp;</DIV><DIV><SPAN>. SAP S/4HANA contains Business Partner Master Data</SPAN></DIV><DIV>&nbsp;</DIV><DIV><SPAN>. Every time Business Partner Master Data changes we need to send it to the Enterprise Blockchain Database Platform</SPAN></DIV><DIV>&nbsp;</DIV><DIV><SPAN>. The Enterprise Blockchain Platform Tenant will run on the SAP Business Technology Platform Kyma Runtime Service</SPAN></DIV><DIV>&nbsp;</DIV><DIV><SPAN>. The Enterprise Blockchain Platform Tenants will be deployed in three SAP BTP locations around the world</SPAN></DIV><DIV>&nbsp;</DIV><DIV><SPAN>. The Enterprise Blockchain Platform Tenants will be deployed in each location on the SAP BTP on a different Cloud Hyperscaler</SPAN></DIV><DIV>&nbsp;</DIV><DIV>&nbsp;</DIV><DIV>In terms of SAP Enterprise Technical Architecture it is pretty clear what the Solution Options are, and we will draw all of the Solutions Options here in the blog, but one variable, one open question which we haven't solved yet, is how to get the Business Partner Master Data out of S/4HANA and to the Enterprise Blockchain Platform.</DIV><DIV>&nbsp;</DIV><DIV>To solve this, to get the Data from the S/4HANA there are a number of options, and in this blog we will focus on:</DIV><DIV>&nbsp;</DIV><DIV><SPAN>. Events - Event Driven Blockchain [this will need the SAP Advanced Event Mesh]</SPAN></DIV><DIV>&nbsp;</DIV><DIV><SPAN>. API's - API Driven [this will need CI to call the Business Partner API on S/4 and then call the API on the Blockchain]</SPAN></DIV><DIV>&nbsp;</DIV><DIV>we will now elaborate the Technical Solution Architecture of both alternatives, Event Driven Blockchain, and, API Driven Blockchain.</DIV><DIV>&nbsp;</DIV><DIV><STRONG>Business Continuity Planning Technical Solution Architecture SAP S/4HANA, Events, Enterprise Blockchain Platform</STRONG></DIV><DIV>&nbsp;</DIV><DIV>in this option, the SAP S/4HANA is connected to the SAP Advanced Event Mesh running on the SAP BTP. SAP S/4HANA publishes a Business Partner Event including the Data, the Payload of the Event to the SAP Advanced Event Mesh on the SAP BTP. The SAP Advanced Event Mesh on the SAP BTP has Topics and Queues created and puts the Business Partner Event and Data into one of the Queues. The Enterprise Blockchain Platform which is running on the SAP BTP Kyma Runtime Service is connected to the SAP Advanced Event Mesh Queue as a Subscriber and listens for new Business Partner Data arriving. As soon as the new Business Partner Data arrives in the Queue the Enterprise Blockchain Platform places that Data as a new Block in the Enterprise Blockchain Database.</DIV><DIV>&nbsp;</DIV><DIV>S/4HANA on SAP RISE PCE on Azure in Europe -&gt; SAP BTP Advanced Event Mesh Azure (Europe) -&gt;&nbsp;</DIV><DIV>&nbsp;</DIV><DIV>-&gt; SAP BTP Advanced Event Mesh on SAP BTP on AWS Europe</DIV><DIV>&nbsp;</DIV><DIV><SPAN>-&gt; Enterprise Blockchain Platform on SAP BTP Kyma Runtine on AWS Europe</SPAN></DIV><DIV>&nbsp;</DIV><DIV>-&gt; SAP BTP Advanced Event Mesh on SAP BTP on Azure USA</DIV><DIV>&nbsp;</DIV><DIV><SPAN>-&gt; Enterprise Blockchain Platform on SAP BTP Kyma Runtine on Azure USA</SPAN></DIV><DIV>&nbsp;</DIV><DIV>-&gt; SAP BTP Advanced Event Mesh on SAP BTP on Google Cloud Platform Asia&nbsp;</DIV><DIV>&nbsp;</DIV><DIV><SPAN>-&gt; Enterprise Blockchain Platform on SAP BTP Kyma Runtine on Google Cloud Platform Asia</SPAN></DIV><DIV>&nbsp;</DIV><DIV><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP Event Driven Blockchain Advanced Event Mesh Multi Cloud Business Continuity Planning atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85629i75C9C4384972048C/image-size/large?v=v2&amp;px=999" role="button" title="SAP Event Driven Blockchain Advanced Event Mesh Multi Cloud Business Continuity Planning atkrypto.io.png" alt="SAP Event Driven Blockchain Advanced Event Mesh Multi Cloud Business Continuity Planning atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP Event Driven Blockchain Advanced Event Mesh Multi Cloud Business Continuity Planning atkrypto.io</span></span></SPAN></DIV><DIV>&nbsp;</DIV><DIV><DIV>The picture clearly shows the distributed Regional/Continental resilience of the solution, and the Multi-Cloud resilience of the solution.</DIV><DIV>&nbsp;</DIV><DIV><STRONG>Business Continuity Planning Technical Solution Architecture SAP S/4HANA, API's, Enterprise Blockchain Platform</STRONG></DIV><DIV>&nbsp;</DIV><DIV>in this option, the SAP S/4HANA is connected to the SAP BTP Cloud Integration running on the SAP BTP. A Periodic Job running on SAP Cloud Integration calls the Business Partner API on SAP S/4HANA and gets the latest Business Partner Data Changes. SAP BTP Cloud Integration then calls an API on the Enterprise Blockchain Platform which is running on the SAP BTP Kyma Runtime Service and puts the new Business Partner Data on to the Enterprise Blockchain.</DIV><DIV>&nbsp;</DIV><DIV>SAP BTP Cloud Integration (Europe) calls an API on -&gt; S/4HANA on SAP RISE PCE on Azure in Europe&nbsp;</DIV><DIV>&nbsp;</DIV><DIV>SAP BTP Cloud Integration then calls an API on the Enterprise Blockchain Platform&nbsp;</DIV><DIV>&nbsp;</DIV><DIV><SPAN>-&gt; Enterprise Blockchain Platform on SAP BTP Kyma Runtine on AWS Europe</SPAN></DIV><DIV>&nbsp;</DIV><DIV><SPAN>-&gt; Enterprise Blockchain Platform on SAP BTP Kyma Runtine on Azure USA</SPAN></DIV><DIV>&nbsp;</DIV><DIV><SPAN>-&gt; Enterprise Blockchain Platform on SAP BTP Kyma Runtine on Google Cloud Platform Asia</SPAN></DIV><DIV>&nbsp;</DIV><DIV><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP API Driven Blockchain Integration Suite Cloud Integration Multi Cloud Business Continuity Planning atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85630iC217516583C581FA/image-size/large?v=v2&amp;px=999" role="button" title="SAP API Driven Blockchain Integration Suite Cloud Integration Multi Cloud Business Continuity Planning atkrypto.io .png" alt="SAP API Driven Blockchain Integration Suite Cloud Integration Multi Cloud Business Continuity Planning atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP API Driven Blockchain Integration Suite Cloud Integration Multi Cloud Business Continuity Planning atkrypto.io</span></span></SPAN></DIV><DIV>&nbsp;</DIV><DIV><DIV>The picture clearly shows the distributed Regional/Continental resilience of the solution, and the Multi-Cloud resilience of the solution.</DIV><DIV>&nbsp;</DIV><DIV>Wrapping up, the goal of this blog, was to remind us all, that if we happen to have fallen in to the bad habit of trying to find a Use Case for the Blockchain, not to worry, but at the same time, forget doing that, and get back to doing Enterprise IT Architecture the way we always have done and with proven Demand Evaluation Processes which will always lead the Business Demand to the most appropriate Enabling Technology Standard, and therefore,<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_self"><EM><STRONG>let the Use Case find the Blockchain</STRONG></EM></A><SPAN>&nbsp;</SPAN>instead of the Blockchain finding the Use Case.</DIV><DIV>&nbsp;</DIV><DIV>There are many many Use Cases where Blockchain is the obvious choice for the Enabling Technology Standard.&nbsp;</DIV><DIV>&nbsp;</DIV><DIV>In my opinion, Business Continuity Planning, is one of the many, a "no brainer" Use Case, for the Enterprise Blockchain Platform.</DIV><DIV>&nbsp;</DIV><DIV>Business Continuity Planning is one of my favourite Use Cases for Enterprise Blockchain, it is so simple, so elegant, and everything is done for you. Less than 10 years ago, to achieve the same resilience and security as an Enterprise Blockchain Platform would have required a shopping list of software and procedures, some automated, some human. And this is the beauty of the Blockchain Technology.</DIV><DIV>&nbsp;</DIV><DIV>This S/4HANA and SAP BTP and Enterprise Blockchain use case is for me, the boiling an egg equivalent of Enterprise Blockchain Database implementations, it is so simple, so elegant, so easy to set up, and so brings out why the Enterprise Blockchain Platform is so special.</DIV><DIV>&nbsp;</DIV><DIV><P><STRONG>Wrapping Up&nbsp;</STRONG></P><P><STRONG>To wrap up, a simple reminder,&nbsp;</STRONG></P><P style=" padding-left : 30px; "><EM><STRONG>The Digital Transformation of Information Security is Enterprise Blockchain</STRONG></EM></P><P style=" padding-left : 30px; "><EM><STRONG>Enterprise Blockchain is the Next Generation Data Integrity, Originality, Confidentiality Protection</STRONG></EM></P><P style=" padding-left : 30px; "><STRONG>Enterprise Blockchain, Enterprise Distributed Ledger Technology is re-imagining information security</STRONG></P><P><STRONG>If you want the easiest, simplest, most resilient foundation to an Enterprise Business Continuity Planning Solution, just send your S/4HANA Operational Critical Master and Transaction Data to The Enterprise Blockchain. voila.</STRONG></P></DIV><DIV>&nbsp;</DIV><DIV>And ultimately, this is all&nbsp;<A class="" href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_blank">Why I love SAP and Blockchain Databases and why you should too</A>&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>.</DIV><DIV>&nbsp;</DIV><DIV>In the next blogs, week by week I will be blogging Use Cases, the blogs will follow a template where the Business Demand, the Use Case is discussed, the Architecture Demand Process will be followed and the outcome will show, week by week, Use Case by Use Case, why Blockchain is the best Enabling Technology Standard for that Use Case and Demand. The blogs will also describe all of the Solution Architecture Options.&nbsp;</DIV><DIV>&nbsp;</DIV><DIV>If you have a Use Case you would like illustrated, let me know in the comments and I will blog the Solution Architecture.</DIV><DIV><P>The good news is, as we discussed in the previous blog, this is no longer hype, we can do all of this today,<SPAN>&nbsp;</SPAN><SPAN>and now, within the&nbsp;</SPAN><A href="https://www.sap.com/norway/partners/partner-program/build.html" target="_self" rel="noopener noreferrer">SAP Partner Edge Open EcoSystem</A><SPAN>&nbsp;there are enabling technology Blockchain Products designed and built by SAP Experts specifically for the needs of SAP Customers to make doing Blockchain and SAP easy, and so you can do SAP and Blockchain, today it's real and there's nothing stopping you.</SPAN></P><P>So what are we waiting for ? Oh yeah, more use cases, ok, that will continue in&nbsp; the next blog&nbsp;&nbsp;<SPAN>This blog is the sixth in the series, the previous blogs are&nbsp;</SPAN><SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_self">here</A><SPAN>,&nbsp;</SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">here</A><SPAN>,&nbsp;</SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_self">here</A><SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/oil-amp-gas-ultimate-data-security-blockchain-data-backbone-from-ot-to-sap/ba-p/13640699" target="_self">here</A>&nbsp;<SPAN>and <A href="https://community.sap.com/t5/technology-blogs-by-members/the-what-is-the-why-to-the-how-to-of-esg-amp-sap-amp-enterprise-blockchain/ba-p/13642365" target="_self">here</A>. </SPAN></P><P><SPAN>What do you think, are the words Blockchain, Web3, Distributed Ledger Technology, starting to appear in your Company's visions and technology visions ? What use cases are you looking at ? Let's chat about it in the comments.</SPAN></P><P>For now, over and out.</P><P>Andy Silvey.</P></DIV></DIV></DIV></DIV></DIV></DIV></DIV><DIV><P>Independent SAP Technical Architect and CEO of atkrypto.io</P><P>Author Bio:</P><P>Andy Silvey is a 25 years SAP Technology veteran&nbsp;[<EM>15 years SAP Basis and 10 years SAP Tech Arch including Tech, Integration, Security, Data from 3.1H to S/4HANA PCE on RISE and the BTP and everything in between, and<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/welcome-corner-blog-posts/andy-silvey-scn-moderator-spotlight/ba-p/13054438" target="_self">former SCN Moderator and Mentor alumni</A>].</EM></P><P>Andy is also co-Founder of atkrypto inc, an startup whose ambition is to make Blockchain easy for Enterprise.</P><P>atkrypto.io's flagship product is the atkrypto Enterprise Blockchain Platform for SAP,&nbsp; and atkrypto.io is a SAP Partner Edge Open EcoSystem Partner.&nbsp;</P><P>The&nbsp;atkrypto Enterprise Blockchain Platform for SAP has been designed by SAP Independent Experts for the needs of SAP Customers and to be deployed on the SAP BTP Kyma Runtime Service and leverage native integration to SAP Products.</P><P>atkrypto&nbsp;Enterprise Blockchain Platform for SAP has a number of unique qualities, including being the only Blockchain software in the world which has a DataCenter version and a light mobile version which can run on Edge/IoT/Mobile devices and enables data to be written to the Blockchain at the Edge where that same Blockchain is running on a Server in the DataCenter, protecting the integrity and originality of data from the Edge to Insights. Taking Blockchain to the Data at the Edge instead of taking the Data to the Blockchain.</P><P>All of this makes atkrypto,io the DePIN Decentralised Physical Infrastructure Network solution for Enterprise.</P><P>&nbsp;</P></DIV><P>&nbsp;</P> 2024-03-26T20:33:44.142000+01:00 https://community.sap.com/t5/technology-blogs-by-sap/safeguarding-data-privacy-in-ksa-leveraging-sap-to-navigate-ndmo-s/ba-p/13652286 Safeguarding Data Privacy in KSA - Leveraging SAP to navigate NDMO’s Regulations in Digital Era 2024-03-28T12:05:30.971000+01:00 Zainab_ASalam https://community.sap.com/t5/user/viewprofilepage/user-id/1426218 <P><FONT face="courier new,courier" size="2" color="#333333">Blog v1.0 &nbsp;| &nbsp;</FONT><FONT face="courier new,courier" size="2" color="#333333">Published On: 28 March 2024</FONT></P><P><FONT face="courier new,courier" size="2"><FONT color="#333333">Authors:&nbsp;</FONT><a href="https://community.sap.com/t5/user/viewprofilepage/user-id/76380">@asadkhan02</a>&nbsp;,&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1427434">@AyeshaSafeer</a>&nbsp;,&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1426218">@Zainab_ASalam</a>&nbsp;</FONT></P><P style=" text-align: center; "><FONT face="courier new,courier" size="2" color="#808080">_________________________________________</FONT></P><P><FONT face="arial,helvetica,sans-serif" color="#000080">In today's digital era, data privacy is a crucial issue for both individuals and organizations. The <STRONG>Saudi National Data Management Office</STRONG> (<STRONG>NDMO</STRONG>), in partnership with the <STRONG>Saudi Data and</STRONG> <STRONG>Artificial Intelligence Authority</STRONG> (<STRONG>SDAIA</STRONG>), has introduced stringent <STRONG>Data Governance and Personal Data Protection Standards</STRONG>. These regulations mandate all organizations operating across various industries in the Kingdom of Saudi Arabia comply by <STRONG>September 2024</STRONG>.</FONT></P><P><FONT face="arial,helvetica,sans-serif" color="#000080">Failure to comply with these regulations can result in hefty financial fines reaching SAR 3 million or higher in some cases, reputational damage, legal consequences, and loss of trust among customers and partners.</FONT></P><P><FONT face="arial,helvetica,sans-serif" color="#000080"><SPAN>To ensure compliance with these new regulations, organizations are encouraged to implement processes aligned with the 15 domains outlined by the NDMO for Data Governance and Personal Data Protection Standards. Leveraging technology as an enabler, organizations can implement robust data privacy measures and effectively meet these requirements.</SPAN></FONT></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Top 5 Areas part of 15 Domains outlined by NDMO for Data Governance and Personal Data Protection Standards" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87957i2C22EE02F15D3B98/image-size/large?v=v2&amp;px=999" role="button" title="Picture1.png" alt="Top 5 Areas part of 15 Domains outlined by NDMO for Data Governance and Personal Data Protection Standards" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Top 5 Areas part of 15 Domains outlined by NDMO for Data Governance and Personal Data Protection Standards</span></span></P><P><FONT size="3" color="#000080">SAP, a global leader in enterprise software, provides advanced technologies with artificial intelligence (AI) capabilities that provide a solid foundation for organizations to implement data governance and personal data protection processes. SAP solutions enable Saudi organizations to efficiently navigate and fulfill regulatory requirements:</FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#333399"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture2.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87931iD46B5558704106BA/image-size/large?v=v2&amp;px=999" role="button" title="Picture2.png" alt="Picture2.png" /></span></FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#000080"><SPAN>By implementing SAP solutions, Saudi organizations can empower their data privacy practices, mitigate compliance risks, and build trust among stakeholders. SAP technologies uphold data integrity, safeguard personal information, offer the framework for regulatory compliance implementation, and adapt to the demands of the digital age.</SPAN></FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#000080">As a team at SAP, we are committed to supporting organizations in achieving their regulatory compliance initiatives. We invite you to take the next step by exploring how our technologies and solutions can assist you on this journey.</FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#000080">Contact us today to learn more about how SAP can help you navigate the complex landscape of data privacy regulations in Saudi Arabia and ensure compliance.</FONT></P><P>&nbsp;</P> 2024-03-28T12:05:30.971000+01:00 https://community.sap.com/t5/financial-management-blogs-by-sap/how-to-upgrade-plugin-systems-if-decentralized-firefighter-is-used/ba-p/13652281 How to upgrade plugin systems if Decentralized Firefighter is used 2024-03-28T14:16:40.756000+01:00 Mate https://community.sap.com/t5/user/viewprofilepage/user-id/239783 <P>Decentralized Firefighter is a good option to allow your Firefighters to logon when the main GRC system is under maintenance and not available or to reduce the high availability of the main GRC system. On the other hand using the Decentralized Firefighter moves GRC functionality to your plugin system which need to be work together with the main GRC system. This usually means that if you upgrade your main GRC system you need to do an upgrade on the same functionality in the backend system as well. Sometimes it is an easier task (just implement some Notes), sometimes - especially if session handling related enhancements are made - it is not an easy task. Upgrading to SP 21 or above from a lower SP level is belong to the latter.</P><P>The introduction of the Logoff button and the changes under the hood is require that - if you use Decentralized Firefighter - you move these changes on your backend as well. This is not necessary a hard task, especially if you upgrade your plugin components at the same time with your main GRC system. On the other hand if you have many backend systems or your upgrade plan is differ in your plugin systems, you can easily find that the upgrade is became a nightmare and these functionality will not works as expected. With this post we would like to introduce a solution and a possible upgrade plan which was became available with the recently released enhancement with Note&nbsp;3435355 (Centralized) and&nbsp;3435356 (Decentralized).</P><P>In normal circumstances we suggest to have an equivalent SP level of your main GRC system (GRCFND_A) and your plugin systems (GRCPINW). This is described in Note 1352498. The equivalency not necessary means that you need to have the same SP, it can be also achieved by implementing the same Notes. What you need to ensure that the functionality between your main GRC system and your plugin works and communicate the same way. What means "A" in the main GRC system should be "A" in the plugin system as well.</P><P>Note 3435356 can give you the option to handle the new functionalities released recently and provide an old behavior of the Firefighter Logon Pad. By implementing Note&nbsp;3435356 to your existing plugin system (with all the prerequisite Notes),&nbsp; and then set SPRO parameter 4031 and 4032 to YES you will be able to use an upgraded version of the Decentralized Firefighter to be fully compatible with any Centralized scenario which is older than SP 21. With this compatibility mode you will be able to upgrade your plugin systems to the latest code level, and if all of your plugin is already upgraded you can also upgrade your main GRC system as the last step. With this you will be able to use Decentralized Firefighter at any time without you would need to upgrade your plugins at once in the same time.</P><P>To summarize what we suggest as a working upgrade plan.<BR />1.) first you need to upgrade your plugin system (GRCPINW) for any newer SP level (preferably the latest one, but will works above SP 21 for V1200 or SP27/28 for V1100_700/731).<BR />2.) Then implement Note&nbsp;3435356 with all the prerequisites into this plugin system.<BR />3.) After the Note is implemented set the Plugin side SPRO parameters 4031 and 4032 to YES. (Now you can use this plugin with your old main GRC system)<BR />4.) Repeat Step 1-3 in all of your plugin system based on their annual Upgrade process<BR />5.) After all of your plugin system is upgraded (where you use Decentralized Firefighter), you can upgrade your main GRC system&nbsp;(GRCFND_A) as well to any equivalent SP level above SP 21.</P><P>With these steps the hard part of moving to above SP 21 can be achieved with planning it a little bit easier.</P> 2024-03-28T14:16:40.756000+01:00 https://community.sap.com/t5/technology-blogs-by-sap/navigating-compliance-and-bpm-challenges-amp-solutions/ba-p/13652811 Navigating Compliance and BPM: Challenges & Solutions 2024-03-28T17:43:40.210000+01:00 RobertT https://community.sap.com/t5/user/viewprofilepage/user-id/41662 <DIV class=""><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RobertT_0-1711643847570.jpeg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/88180i4E1778E810EA0784/image-size/medium?v=v2&amp;px=400" role="button" title="RobertT_0-1711643847570.jpeg" alt="RobertT_0-1711643847570.jpeg" /></span></DIV></DIV><P><FONT size="2">Photo by <A class="" href="https://unsplash.com/@2mduffel?utm_source=medium&amp;utm_medium=referral" target="_blank" rel="noopener ugc nofollow noreferrer">Mark Duffel</A> on <A class="" href="https://unsplash.com/?utm_source=medium&amp;utm_medium=referral" target="_blank" rel="noopener ugc nofollow noreferrer">Unsplash</A></FONT></P><P class="">The regulatory terrain is in constant flux. From the EU’s GDPR to China’s PIPL for data privacy, or even industry-specific safety, employment, testing, and environmental regulations (just to name a few), the constant evolution makes it difficult for organizations to stay current and ensure their business processes comply with all relevant regulations. While it is true that these complexities can seem daunting, understanding the challenges and potential solutions can make compliance a natural part of your Business Process Management (BPM) strategy.</P><P class="">Business Process Management involves the systematic management of an organization’s processes to achieve specific goals, such as efficiency, effectiveness, and agility. However, amidst this quest for optimization, organizations must navigate a labyrinth of regulatory requirements. Whether it’s data privacy laws like GDPR, industry-specific regulations such as HIPAA in healthcare, OSHA for safety, or financial regulations like Sarbanes-Oxley (SOX), non-compliance can lead to hefty fines, damaged reputations, and even legal consequences.</P><P class="">In this blog post, I’ll delve into the complexities of regulatory compliance in BPM and provide guidance on how organizations can ensure their processes align with regulations effectively.</P><H1 id="toc-hId-861599560">Challenges in Compliance and BPM Integration</H1><P class="">First, no one said this would be easy. Anyone who tells you otherwise has something to sell. You need to understand that there will certainly be some things we will need to address in order to effectively integrate or use BPM to help manage compliance. Let’s consider a few of these hurdles:</P><P class="">1. <STRONG>Complex Regulatory Landscape</STRONG>: The regulatory environment is constantly evolving, with new laws and amendments introduced regularly. This dynamic nature makes it challenging for organizations to keep track of compliance requirements and incorporate them into their BPM strategies.</P><P class="">2. <STRONG>Cross-Functional Dependencies:</STRONG> Business processes often span multiple departments and systems. Ensuring compliance across these interconnected processes requires collaboration and coordination among various stakeholders, which can be a logistical challenge.</P><P class="">3. <STRONG>Legacy Systems and Siloed Data:</STRONG> Many organizations still rely on legacy systems that may not be designed with compliance in mind. Additionally, data silos make it difficult to maintain visibility and control over information flow, increasing the risk of compliance violations.</P><P class="">4. <STRONG>Balancing Compliance and Efficiency:</STRONG> Striking the right balance between compliance and efficiency is crucial. Overly rigid processes designed solely for compliance may hinder agility and innovation, while overly flexible processes could compromise compliance.</P><H1 id="toc-hId-665086055">Solutions for Effective Compliance in BPM</H1><P class="">With those issues in mind, there are ways that BPM (done correctly), can <EM>assist</EM> and is even designed to <EM>support</EM>. You will notice that I used the words “assist” and “support”. That is because it is important for everyone to understand that these solutions are not necessarily “out of the box” functionality that one can simply turn on. They do in fact require internal frameworks and methods of working be designed and implemented. This will require effective communication and change management from all levels. We can talk more about that at another time. For now, here are a few methods to consider:</P><P class="">1. <STRONG>Continuous Monitoring and Auditing:</STRONG> Implement robust monitoring and auditing mechanisms to track process performance and ensure compliance in real-time. Automated workflows and alerts can help detect deviations from regulatory requirements promptly.</P><P class="">2. <STRONG>Standardization and Documentation:</STRONG> Standardize processes and document workflows to ensure clarity and transparency. This not only facilitates compliance but also streamlines process management and training efforts.</P><P class="">3. <STRONG>Adaptive Process Design:</STRONG> Adopt an adaptive approach to process design that allows for flexibility while maintaining compliance. Leverage BPM tools with dynamic capabilities to adjust processes in response to regulatory changes swiftly.</P><P class="">4. <STRONG>Integration with Compliance Management Systems:</STRONG> Where possible, integrate BPM systems with dedicated compliance management platforms to help centralize compliance efforts. This enables communication between compliance teams and process stakeholders, supporting alignment with regulatory requirements.</P><P class="">5. <STRONG>Employee Training and Awareness</STRONG>: Invest in comprehensive training programs to educate employees about compliance obligations and the importance of adhering to prescribed processes. Foster a culture of compliance throughout the organization to reinforce accountability and responsibility.</P><P class="">As we have discussed, achieving compliance requires a strategic and holistic approach that encompasses people, processes, and technology. The dynamic landscape of regulatory compliance can and does present a challenge to BPM. However, by addressing the challenges and implementing recommended solutions, organizations can ensure a smoother path to regulatory compliance and thereby safeguard their credibility and maintain a competitive edge in the market.</P><P class="">— — — — — — — — — — — -</P><P class="">If you found this article helpful, be sure to click like. And course follow me for more on the topics of AI, BPM, Process Mining, Customer Experience, Digital Transformation, and Automation.</P><P class="">Until next time — Keep Transforming <span class="lia-unicode-emoji" title=":light_bulb:">💡</span></P> 2024-03-28T17:43:40.210000+01:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-members/firefighter-id-login-issue-ffid-status-is-in-red/ba-p/13656494 FireFighter ID login issue - FFID Status is in Red 2024-04-03T10:45:24.579000+02:00 Sankar_Aravind https://community.sap.com/t5/user/viewprofilepage/user-id/483030 <P>There will be some scenarios where you need to approve the firefighter requests from NWBC or you need to extend the firefighter ID assignment validity from NWBC (with needed approvals).&nbsp;</P><P>However, there are some instances where the firefighters will see the below error message when they try login to Firefighter launchpad or the FFID status always shows in RED.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sankar_Aravind_0-1712089662063.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/90129i30D7E9761AFF0F9C/image-size/medium?v=v2&amp;px=400" role="button" title="Sankar_Aravind_0-1712089662063.png" alt="Sankar_Aravind_0-1712089662063.png" /></span></P><P>You have done the pre-checks like&nbsp;</P><P>1) No other firefighter is using the FFID</P><P>2) You are using the Centralized or Decentralized, any one at that point</P><P>3) All configs and authorizations are in place</P><P>4) You have already checked no previous sessions are running</P><P>5) You have already checked no jobs running with FFID and not available in SM04.</P><P>But still the user showing as occupied with Red color light in the firefighter launchpad.&nbsp;</P><P>The reason for this is, when you perform the extension or assignments of FFID in NWBC, you need to come out of that FFID assignment maintenance screen. Till then, the FFID shows its already checked-out.&nbsp;</P><P>Once you come out of that maintaince window, you will see the green status in the FFID launchpad and firefighters can login from there.&nbsp;</P><P>&nbsp;</P><P>Thank you.&nbsp;</P><P>&nbsp;</P> 2024-04-03T10:45:24.579000+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/get-peace-of-mind-for-evolving-compliance-requirements-with-sap-advanced/ba-p/13652975 Get peace of mind for evolving compliance requirements with SAP advanced compliance automation 2024-04-08T07:00:00.023000+02:00 T_Frenehard https://community.sap.com/t5/user/viewprofilepage/user-id/215222 <P>Tax authorities have typically been relying on period-end declarations and cumbersome audits, leaving a chance for after the fact validations and corrections. Now the era of 'post fact' adjustments is vanishing: more and more tax authorities require all data in real-time, even before invoices are issued to customers, making compliance a must-have within your business processes in your cloud ERP.</P><P>Did you know:</P><UL><LI>“By 2026, half of revenues will come from products, services, or businesses that haven’t yet been created” (1)</LI><LI>“65% of consumer business leaders believe their corporate tax liability will increase as result of the Pillar One/Pillar Two project” (2)</LI><LI>New “Spanish Plastic Tax” is expected to generate approximately €724m annually (3)</LI><LI>7 out of the 10 largest economies in the world either have introduced or plan to introduce mandatory electronic invoices for all business transactions (4)</LI></UL><P>To address your compliance needs, the <STRONG>GROW with SAP advanced compliance automation package, </STRONG>is a new commercial offering designed to help you transform, standardize and harmonize processes globally to comply locally, faster, and more efficiently. It also helps you respond to existing and upcoming e-invoicing regulations without compromising the efficiency of order to cash processes and ensure you have the adequate internal controls needed to safeguard your financial data, policies, and processes, as well as minimize the risk of noncompliance.</P><P>This first element of the package is the <STRONG>SAP Document and Reporting Compliance</STRONG> solution that helps you fulfill local compliance mandates - from electronic business documents to statutory reporting - and automate compliance processes.</P><P>The second element of the package is the <STRONG>SAP Risk and Assurance Management</STRONG>. It helps you centrally document and manage manual and automated internal controls over financial reporting, thus improving performance, protecting core data and processes.</P><P>&nbsp;</P><H2 id="toc-hId-990683430"><STRONG>Explosion of Local Compliance Obligations</STRONG></H2><P>&nbsp;</P><P><SPAN>You never go a full month without new tax news, as the digitalization journey of governments continues, resulting in more and more a</SPAN>uthorities pushing new e-invoicing regulations that are quickly becoming the new norm. And this is further going to increase with the “program announced by the European Union or tax initiatives in Japan, Saudi Arabia, Romania, Poland, Malaysia, Israel just to name a few.</P><P>This shift is motivated by various reasons, such as:</P><P>&nbsp;- Preventing tax evasion</P><P>&nbsp;- Increasing digitalization and controls in the public sector</P><P>&nbsp;- Or simply digitalizing the economy, for instance to reduce the carbon footprint</P><P>Whatever the deciding criterion behind it, the trend is clear: all tax authorities are investing in technology and introducing more demanding digital mandates:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_0-1711660293470.jpeg" style="width: 500px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/88243iFCB8CF06FE7AE762/image-dimensions/500x247?v=v2" width="500" height="247" role="button" title="T_Frenehard_0-1711660293470.jpeg" alt="T_Frenehard_0-1711660293470.jpeg" /></span></P><P><FONT size="2">Indicative examples of some external obligation… by no means exhaustive list!</FONT></P><P>&nbsp;</P><H2 id="toc-hId-794169925"><STRONG>Turning Taxes into Opportunities</STRONG></H2><P>&nbsp;</P><P>With these challenges also come opportunities. The enables seamless compliance and helps companies respond to existing and upcoming regulations efficiently, in addition to improving and protecting business processes by minimize the risk of noncompliance.</P><P>It does so by providing a future-proof compliance platform with legal changes as a service, to standardize processes while complying with local legislations. Since no company is immune to anomalies, it provides the means to reduce operational delays, detect compliance issues, accelerate remediation in time for digital reporting and address issues at the source directly.</P><P>This helps achieve the following benefits:</P><P>&nbsp;</P><TABLE><TBODY><TR><TD width="200"><P><STRONG>Comply with ever-evolving Digital Mandates</STRONG></P></TD><TD width="200"><P><STRONG>Lower the cost of compliance with automation</STRONG></P></TD><TD width="200"><P><STRONG>Minimize risk of non-compliance</STRONG></P></TD></TR><TR><TD width="200"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_1-1711660293472.png" style="width: 100px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/88240i4B22724CCAF8B8EB/image-dimensions/100x123?v=v2" width="100" height="123" role="button" title="T_Frenehard_1-1711660293472.png" alt="T_Frenehard_1-1711660293472.png" /></span><P>&nbsp;</P></TD><TD width="200"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_2-1711660293473.png" style="width: 100px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/88241iC8525074990E75B5/image-dimensions/100x100?v=v2" width="100" height="100" role="button" title="T_Frenehard_2-1711660293473.png" alt="T_Frenehard_2-1711660293473.png" /></span><P>&nbsp;</P></TD><TD width="200"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_3-1711660293474.png" style="width: 100px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/88244i61ECACDD183A8958/image-dimensions/100x87?v=v2" width="100" height="87" role="button" title="T_Frenehard_3-1711660293474.png" alt="T_Frenehard_3-1711660293474.png" /></span><P>&nbsp;</P></TD></TR><TR><TD width="200"><P>o&nbsp;&nbsp; One solution to fulfill all types of digital mandates from real time electronic documents to statutory reports</P><P>o&nbsp;&nbsp; Continuously address increasingly complex mandates</P><P>o&nbsp;&nbsp; Improve tax data quality and minimize the risk of noncompliance</P></TD><TD width="200"><P>o&nbsp;&nbsp; Remove manual workarounds and inefficient tasks</P><P>o&nbsp;&nbsp; Gain efficiency with standardized operations across countries.</P><P>o&nbsp;&nbsp; Simplify implementation of new mandates and ongoing support</P><P>o&nbsp;&nbsp; Improve financial performance and accuracy</P></TD><TD width="200"><P>o&nbsp;&nbsp; ​Increase tax transparency and auditability</P><P>o&nbsp;&nbsp; Detect compliance issues and accelerate remediation in time for digital reporting</P><P>o&nbsp;&nbsp; Address issue at the source</P></TD></TR></TBODY></TABLE><P>With SAP’s new <STRONG>GROW with SAP advanced compliance automation package</STRONG>, we aim to get you peace of mind, and help you improve your operational agility to implement legal mandates, as you navigate a highly competitive and price sensitive environment.</P><P>If you are interested in learning more about the solutions mentioned, look at the links below:</P><P><STRONG>SAP Document and Reporting Compliance</STRONG></P><UL><LI><A href="https://www.sap.com/products/financial-management/document-reporting-compliance.html" target="_blank" rel="noopener noreferrer">Documentation</A></LI><LI><A href="https://www.sap.com/assetdetail/2021/09/0c658940-fb7d-0010-bca6-c68f7e60039b.html" target="_blank" rel="noopener noreferrer">Overview video</A></LI><LI><A href="https://help.sap.com/docs/cloud-edition" target="_blank" rel="noopener noreferrer">Section on the SAP Help Portal</A></LI></UL><P><STRONG>SAP Risk and Assurance Management</STRONG></P><UL><LI><A href="https://www.sap.com/products/financial-management/financial-compliance-management.html" target="_blank" rel="noopener noreferrer">Documentation</A></LI><LI><A href="https://www.sap.com/assetdetail/2022/12/809a5a25-557e-0010-bca6-c68f7e60039b.html" target="_blank" rel="noopener noreferrer">Overview video</A></LI><LI><A href="https://help.sap.com/docs/FINANCIAL_COMPLIANCE_CF" target="_blank" rel="noopener noreferrer">Section on the SAP Help Portal</A></LI></UL><P>&nbsp;</P><P><U>Sources:</U></P><P>(1) <A href="https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/2021-global-report-the-state-of-new-business-building" target="_blank" rel="nofollow noopener noreferrer">The state of new business building, McKinsey, December 2021</A></P><P>(2) Deloitte, Global Tax and the impact of BEPS on consumer business, Deloitte’s 2020 global survey on the OECD’s Base Erosion and Profit Shifting (BEPS)</P><P>(3) <A href="https://www.internationaltaxreview.com/article/2ba9a65l5p74ycisjwagw/plastic-taxes-a-guide-to-new-legislation-in-europe" target="_blank" rel="nofollow noopener noreferrer">Plastic taxes: a guide to new legislation in Europe, February 2023</A></P><P>(4) <A href="https://blogs.sap.com/2023/10/16/sap-s-4hana-update-for-2023-comply-with-new-regulations-and-respond-to-the-latest-compliance-trends-with-sap-document-and-reporting-compliance/" target="_blank" rel="noopener noreferrer">SAP S/4HANA update for 2023 – Comply with new regulations and respond to the latest compliance trends with SAP Document and Reporting Compliance, October 2023</A></P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P> 2024-04-08T07:00:00.023000+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/shift-to-remote-continuous-and-risk-adjusted-management-with-sap-three/ba-p/13631584 Shift to Remote, Continuous, and Risk-Adjusted Management with SAP Three Lines of Defense Package 2024-04-09T07:00:00.022000+02:00 T_Frenehard https://community.sap.com/t5/user/viewprofilepage/user-id/215222 <P><SPAN>With 90% of compliance leaders expecting evolving business, regulatory, and customer demands to significantly increase compliance-related operating costs, it is no surprise that half of them are already aiming to automate controls monitoring and management capabilities.</SPAN></P><P><SPAN>The <STRONG>Three Lines of Defense</STRONG> add-on package is designed to help RISE with SAP customers shift to remote, continuous, and risk-adjusted management that drives down risk and compliance costs and builds trust. </SPAN></P><P><SPAN>By embedding integrated solutions for internal control and compliance, enterprise risk management and internal audit into the very foundation of their SAP software landscape, organizations can automate tasks and decision-making, gain real-time visibility on their compliance status, and equip people to anticipate and respond to the risks standing in the way of achieving business objectives.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_4-1709831395560.png" style="width: 482px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/77288i97DC25742F425AAC/image-dimensions/482x400?v=v2" width="482" height="400" role="button" title="T_Frenehard_4-1709831395560.png" alt="T_Frenehard_4-1709831395560.png" /></span></P><P>Managing risks, controls, and regulatory requirements directly in business operations and monitoring compliance status in real-time is key to supporting risk-based decision-making.</P><P>As part of the <STRONG>Three Lines of Defense </STRONG>add-on package, <EM>SAP Process Control</EM> and <EM>SAP Risk Management</EM> natively integrate with SAP S/4HANA, SAP Signavio, etc. and work together to automate continuous control and risk monitoring. Effortlessly supporting continuous, automated risk and compliance monitoring across systems and processes. With embedded rules, configurations, and intelligent monitoring capabilities these solutions assist in doing the hard work of detecting, predicting, and mitigating threats in real time and invoking exception processes, when needed.</P><P>Furthermore, real-time reporting allows organizations to demonstrate compliance status to stakeholders on demand, reducing the overall assurance effort.</P><P>By leveraging this single source of truth, <EM>SAP Audit Management</EM> further enables organizations to increase assurance and improve audit efficiency - and enables the audit teams shift their focus from providing basic assurance to delivering trusted insight and advice to the business.</P><P>With integrated solutions from the Three Lines of Defense add-on package, companies can increase transparency and standardization of their multiple compliance initiatives and focus on the processes and activities that are most important. By aligning value drivers<SPAN>, objectives, and high-impact risks, they can seize opportunities and mitigate risks promptly for increased profitability using instant access to crucial risk indicators. </SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_5-1709831395563.png" style="width: 689px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/77289i9B36DFD7DA2A97B8/image-dimensions/689x224?v=v2" width="689" height="224" role="button" title="T_Frenehard_5-1709831395563.png" alt="T_Frenehard_5-1709831395563.png" /></span></P><P><SPAN>If you are a RISE with SAP customer, you can benefit from this cost attractive package to optimize collaboration across all three lines, and ensure the reliability, coherence, and transparency of the information required for decision-making.</SPAN></P><P><SPAN>If you’d like to read more about this package and its components, then have a look at the following links:&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><UL><LI><SPAN>Solution brief: </SPAN><SPAN><A href="https://www.sap.com/documents/2016/08/387ca9f4-807c-0010-82c7-eda71af511fa.html" target="_blank" rel="noopener noreferrer">Strengthening the Three Lines for Governance, Risk, and Compliance</A></SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>Overview video: </SPAN><SPAN><A href="https://video.sap.com/media/t/1_q5927sib" target="_blank" rel="noopener noreferrer">Integrated Risk and Controls Management for SAP S/4HANA</A></SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>Individual product pages: </SPAN><SPAN><A href="https://www.sap.com/products/financial-management/internal-control.html" target="_blank" rel="noopener noreferrer">SAP Process Control</A></SPAN><SPAN>, </SPAN><SPAN><A href="https://www.sap.com/products/financial-management/risk-management.html" target="_blank" rel="noopener noreferrer">SAP Risk Management</A></SPAN><SPAN> and </SPAN><SPAN><A href="https://www.sap.com/products/financial-management/audit-management.html" target="_blank" rel="noopener noreferrer">SAP Audit Management</A></SPAN></LI></UL> 2024-04-09T07:00:00.022000+02:00 https://community.sap.com/t5/technology-blogs-by-members/trustable-ai-thanks-to-sap-ai-core-amp-sap-hana-cloud-amp-sap-s-4hana-amp/ba-p/13662822 Trustable AI thanks to - SAP AI Core & SAP HANA Cloud & SAP S/4HANA & Enterprise Blockchain 🚀 2024-04-11T12:51:09.466000+02:00 AndySilvey https://community.sap.com/t5/user/viewprofilepage/user-id/1397601 <P>This blog is the seventh in the series and discusses what AI and and SAP and Enterprise Blockchain are, why they are so important for each other, and then takes a deep dive in to the SAP product oriented reference architecture of how to implement SAP AI Core and S/4HANA and Enterprise Blochchain.</P><P>What will it take to make AI trustable ?</P><P style=" padding-left : 30px; ">tl:dr</P><P style=" padding-left : 30px; ">&nbsp;</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP Artificial Intelligence SAP AI Core SAP HANA Cloud SAP S4HANA Enterprise Blockchain - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/93002i2A1E686D4A1DE3BA/image-size/large?v=v2&amp;px=999" role="button" title="SAP Artificial Intelligence SAP AI Core SAP HANA Cloud SAP S4HANA Enterprise Blockchain - atkrypto.io.jpg" alt="SAP Artificial Intelligence SAP AI Core SAP HANA Cloud SAP S4HANA Enterprise Blockchain - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP Artificial Intelligence SAP AI Core SAP HANA Cloud SAP S4HANA Enterprise Blockchain - atkrypto.io</span></span></P><P>&nbsp;</P><P style=" padding-left : 30px; ">Enterprise Blockchain is the Cyber Security for Enterprise AI.&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span></P><P>This blog introduces the Enterprise Blockchain Wallet and Off-Chain data storage and demonstrates why it is so special and important for protecting the trustworthiness and reliability and integrity and originality of information and data, be patient and read on because the Enterprise Blockchain Wallet is something very special and enables us to protect large and unstructured data very simply and effectively and is one of the biggest reasons why an Enterprise Blockchain Database is so suited to protecting data for AI operations</P><P>&nbsp;</P><P>The blog is going to break the subject down in to three sections:</P><P style=" padding-left : 30px; "><STRONG>Section 1.0: The What is it of SAP AI, and Enterprise Blockchain&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Section 2.0: The Why is it, of&nbsp;SAP AI, and Enterprise Blockchain&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Section 3.0: The How is it,&nbsp;of&nbsp;SAP AI, and Enterprise Blockchain</STRONG></P><P>A huge amount has been written about both Artificial Intelligence and Enterprise Blockchain and there is no point to repeat everything here, so we will talk briefly about the subjects and then point to very useful resources for further reading, and focus our attention on why Enterprise Blockchain makes Artificial Intelligence trustable, and how to do it.</P><P>&nbsp;</P><P><U><EM><STRONG>Section 1.0: The What is of SAP AI, and Enterprise Blockchain&nbsp;</STRONG></EM></U></P><P><EM><A href="https://www.sap.com/products/artificial-intelligence/what-is-artificial-intelligence.html" target="_self" rel="noopener noreferrer">What is Artificial Intelligence ?</A></EM></P><P>&nbsp;</P><P><A href="https://www.sap.com/products/artificial-intelligence/what-is-artificial-intelligence.html" target="_self" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1712595158437.png" style="width: 724px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92938i4A116EB727F306CA/image-dimensions/724x360?v=v2" width="724" height="360" role="button" title="AndySilvey_0-1712595158437.png" alt="AndySilvey_0-1712595158437.png" /></span></A></P><P>&nbsp;</P><P><A href="https://www.sap.com/products/artificial-intelligence/what-is-artificial-intelligence.html" target="_self" rel="noopener noreferrer">What is the History of AI ?</A></P><P>&nbsp;</P><P><A href="https://www.sap.com/products/artificial-intelligence/what-is-artificial-intelligence.html" target="_self" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1712595326540.png" style="width: 825px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92939i98CF1B9B0E9281EB/image-dimensions/825x439?v=v2" width="825" height="439" role="button" title="AndySilvey_1-1712595326540.png" alt="AndySilvey_1-1712595326540.png" /></span></A></P><P>and SAP has an amazing AI powered product roadmap, taking the product portfolio...</P><P style=" padding-left : 30px; ">.&nbsp; <EM>from a <STRONG>System of Record </STRONG></EM></P><P style=" padding-left : 30px; "><EM>. through being a <STRONG>System of Engagement</STRONG></EM></P><P style=" padding-left : 30px; "><EM>. to being a <STRONG>System of Intelligence</STRONG></EM></P><P>What AI can do for the Enterprise, and where AI is going, massive opportunities are coming along,&nbsp;and it is happening all around us as we speak, this technology revolution is not on presentations, it is real and we can implement it and benefit from it right now, today. <A href="https://news.sap.com/2023/05/sap-sapphire-business-ai/" target="_self" rel="noopener noreferrer">SAP's AI capabilities are growing by the day</A>:</P><P>&nbsp;</P><P><A href="https://news.sap.com/2023/05/sap-sapphire-business-ai/" target="_self" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_2-1712595955469.png" style="width: 814px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92975i27FC0C6770917E57/image-dimensions/814x385?v=v2" width="814" height="385" role="button" title="AndySilvey_2-1712595955469.png" alt="AndySilvey_2-1712595955469.png" /></span></A></P><P>&nbsp;</P><P>Like everything else we do in Enterprise IT,</P><P style=" padding-left : 60px; "><EM><STRONG>AI is about Data</STRONG></EM></P><P style=" padding-left : 60px; ">&nbsp;</P><P><EM><A href="https://www.sap.com/products/artificial-intelligence/what-is-blockchain.html" target="_self" rel="noopener noreferrer">What is Enterprise Blockchain ?&nbsp;</A></EM></P><P>Enterprise Blockchain is both:</P><P style=" padding-left : 30px; "><STRONG>. a Secure Store</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Communication Channel</STRONG></P><P><SPAN>McKinsey &amp; Company, in their&nbsp;</SPAN><A href="https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-blockchain" target="_self" rel="nofollow noopener noreferrer">December 2023 Featured Insights Publication</A><SPAN>, gave a beautiful description of what is unique and special about Blockchain, "</SPAN><EM>Blockchain is a secure database shared across a network of participants, where up-to-date information is available to all participants at the same time</EM><SPAN>". If we just pause for a moment and let that sink in, and think about what that means, to Business Processes, to Collaboration, to System Resilience, we start to see what is so special about Blockchain Databases and Distributed Ledger Technology.</SPAN></P><P>In these previous blogs, I made a deep dive in to what Enterprise Blockchain is and why we should be positioning it in our Enterprise Architecture:</P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_blank">Why I love SAP and Blockchain Databases and why you should too <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_blank">SAP Enterprise Architecture: Positioning Blockchain Database as an Enterprise Technology Standard <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_blank">SAP Enterprise Architecture: Let the Use Case find the Blockchain<span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></P><P>and in a nutshell, Enterprise Blockchain is:</P><P style=" padding-left : 30px; "><EM><STRONG>. The Digital Transformation of Information Security&nbsp;</STRONG></EM></P><P style=" padding-left : 30px; "><EM><STRONG>. The Next Generation Data Integrity, Originality, Confidentiality Protection</STRONG></EM></P><P style=" padding-left : 30px; "><STRONG>. Re-imagining Information Security</STRONG></P><P style=" padding-left : 30px; "><STRONG>. Natively, out of the box, due to its special characteristics the strongest, hardest, most resilient Enterprise Database product&nbsp;</STRONG></P><P>&nbsp;</P><P>To wrap up this section:</P><P style=" padding-left : 30px; ">. AI is about Data</P><P style=" padding-left : 30px; ">. Enterprise Blockchain is about Security of Data</P><P>&nbsp;</P><P><U><EM><STRONG>Section 2.0: The Why is it, of&nbsp;SAP AI, and Enterprise Blockchain</STRONG></EM></U></P><P>SAP say it themselves, building trust in AI, means the AI has to be:</P><P style=" padding-left : 30px; ">. Relevant</P><P style=" padding-left : 30px; ">. Reliable</P><P style=" padding-left : 30px; ">. Responsible</P><P>What is AI's biggest risk ?&nbsp;</P><P>AI's biggest risk is that the Data behind the AI is not trustworthy. In the same way as asking the wrong person for directions can leave you going all around the houses, if the Data behind the AI, and this means the Models as well, has been changed/contaminated/modified/poluted/made unreliable, whether purposefully through malicious acts or cyber attack, or accidentally, the result will be AI insights which cannot be trusted, and the result of that could be catastrophic.</P><P>Gartner remind us of this, when they describe the <A href="https://www.gartner.com/en/information-technology/topics/ai-readiness?utm_campaign=RM_GB_2024_ITAI_C_BB3_AIREADYORG_MR_A_Controlled&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITAI_C_BB3_AIREADYORG_MR_A_Controlled-_-0000" target="_self" rel="nofollow noopener noreferrer"><EM>4 key initiatives to get your Enterprise AI ready</EM></A>, and number 2 is AI Cyber Security:</P><P>&nbsp;</P><P style=" padding-left : 90px; "><A href="https://www.gartner.com/en/information-technology/topics/ai-readiness?utm_campaign=RM_GB_2024_ITAI_C_BB3_AIREADYORG_MR_A_Controlled&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITAI_C_BB3_AIREADYORG_MR_A_Controlled-_-0000" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1712671868094.png" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/93862i48744A2C3FE87219/image-dimensions/601x565?v=v2" width="601" height="565" role="button" title="AndySilvey_1-1712671868094.png" alt="AndySilvey_1-1712671868094.png" /></span></A></P><P>&nbsp;</P><P>&nbsp;</P><P>AI is about the Data</P><P>So, if we are going to do AI, then we need to care for and protect the Data that the AI is using.</P><P>Imagine, as described in the previous blog, when we <EM><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_self">let the Use Case find the Enterprise Blockchain</A></EM>, we have a Business Requirement, a Business Demand, to make AI trustable to make AI achieve as <A href="https://news.sap.com/2024/01/trustworthy-ai-can-reinvent-companies-and-help-resolve-global-challenges/#:~:text=As%20a%20global%20software%20company,into%20SAP%20databases%20and%20software." target="_self" rel="noopener noreferrer">SAP put it, the three R's, Relevant, Reliable, Responsible</A>:</P><P>&nbsp;</P><P><A href="https://news.sap.com/2024/01/trustworthy-ai-can-reinvent-companies-and-help-resolve-global-challenges/#:~:text=As%20a%20global%20software%20company,into%20SAP%20databases%20and%20software." target="_self" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1712597932094.png" style="width: 887px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92982iD0E15387BA1E82E6/image-dimensions/887x674?v=v2" width="887" height="674" role="button" title="AndySilvey_0-1712597932094.png" alt="AndySilvey_0-1712597932094.png" /></span></A></P><P>&nbsp;</P><P>In the US, <EM><A href="https://airc.nist.gov/AI_RMF_Knowledge_Base/AI_RMF/Foundational_Information/3-sec-characteristics" target="_self" rel="nofollow noopener noreferrer">NIST, the National Institute of Standards &amp; Technology have a whole section dedicated to AI and risks with AI</A></EM>. The biggest risk to AI is the trustworthiness of the data:</P><P>&nbsp;</P><P><A href="https://airc.nist.gov/AI_RMF_Knowledge_Base/AI_RMF/Foundational_Information/3-sec-characteristics" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1712598333140.png" style="width: 792px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92984i1AEDF7020C0F5479/image-dimensions/792x517?v=v2" width="792" height="517" role="button" title="AndySilvey_0-1712598333140.png" alt="AndySilvey_0-1712598333140.png" /></span></A></P><P>&nbsp;</P><P>When we look in our Enterprise Technology Standards, and we look for the Technology Standard in our Enterprise Portfolio which is <EM><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">positioned to bring the strongest protection to Data, we find the Enterprise Blockchain</A></EM>.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92999iC2007AEEC9B7D614/image-size/large?v=v2&amp;px=999" role="button" title="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io .png" alt="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io</span></span></P><P>&nbsp;</P><P>In the previous blogs, we have discussed in detail about the special characteristics of Enterprise Blockchain and just why it natively out of the box protects the integrity of data to a level that legacy database products cannot do, in a nutshell....</P><P><SPAN>AI is about Data</SPAN></P><P><SPAN>AI is about the Data that goes in to the AI engine</SPAN></P><P><SPAN>This means AI depends on a Database or a Datastore</SPAN></P><P><SPAN>What kind of Database does AI need ? What capabilities does the Database for the AI Data need to have ?</SPAN></P><P><SPAN>1. It must not be possible to modify the Data in the Database which feeds the AI - the Database needs to be immutable</SPAN></P><P><SPAN>2. The Data in the Database, the integrity and originality of that Data must be protected to the highest level that is technically possible</SPAN></P><P><SPAN>3. The Data must be available with the highest availability, the Database must be resilient to attack</SPAN></P><P><SPAN>When we look in our&nbsp;<A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">Enterprise Technology Standards we find 1 Technology Standard</A>&nbsp;in the Enterprise which has those capabilities, and that is..... Enterprise Blockchain</SPAN></P><P><SPAN>Enterprise Blockchain ticks those three boxes...</SPAN></P><P style=" padding-left : 30px; "><SPAN><span class="lia-unicode-emoji" title=":white_heavy_check_mark:">✅</span>Immutable - tick that box</SPAN></P><P style=" padding-left : 30px; "><SPAN><span class="lia-unicode-emoji" title=":white_heavy_check_mark:">✅</span>Integrity must be protected to the highest level - tick that box, thanks to the Enterprise Blockchain Hash Mechanism and the Enterprise Blockchain Consensus Mechanism</SPAN></P><P style=" padding-left : 30px; "><SPAN><span class="lia-unicode-emoji" title=":white_heavy_check_mark:">✅</span>Highest level of resilience and availability - tick that box thanks to the Distributed and Decentralised nature of the Enterprise Blockchain</SPAN></P><P><SPAN>This is why, Enterprise Blockchain is the enabler of trustable outcomes from Enterprise AI.</SPAN></P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="atkrypto.io what is a blockchain" style="width: 930px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/93590iDCB91C463CA311CE/image-size/large?v=v2&amp;px=999" role="button" title="atkrypto.io what is a blockchain.jpg" alt="atkrypto.io what is a blockchain" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">atkrypto.io what is a blockchain</span></span></P><P>&nbsp;</P><P>But there's more than that, AI, and especially during the AI Training, AI needs a lot of data, and that's why SAP AI Core uses SAP HANA Cloud (Data Lake) as the Data Source, because the volumes of data for training are big.</P><P>And this is why, in this blog we take the Enterprise Blockchain Technology story one level further and we introduce the:</P><P style=" padding-left : 30px; ">Enterprise Blockchain Wallet</P><P style=" padding-left : 30px; ">Off-Chain Data Storage</P><P>In the Enterprise Blockchain Platforms, the Enterprise Blockchain Wallet is used for Off-Chain storage of big data and in the following paragraphs we will explain why.</P><P>What is the Enterprise Blockchain Wallet, and what is Off-Chain Data Storage and why would we use them and why do we need them ?</P><P>As we have explained <A href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_self">in a previous blog</A>, the Enterprise Blockchain Database, the Distributed Ledger, can be looked at simply as a Database Table (which is replicated and synchronised across multiple Servers) and in principle it stores the Data like this:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Blockchain is a very simple form of database atkrypto.io" style="width: 896px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94111i4493BEB11005D9D1/image-size/large?v=v2&amp;px=999" role="button" title="Blockchain is a very simple form of database atkrypto.io .jpg" alt="Blockchain is a very simple form of database atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Blockchain is a very simple form of database atkrypto.io</span></span></P><P>&nbsp;</P><P>This is fine, and suited to what we call <A href="https://aws.amazon.com/compare/the-difference-between-structured-data-and-unstructured-data/#:~:text=Structured%20data%20is%20data%20that,files%20and%20large%20text%20documents." target="_self" rel="nofollow noopener noreferrer">Structured Data</A>, and as AWS nicely describe, <A href="https://aws.amazon.com/what-is/structured-data/" target="_self" rel="nofollow noopener noreferrer">Structured Data</A> is information like words and numbers. This kind of data is perfectly suited to being stored in an Enterprise Blockchain Database and also a legacy Database. Examples of the data would Names, Addresses, Phone Numbers, Product Information etc.</P><P>But, AI Artificial Intelligence software, especially during the Learning requires large quantities of this information, this data, and in <A href="https://discovery-center.cloud.sap/serviceCatalog/sap-ai-core?region=all" target="_self" rel="nofollow noopener noreferrer">SAP AI Core</A> the volumes, the amounts of data which are required for&nbsp; AI Learning are so big,&nbsp; and are often stored in what's called <A href="https://en.wikipedia.org/wiki/Comma-separated_values" target="_self" rel="nofollow noopener noreferrer">CSV, Comma Separated Values</A> files, and these CSV files will are too big to be stored on the Enterprise Blockchain Database itself, and they are too big to be stored in a Legacy Database.</P><P>And that's ok, Enterprise Blockchain Platforms are ready for that, and have been designed to store both Structured Data and Data which is in files which are so big that they cannot be stored in the Enterprise Blockchain Database itself.</P><P>So, if we can't store the large CSV file in Enterprise Blockchain Database, then how, in an Enterprise Blockchain Platform do we store large files of Data ?</P><P>Voila.... bring in the Enterprise Blockchain Platform Wallet. The best Enterprise Blockchain Platform products include what is called the Enterprise Blockchain Platform Wallet, or to make it shorter, the Enterprise Blockchain Wallet.</P><P>The Enterprise Blockchain Wallet enables us to store large Data, like large Files safely and securely off the chain, or '<A href="https://www.bitdegree.org/crypto/learn/crypto-terms/what-is-off-chain" target="_self" rel="nofollow noopener noreferrer">Off-Chain</A>'.&nbsp;</P><P>But if we store the large Data files Off-Chain in the Enterprise Blockchain Wallet, then how do we also have them some how on the Enterprise Blockchain Database ?</P><P>The way this works is elegant, in any decent Enterprise Blockchain Platform, the Enterprise Blockchain Wallet location is completely configurable, and could be anywhere from <A href="https://www.sap.com/norway/products/technology-platform/hana/features/cloud-data-lake.html" target="_self" rel="noopener noreferrer">SAP HANA Cloud (Data Lake)</A>, or for example&nbsp;multiple hyperscaler object stores, such as Amazon S3, OSS (Alicloud Object Storage<BR />Service), SAP HANA Cloud, Data Lake, and Azure Blob Storage.</P><P>The configurable Enterprise Blockchain Wallet of the Enterprise Blockchain Platform looks like this:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enterprise Blockchain Platform - Enterprise Blockchain Wallets - Configurable Enterprise Wallets - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94120i957EBAF9C4C99D2C/image-size/large?v=v2&amp;px=999" role="button" title="Enterprise Blockchain Platform - Enterprise Blockchain Wallets - Configurable Enterprise Wallets - atkrypto.io .jpg" alt="Enterprise Blockchain Platform - Enterprise Blockchain Wallets - Configurable Enterprise Wallets - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Enterprise Blockchain Platform - Enterprise Blockchain Wallets - Configurable Enterprise Wallets - atkrypto.io</span></span></P><P>&nbsp;</P><P>Ok, so we've got the AI Data stored in the (configurable) Enterprise Blockchain Wallet, but what about securing the AI Data ? Obviously the Enterprise Blockchain Wallet storage location has built in security, for example the SAP HANA Cloud, the AWS S3 Buckets, but we need more than the out of the box security of these products, the reason we are using the Enterprise Blockchain Database is because of the amazing security strengths that it natively out of the box has, and so, what about the Enterprise Blockchain Wallet, doesn't the Enterprise Blockchain Platform have some cool super hard way of protecting the data in the Enterprise Blockchain Wallet ?</P><P>Well yes it does, this is the magic of Enterprise Blockchain Database 'Off-Chain' storage in the Enterprise Blockchain Wallet. This is so unique to Blockchain Technologies.</P><P>What happens is this, when store data in the Enterprise Blockchain Wallet, the Enterprise Blockchain Platform software runs a hash algorithm over the data that we have stored and the data, and <A href="https://codesigningstore.com/what-is-hashing-algorithm-how-it-works#:~:text=In%20cryptography%2C%20hashing%20is%20a,output%20of%20the%20same%20length." target="_self" rel="nofollow noopener noreferrer">the large file gets hashed</A>:</P><P>&nbsp;</P><P><A href="https://codesigningstore.com/what-is-hashing-algorithm-how-it-works#:~:text=In%20cryptography%2C%20hashing%20is%20a,output%20of%20the%20same%20length." target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1712683845995.png" style="width: 820px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94122i996C23E84262122C/image-dimensions/820x242?v=v2" width="820" height="242" role="button" title="AndySilvey_0-1712683845995.png" alt="AndySilvey_0-1712683845995.png" /></span></A></P><P>&nbsp;</P><P>The data or the file in the Enterprise Blockchain Wallet gets hashed, and then, that hash is stored in the Enterprise Blockchain Database.</P><P>This means we now have a unique hash of that data or file, and if anybody or anything makes even the tiniest teeniest change to that data or file, next time we run a hash over that data or file the result will be different that the original hash which is safely stored in the Enterprise Blockchain Database and this is how we will know that the data has been changed and we cannot trust the Data and therefore we cannot use it for our Enterprise AI.</P><P>On the other hand, if just before we load the data in to the Enterprise AI from the Enterprise Blockchain Wallet, if we run a hash over the data and the hash result is the same as we have in the Enterprise Blockchain Database, then we will know we can trust the Data and we can use it in our AI and we will have trustable AI.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enterprise Blockchain Wallet Data Hashes Stored in the Enterprise Blockchain Database - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94123i2BCFCE251BFB839F/image-size/large?v=v2&amp;px=999" role="button" title="Enterprise Blockchain Wallet Data Hashes Stored in the Enterprise Blockchain Database - atkrypto.io .jpg" alt="Enterprise Blockchain Wallet Data Hashes Stored in the Enterprise Blockchain Database - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Enterprise Blockchain Wallet Data Hashes Stored in the Enterprise Blockchain Database - atkrypto.io</span></span></P><P>&nbsp;</P><P><STRONG>And this is why, for all of these reasons,&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Trustable Enterprise AI depends on Data being stored in the Enterprise Blockchain</STRONG></P><P style=" padding-left : 30px; ">&nbsp;</P><P><EM><A href="https://outlierventures.io/" target="_self" rel="nofollow noopener noreferrer">Outlier Ventures</A></EM>, in their <EM><A href="https://outlierventures.io/wp-content/uploads/2024/02/AI_thesis_v9-1.pdf" target="_self" rel="nofollow noopener noreferrer">AI Thesis</A></EM>, very nicely show how Enterprise Blockchain &amp; Artificial Intelligence together solves the risks associated with AI alone:</P><P>&nbsp;</P><P><A href="https://outlierventures.io/wp-content/uploads/2024/02/AI_thesis_v9-1.pdf" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1712598679467.png" style="width: 781px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92985iDA85439470F954B9/image-dimensions/781x621?v=v2" width="781" height="621" role="button" title="AndySilvey_1-1712598679467.png" alt="AndySilvey_1-1712598679467.png" /></span></A></P><P>&nbsp;</P><P>To conclude this section, the <EM>Why to, of Artificial Intelligence and Enterprise Blockchain</EM>, Artificial Intelligence needs to be Reliable, Relevant, Responsible, for it to be Trustable.</P><P>Enterprise Blockchain, due to its native super strong security strength when used as a store of Data and Models for AI, enables AI to be Trustable.</P><P>&nbsp;</P><P><STRONG>Section 3.0: The How is it,&nbsp;of&nbsp;SAP AI, and Enterprise Blockchain</STRONG></P><P>Now that we know why trustable Enterprise AI needs the Enterprise Blockchain Database to protect the integrity and originality of the Data and Models, how do we implement it today ?</P><P>Well that's easy, here are the ingredients and the recipe&nbsp;<SPAN><span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:">😄</span></SPAN></P><P>Ingredients, you're going to need:</P><P style=" padding-left : 30px; ">Data Source(s) eg</P><P style=" padding-left : 60px; ">S/4HANA and others</P><P style=" padding-left : 30px; ">Enterprise AI Product</P><P style=" padding-left : 60px; "><A href="https://help.sap.com/doc/c31b38b32a5d4e07a4488cb0f8bb55d9/CLOUD/en-US/f17fa8568d0448c685f2a0301061a6ee.pdf" target="_self" rel="noopener noreferrer">SAP AI Core</A></P><P style=" padding-left : 60px; "><A href="https://help.sap.com/doc/5945759df2d34b69b681c53bb2dd7b9f/CLOUD/en-US/038a6194f65c4ef68885f6f16360dbc4.pdf" target="_self" rel="noopener noreferrer">SAP AI Launchpad</A></P><P style=" padding-left : 30px; ">Large Storage for Large Data and the Enterprise Blockchain Wallet</P><P style=" padding-left : 60px; "><A href="https://www.sap.com/norway/products/technology-platform/hana/features/cloud-data-lake.html" target="_self" rel="noopener noreferrer">SAP HANA Cloud (Data Lake)</A></P><P style=" padding-left : 30px; ">Enterprise Blockchain Platform</P><P>These are the basic ingredients, the data from the S/4HANA will be stored in the <A href="https://www.sap.com/norway/products/technology-platform/hana/features/cloud-data-lake.html" target="_self" rel="noopener noreferrer">SAP HANA Cloud</A> (Data Lake) which will also be the Enterprise Blockchain Platform (configurable) Wallet, the Enterprise Blockchain Platform, and then <A href="https://help.sap.com/doc/c31b38b32a5d4e07a4488cb0f8bb55d9/CLOUD/en-US/f17fa8568d0448c685f2a0301061a6ee.pdf" target="_self" rel="noopener noreferrer">SAP AI Core</A> to read the Data from the (SAP HANA Cloud - Data Lake) Enterprise Blockchain Platform Wallet and process it through Enterprise AI and turn it in to insights through the <A href="https://help.sap.com/doc/5945759df2d34b69b681c53bb2dd7b9f/CLOUD/en-US/038a6194f65c4ef68885f6f16360dbc4.pdf" target="_self" rel="noopener noreferrer">SAP AI Launchpad</A>.</P><P>And your Technical Reference Architecture will look something like this:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP AI Core SAP S4HANA SAP AI Launchpad SAP HANA Cloud Data Lake Enterprise Blockchain Protection - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94128i8A1CC7D8101AFD06/image-size/large?v=v2&amp;px=999" role="button" title="SAP AI Core SAP S4HANA SAP AI Launchpad SAP HANA Cloud Data Lake Enterprise Blockchain Protection - atkrypto.io .jpg" alt="SAP AI Core SAP S4HANA SAP AI Launchpad SAP HANA Cloud Data Lake Enterprise Blockchain Protection - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP AI Core SAP S4HANA SAP AI Launchpad SAP HANA Cloud Data Lake Enterprise Blockchain Protection - atkrypto.io</span></span></P><P>&nbsp;</P><P>And that's how you do it.</P><P>Wrapping up, conclusions:</P><P>&nbsp;</P><P style=" padding-left : 30px; "><STRONG>. Trustable Enterprise AI depends on Data being stored in the Enterprise Blockchain</STRONG></P><P style=" padding-left : 30px; ">&nbsp;</P><P><STRONG>Enterprise Blockchain is:</STRONG></P><P style=" padding-left : 30px; "><EM><STRONG>. </STRONG></EM><STRONG>The Digital Transformation of Information Security&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>. The Next Generation Data Integrity, Originality, Confidentiality Protection</STRONG></P><P style=" padding-left : 30px; "><STRONG>. Re-imagining Information Security</STRONG></P><P style=" padding-left : 30px; "><STRONG>. Natively, out of the box, due to its special characteristics the strongest, hardest, most resilient Enterprise Database product&nbsp;</STRONG></P><P style=" padding-left : 30px; ">&nbsp;</P><P><STRONG>Enterprise Blockchain is both:</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Store</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Communication Channel</STRONG></P><P>&nbsp;</P><P><STRONG>The configurable Enterprise Blockchain Wallet enables you to store Big Data 'Off-Chain' and the hashes of the Big Data are stored safely and securely on the Enterprise Blockchain Database.</STRONG></P><P>&nbsp;</P><P>The good news is, as we discussed in the previous blog, this is no longer hype, we can do all of this today,<SPAN>&nbsp;</SPAN><SPAN>and now, within the&nbsp;</SPAN><A href="https://www.sap.com/norway/partners/partner-program/build.html" target="_self" rel="noopener noreferrer">SAP Partner Edge Open EcoSystem</A><SPAN>&nbsp;there are enabling technology Blockchain Products designed and built by SAP Experts specifically for the needs of SAP Customers to make doing Blockchain and SAP easy, and so you can do SAP and Blockchain, today it's real and there's nothing stopping you.</SPAN></P><P>So what are we waiting for ? Oh yeah, more use cases, ok, that will be the next blog.&nbsp;</P><P><SPAN>What do you think, are the words AI, Blockchain, Web3, Distributed Ledger Technology, starting to appear in your Company's visions and technology visions ? What use cases are you looking at ? Let's chat about it in the comments.</SPAN></P><P>For now, over and out.</P><P>Andy Silvey.</P><P>Independent SAP Technical Architect and CEO of atkrypto.io</P><P>Author Bio:</P><P>Andy Silvey is a 25 years SAP Technology veteran&nbsp;[<EM>15 years SAP Basis and 10 years SAP Tech Arch including Tech, Integration, Security, Data from 3.1H to S/4HANA PCE on RISE and the BTP and everything in between, and<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/welcome-corner-blog-posts/andy-silvey-scn-moderator-spotlight/ba-p/13054438" target="_self">former SCN Moderator and Mentor alumni</A>].</EM></P><P>Andy is also co-Founder of atkrypto inc, an startup whose ambition is to make Blockchain easy for Enterprise.</P><P>atkrypto.io's flagship product is the atkrypto Enterprise Blockchain Platform for SAP,&nbsp; and atkrypto.io is a SAP Partner Edge Open EcoSystem Partner.&nbsp;</P><P>The&nbsp;atkrypto Enterprise Blockchain Platform for SAP has been designed by SAP Independent Experts for the needs of SAP Customers and to be deployed on the SAP BTP Kyma Runtime Service and leverage native integration to SAP Products.</P><P>atkrypto&nbsp;Enterprise Blockchain Platform for SAP has a number of unique qualities, including being the only Blockchain software in the world which has a DataCenter version and a light mobile version which can run on Edge/IoT/Mobile devices and enables data to be written to the Blockchain at the Edge where that same Blockchain is running on a Server in the DataCenter, protecting the integrity and originality of data from the Edge to Insights. Taking Blockchain to the Data at the Edge instead of taking the Data to the Blockchain.</P> 2024-04-11T12:51:09.466000+02:00 https://community.sap.com/t5/security-and-compliance-blogs/agile-secure-and-compliant-business-operations-through-resilience/ba-p/13671489 Agile, Secure, and Compliant Business Operations Through Resilience 2024-04-16T00:52:00.653000+02:00 DebDrechsel https://community.sap.com/t5/user/viewprofilepage/user-id/1439664 <P style=" text-align: center; "><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="succulents-banner.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/96839i44486E55D8C64555/image-size/large?v=v2&amp;px=999" role="button" title="succulents-banner.png" alt="succulents-banner.png" /></span><EM>Succulents are highly resilient plants growing in arid areas with low rainfall. They soak up and retain water to get through dry seasons. They can survive even on mist and dew.</EM></P><P><EM>By Deb Drechsel, Global Head of Employee Awareness &amp; Enablement, Global Physical Security and Jay Thoden van Velzen, Office of the CSO, SAP Global Security &amp; Cloud Compliance</EM></P><P>Recently, Anahita Thoms and Thomas Saueressig published an article on SAP News that strongly resonated. It asked the question, <A href="https://news.sap.com/2024/01/is-supply-chain-innovation-possible-era-tighter-regulation/" target="_blank" rel="noopener noreferrer">is supply chain innovation even possible in an era of tighter regulation?</A>&nbsp;The article begins:</P><P style=" padding-left : 30px; ">The world is experiencing a new, tougher business environment. Trade tensions, wars, climate change, and countless other disruptions are putting the brakes on a long and steady period of globalization. Given this growing uncertainty, companies must reconfigure global supply chains to improve their resilience.</P><P style=" padding-left : 30px; ">Business leaders might assume that more regulation in such a volatile environment would hinder the innovation they require most at this time. However, we will argue smart and balanced regulation can serve as a catalyst for transformation.</P><P>While the article is clearly written from the perspective of how SAP solutions can help customers weather these challenges, SAP as a global software and cloud service provider must do the same.</P><P>&nbsp;</P><H1 id="toc-hId-863413192">Resilience</H1><P>The resilient survive, not necessarily the strongest. The resilient know how to withstand and recover from adverse situations, or even thrive during rapid change.&nbsp;<A href="https://www.nature.com/articles/s41586-022-04446-1" target="_blank" rel="noopener nofollow noreferrer">Birds and mammals made it through the asteroid impact 66 million years ago</A>. The (non-avian) dinosaurs didn’t. Darwin’s “survival of the fittest” means being better adapted to one’s immediate local environment. When that environment is changing, the fittest are those that are most <EM>adaptable</EM>. That is, those that are most resilient.</P><P>Whether in business and technology operations or in physical- and cybersecurity, resilience is increasingly a factor. Business faces an uncertain business, geopolitical, regulatory, and environmental climate. The technology cycle has sped up, and on demand cloud infrastructure and cloud-native practices like Site Reliability Engineering (SRE) stress always-on service operations.</P><P>The rise in cyber threats, in particular ransomware, is focusing security teams on detection, response, and recovery, not just on protection. The impact of security incidents drives an increase in security-related regulation. The influence of DevOps and SRE is <A href="https://community.sap.com/t5/financial-management-blogs-by-sap/security-chaos-engineering-and-security-engineering-amid-chaos-cloud-native/ba-p/13554612" target="_blank">driving innovation in cloud-native security practices</A> to scale security and compliance in cloud services.</P><P>In SAP, cybersecurity and physical security risks are managed by SAP Global Security &amp; Cloud Compliance, with the support of colleagues throughout the organization in various technology and business functions. The Global Physical Security team is focused on staying resilient in our organization’s ability to withstand and recover from physical attacks, cyber incidents, or natural disasters. They monitor the ever-changing global threat landscape and associated risks and adjust our strategy accordingly. The measures taken to protect physical assets, people, and unauthorized access require maintaining as well as growing a resilient mindset from our organization and all security professionals.</P><P>When business, technology, cyber and physical resilience align and interact – as they must, to be truly resilient – we start to see overlaps, as in the Venn diagram below. It is in these petal-shape intersections that we find opportunity. But these petals are also where gaps will appear if they are not managed well and that could make the organization vulnerable.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="resilience-flower.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/96846i83C97BB7E48D63EB/image-size/medium?v=v2&amp;px=400" role="button" title="resilience-flower.png" alt="resilience-flower.png" /></span></P><P style=" text-align: center; "><EM>Resilience “Flower” Venn diagram of intersecting resilience petals</EM>&nbsp;</P><H2 id="toc-hId-795982406">Geopolitical and Climate Risks</H2><P>Business models, operations and supply chains are realigning due to the impact of trade wars and sanctions, environmental disasters and climate change, and military conflicts and political instability. Organizations may be directly affected, or indirectly through delayed delivery times or higher insurance costs. Increased regulation and reporting requirements, as mentioned in the SAP News article linked above, add an additional burden to navigate.</P><P>Protests and civic activism can add another dimension. That also goes for cloud service providers. For instance, there is growing resistance to additional data centers due to concerns regarding the environmental impact of new data centers (<A href="https://www.reuters.com/world/americas/chile-partially-pulls-google-data-center-permit-seeks-tougher-environmental-2024-02-27/" target="_blank" rel="noopener nofollow noreferrer">Chile</A>, <A href="https://www.commondreams.org/opinion/sines-4-0-data-center-portugal" target="_blank" rel="noopener nofollow noreferrer">Portugal</A>, <A href="https://www.gtlaw.com/en/insights/2024/3/challenges-in-the-dutch-data-center-market" target="_blank" rel="noopener nofollow noreferrer">The Netherlands</A>). Data centers consume much power and water, and that is only going to increase with the growth in the use of cloud services and AI.</P><H2 id="toc-hId-599468901">Business Agility and Continuity</H2><P>The intersection between business and technology is how technology enables the business to respond to these geopolitical and climate risks, as well as business, financial and market risks. Technology resilience is required for business continuity – that is, keeping the lights on and recover quickly. Cloud services and cloud-native technologies such as Kubernetes have made “always-on” models viable, as well as systems that scale with demand.</P><P>Technology resilience is also required to support the necessary business agility. That means that the technology should continuously renew and be adaptable to the needs of the business, rather than hold the organization back through legacy systems and processes. Technology must be an enabler of business resilience. Business AI will contribute to that.</P><H2 id="toc-hId-402955396">Security and Compliance Risks</H2><P>Cybersecurity teams set policies and provide governance, but IT operations and DevOps teams must configure and operate systems according to those policies and bring them in compliance. The intersection between technology and cyber is therefore where most of the security and compliance risks lie. The gap between security requirements and the execution to those requirements is where both adversaries and auditors cause you unpleasant surprises.</P><P>DevSecOps and good Software Development Lifecycle (SDOL) practices, Continuous Integration/Continuous Delivery (CI/CD) pipelines, <A href="https://community.sap.com/t5/security-and-compliance-blogs/how-sap-automates-security-scanning-and-alerting-on-over-6-000-aws-accounts/ba-p/13629418" target="_blank">enforced cloud guardrails and landscape scanning</A> all help keep that security and compliance gap small and raise resilience, without impeding the agility of technical teams.</P><P>Among the main areas of business, technology, cybersecurity and physical security, cybersecurity is the least mature. <A href="https://community.sap.com/t5/security-and-compliance-blogs/cyber-resilience-and-cloud-transformation-resolving-the-erp-security/ba-p/13625662" target="_blank">Cybersecurity leaders often still stress defense over resilience.</A> Often repeated dogmas like “Defenders have to be right all the time, attackers only once” illustrate this, as opposed to an approach that assumes breach and focuses on detection, response, and recovery.</P><P>The rise in ransomware attacks with business impact (in terms of possible ransoms paid, loss of business, and response and recovery costs) indicates that the networks of many organizations are vulnerable. <A href="https://community.sap.com/t5/security-and-compliance-blogs/effective-measures-to-defend-against-common-cloud-threats/ba-p/13625687" target="_blank">Recent reports show</A> that is also the case for cloud landscapes. Software supply chain attacks like <A href="https://www.gao.gov/blog/solarwinds-cyberattack-demands-significant-federal-and-private-sector-response-infographic" target="_blank" rel="noopener nofollow noreferrer">the Solarwinds incident</A> pose further challenges. In reaction, governments globally are intervening with stricter regulation and are pushing more responsibility on critical infrastructure and technology providers to have processes in place to meet security baselines.</P><H2 id="toc-hId-206441891">Cyber Physical Risks</H2><P>The cyber-physical petal is another intersection that could jeopardize the resilience of an organization. A classic XKCD illustration (<A href="https://xkcd.com/538/" target="_blank" rel="noopener nofollow noreferrer">538</A>) shows the limits of cybersecurity controls in the face of physical threats. Leaked and stolen credentials are a known issue in cybersecurity. But Multi Factor Authentication (MFA) will not protect you if a sufficiently motivated adversary forces an employee into collaboration.</P><P>Any organization with remote and office workers, and traveling executives and representatives, must consider the cybersecurity downstream effects from any physical security incidents, besides the immediate safety of those employees. Meanwhile, in the current age of virtual job interviews, hiring managers must guard against bringing adversaries into their organizations. If they don’t, they may inadvertently <A href="https://www.reuters.com/technology/north-koreans-use-fake-names-scripts-land-remote-it-work-cash-2023-11-21/" target="_blank" rel="noopener nofollow noreferrer">support a sanctioned regime</A>.</P><P>Cybersecurity incidents in critical infrastructure and critical business systems have caused disruption of operations in <A href="https://www.techtarget.com/searchsecurity/news/366554695/MGM-faces-100M-loss-from-ransomware-attack" target="_blank" rel="noopener nofollow noreferrer">resorts</A>, <A href="https://www.nbcdfw.com/news/local/dallas-pays-millions-for-ransomware-expenses-after-may-attack/3313643/" target="_blank" rel="noopener nofollow noreferrer">cities</A>, <A href="https://healthitsecurity.com/news/change-healthcare-disconnects-system-amid-cyberattack" target="_blank" rel="noopener nofollow noreferrer">healthcare</A>, <A href="https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/" target="_blank" rel="noopener nofollow noreferrer">fuel distribution</A>, and <A href="https://www.csoonline.com/article/567845/rebuilding-after-notpetya-how-maersk-moved-forward.html" target="_blank" rel="noopener nofollow noreferrer">global shipping</A>. These cases show how critical resilience is in providing organizations options on how to respond and recover.</P><P>&nbsp;</P><H1 id="toc-hId--119154333">Agile, Secure and Compliant Business Operations</H1><P>As we have seen, technology, cybersecurity and physical security need to act in concert to support the business to survive and thrive in the current business climate. Cloud Infrastructure-as-a-Service (IaaS) is often chosen for the agility and flexibility to scale up as well as down as needed. IaaS providers have engineered resilience into their cloud platforms, which enables their customers to configure their systems as they require. While this increases agility, it also adds the complexity of cloud infrastructure configuration in addition to managing the workloads and applications.</P><P>With Software-as-a-Service (SaaS) providers that complexity for customers is reduced to the management of the applications only. The rise of enterprise SaaS providers as documented in <A href="https://accelerationeconomy.com/category/cloud-wars/" target="_blank" rel="noopener nofollow noreferrer">Acceleration Economy’s Cloud Wars</A> suggests that customers are increasingly comfortable moving to cloud services higher up the stack.</P><P>Like all organizations, cloud service providers must be resilient. Unlike their customers, they have the benefit of what Phil Venables, CISO of Google Cloud, has called the <A href="https://cloud.google.com/blog/products/identity-security/8-megatrends-drive-cloud-adoption-and-improve-security-for-all" target="_blank" rel="noopener nofollow noreferrer">'decreasing marginal cost of security’</A>. Cloud service providers can scale the cost of security and compliance controls across many landscapes and customers, and therefore can afford larger teams, and manage a broader spectrum of threats and global regulations. That also applies to SAP.</P><P>However, as a technology and service provider of enterprise business solutions, SAP is uniquely positioned among cloud companies to enable agile, secure, and compliant business operations as well as business resilience. SAP supports customers with their geopolitical and climate risks, business agility and continuity, security and compliance risks, and cyber physical risks through both its solution portfolio of applications and its cloud services operations.</P><P>Necessity is the mother of invention, as SAP experienced itself in its ongoing cloud transformation. Growing uncertainty and regulation can be a catalyst for transformation, as the <A href="https://news.sap.com/2024/01/is-supply-chain-innovation-possible-era-tighter-regulation/" target="_blank" rel="noopener noreferrer">SAP News article argues</A> we began with. That article ends with three customer examples:</P><P style=" padding-left : 30px; ">Necessity often drives innovation, leading companies to invest in advanced technologies […]. Unilever’s commitment to traceability and transparency in its global palm oil supply chain demonstrates how compliance acts as a transformative force. Nestlé’s embrace of technology illustrates how businesses can enhance transparency, and resiliency, while ensuring compliance with evolving standards. And Grupo Nutresa’s procurement transformation shows how it’s possible to deliver efficiencies and generate more value while doubling down on sustainability with trading partners.</P><P>SAP is honored to support customers such as these in their cloud transformation and journey towards greater resilience.</P> 2024-04-16T00:52:00.653000+02:00 https://community.sap.com/t5/security-and-compliance-blogs/what-will-sap-basis-administrators-do-once-we-move-to-rise-thoughts/ba-p/13676583 “What Will SAP Basis Administrators Do Once We Move to RISE?” – Thoughts Following SAPinsider 2024 2024-04-20T00:01:08.232000+02:00 JayThvV https://community.sap.com/t5/user/viewprofilepage/user-id/160843 <P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="las-vegas-moon.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99116i08178774ED1FE817/image-size/large?v=v2&amp;px=999" role="button" title="las-vegas-moon.png" alt="las-vegas-moon.png" /></span></P><P><EM>By Jay Thoden van Velzen, Technical Advisor, Office of the CSO</EM></P><P>SAPinsider 2024 Las Vegas completed my world tour of similar events after <A href="https://www.linkedin.com/pulse/cyber-physical-clouds-risks-resiliency-real-world-thoden-van-velzen/" target="_blank" rel="noopener nofollow noreferrer">Melbourne</A> and <A href="https://community.sap.com/t5/technology-blogs-by-sap/dark-clouds-over-old-europe-impressions-from-sapinsider-emea-2023/ba-p/13573027" target="_blank">Copenhagen</A>, giving me a priceless opportunity to hear from customers in three very different regions. In Australia, many customers were already committed to the cloud and just wanted to make sure SAP understood the importance to their business we got it right. In Europe, many customers were more comfortable staying on-premise. In America, customers wanted to understand RISE with SAP S/4HANA Cloud (RISE) better but were clearly considering the option.</P><P>One customer question kept coming up in Las Vegas in both conference sessions and on the exhibition show floor: “What will SAP Basis administrators do after our organization moves to RISE?”. The short answer to that is “higher value activities”. &nbsp;</P><P>The question raised makes sense, when many responsibilities previously covered by Basis administrators or consultants in RISE are taken care of by the cloud provider. But since it is a trope in the cybersecurity profession that regardless how well we do, we’re never done, it is worth exploring the question further. <A href="https://community.sap.com/t5/security-and-compliance-blogs/cyber-resilience-and-cloud-transformation-resolving-the-erp-security/ba-p/13625662" target="_blank">Many on-premise ERP teams are struggling to keep up with complex landscapes</A>. A move to RISE frees teams up for tasks that they couldn’t get to before.</P><P>&nbsp;</P><H1 id="toc-hId-863563102">Remaining Responsibilities</H1><P>It is important to remember, though, that depending on your chosen edition and selected options, customers still must manage several remaining responsibilities. The <A href="https://www.sap.com/about/agreements/policies/hec-services.html?sort=latest_desc&amp;pdf-asset=445e20f9-387e-0010-bca6-c68f7e60039b&amp;page=2" target="_blank" rel="noopener noreferrer">RISE with SAP S/4HANA Cloud, private edition and SAP ERP, PCE Roles and Responsibilities</A> document specifies clearly which services are standard, which are excluded and which are optional or additional services customers can choose to perform or have SAP manage for them. These services are broken down in five different categories.</P><P style=" text-align: center; "><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="RISE-PCE-SERVICES-DEFINITION.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99125i6C6DC2FAEAA3176E/image-size/large?v=v2&amp;px=999" role="button" title="RISE-PCE-SERVICES-DEFINITION.png" alt="RISE-PCE-SERVICES-DEFINITION.png" /></span><EM>Classification of five categories of services and responsibilities for RISE with SAP S/4HANA Cloud, private edition</EM></P><P>While many infrastructure tasks are done by SAP, the administration, security, and compliance of the ERP system itself, including roles and authorizations, or implemented business processes remain with the customer. That also extends to other cloud services. The <A href="https://www.sap.com/about/trust-center/security.html?pdf-asset=7616adbb-547e-0010-bca6-c68f7e60039b&amp;page=2" target="_blank" rel="noopener noreferrer">Recommended Security Configurations for SAP Cloud Services</A> lists security recommendations guides for many SaaS cloud services for the parts that customers must manage.</P><H1 id="toc-hId-667049597">&nbsp;</H1><H1 id="toc-hId-470536092">Governance, Risk and Compliance</H1><P>Beyond system administration, the next layer up the value chain is in the area broadly covered by <A href="https://www.sap.com/products/financial-management/grc.html" target="_blank" rel="noopener noreferrer">SAP’s Governance, Risk and Compliance (GRC) portfolio</A> as well as partner offerings in the space. This also includes identity and access management, fraud detection, and process compliance. An increase in cybersecurity and data privacy regulations, as well as trade regulations and sanctions, make this topic of growing importance. And that further extends into <A href="https://www.sap.com/products/scm/sustainability-control-tower.html" target="_blank" rel="noopener noreferrer">Environmental, Social and Governance (ESG) management</A>.</P><P>The rise of Business Artificial Intelligence only further increases the need for governance around data residency, data privacy, and security compliance regulations to ensure that data is only stored and accessed for the right purpose by the right people.</P><P>GRC is often the first step for customers towards SAP security and compliance beyond system administration. We can go a lot further.</P><H1 id="toc-hId-274022587">&nbsp;</H1><H1 id="toc-hId-77509082">Integration and Extension Security</H1><P>Custom code isn’t going away but is done differently in the cloud. To ensure that systems stay agile and can be more easily kept up to date, the first responsibility for SAP Basis administrators is to keep the core clean. They must also manage secure and compliant processes for integrations and extensions developed on the Business Transformation Platform (BTP).</P><P>The security of BTP extensions includes authentication and authorizations across integrated systems, with SAP or third-party solutions. It also includes threat modeling, code scanning, governance of code repositories, version control, testing, and deployment controls. That is, all the aspects of secure software development and operations lifecycles (SDOL).</P><P>Many security incidents exactly exploit weaknesses in the boundaries between systems. Threat modeling for that reason explicitly focuses on risks associated with such security scope boundaries. In a cloud landscape, that especially focuses on authentication, authorizations, and Application Programming Interface (API) security to ensure that integrations are done on a least-privilege basis, and don’t inadvertently break authorization concepts or data residency and privacy requirements. Code repositories must be governed by oversight through pull requests and code checks, as well as code reviews before being merged into a main development branch and deployed.</P><P>Such processes may already be in place in your organization for in-house software development. But it should be easier than ever to align them to an SAP cloud environment than with on-premise ABAP code and transports in its own separate world. This will help improve dialogue with your cybersecurity teams.</P><H1 id="toc-hId--119004423">&nbsp;</H1><H1 id="toc-hId--315517928">Threat Detection</H1><P>Such a dialogue is important as <A href="https://community.sap.com/t5/security-and-compliance-blogs/cyber-resilience-and-cloud-transformation-resolving-the-erp-security/ba-p/13625662" target="_blank">often cybersecurity and SAP teams are not on the best of terms</A>. Only in rare cases have customers integrated threat detection for SAP systems into their broader cybersecurity threat detection processes, and many have little time for threat detection even among SAP Basis administrators. <A href="https://www.sap.com/products/financial-management/enterprise-threat-detection.html" target="_blank" rel="noopener noreferrer">SAP</A> and <A href="https://store.sap.com/dcp/en/search/threat%20detection?query=threat%20detection:relevance:useCases:SAP%20Product:useCases:Partner%20Product&amp;currentPage=0" target="_blank" rel="noopener noreferrer">the partner ecosystem</A> provide solutions in this space, but these are not adopted universally. Integration of SAP logs and alerts into Security Incident and Event Management (SIEM) solutions or security data lakes with effective detections built on top of them that engage their Security Operations Center (SOC) is even less common.</P><P>Phishing or credential compromise detection and the SOC raises an alert, this provides a lead for SAP Basis administrators to hunt down associated threats in their ERP systems. However, this one-way threat detection doesn’t help against threats that originate in the SAP system, involve an insider threat, or abuse credentials deliberately to target customer SAP cloud solutions. The infrastructure is monitored by SAP, but threat detection within the application itself is customer responsibility and SAP cloud operations teams do not have visibility, access, or context at that level.</P><P>For that, organizations need a bi-directional information flow, where SAP Basis administrators provide the domain expertise as cybersecurity teams generally have no familiarity with the solutions. SAP Basis administrators are best equipped to find out whether something in the landscape is not right and understand the potential impact.</P><H1 id="toc-hId--512031433">&nbsp;</H1><H1 id="toc-hId--708544938">Respond and Recover</H1><P>The domain expertise of SAP Basis administrators in security incidents is similarly important – if only to prevent the response to the incident to be less disruptive than the incident itself. A natural reaction from the SOC would be to contain the incident and reimage the landscape, as they would with laptops and phones, or servers and cloud infrastructure.</P><P>But an attacker <EM>inside </EM>an SAP solution itself, manifest itself through a high-privileged user or service account. Such privileges and authorizations are part of the metadata of the application. Customers can certainly request restoration of systems from backups as part of their cloud service contract. But depending on how quickly it took to detect the intrusion, a system recovery could restore the access of the malicious actor, while causing significant business disruption.</P><P>SAP Basis teams may have incident response plans for system outages, but these must be accompanied with run books for security incident response. There must be agreed plans and roles and responsibilities defined between the SAP Basis and SOC teams. Threshold levels that match the priority and severity of the incident with the business impact of containment and response measures must be agreed with organizational stakeholders.</P><P>Then these run books must be practiced and trained by SOC and SAP Basis teams during tabletop exercises, fire drills, and red teaming. Security incidents in SAP systems are bound to be rare – compared to phishing or social engineering attacks, for instance. An active incident is the wrong time to find out that you don’t have the right authorizations or business mandate to act or are forced to make decisions that affect business operations in the heat of the moment and under pressure.</P><H1 id="toc-hId--905058443">&nbsp;</H1><H1 id="toc-hId--331831865">From System Administration to Managing Security and Compliance</H1><P>Cybersecurity (or information security, depending on one’s career trajectory) grew out of infrastructure, network, and system integration into its own practice of managing security and compliance risks. Identity and Access Management (IAM) or vulnerability management are commonly understood to be cybersecurity disciplines. In an SAP context, these are seen as SAP Basis administration activities.</P><P>With common infrastructure tasks disappearing with RISE with SAP S/4HANA Cloud, SAP Basis can evolve into managing the security and compliance risks of SAP cloud solutions. Since&nbsp;cybersecurity teams don't have the SAP expertise, SAP Basis administrators are the prime candidates to make their organizations more resilient against security and compliance threats.</P><H1 id="toc-hId--528345370">&nbsp;</H1><H1 id="toc-hId--724858875">More Information</H1><UL><LI><A href="https://www.sap.com/about/agreements/policies/hec-services.html?sort=latest_desc&amp;pdf-asset=445e20f9-387e-0010-bca6-c68f7e60039b&amp;page=2" target="_blank" rel="noopener noreferrer">RISE with SAP S/4HANA Cloud, private edition and SAP ERP, PCE Roles and Responsibilities</A></LI><LI><A href="https://www.sap.com/about/trust-center/security.html?pdf-asset=7616adbb-547e-0010-bca6-c68f7e60039b&amp;page=2" target="_blank" rel="noopener noreferrer">Recommended Security Configurations for SAP Cloud Services</A></LI><LI><A href="https://www.sap.com/products/financial-management/grc.html" target="_blank" rel="noopener noreferrer">SAP’s Governance, Risk and Compliance (GRC) portfolio</A></LI><LI><A href="https://community.sap.com/t5/security-and-compliance-blogs/cyber-resilience-and-cloud-transformation-resolving-the-erp-security/ba-p/13625662" target="_blank">Cyber Resilience and Cloud Transformation: Resolving the ERP Security Hamster Wheel</A></LI><LI><A href="https://community.sap.com/t5/security-and-compliance-blogs/agile-secure-and-compliant-business-operations-through-resilience/ba-p/13671489" target="_self">Agile, Secure, and Compliant Business Operations Through Resilience</A></LI></UL> 2024-04-20T00:01:08.232000+02:00 https://community.sap.com/t5/technology-blogs-by-members/iot-ultimate-data-cyber-security-with-enterprise-blockchain-and-sap-btp/ba-p/13676981 IoT - Ultimate Data Cyber Security - with Enterprise Blockchain and SAP BTP 🚀 2024-04-22T11:07:39.454000+02:00 AndySilvey https://community.sap.com/t5/user/viewprofilepage/user-id/1397601 <P>It wasn't that long ago that Cyber Security and Resilience translated to High Availability and Disaster Recovery. Driven by the Sensitivity, Confidentiality, and Availability requirements of the Data, Systems and Applications were built to have the highest possible availability. That requirement came from the times when an entire end to end Business Process ran in a single standalone Application.</P><P>Fast forward to today, end to end Business Processes can begin in one Application on one side of the world and pass through Applications somewhere else in the world and finish in Applications in an altogether different location in the world. The beginning of the Business Process can be Sensors and Things at the Edge, producing Data, Events, something has happened and triggered the Business Process.</P><P>&nbsp;</P><P><STRONG>This creates several problems</STRONG>:</P><P style=" padding-left : 30px; "><STRONG>Protect the Originality &amp; Integrity of the Data</STRONG> - When the Thing, the IoT Sensor, let's say critical infrastructure, something like a Base Station in a Telco Network, or a piece of the Electrical Grid for a Utility Company, when the Thing, the IoT Sensor creates the&nbsp; piece of Data, a Record of something that just happened we need to make sure that piece of Data cannot be modified or destroyed and therefore protect the originality and integrity of the Data</P><P style=" padding-left : 30px; "><STRONG>Moving the Data from the Edge to the SAP Application in the Cloud or DataCenter and at the same time&nbsp;Protect the Originality &amp; Integrity of the Data</STRONG> - we need to get the Data from the Thing, the IoT Sensor, to the SAP Application in the Cloud or DataCenter and we need to be sure, to have surety that the Data which arrives in the SAP Cloud or DataCenter is exactly the same Data that was created at the Edge at the Thing, the IoT Sensor. If this Data gets changed in any way, we won't be able to <EM><STRONG>trust</STRONG></EM> the Business Processes and Insights which are depending on that Data. And so, in the activity of moving the Data we need to make sure that that piece of Data cannot be modified or destroyed&nbsp;and therefore protect the originality and integrity of the Data</P><P>And so, here we are, the biggest threat to Enterprise SAP Applications is no longer the High Availability, the Server crashing, that's all under control and possible to take care of,&nbsp;</P><P style=" padding-left : 30px; "><STRONG>The biggest threat to IoT &amp; Enterprise SAP Applications is Cyber Security and Cyber Attacks</STRONG></P><P>A common thought is that a hacker, or cyber attacker wants to modify Data for their own financial benefit, for example change the destination bank account number for invoice payments, yes those threats are still there, but biggest threat is that a hacker or cyber attacker deletes or modifies Master and Transaction Data resulting that the Master and Transactional Data does not have integrity and cannot be used, and if the attacker succeeded to modify the Backup as well, then&nbsp; the Enterprise could be out of business for a long time trying to pick up the pieces and get up and running again.</P><P style=" padding-left : 30px; "><STRONG>The biggest threat to IoT &amp; Enterprise SAP Applications is Cyber Attacks rendering the Master and Transaction Data un-trustworthy</STRONG></P><P>And that's where the Enterprise Blockchain comes in, and this blog is going to explain why.</P><P>Ok let's go<span class="lia-unicode-emoji" title=":rocket:">🚀</span></P><P>Welcome to the eighth blog in this series on Enterprise Blockchain and SAP. If you have been following the previous blogs then you'll be familiar with the blog template. We'll begin by talking about and framing the problem, in this case <EM>Data Cyber Security for IoT and SAP</EM> and then go in to identifying the enabling technology which will have the best capabilities and be the most appropriate to solving the problem all the way through to the reference solution architecture to be able to implement the solution.</P><P>The blog is going to break the subject down in to three sections:</P><P style=" padding-left : 30px; "><STRONG>Section 1.0: The What is it of IoT &amp; SAP, and Enterprise Blockchain&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Section 2.0: The Why is it, of IoT &amp; SAP, and Enterprise Blockchain&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Section 3.0: The How is it,&nbsp;of IoT &amp; SAP, and Enterprise Blockchain</STRONG></P><P><STRONG>tl:dr</STRONG></P><P>If you want to protect the originality and integrity and confidentiality of IoT data, from the Edge to Insights and SAP Business Processes, then the answer is an Enterprise Blockchain Database, where the Enterprise Blockchain Tenants are running on Edge Hosts/Servers and in the SAP BTP Business Technology Platform, enabling Enterprise Blockchain Database to protect the Data from the Edge Hosts/Servers to the SAP BTP.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99480iB1B098FECFF5F4B7/image-size/large?v=v2&amp;px=999" role="button" title="IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io .png" alt="IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io</span></span></P><P>&nbsp;</P><P>[<EM>the finer technical details of getting the data from the Enterprise Blockchain to SAP Asset Management and S/4HANA will be <A href="https://community.sap.com/t5/supply-chain-management-blogs-by-sap/best-practices-for-using-current-sap-apm-rules-for-condition-monitoring/bc-p/13673307#M5681" target="_self">clearer possibly</A> after <A href="https://www.sap.com/events/sapphire.html?source=ppc-us-sapphire-splash-promo&amp;campaigncode=crm-ya24-int-2331870&amp;source=ppc-1na-googleads-search-71700000117657864-58700008674879759-xsolutionarea_saf-x-x-aam&amp;gad_source=1&amp;gclid=Cj0KCQjw8pKxBhD_ARIsAPrG45kRZmQXtXaCvFDWwZJlxgsMVyhEEarnGfainO9me0RUrJK4HokVZI0aAqZFEALw_wcB&amp;gclsrc=aw.ds" target="_self" rel="noopener noreferrer">Sapphire Orlando in June</A>. In the mean time there are a number of ways to get the Data in and out of the Enterprise Blockchain running on the SAP BTP Kyma Service</EM>]</P><P><STRONG>Enterprise Blockchain is both:</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Store</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Communication Channel</STRONG></P><P><SPAN><STRONG>Enterprise Blockchain is the Cyber Security for Enterprise IoT Data from the Edge to Insights</STRONG>&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span></SPAN></P><P>&nbsp;</P><P>and now.... the long answer...</P><P>&nbsp;</P><P><STRONG>Section 1.0: The What is it of IoT &amp; SAP, and Enterprise Blockchain&nbsp;</STRONG></P><P><A href="https://www.sap.com/products/artificial-intelligence/what-is-iot.html" target="_self" rel="noopener noreferrer">What is IoT Internet of Things ?</A></P><DIV class=""><DIV class=""><DIV class=""><H2 id="toc-hId-992649663">History of IoT</H2></DIV></DIV></DIV><DIV class=""><DIV class=""><DIV class=""><DIV class=""><DIV><DIV class=""><DIV class=""><DIV class=""><DIV class=""><DIV class=""><P>In 2021, there were over<SPAN>&nbsp;</SPAN><A class="" href="https://dataprot.net/statistics/iot-statistics/#:~:text=In%202021%2C%20there%20were%20more,to%20the%20internet%20per%20minute." target="_blank" rel="noopener noreferrer nofollow">10 billion IoT devices</A><SPAN>&nbsp;</SPAN>in the world, and by 2025, the IDC expects global data generation to exceed<SPAN>&nbsp;</SPAN><A class="" href="https://blogs.idc.com/2021/01/06/future-of-industry-ecosystems-shared-data-and-insights/" target="_blank" rel="noopener noreferrer nofollow">73 zettabytes</A><SPAN>&nbsp;</SPAN>– which is equal to 73 trillion gigabytes. Although we can’t really quantify digital data in physical terms, we can say that if all that data were converted into 1990s floppy disks – and they were laid out end to end – they could go to the moon and back over 5,000 times.</P><P>[Source:&nbsp;<A href="https://www.sap.com/products/artificial-intelligence/what-is-iot.html" target="_blank" rel="noopener noreferrer">What is IoT? The Future of Business | SAP</A>]</P></DIV></DIV></DIV></DIV></DIV></DIV></DIV></DIV></DIV></DIV><P><A href="https://www.sap.com/products/artificial-intelligence/what-is-iot.html" target="_self" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1713698558262.png" style="width: 764px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99481i923459207E9A6CC1/image-dimensions/764x273?v=v2" width="764" height="273" role="button" title="AndySilvey_0-1713698558262.png" alt="AndySilvey_0-1713698558262.png" /></span></A></P><P>&nbsp;</P><H2 id="toc-hId-796136158"><A href="https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-the-internet-of-things" target="_self" rel="nofollow noopener noreferrer">What are some IoT applications?</A></H2><P>Looking at IoT applications, which are sometimes described as use cases, can help ground the discussion about what IoT is. Broadly,<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/the-internet-of-things-the-value-of-digitizing-the-physical-world" target="_blank" rel="noopener nofollow noreferrer">IoT applications occur in one of nine settings</A>.</P><OL><LI><EM>Human health.</EM><SPAN>&nbsp;</SPAN>Devices can be attached to or inserted inside the human body, including wearable or ingestible devices that monitor or<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/featured-insights/the-next-normal/wellness" target="_blank" rel="noopener nofollow noreferrer">maintain health and wellness</A>, assist in managing diseases such as diabetes, and more.</LI><LI><EM>Home.</EM><SPAN>&nbsp;</SPAN>Homeowners can install devices such as home voice assistants,<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/a-smart-home-is-where-the-bot-is" target="_blank" rel="noopener nofollow noreferrer">automated vacuums</A>, or security systems.</LI><LI><EM>Retail environments.</EM><SPAN>&nbsp;</SPAN>Devices can be installed in<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/industries/retail/our-insights/how-tech-will-revolutionize-retail" target="_blank" rel="noopener nofollow noreferrer">stores</A>, banks, restaurants, and arenas to facilitate self-checkout, extend in-store offers, or help optimize inventory.</LI><LI><EM>Offices.</EM><SPAN>&nbsp;</SPAN>IoT applications in offices could entail<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/industries/industrials-and-electronics/our-insights/laying-the-foundation-for-success-in-the-connected-building-era" target="_blank" rel="noopener nofollow noreferrer">energy management</A>&nbsp;or security for buildings.</LI><LI><EM>Standardized production environments.</EM><SPAN>&nbsp;</SPAN>In such settings, including<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/a-manufacturers-guide-to-generating-value-at-scale-with-industrial-iot" target="_blank" rel="noopener nofollow noreferrer">manufacturing plants</A>, hospitals, or farms, IoT applications often aim to gain operating efficiencies or optimize equipment use and inventory.</LI><LI><EM>Custom production environments.</EM><SPAN>&nbsp;</SPAN>In customized settings like those in mining, construction, or oil and gas exploration and production, IoT applications might be used in<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/capabilities/operations/our-insights/a-smarter-way-to-digitize-maintenance-and-reliability" target="_blank" rel="noopener nofollow noreferrer">predictive maintenance</A>&nbsp;or<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/capabilities/people-and-organizational-performance/our-insights/overcoming-limiting-mind-sets-to-improve-safety" target="_blank" rel="noopener nofollow noreferrer">health and safety efforts</A>.</LI><LI><EM>Vehicles.</EM><SPAN>&nbsp;</SPAN>IoT can help with condition-based maintenance, usage-based design, or presales analytics for<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/industries/automotive-and-assembly/our-insights/unlocking-the-full-life-cycle-value-from-connected-car-data" target="_blank" rel="noopener nofollow noreferrer">cars and trucks</A>, ships, airplanes, and trains.</LI><LI><EM>Cities.</EM><SPAN>&nbsp;</SPAN>IoT applications can be used for adaptive traffic control, smart meters, environmental monitoring, or<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/capabilities/quantumblack/our-insights/iot-comes-of-age" target="_blank" rel="noopener nofollow noreferrer">managing resources</A>.</LI><LI><EM>Outside.<SPAN>&nbsp;</SPAN></EM>In urban environments or other outdoor settings, such as railroad tracks, autonomous vehicles, or flight navigation, IoT applications could involve real-time routing, connected navigation, or shipment tracking.</LI></OL><P>Other<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/industries/technology-media-and-telecommunications/our-insights/laying-the-foundation-to-accelerate-the-enterprise-iot-journey" target="_blank" rel="noopener nofollow noreferrer">real-world examples abound</A>. IoT solutions are being used in myriad settings: in refrigerators, to help restaurants optimize their food-compliance processes; in fields, to track livestock; in offices, to track how many and how often meeting rooms are used; and beyond.</P><P>&nbsp;</P><H2 id="toc-hId-599622653"><A href="http://What%20is the economic impact of IoT? The potential value of IoT is large and growing. By 2030, we estimate it could amount to up to $12.5 trillion globally. That includes the value captured by consumers and customers of IoT products and services. The potential economic value of IoT differs based on settings and usages, with factory settings and human health applications representing outsize shares of this total. Factory settings could generate $1.4 trillion to $3.3 trillion by 2030, or just over a quarter of the total value potential. IoT economic impact in human health settings could reach around 14 percent of the total estimated value. Another way of looking at IoT’s value is to explore use-case clusters (similar uses adapted to different settings). Some of the most common use cases account for a sizable share of IoT’s potential economic value: operations optimization, which is basically making the various day-to-day management of assets and people more efficient (41 percent) health (15 percent) human productivity (15 percent) condition-based maintenance (12 percent) Other clusters include sales enablement, energy management, autonomous vehicles (the fastest-growing cluster), and safety and security." target="_self" rel="nofollow noopener noreferrer">What is the economic impact of IoT?</A></H2><P>The potential value of IoT is large and growing.<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/iot-value-set-to-accelerate-through-2030-where-and-how-to-capture-it" target="_blank" rel="noopener nofollow noreferrer">By 2030, we estimate it could amount to up to $12.5 trillion globally</A>. That includes the value captured by consumers and customers of IoT products and services.</P><P>The potential economic value of IoT differs based on settings and usages, with factory settings and human health applications representing outsize shares of this total. Factory settings could generate $1.4 trillion to $3.3 trillion by 2030, or just over a quarter of the total value potential. IoT economic impact in human health settings could reach around 14 percent of the total estimated value.</P><P>Another way of looking at IoT’s value is to explore<SPAN>&nbsp;</SPAN><A href="https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/iot-value-set-to-accelerate-through-2030-where-and-how-to-capture-it" target="_blank" rel="noopener nofollow noreferrer">use-case clusters</A>&nbsp;(similar uses adapted to different settings). Some of the most common use cases account for a sizable share of IoT’s potential economic value:</P><UL><LI>operations optimization, which is basically making the various day-to-day management of assets and people more efficient (41 percent)</LI><LI>health (15 percent)</LI><LI>human productivity (15 percent)</LI><LI>condition-based maintenance (12 percent)</LI></UL><P>Other clusters include sales enablement, energy management, autonomous vehicles (the fastest-growing cluster), and safety and security.</P><P>[Source:&nbsp;&nbsp;<A href="https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-the-internet-of-things" target="_blank" rel="noopener nofollow noreferrer">What is IoT: The Internet of Things explained | McKinsey</A>]</P><P>&nbsp;</P><P><A href="https://www.sap.com/products/artificial-intelligence/what-is-iot.html" target="_self" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1713698788363.png" style="width: 778px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99482iB4EB5AC0112FEAFE/image-dimensions/778x428?v=v2" width="778" height="428" role="button" title="AndySilvey_1-1713698788363.png" alt="AndySilvey_1-1713698788363.png" /></span></A></P><P>&nbsp;</P><P>Like everything else we do in Enterprise IT,</P><P style=" padding-left : 60px; "><EM><STRONG>IoT Internet of Things is about Data</STRONG></EM></P><P>&nbsp;</P><P><EM><A href="https://www.sap.com/products/artificial-intelligence/what-is-blockchain.html" target="_self" rel="noopener noreferrer">What is Enterprise Blockchain ?&nbsp;</A></EM></P><P>Enterprise Blockchain is both:</P><P style=" padding-left : 30px; "><STRONG>. a Secure Store</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Communication Channel</STRONG></P><P><SPAN>McKinsey &amp; Company, in their&nbsp;</SPAN><A href="https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-blockchain" target="_self" rel="nofollow noopener noreferrer">December 2023 Featured Insights Publication</A><SPAN>, gave a beautiful description of what is unique and special about Blockchain, "</SPAN><EM>Blockchain is a secure database shared across a network of participants, where up-to-date information is available to all participants at the same time</EM><SPAN>". If we just pause for a moment and let that sink in, and think about what that means, to Business Processes, to Collaboration, to System Resilience, we start to see what is so special about Blockchain Databases and Distributed Ledger Technology.</SPAN></P><P>In these previous blogs, I made a deep dive in to what Enterprise Blockchain is and why we should be positioning it in our Enterprise Architecture:</P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_blank">Why I love SAP and Blockchain Databases and why you should too<SPAN><span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</SPAN></A></P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_blank">SAP Enterprise Architecture: Positioning Blockchain Database as an Enterprise Technology Standard<SPAN><span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</SPAN></A></P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_blank">SAP Enterprise Architecture: Let the Use Case find the Blockchain <span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IoT Internet of Things and SAP - Enterprise Blockchain is the next generation Data Cyber Security Protection - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99489i784CF7AD0620178E/image-size/large?v=v2&amp;px=999" role="button" title="IoT Internet of Things and SAP - Enterprise Blockchain is the next generation Data Cyber Security Protection - atkrypto.io .png" alt="IoT Internet of Things and SAP - Enterprise Blockchain is the next generation Data Cyber Security Protection - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">IoT Internet of Things and SAP - Enterprise Blockchain is the next generation Data Cyber Security Protection - atkrypto.io</span></span></P><P>&nbsp;</P><P>and in a nutshell, Enterprise Blockchain is:</P><P style=" padding-left : 30px; "><EM><STRONG>. The Digital Transformation of Information Security into Cyber Security</STRONG></EM></P><P style=" padding-left : 30px; "><EM><STRONG>. The Next Generation Data Integrity, Originality, Confidentiality Protection</STRONG></EM></P><P style=" padding-left : 30px; "><STRONG>. Re-imagining Information Security</STRONG></P><P style=" padding-left : 30px; "><STRONG>. Natively, out of the box, due to its special characteristics the strongest, hardest, most resilient Enterprise Database product&nbsp;</STRONG></P><P>To wrap up this section:</P><P style=" padding-left : 30px; ">. Iot Internet of Things is about Data</P><P style=" padding-left : 30px; ">. Enterprise Blockchain is about Cyber Security of Data</P><P>&nbsp;</P><P><STRONG>Section 2.0: The Why is it, of IoT &amp; SAP, and Enterprise Blockchain</STRONG></P><P>So, why does IoT, Internet of Things, in the Enterprise IT, when implemented in conjunction with SAP Applications need Enterprise Blockchain ?</P><P>IoT is about Data, and the Data in most cases originates from the Edge and outlying parts of the Network.</P><P>The problem is the Cyber Security of getting the Data from the Edge and outlying parts of the Network to the safe zones of the SAP Cloud and yours or SAP's DataCenters.</P><P><SPAN>IoT's biggest risk is that the Data coming from the IoT Devices is not trustworthy. In the same way as asking the wrong person for directions can leave you going all around the houses, if the Data coming from the IoT Devices, has been changed/contaminated/modified/poluted/made unreliable, whether purposefully through malicious acts or cyber attack, or accidentally, the result will be IoT's Data insights which cannot be trusted, and the result of that could be catastrophic. Just imagine not being able to trust the temperature of refrigeration during pharmaceutical and food production !</SPAN></P><P>If we cannot protect and the originality and integrity of IoT Data, secure it, then how can we trust IoT Data ?</P><P>As <A href="https://www.mckinsey.com/industries/technology-media-and-telecommunications/our-insights/cybersecurity-for-the-iot-how-trust-can-unlock-value" target="_self" rel="nofollow noopener noreferrer">Mckinsey &amp; Company say</A>:</P><P>&nbsp;</P><P><A href="https://www.mckinsey.com/industries/technology-media-and-telecommunications/our-insights/cybersecurity-for-the-iot-how-trust-can-unlock-value" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1713702593375.png" style="width: 883px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99501i07B879945532E48E/image-dimensions/883x424?v=v2" width="883" height="424" role="button" title="AndySilvey_0-1713702593375.png" alt="AndySilvey_0-1713702593375.png" /></span></A></P><P>&nbsp;</P><P>IoT is about the Data</P><P>So, if we are going to do IoT and include IoT Data in our Business Processes and Insights, then we need to care for and protect the Data that is coming from IoT Devices.</P><P>Imagine, as described in the previous blog, when we<SPAN>&nbsp;</SPAN><EM><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_self">let the Use Case find the Enterprise Blockchain</A></EM>, we have a Business Requirement, a Business Demand, to make IoT Data trustable.</P><P>When we look in our Enterprise Technology Standards, and we look for the Technology Standard in our Enterprise Portfolio which is<SPAN>&nbsp;</SPAN><EM><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">positioned to bring the strongest protection to Data, we find the Enterprise Blockchain</A></EM>.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1713703070065.png" style="width: 826px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99502iC524A0F83A222353/image-dimensions/826x417?v=v2" width="826" height="417" role="button" title="AndySilvey_1-1713703070065.png" alt="AndySilvey_1-1713703070065.png" /></span></P><P><SPAN class=""><SPAN class="">Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io</SPAN></SPAN></P><P>In the previous blogs, we have discussed in detail about the special characteristics of Enterprise Blockchain and just why it natively out of the box protects the integrity of data to a level that legacy database products cannot do, in a nutshell....</P><P><SPAN>IoT is about Data</SPAN></P><P><SPAN>IoT is about the Data that goes in to the SAP Applications in the Cloud and Data Centers</SPAN></P><P><SPAN>This means IoT Device Data depends on a Database or a Datastore</SPAN></P><P><SPAN>What kind of Database do IoT Devices produces ? What capabilities does the Database for the IoT Devices Data need to have ?</SPAN></P><P><SPAN>1. It must not be possible to modify the Data in the Database which comes from the IoT Devices - the Database needs to be immutable</SPAN></P><P><SPAN>2. The Data in the Database, the integrity and originality of that Data must be protected to the highest level that is technically possible</SPAN></P><P><SPAN>3. The Data must be available with the highest availability, the Database must be resilient to attack</SPAN></P><P><SPAN>When we look in our&nbsp;<A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">Enterprise Technology Standards we find 1 Technology Standard</A>&nbsp;in the Enterprise which has those capabilities, and that is..... Enterprise Blockchain</SPAN></P><P><SPAN>Enterprise Blockchain ticks those three boxes...</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_2-1713703204488.png" style="width: 16px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99503iDB4656E3EE6F0658/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="AndySilvey_2-1713703204488.png" alt="AndySilvey_2-1713703204488.png" /></span>&nbsp;<SPAN>Immutable - tick that box</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_2-1713703204488.png" style="width: 16px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99503iDB4656E3EE6F0658/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="AndySilvey_2-1713703204488.png" alt="AndySilvey_2-1713703204488.png" /></span>&nbsp;<SPAN>Integrity must be protected to the highest level - tick that box, thanks to the Enterprise Blockchain Hash Mechanism and the Enterprise Blockchain Consensus Mechanism</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_2-1713703204488.png" style="width: 16px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99503iDB4656E3EE6F0658/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="AndySilvey_2-1713703204488.png" alt="AndySilvey_2-1713703204488.png" /></span>&nbsp;<SPAN>Highest level of resilience and availability - tick that box thanks to the Distributed and Decentralised nature of the Enterprise Blockchain</SPAN></P><P><SPAN>This is why, Enterprise Blockchain is the enabler of trustable outcomes from Enterprise IoT Devices' Data.</SPAN></P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_5-1713703204734.jpeg" style="width: 852px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99506i419C536501B5D416/image-dimensions/852x426?v=v2" width="852" height="426" role="button" title="AndySilvey_5-1713703204734.jpeg" alt="AndySilvey_5-1713703204734.jpeg" /></span></P><P><SPAN class=""><SPAN class="">atkrypto.io what is a blockchain</SPAN></SPAN></P><P>But there's more than that, IoT Devices can produce a lot of data, and the volumes of data can be big.</P><P>And this is why, in this blog we take the Enterprise Blockchain Technology story one level further and we introduce the:</P><P style=" padding-left : 30px; ">Enterprise Blockchain Wallet</P><P style=" padding-left : 30px; ">Off-Chain Data Storage</P><P>In the Enterprise Blockchain Platforms, the Enterprise Blockchain Wallet is used for Off-Chain storage of big data and in the following paragraphs we will explain why.</P><P>What is the Enterprise Blockchain Wallet, and what is Off-Chain Data Storage and why would we use them and why do we need them ?</P><P>As we have explained<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_self">in a previous blog</A>, the Enterprise Blockchain Database, the Distributed Ledger, can be looked at simply as a Database Table (which is replicated and synchronised across multiple Servers) and in principle it stores the Data like this:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_6-1713703204813.jpeg" style="width: 790px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99507iE8967130B58A8005/image-dimensions/790x401?v=v2" width="790" height="401" role="button" title="AndySilvey_6-1713703204813.jpeg" alt="AndySilvey_6-1713703204813.jpeg" /></span></P><P><SPAN class=""><SPAN class="">Blockchain is a very simple form of database atkrypto.io</SPAN></SPAN></P><P>This is fine, and suited to what we call<SPAN>&nbsp;</SPAN><A href="https://aws.amazon.com/compare/the-difference-between-structured-data-and-unstructured-data/#:~:text=Structured%20data%20is%20data%20that,files%20and%20large%20text%20documents." target="_self" rel="nofollow noopener noreferrer">Structured Data</A>, and as AWS nicely describe,<SPAN>&nbsp;</SPAN><A href="https://aws.amazon.com/what-is/structured-data/" target="_self" rel="nofollow noopener noreferrer">Structured Data</A><SPAN>&nbsp;</SPAN>is information like words and numbers. This kind of data is perfectly suited to being stored in an Enterprise Blockchain Database and also a legacy Database. Examples of the data would Names, Addresses, Phone Numbers, Product Information etc.</P><P>But, IoT Devices can produce a lot of Data, for example, there could be photographs proving that general waste was tipped at the correct certified location, photographs and in large volumes would&nbsp;be too big to be stored on the Enterprise Blockchain Database itself.</P><P>And that's ok, Enterprise Blockchain Platforms are ready for that, and have been designed to store both Structured Data and Data which is in files which are so big that they cannot be stored in the Enterprise Blockchain Database itself, for example the photographs from a Waste Truck's onboard camera proving that waste was responsibly tipped in the correct location and taken at the same time as recording GPS location coordinates proving the location of the Waste Truck.</P><P>So, if we can't store the large photographs files in large quantities to the Enterprise Blockchain Database, then how, in an Enterprise Blockchain Platform do we store large files of Data ?</P><P>Voila.... bring in the Enterprise Blockchain Platform Wallet. The best Enterprise Blockchain Platform products include what is called the Enterprise Blockchain Platform Wallet, or to make it shorter, the Enterprise Blockchain Wallet.</P><P>The Enterprise Blockchain Wallet enables us to store large Data, like large Files safely and securely off the chain, or '<A href="https://www.bitdegree.org/crypto/learn/crypto-terms/what-is-off-chain" target="_self" rel="nofollow noopener noreferrer">Off-Chain</A>'.&nbsp;</P><P>But if we store the large Data files Off-Chain in the Enterprise Blockchain Wallet, then how do we also have them some how on the Enterprise Blockchain Database ?</P><P>The way this works is elegant, in any decent Enterprise Blockchain Platform, the Enterprise Blockchain Wallet location is completely configurable, and could be anywhere from<SPAN>&nbsp;</SPAN><A href="https://www.sap.com/norway/products/technology-platform/hana/features/cloud-data-lake.html" target="_self" rel="noopener noreferrer">SAP HANA Cloud (Data Lake)</A>, or for example&nbsp;multiple hyperscaler object stores, such as Amazon S3, OSS (Alicloud Object Storage<BR />Service), SAP HANA Cloud, Data Lake, and Azure Blob Storage.</P><P>The configurable Enterprise Blockchain Wallet of the Enterprise Blockchain Platform looks like this:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_7-1713703204779.jpeg" style="width: 793px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99508i9C1349C576211BAD/image-dimensions/793x443?v=v2" width="793" height="443" role="button" title="AndySilvey_7-1713703204779.jpeg" alt="AndySilvey_7-1713703204779.jpeg" /></span></P><P><SPAN class=""><SPAN class="">Enterprise Blockchain Platform - Enterprise Blockchain Wallets - Configurable Enterprise Wallets - atkrypto.io</SPAN></SPAN></P><P>Ok, so we've got the IoT Data stored in the (configurable) Enterprise Blockchain Wallet, but what about securing the IoT Data ? Obviously the Enterprise Blockchain Wallet storage location has built in security, for example the SAP HANA Cloud, the AWS S3 Buckets, but we need more than the out of the box security of these products, the reason we are using the Enterprise Blockchain Database is because of the amazing security strengths that it natively out of the box has, and so, what about the Enterprise Blockchain Wallet, doesn't the Enterprise Blockchain Platform have some cool super hard way of protecting the data in the Enterprise Blockchain Wallet ?</P><P>Well yes it does, this is the magic of Enterprise Blockchain Database 'Off-Chain' storage in the Enterprise Blockchain Wallet. This is so unique to Blockchain Technologies.</P><P>What happens is this, when store data in the Enterprise Blockchain Wallet, the Enterprise Blockchain Platform software runs a hash algorithm over the data that we have stored and the data, and<SPAN>&nbsp;</SPAN><A href="https://codesigningstore.com/what-is-hashing-algorithm-how-it-works#:~:text=In%20cryptography%2C%20hashing%20is%20a,output%20of%20the%20same%20length." target="_self" rel="nofollow noopener noreferrer">the large file gets hashed</A>:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_8-1713703204730.png" style="width: 768px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99510iF3509D05E84B5D07/image-dimensions/768x227?v=v2" width="768" height="227" role="button" title="AndySilvey_8-1713703204730.png" alt="AndySilvey_8-1713703204730.png" /></span></P><P>&nbsp;</P><P>The data or the file in the Enterprise Blockchain Wallet gets hashed, and then, that hash is stored in the Enterprise Blockchain Database.</P><P>This means we now have a unique hash of that data or file, and if anybody or anything makes even the tiniest teeniest change to that data or file, next time we run a hash over that data or file the result will be different that the original hash which is safely stored in the Enterprise Blockchain Database and this is how we will know that the data has been changed and we cannot trust the Data and therefore we cannot use it for our Enterprise IoT Data processing and Insights..</P><P>On the other hand, if just before we load the data in to the SAP Enterprise Applications, eg SAP Asset Performance Management and SAP S/4HANA,&nbsp; from the Enterprise Blockchain Wallet, if we run a hash over the data and the hash result is the same as we have in the Enterprise Blockchain Database, then we will know we can trust the Data and we can use it in our SAP Applications and we will have trustable IoT Data.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_9-1713703204724.jpeg" style="width: 789px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99509i72AFA7B052607252/image-dimensions/789x444?v=v2" width="789" height="444" role="button" title="AndySilvey_9-1713703204724.jpeg" alt="AndySilvey_9-1713703204724.jpeg" /></span></P><P><SPAN class=""><SPAN class="">Enterprise Blockchain Wallet Data Hashes Stored in the Enterprise Blockchain Database - atkrypto.io</SPAN></SPAN></P><P>&nbsp;</P><P><STRONG>And this is why, for all of these reasons,&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Trustable Enterprise IoT Data depends on Data being stored in the Enterprise Blockchain</STRONG></P><P>&nbsp;</P><P>But that's not the end of the Why IoT Data needs Enterprise Blockchain.&nbsp;</P><P>As we showed at the beginning of the blog in this picture:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99516i78EE68F5BDA0E88C/image-size/large?v=v2&amp;px=999" role="button" title="IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io .png" alt="IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io</span></span></P><P>&nbsp;</P><P>As the picture shows, we have an Enterprise Blockchain Database Tenant installed on a Server Host at the Edge of the Network AND we have an Enterprise Blockchain Data Tenant installed on the SAP BTP Kyma Runtime.</P><P>The consequence of this is that we have a distributed Enterprise Blockchain Database table which stretches from the Edge of the Network where the IoT Devices are all the way across the Network to the SAP BTP and DataCenter.</P><P>This means we have Enterprise Blockchain Data Protection from the source where the IoT Devices are to the Insights and Business Processes where the SAP Applications are.</P><P>We have taken the Enterprise Blockchain to the Data at the source at the IoT Devices instead of taking the IoT Device's Data across all of the Networks to the safety of the SAP BTP and DataCenter. This is because we need to store the Data in the Enterprise Blockchain as close as possible to the source of the Data. The closer the Enterprise Blockchain Tenant is to the source of the Data, the safer the Data will be, it's as simple as that. Enterprise Blockchain is the next generation Cyber Security for IoT Data, and we need to minimise the amount of exposure IoT Data has to previous generation security technologies and approaches.</P><P>And this is why we say, Enterprise Blockchain is a Secure Communication Channel, because instead of integrating Applications sending and replicating Data across Networks, we are sharing the Data across the Enterprise Blockchain and the Enterprise Blockchain is the Secure Communication Channel.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IoT Internet of Things and SAP - Enterprise Blockchain is the next generation Data Cyber Security Protection - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99524iE0B4E3EA19DF35AE/image-size/large?v=v2&amp;px=999" role="button" title="IoT Internet of Things and SAP - Enterprise Blockchain is the next generation Data Cyber Security Protection - atkrypto.io .png" alt="IoT Internet of Things and SAP - Enterprise Blockchain is the next generation Data Cyber Security Protection - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">IoT Internet of Things and SAP - Enterprise Blockchain is the next generation Data Cyber Security Protection - atkrypto.io</span></span></P><P>&nbsp;</P><P>To conclude this section, the<SPAN>&nbsp;</SPAN><EM>Why to, of IoT and Enterprise Blockchain</EM>, IoT Data&nbsp; needs to Trustable.</P><P>Enterprise Blockchain, due to its native super strong security strength when used as a store of Data enables IoT Data to be Trustable, and the Enterprise Blockchain Software needs be installed as close as possible to the source of the IoT Data, as close as possible to the IoT Devices.</P><P>&nbsp;</P><P><STRONG>Section 3.0: The How is it,&nbsp;of IoT &amp; SAP, and Enterprise Blockchain</STRONG></P><P>Now that we know why trustable Enterprise IoT needs the Enterprise Blockchain Database to protect the integrity and originality of the Data, how do we implement it today ?</P><P>Well that's easy, here are the ingredients and the recipe...&nbsp;</P><P>Ingredients, you're going to need:</P><P style=" padding-left : 30px; ">Data Source(s) eg</P><P style=" padding-left : 60px; ">IoT Devices which are either REST or MQTT (this could be other protocols and transfer mechanisms depending upon the required Adapters)</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP and IoT IoT Devices sending Data to MQTT Broker in the Edge Host Instance of the Enterprise Blockchain Platform Database Tenant - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99519i3605FA3152934DB4/image-size/large?v=v2&amp;px=999" role="button" title="SAP and IoT IoT Devices sending Data to MQTT Broker in the Edge Host Instance of the Enterprise Blockchain Platform Database Tenant - atkrypto.io.png" alt="SAP and IoT IoT Devices sending Data to MQTT Broker in the Edge Host Instance of the Enterprise Blockchain Platform Database Tenant - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP and IoT IoT Devices sending Data to MQTT Broker in the Edge Host Instance of the Enterprise Blockchain Platform Database Tenant - atkrypto.io</span></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP and IoT IoT Devices sending Data to REST Endpoint in the Edge Host Instance of the Enterprise Blockchain Platform Database Tenant - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99521iA1FCD76FA6CB022C/image-size/large?v=v2&amp;px=999" role="button" title="SAP and IoT IoT Devices sending Data to REST Endpoint in the Edge Host Instance of the Enterprise Blockchain Platform Database Tenant - atkrypto.io.png" alt="SAP and IoT IoT Devices sending Data to REST Endpoint in the Edge Host Instance of the Enterprise Blockchain Platform Database Tenant - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP and IoT IoT Devices sending Data to REST Endpoint in the Edge Host Instance of the Enterprise Blockchain Platform Database Tenant - atkrypto.io</span></span></P><P style=" padding-left : 30px; ">&nbsp;</P><P style=" padding-left : 30px; ">Large Storage for Large Data and the Enterprise Blockchain Wallet</P><P style=" padding-left : 60px; "><A href="https://www.sap.com/norway/products/technology-platform/hana/features/cloud-data-lake.html" target="_self" rel="noopener noreferrer">SAP HANA Cloud (Data Lake)</A></P><P style=" padding-left : 30px; ">Enterprise Blockchain Platform and specifically one which is capable of running Tenants as close to the Source of the IoT Data as possible at the Edge. We do NOT want to send the IoT Data across the Internet to a Blockchain somewhere in the Cloud, that would defeat the object of the exercise.</P><P>These are the basic ingredients, the data from the IoT Devices will be stored either Off-Chain in the<SPAN>&nbsp;</SPAN><A href="https://www.sap.com/norway/products/technology-platform/hana/features/cloud-data-lake.html" target="_self" rel="noopener noreferrer">SAP HANA Cloud</A><SPAN>&nbsp;</SPAN>(Data Lake) which will also be the Enterprise Blockchain Platform (configurable) Wallet, or On-Chain in the Enterprise Blockchain Platform Database Ledgers, this Enterprise Blockchain Database Ledger will be running from the Edge to the SAP BTP and DataCenters and then<SPAN>&nbsp;SAP Applications like SAP Asset Performance Management and SAP S/4HANA will be able use the Data in Business Processes and Insights.</SPAN></P><P>And your Technical Reference Architecture will look something like this:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99523i77F022B729519D92/image-size/large?v=v2&amp;px=999" role="button" title="IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io .png" alt="IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">IoT Internet of Things Edge Data Cyber Security and SAP Asset Performance Management BTP Protected by Enterprise Blockchain - atkrypto.io</span></span></P><P>&nbsp;</P><P>And that's how you do it.</P><P>Wrapping up, conclusions:</P><P>&nbsp;</P><P style=" padding-left : 30px; "><STRONG>. Trustable Enterprise IoT depends on Data being stored in the Enterprise Blockchain at the Edge and in the SAP BTP</STRONG></P><P style=" padding-left : 30px; ">&nbsp;</P><P><STRONG>Enterprise Blockchain is:</STRONG></P><P style=" padding-left : 30px; "><EM><STRONG>.<SPAN>&nbsp;</SPAN></STRONG></EM><STRONG>The Digital Transformation of Information Security to Cyber Security</STRONG></P><P style=" padding-left : 30px; "><STRONG>. The Next Generation Data Integrity, Originality, Confidentiality Protection</STRONG></P><P style=" padding-left : 30px; "><STRONG>. Re-imagining Information Security</STRONG></P><P style=" padding-left : 30px; "><STRONG>. Natively, out of the box, due to its special characteristics the strongest, hardest, most resilient Enterprise Database product&nbsp;</STRONG></P><P style=" padding-left : 30px; ">&nbsp;</P><P><STRONG>Enterprise Blockchain is both:</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Store</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Communication Channel</STRONG></P><P>&nbsp;</P><P><STRONG>The configurable Enterprise Blockchain Wallet enables you to store Big Data 'Off-Chain' and the hashes of the IoT Data are stored safely and securely on the Enterprise Blockchain Database.</STRONG></P><P>&nbsp;</P><P>The good news is, as we discussed in the previous blog, this is no longer hype, we can do all of this today,<SPAN>&nbsp;</SPAN><SPAN>and now, within the&nbsp;</SPAN><A href="https://www.sap.com/norway/partners/partner-program/build.html" target="_self" rel="noopener noreferrer">SAP Partner Edge Open EcoSystem</A><SPAN>&nbsp;there are enabling technology Blockchain Products designed and built by SAP Experts specifically for the needs of SAP Customers to make doing Blockchain and SAP easy, and so you can do SAP and Blockchain, today it's real and there's nothing stopping you.</SPAN></P><P>So what are we waiting for ? Oh yeah, more use cases, ok, that will be the next blog.&nbsp;</P><P><SPAN>What do you think, are the words IoT, Blockchain, Web3, Distributed Ledger Technology, starting to appear in your Company's visions and technology visions ? What use cases are you looking at ? Let's chat about it in the comments.</SPAN></P><P>For now, over and out.</P><P>Andy Silvey.</P><P>Independent SAP Technical Architect and CEO of atkrypto.io</P><P>Author Bio:</P><P>Andy Silvey is a 25 years SAP Technology veteran&nbsp;[<EM>15 years SAP Basis and 10 years SAP Tech Arch including Tech, Integration, Security, Data from 3.1H to S/4HANA PCE on RISE and the BTP and everything in between, and<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/welcome-corner-blog-posts/andy-silvey-scn-moderator-spotlight/ba-p/13054438" target="_self">former SCN Moderator and Mentor alumni</A>].</EM></P><P>Andy is also co-Founder of <A href="http://www.atkrypto.io" target="_self" rel="nofollow noopener noreferrer">atkrypto</A> inc, an startup whose ambition is to make Blockchain easy for Enterprise.</P><P>atkrypto.io's flagship product is the atkrypto Enterprise Blockchain Platform for SAP,&nbsp; and atkrypto.io is a SAP Partner Edge Open EcoSystem Partner.&nbsp;</P><P>The&nbsp;atkrypto Enterprise Blockchain Platform for SAP has been designed by SAP Independent Experts for the needs of SAP Customers and to be deployed on the SAP BTP Kyma Runtime Service and leverage native integration to SAP Products.</P><P>atkrypto&nbsp;Enterprise Blockchain Platform for SAP has a number of unique qualities, including being the only Blockchain software in the world which has a DataCenter version and a light mobile version which can run on Edge/IoT/Mobile devices and enables data to be written to the Blockchain at the Edge where that same Blockchain is running on a Server in the DataCenter, protecting the integrity and originality of data from the Edge to Insights. Taking Blockchain to the Data at the Edge instead of taking the Data to the Blockchain.</P><P><SPAN>All of this makes atkrypto,io the DePIN Decentralised Physical Infrastructure Network solution for Enterprise.</SPAN></P><P><SPAN>atkrypto is one of the <A href="https://dtw.tmforum.org/next20-startup-program" target="_self" rel="nofollow noopener noreferrer">Next20 startups</A> being featured at <A href="https://dtw.tmforum.org/explore/exhibitors/atkrypto-io-119" target="_self" rel="nofollow noopener noreferrer">TM Forum's DTW Ignite in Copenhagen in June</A></SPAN></P><P>If you will be at DTW24 come and talk to us about Cyber Security of SAP Data with Enterprise Blockchain.</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P style=" padding-left : 30px; ">&nbsp;</P> 2024-04-22T11:07:39.454000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/behind-the-compatibility-what-are-the-compatibility-means-between-grc-and/ba-p/13674684 Behind the compatibility - What are the compatibility means between GRC and the plugins 2024-04-22T11:08:52.927000+02:00 Mate https://community.sap.com/t5/user/viewprofilepage/user-id/239783 <P style=" text-align : justify; ">GRC Access Control have many feature which requires to collect information or change/provision information in your plugin systems. To do so, you need to implement an additional functionality to them what we call Plugin component. Depends on the type of the plugin system, it can be a standard ABAP based Add-on (GRCPINW) with additional features for ERP systems (GRCPIERP), or it can be&nbsp; a solution for HANA Database (HCOGRCPI). The other plugins are mostly handled by the main GRC system using the appropriate API of the plugin. To have a stable and reliable landscape you need to regularly update these components with corrections and based on our basic suggestion you should upgrade them at least once a year. You also need to ensure that your plugins are compatible with the main GRC system. But what compatibility means? Is it just the Service pack level what Note 1352498 or Note 2487192 suggests, or there is something else?</P><P style=" text-align : justify; ">In a simple way what the Notes describes are true. Service Packs will always be compatible to each other, and if you just implement or upgrade your system it gives an easy way to achieve the compatibility. On the other hand the real criteria of the compatibility is not the number of the SP, it is what we call codebase equivalency. During a usage of a functionality the main GRC system and the plugin codes are often communicating with each other and what we need to ensure is the communication works the same way using the same signs and codes. In reality no matter what Service Pack are implemented to you plugin system, if this set of communication rules are the same. Compatibility can be reached by implementing the same set of Notes as well, however determining the right ones are much harder then simply implementing the same Service Pack.</P><P style=" text-align : justify; ">Lets see an example of what we call code base equivalency and why the compatibility is important. With SP 21 the Firefighter Session management changed and a more secure and reliable option is introduced. Part of these changes a completely new locking mechanism was required which not allows to use the same Firefighter IDs by different Firefighter Users at the same time. The initial version of this process used already existing objects and tables to lock the Firefighter ID. This worked properly, unless the database containsed remnants of old and inconsistent data. To resolve it Note 3408121 was introduced which provided a new locking interface and dedicated tables to ensure proper locking. This Note is part of SP 24 and it contains coding changes in both GRCDND_A and GRCPINW as well. If you use just only Centralized Firefighter, then you need to implement it only on your main GRC system, if you use Decentralized Firefighter, then you need to have in both the main GRC system and in your plugins as well to have the compatibility. Why? Because it changes the way how the locking works and this need to be the same both the Centralized environment and in the Decentralized one as well. If you just implement it on your main GRC system you will see inconsistent behavior in the Decentralized Firefighter Logon Pad and vice versa if you just implement it on the plugin. This is an example of the code base equivalency.&nbsp;</P><P style=" text-align : justify; ">Now upgrade your main GRC system to SP24 (which already contains the coding changes of the above Note), and lets just implement this Note to your plugin system. Now an older SP level of your plugin will also be code base compatible with the main GRC system, even if the SP levels are different. (Of course by implementing just this single Note will not made it fully compatible for every functionality, however this particular locking mechanism will be compatible with each other.) If you would just update your plugin system to SP24 and leave the main GRC system on a lower SP level but implement the Note to your main GRC system then the compatibility would be also achieved (with the same limitation as in the previous case).</P><P style=" text-align : justify; ">The compatibility is not (necessary) means that you need to have the same Service Pack level and you can have even a higher SP levels on your plugin system as well, if and only if, the compatible set of Notes are implemented to the lower-leveled system as well.</P><P style=" text-align : justify; ">Implementing the same Service Pack level fulfill the requirement for compatibility without any extra effort. It is the easiest way to have it, however it is not the only one, and you don't need to be on the same Service Pack level to have the same code base and have compatibility.</P> 2024-04-22T11:08:52.927000+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/grc-tuesdays-takeaways-from-the-2024-internal-controls-compliance-and-risk/ba-p/13675318 GRC Tuesdays: Takeaways from the 2024 Internal Controls, Compliance and Risk Management Conference 2024-04-23T07:00:00.021000+02:00 T_Frenehard https://community.sap.com/t5/user/viewprofilepage/user-id/215222 <P style=" text-align: center; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_0-1713488262942.jpeg" style="width: 500px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/98469i23CE6CDC80BFFB01/image-dimensions/500x375?v=v2" width="500" height="375" role="button" title="T_Frenehard_0-1713488262942.jpeg" alt="T_Frenehard_0-1713488262942.jpeg" /></span></P><P>On March 6th and 7th, TAC Insights and SAP brought together the SAP for Internal Controls, Compliance and Risk Management and the SAP for Cyber Security and Data Protection events under one roof in Brussels and into one single event under the theme <STRONG>RISE with SAP GRC</STRONG>.</P><P>We were very fortunate to have many customers join us to share their stories on enterprise risk management, control automation, cross-application segregation of duty risk management, security monitoring, and much more.</P><P>In today’s blog, I wanted to get exclusive insights from the keynote speakers and the conference chairs on what they heard during this conference and their perspective.</P><P>I thought I would start with <A href="https://de.linkedin.com/in/mariewagener" target="_blank" rel="noopener nofollow noreferrer">Marie-Luise Wagener-Kirchner</A> and <A href="https://de.linkedin.com/in/vishalvermasap" target="_blank" rel="noopener nofollow noreferrer">Vishal Verma</A> – who delivered the opening keynote. Marie-Luise was also co-chair on the internal control, compliance, and risk management track.</P><P><STRONG>Thomas:</STRONG> During your keynote, you shared SAP’s key focus areas for the next 18-24 months. What would you say were the roadmap items that resonated the most with the audience?</P><P><STRONG>Marie-Luise:</STRONG> I believe the fact that we are here to stay and continuously invest into our solutions. Highlighting recent innovations as well as outlining the exciting use cases we are planning to deliver together with an outlook on our GRC 2026 release where we plan to further harmonize our GRC solution portfolio.</P><P><STRONG>Vishal: &nbsp;</STRONG>Clarity on “RISE with SAP” program that takes enterprises on a transformation journey that’s tailored exactly to their needs, and how SAP Solutions for GRC fits well with it. Audience also liked the way forward for SAP Identity Services and planned collaboration with Microsoft Entra.</P><P>&nbsp;</P><P>Since we finished the first day with a live demo illustrating how SAP systems are targeted by passionate hackers (with the help of Google!), I thought I would ask <A href="https://www.linkedin.com/in/vincent-doux-3867752/" target="_blank" rel="noopener nofollow noreferrer">Vincent Doux</A><SPAN>, </SPAN>chair of the cyber security and data protection track about what concerns companies the most and what they are doing to protect their landscape.</P><P><STRONG>Thomas:</STRONG> Presenters all highlighted the increasing number of attacks they are experiencing on all IT systems. But from what you have heard during the event, would you say that the level of attack sophistication has increased or is it relatively similar vectors and patterns year over year?</P><P><STRONG>&nbsp;</STRONG><STRONG>Vincent: </STRONG>Right from the live demonstration on how SAP systems can be targeted by hackers with relative ease, it has been a real eye-opener about the level of sophistication in cyberattacks today. Existing SAP security measures play a crucial role in defending against common vulnerabilities and exposure patterns. However, the complexity and expertise in these attacks, unfortunately, are seeing a significant increase. Our customers' testimonials, be it BP, SANOFI, or GSK, strongly seconded this sentiment. They brought diverse perspectives on the challenges they've faced and how SAP's GRC &amp; Security solutions have been instrumental in their defense strategy. One major observation across all testimonies was the need for a robust customized security strategy. Leveraging SAP's security solutions, they could maintain their competitive edge by preventing security incidents, ensuring data protection, and system integrity. The goal has always been to make sure that we're not just reactive but proactive. As our event theme suggests – RISE with SAP GRC, the emphasis is on staying ahead, innovatively addressing evolving threat vectors, and continuously improving the robustness of the security processes. Our job is to anticipate, adapt, and ensure that SAP security framework evolves faster than the threat landscape.</P><P><STRONG>Thomas:</STRONG> From what organizations have shared on stage and your breakout discussion, what are companies concentrating on to protect against these threats?</P><P><STRONG>Vincent: </STRONG>From the discussions, it is clear that our client organizations are focusing on three crucial areas.&nbsp; First is strengthening their internal controls and compliance through tools like SAP's GRC 3 Lines of Defense platform. Second, they are actively identifying and addressing vulnerabilities for proactive threat management in the SAP application layer and not only in the IT infrastructure. And lastly, they are creating a security-aware culture through regular trainings and simulations to involve not only IT population but also the business users. These concerted efforts ensure that they are well-prepared to combat any cybersecurity threats.</P><P>&nbsp;</P><P>Michael Rasmussen shared an insightful session on the future of GRC with Business-Integrated GRC, “the next generation of GRC technology with a view focused on performance” and where “GRC becomes an integrated part of the business management platform”. In my opinion, a perfect topic to discuss with the 2 co-chairs of the internal controls, compliance, and risk management track – Marie-Luise Wagener-Kirchner and <A href="https://de.linkedin.com/in/michael-heckner" target="_blank" rel="noopener nofollow noreferrer">Michael Heckner</A>!</P><P><STRONG>Thomas:</STRONG> Within Business-Integrated GRC, Michael Rasmussen – GRC Analyst &amp; Pundit at GRC 20/20 Research, mentioned Artificial Intelligence to enhance GRC capabilities but also cited the rising importance of environmental, social and governance (ESG) as key considerations. From what you have heard from customers, is work already ongoing to address these matters or are we still at the investigation and discovery phase?</P><P><STRONG>Marie-Luise:</STRONG> While our customers heavily invest in smartness and automation, ESG is still closely monitored also with regards to upcoming requirements. Our customers have shared interesting use cases for Robotic Process Automation (RPA) and how they have built in internal controls to ensure stabilized business processes, they also shared insights in their reporting dashboards to foster clever decision making as well as their continued investments into smart automated controls.</P><P><STRONG>Michael:</STRONG> I do see an interest in both, AI and ESG. Most of our customers, and at all levels, are currently enquiring about getting help from AI for various risk and compliance tasks. AI clearly is currently at the top of its hype cycle. What is often overlooked is that the repetitive, mundane, manual GRC tasks can already today be automated with advanced GRC platforms like SAP GRC towards continuous monitoring. Taking the human labour – and human error – out of the equation. AI will certainly add another level to it, but the available capabilities are not yet fully utilized.<BR />ESG is a different story. Here the ESG-focused specialists of course see the common requirements between traditional GRC processes and ESG processes. Both ESG and GRC processes aim to ensure that organizations operate in a responsible and sustainable manner. They both involve assessing and managing risks, complying with regulations and standards, and monitoring performance. Additionally, both ESG and GRC processes require organizations to establish robust governance structures and frameworks to effectively manage and report on their activities. By integrating ESG and GRC processes, organizations can enhance their overall sustainability, risk management, and compliance efforts, leading to improved long-term performance and stakeholder trust.</P><P>&nbsp;</P><P>Finally, in his closing keynote “A Future Beyond Comprehension”, Chris Johnston - Head of Finance and Risk Customer Solution Advisory EMEA-North at SAP, gave us a lot of reasons to hope for a very exciting future powered by AI. I therefore wanted to finish this blog on a similar positive mindset and asked the colleagues for a few words on their expectations for top GRC advances in the years to come.</P><P><STRONG>Thomas:</STRONG> What technological progress do you think we can expect for GRC in the years to come?</P><P><STRONG>Marie-Luise:</STRONG> Integration, smartness, and automation. Customer landscapes will remain and even become more heterogenous and technically challenging, thus requiring integration to achieve and sustain a holistic overview of business risks and their mitigations. Smartness with the different flavours of AI will be accompanied by automation to reduce complex manual tasks and to support the end-users in their daily work.</P><P><STRONG>Vincent: </STRONG>In the future, we can expect generative AI and machine learning to revolutionize the GRC landscape with advancements in risk detection and automated compliance. Additionally, we’ll see more integration between GRC solutions and business processes for a unified view. Plus, as ESG considerations become prioritized, companies will leverage technology to effectively manage these. Overall, GRC is poised to become more efficient, integrated, and responsive to social responsibility.</P><P><STRONG>Michael:</STRONG> I do see an increasing adoption of emerging technologies ranging from robotic process automation and continuous monitoring all the way to applying artificial intelligence. These technologies will enable more efficient and effective risk assessment, compliance monitoring, and governance processes.<BR />While this will provide enhanced risk intelligence, we will also need to keep a close watch on emerging risks, esp. with new technologies like AI.<BR />Overall, new technologies like AI will help to identify patterns, detect anomalies, and provide real-time insights in an unprecedented way.</P><P>If you attended the conference, I would be very interested in reading your comments either in this blog or on Twitter <A href="https://twitter.com/tfrenehard" target="_blank" rel="noopener nofollow noreferrer">@TFrenehard</A></P><P>And it you couldn’t attend in 2024, I hope that you will consider joining us next year!</P><P>If you are interested in learning more about SAP solutions for Governance, Risk, and Compliance, feel free to fill-in the <A href="https://www.sap.com/registration/request-demo.html?product=237150e2-6555-4a16-b49e-e93dbf1891da&amp;productName=Governance%2C+Risk%2C+Compliance+%28GRC%29%2C+and+Cybersecurity&amp;pageTitle=Cybersecurity+and+Governance%2C+Risk%2C+and+Compliance+Software&amp;countryOfOrigin=en_au&amp;refererPagePath=https%3A%2F%2Fwww.sap.com%2Faustralia%2Fproducts%2Ffinancial-management%2Fgrc.html&amp;refererContentPath=%2Fcontent%2Fsapdx%2Flanguages%2Fen_gb%2Fproducts%2Ffinancial-management%2Fgrc&amp;navTitle=Request+a+Demo" target="_blank" rel="noopener noreferrer">demo request form</A>!</P> 2024-04-23T07:00:00.021000+02:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/influence-the-development-of-sap-enterprise-threat-detection-cloud-edition/ba-p/13687244 INFLUENCE THE DEVELOPMENT OF SAP ENTERPRISE THREAT DETECTION, CLOUD EDITION 2024-05-03T06:40:10.948000+02:00 KirtiSingh01 https://community.sap.com/t5/user/viewprofilepage/user-id/1447958 <P>Introducing influence page for SAP Enterprise Threat Detection, cloud edition.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KirtiSingh01_2-1714475829296.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103858i767BFD6748C29B56/image-size/large?v=v2&amp;px=999" role="button" title="KirtiSingh01_2-1714475829296.png" alt="KirtiSingh01_2-1714475829296.png" /></span></P><P>The SAP Enterprise Threat Detection product team are inviting customers and partners to share their feedback and ideas to enhance our solution.</P><P>On <A href="https://influence.sap.com/sap/ino/#/campaign/3606" target="_blank" rel="noopener noreferrer">SAP Enterprise Threat Detection, cloud edition Influence page</A> you can see all submitted requests, submit your improvement requests, vote and comment on other ideas.</P><P>The rationale and advantages of a customer influence page include:</P><UL><LI>Augmenting customers engagement and influence on product features.</LI><LI>Improving product/services using meaningful customer insights.</LI><LI>Cultivating an engaged community.</LI><LI>Serving as a central platform for customer suggestions and fueling innovation.</LI></UL><P>The product team regularly evaluates the ideas and considers them for roadmap planning. Votes help to priorities ideas along with other important selection criteria such as:</P><UL><LI><STRONG>DESIRABILITY</STRONG>: How many customers voted for this? How many customers will benefit from it?</LI><LI><STRONG>VIABILITY</STRONG>: Is this Improvement Request globally relevant? Is this in alignment with SAP’s strategy for the product?</LI><LI><STRONG>FEASIBILITY</STRONG>: Is the development effort realistic? Is this request achievable within the product’s architecture?</LI></UL><P>While this page is mainly for the public cloud edition, for private cloud and on-premise versions feel free to propose integration-related ideas.</P><P><STRONG>Follow the steps below to get access</STRONG>&nbsp;and start sharing your enhancement ideas:</P><UL><LI><STRONG>Go to</STRONG>&nbsp;<A href="https://influence.sap.com/sap/ino/#/campaign/3606" target="_blank" rel="noopener noreferrer">SAP Enterprise Threat Detection, cloud edition Influence page</A><U>.</U>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<UL class="lia-list-style-type-circle"><LI>In case you are a new user, create a user account using S-User-ID and accept the Terms of Use. Once the user is created you activate SSO and can access without any interruption.</LI></UL></LI></UL><UL><LI><STRONG>Follow&nbsp;</STRONG>the session to get notified of new Improvement Requests and blogs.</LI><LI><STRONG>Vote</STRONG>&nbsp;and&nbsp;<STRONG>comment</STRONG>&nbsp;on Improvement Requests posted by other customers/ partners.</LI><LI><STRONG>Submit</STRONG>&nbsp;new Improvement Requests.</LI></UL><P>You can also check out the videos\link below, if you wish to learn more about SAP Continuous Influence and how to submit and manage improvement requests:</P><UL><LI><A href="https://www.sap.com/assetdetail/2019/06/145793d7-517d-0010-87a3-c30de2ffd8ff.html" target="_blank" rel="noopener noreferrer">How to get started and navigate on the Customer Influence Site</A></LI><LI><A href="https://www.sap.com/assetdetail/2018/11/08f0cc5e-277d-0010-87a3-c30de2ffd8ff.html" target="_blank" rel="noopener noreferrer">How to submit an improvement request</A></LI><LI><A href="https://www.sap.com/about/customer-involvement/influence-adopt.influence-opportunities.html#join-customer-influence" target="_blank" rel="noopener noreferrer">SAP Customer Influence and Adoption main info page</A></LI></UL><P>Please reach us at <A href="mailto:SAP-ETD@sap.com" target="_blank" rel="noopener nofollow noreferrer">SAP-ETD@sap.com</A> in case of any issue.</P><P>We look forward to seeing your ideas and further improve our software as we move forward.</P> 2024-05-03T06:40:10.948000+02:00 https://community.sap.com/t5/technology-blogs-by-members/threat-actors-targeting-sap-applications/ba-p/13679657 Threat Actors targeting SAP Applications 2024-05-03T07:57:35.500000+02:00 jppereze https://community.sap.com/t5/user/viewprofilepage/user-id/91040 <P>Last week, Onapsis and Flashpoint released a report describing the evolution of the Treat Landscape around SAP Applications, including the intersection of SAP and Ransomware. Some of its highlights include a 490% increase of the mentions to SAP exploits or vulnerabilities across the open deep and dark web from 2020 to 2023, or a whopping 400% increase in the price or an Remote Command Execution exploit for SAP Applications from August of 2020 to April of 2024.</P><P>These Threat Intelligence indicates that Threat Actors of all types understand how to target SAP technology, by exploiting SAP CVE(s), exfiltrating financial reports from SAP Applications, performing financial fraud over extended periods of time, or even through the execution of Ransomware, which also targets SAP Applications and data. Some examples of these Threat Actors are APT10, a state sponsored actor, FIN7/FIN13, which are financially motivated Threat Actors or Cobalt Spider, a cybercriminal group.&nbsp;</P><P>This is an effort moving in the direction of helping SAP Customers tackle cybersecurity threats such as active cyberattacks or ransomware, as done in the past jointly with SAP:</P><UL><LI><A href="https://news.sap.com/2021/07/ransomware-threats-sap-onapsis/" target="_blank" rel="noopener noreferrer">Taking Ransomware Threats Seriously | SAP &amp; Onapsis | SAP News</A>&nbsp;</LI><LI><A href="https://news.sap.com/2021/04/sap-onapsis-application-cyber-threat/" target="_blank" rel="noopener noreferrer">SAP and Onapsis Help Protect Against Cyber Threats | SAP News</A>&nbsp;</LI></UL><P>So as SAP Customers, what should we do?&nbsp;</P><P>In short, Vulnerability Management, Threat Detection and Threat Intelligence should integrate and incorporate SAP Applications.&nbsp;</P><UL><LI>&nbsp;Vulnerabilities and misconfigurations affecting SAP are used by Threat Actors to target SAP Applications, so SAP Customers should have proper vulnerability management programs addressing vulnerabilities and issues in a timely way.&nbsp; There are specific vulnerabilities and risks that were identified as part of this research so those individual CVE(s) and misconfigurations are among the ones we should prioritize. Having said that, SAP releases patches periodically (second Tuesday of every month) and we should be able to process them and react accordingly. As an example, these are the patches released by SAP on April 2024:&nbsp;<A href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2024.html" target="_blank" rel="noopener noreferrer">SAP Security Patch Day – April 2024</A>&nbsp; &nbsp;</LI><LI>Threat Intelligence tailored to SAP Applications should be consumed and integrated into Security Operation Centers, giving defenders the right signals to protect these applications before the bad guys act. Besides this recently released report, in the past, CISA has released a number of alerts, warning SAP customers about a number of different threats:&nbsp;<UL class="lia-list-style-type-square"><LI><P><A href="https://www.cisa.gov/news-events/alerts/2021/04/06/malicious-cyber-activity-targeting-critical-sap-applications" target="_blank" rel="noopener nofollow noreferrer"><SPAN>Malicious Cyber Activity Targeting Critical SAP Applications | CISA</SPAN></A><SPAN>&nbsp;</SPAN></P></LI><LI><P><A href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-195a" target="_blank" rel="noopener nofollow noreferrer"><SPAN>Critical Vulnerability in SAP NetWeaver AS Java | CISA</SPAN></A><SPAN>&nbsp;</SPAN></P></LI><LI><P><A href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa19-122a" target="_blank" rel="noopener nofollow noreferrer"><SPAN>New Exploits for Unsecure SAP Systems | CISA</SPAN></A></P></LI><LI><P><A href="https://www.cisa.gov/news-events/alerts/2016/05/11/exploitation-sap-business-applications" target="_blank" rel="noopener nofollow noreferrer"><SPAN>Exploitation of SAP Business Applications | CISA</SPAN></A></P></LI></UL></LI><LI>Feeds of logs and audit trails should be integrated into existing continuous monitoring programs to detect when SAP vulnerabilities are being exploited, SAP users are compromised or any other type of threat is affecting SAP Applications. These types of signals are extremely important to understand what happens through an SAP Application and to proactively detect potential threats.</LI></UL><P>If you are interested on reading more of this research, the report is available for download at both Onapsis and Flashpoint sites (SAP community policies do not allow to add the link directly on this blog).&nbsp;</P><P>&nbsp;</P> 2024-05-03T07:57:35.500000+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/grc-tuesdays-automate-compliance-with-anti-forced-labour-regulations/ba-p/13687907 GRC Tuesdays: Automate compliance with anti-forced labour regulations 2024-05-07T07:00:00.014000+02:00 T_Frenehard https://community.sap.com/t5/user/viewprofilepage/user-id/215222 <P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_0-1714525577927.jpeg" style="width: 500px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104194i32DB8635D2B1E9A6/image-dimensions/500x251?v=v2" width="500" height="251" role="button" title="T_Frenehard_0-1714525577927.jpeg" alt="T_Frenehard_0-1714525577927.jpeg" /></span></P><P>Over 6 years ago now, I posted a blog <A href="https://community.sap.com/t5/technology-blogs-by-sap/grc-tuesdays-combating-modern-slavery-it-s-more-than-compliance-it-s-ethics/ba-p/12827886" target="_blank">GRC Tuesdays: Combating Modern Slavery—It’s More Than Compliance, It’s Ethics!</A> mentioning that many countries across the globe were reviewing their response to exploitation in supply chains with parliamentary debates on new regulations coming into addition/replacement to what was already in place such as Dodd-Frank Act’s in the United States that rules on conflict mineral disclosure, the UK’s Modern Slavery Act, Netherlands’ Child Labour Due Diligence Law and France’s law imposing due diligence to prevent human rights abuses in supply chains.</P><P>This topic is becoming more and more prominent and forced labour is an integral part of “Erosion of human rights”, one of the key risks cited by the World Economic Forum in its <A href="https://www.weforum.org/publications/global-risks-report-2024/" target="_blank" rel="noopener nofollow noreferrer">Global Risks Report 2024</A> published earlier this year:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_1-1714525577934.png" style="width: 502px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104195i59D465BDB6B3F3DC/image-dimensions/502x311?v=v2" width="502" height="311" role="button" title="T_Frenehard_1-1714525577934.png" alt="T_Frenehard_1-1714525577934.png" /></span></P><P>When discussing Environmental, Social, Governance (ESG) concerns with organizations, there are divergence in points of view of what needs to be done to implement the right processes – especially when it relates to reporting on metrics. There are even divergences on whether regulators around the globe will effectively enforce all the proposed legislations. But there is one ESG topic where I see a consensus: combatting forced labour is a necessity. Regardless of the industry or geography. And it seems that the recourse to legislation I had hinted to 6 years ago is now adding further pressure.</P><P>&nbsp;</P><H2 id="toc-hId-993602733"><STRONG>What is forced labour?</STRONG></H2><P>&nbsp;</P><P>When defining forced labour, most regulatory bodies refer to the definition by the International Labour Organization from its June 1930 <A href="https://www.ilo.org/global/topics/forced-labour/definition/lang--en/index.htm" target="_blank" rel="noopener nofollow noreferrer">Forced Labour Convention</A>: “forced or compulsory labour shall mean all work or service which is exacted from any person under the menace of any penalty and for which the said person has not offered himself voluntarily”.</P><P>Further to that, the International Labour Organization has developed indicators that individually or in conjunction, can indicate a forced labour situation:</P><UL><LI>Abuse of vulnerability</LI><LI>Deception</LI><LI>Restriction of movement</LI><LI>Isolation</LI><LI>Physical and sexual violence</LI><LI>Intimidation and threats</LI><LI>Retention of identity documents</LI><LI>Withholding of wages</LI><LI>Debt **bleep**</LI><LI>Abusive working and living conditions</LI><LI>Excessive overtime</LI></UL><P>&nbsp;</P><H2 id="toc-hId-797089228"><STRONG>Why should you care?</STRONG></H2><P>&nbsp;</P><P>Let’s start with the obvious: it’s ethics!</P><P>As <A href="https://www.cbp.gov/trade/forced-labor" target="_blank" rel="noopener nofollow noreferrer">stated</A> by the US Customs and Border Protection (CBP) quite eloquently: “Forced labor is a violation of basic human rights” and “Eradicating the use of forced labor is a moral imperative”.</P><P>As a matter of fact, the CBP has been tasked not only with identifying products made by forced labour and preventing them from entering the United States, they are also engaging on stopping them from being made in the first place.</P><P>And the United States are not the only country focusing on this matter. As listed in introduction, some European countries already had national legislation. But, on 23 February 2022, realizing that “voluntary action does not appear to have resulted in large scale improvement across sectors”, the European Commission adopted a <A href="https://commission.europa.eu/business-economy-euro/doing-business-eu/corporate-sustainability-due-diligence_en" target="_blank" rel="noopener nofollow noreferrer">proposal</A> for a Directive on corporate sustainability due diligence with the aim “to foster sustainable and responsible corporate behaviour and to anchor human rights and environmental considerations in companies’ operations and corporate governance”. The intent here is to provide a harmonised legal framework in the European Union, creating legal certainty and level playing field.</P><P>These rules that are expected to come into force around 2027 and fines for breaching the rules could be as much as <A href="https://www.reuters.com/world/europe/eu-parliament-member-states-agree-new-corporate-sustainability-law-2023-12-14/" target="_blank" rel="noopener nofollow noreferrer">5% of a company’s global turnover</A>.</P><P>And more geographies are following suit especially since “<A href="https://sdgs.un.org/goals/goal8#targets_and_indicators" target="_blank" rel="noopener nofollow noreferrer">Decent work and economic growth</A>” is one of UN Sustainable Development Goals (#8) with a dedicated target to “Take immediate and effective measures to eradicate forced labour, end modern slavery and human trafficking and secure the prohibition and elimination of the worst forms of child labour”.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_2-1714525577941.png" style="width: 501px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104196i2F0FF640FFE1A426/image-dimensions/501x308?v=v2" width="501" height="308" role="button" title="T_Frenehard_2-1714525577941.png" alt="T_Frenehard_2-1714525577941.png" /></span></P><P>&nbsp;</P><H2 id="toc-hId-600575723"><STRONG>What can you do about it?</STRONG></H2><P>&nbsp;</P><P>Eradicating forced labour won’t be achieved by individual organizations all by themselves, of course. And there is no single bullet (or tool) that will solve the issue on day 1 and ensure the company is compliant with the various regulations.</P><P>But there are steps that organizations can take. And technology and data traceability play a significant role in supporting anti-forced labour compliance. By providing monitoring capabilities and traceability of transactions, technology increases transparency of the supply chain as highlighted by KPMG in a dedicated webinar: <A href="https://kpmg.com/us/en/webcasts/2024/forced-labor-compliance-sap-gts.html" target="_blank" rel="noopener nofollow noreferrer">Forced Labor Compliance Using SAP GTS</A></P><P>During this session, <A href="mailto:francesxing@kpmg.com" target="_self" rel="nofollow noopener noreferrer">Frances Xing</A>&nbsp;– Managing Director, Trade &amp; Customs, Global Trade Technology, KPMG US, <A href="mailto:lclawson@kpmg.com" target="_self" rel="nofollow noopener noreferrer">Laura Clawson</A> – Senior Manager, Tax, Core ESG Team, KPMG US and Olesia Melnyk – Manager, Tax, Trade and Customs, KPMG US illustrated how <A href="https://sap.com/gts" target="_blank" rel="noopener noreferrer">SAP Global Trade Services</A> could be leveraged to support compliance with anti-forced labour regulations, with a special focus on the Uyghur Forced Labor Prevention Act (UFLPA):</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_3-1714525577949.png" style="width: 502px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104197i8053244397E1A041/image-dimensions/502x276?v=v2" width="502" height="276" role="button" title="T_Frenehard_3-1714525577949.png" alt="T_Frenehard_3-1714525577949.png" /></span></P><P>In summary, during the webcast, the KPMG thought leaders highlighted a few use cases including:</P><UL><LI>Utilizing sanctioned party list screening functionality to screen customers, suppliers, and other parties</LI><LI>Leveraging preference supplier solicitation functionality to effectively solicit and manage supplier solicitations for documentation and evidence required by Customs authorities</LI><LI>Screening transactions against forced labour indicators (HTS classification, country of origin, others)</LI><LI>Building robust reports to make an informed decision on forced labour blocked transactions</LI></UL><P>What about you, how does your company prepare for these regulatory requirements? I look forward to reading your thoughts and comments either on this blog or on Twitter <A href="https://twitter.com/tfrenehard" target="_blank" rel="noopener nofollow noreferrer">@TFrenehard</A></P><P>And if you are interested in learning more about SAP solutions for Governance, Risk, and Compliance, feel free to fill-in the <A href="https://www.sap.com/registration/request-demo.html?product=237150e2-6555-4a16-b49e-e93dbf1891da&amp;productName=Governance%2C+Risk%2C+Compliance+%28GRC%29%2C+and+Cybersecurity&amp;pageTitle=Cybersecurity+and+Governance%2C+Risk%2C+and+Compliance+Software&amp;countryOfOrigin=en_au&amp;refererPagePath=https%3A%2F%2Fwww.sap.com%2Faustralia%2Fproducts%2Ffinancial-management%2Fgrc.html&amp;refererContentPath=%2Fcontent%2Fsapdx%2Flanguages%2Fen_gb%2Fproducts%2Ffinancial-management%2Fgrc&amp;navTitle=Request+a+Demo" target="_blank" rel="noopener noreferrer">demo request form</A>!</P> 2024-05-07T07:00:00.014000+02:00 https://community.sap.com/t5/technology-blogs-by-members/b2b-business-processes-ultimate-cyber-data-security-with-blockchain-and-sap/ba-p/13680992 B2B Business Processes - Ultimate Cyber Data Security - with Blockchain and SAP BTP 🚀 2024-05-07T09:54:43.546000+02:00 AndySilvey https://community.sap.com/t5/user/viewprofilepage/user-id/1397601 <P>B2B Business Processes - there are many Business Processes which cross Company and Organisation boundaries.</P><P>What has that got to do with Enterprise Blockchain and Cyber Security ?&nbsp; Let's find out.</P><P>This is a great Enterprise Blockchain story, it's one of my favourites, like the <A href="https://community.sap.com/t5/technology-blogs-by-members/bcp-business-continuity-planning-for-sap-s-4hana-made-easy-with-enterprise/ba-p/13647824" target="_self">BCP one</A>, it's so easy to implement and so effective and protects Data and Systems and Business Partners across so many dimensions, read on to find out why.</P><P>So buckle up and enjoy the ride...</P><P>B2B Business Processes, also known as, Multi-Party Collaboration, the following common Business Processes and others&nbsp; can all include elements of 3rd Party Organisation integration:</P><P style=" padding-left : 30px; ">Order-To-Cash<BR />Procure-To-Pay<BR />Plan-To-Produce/Plan-To-Inventory<BR />Record-To-Report<BR />Source-To-Pay<BR />Idea-To-Offering<BR />Count-To-Reconcile<BR />Forecast-To-Monitor<BR />Inspect-To-Comply<BR />Cradle-To-Grave/Acquire-To-Retire</P><P>Where ever you have a Business Process which includes sending your Data to a 3rd Party Organisation, to another Company, your Data is being put at risk. When ever you send or replicate or integrate your Company's Data to another Company your Data is at risk, and this means your Business Process is at risk and therefore your Business is at risk.</P><P>This blog is going to be talking about and showing is the weakness of the current approach of working with Data across multiple Organisations which collaborate together on a Business Process.</P><P>An easy example is 3PL 3rd Party Logistics.</P><P>Your Company needs something delivered and your S/4HANA system sends an instruction to the 3rd Party Logistics company to make a collection and a delivery.</P><P>This all looks very normal and very common, but what is actually happening when your Company sends an instruction from the S/4HANA system to the Delivery Planning System at your Partner Company the 3PL 3rd Party Logistics Company ?</P><P>Data, it's all about Data, your <EM>S/4HANA system is sending Data to your Business Partner the 3rd Party Logistics Company</EM>&nbsp;instructing them on where to collect from or deliver to.</P><P>And this is the problem, as soon as your Data leaves your network, it's no longer your Data, and you lose control of the Data.</P><P>This is a classical Integration scenario, the S/4HANA is Integrated to the 3rd Party Logistics Company's System and you send them your Data. What happens to that Data at your Business Partner is beyond your control, you can only trust that they will care for your Data the same way as they would care for their own Data.</P><P>This is how you are doing it today, with IDOCS and API's, this is legacy Data Integration through Replication:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cyber Security Risk SAP Customers have to share Master Data with Partners Legacy Integration through Data Replication atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/102974i8A91D0FB90C9B260/image-size/large?v=v2&amp;px=999" role="button" title="Cyber Security Risk SAP Customers have to share Master Data with Partners Legacy Integration through Data Replication atkrypto.io.png" alt="Cyber Security Risk SAP Customers have to share Master Data with Partners Legacy Integration through Data Replication atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Cyber Security Risk SAP Customers have to share Master Data with Partners Legacy Integration through Data Replication atkrypto.io</span></span></P><P>&nbsp;</P><P><STRONG>This creates several problems including</STRONG>:</P><P style=" padding-left : 30px; "><STRONG>Trust between Partners:&nbsp;</STRONG>The more Partners in a Business Transaction or Business Process, the less trust there is between Partners. This is a very simple graph, as the number of Partners in a Business Transaction or Business Process goes up, so the trust between the Partners goes down. What is trust in a Business Transaction or Business Process, doing what you said you would, data, instruction, confirmation. I will deliver the parcel to the address you gave me, but what if somebody in my Team changes the delivery address for their own benefit ?</P><P style=" padding-left : 30px; "><STRONG>Protect the Originality &amp; Integrity of the Data</STRONG><SPAN>&nbsp;</SPAN>- When your S/4HANA sends the Data to your Business Partner's System we need to make sure that the Data cannot be modified or destroyed and therefore protect the originality and integrity of the Data</P><P style=" padding-left : 30px; "><STRONG>Replicating &amp; Integrating the Data from your S/4HANA to your Business Partner's System and at the same time Protect the Originality &amp; Integrity of the Data</STRONG><SPAN>&nbsp;</SPAN>- we need to get the Data from the S/4HANA to the Business Partner's System and we need to be sure, to have surety that the Data which arrives at the Business Partner's System is the same Data as was sent from your S/4HANA. If this Data can be&nbsp; changed in any way, we won't be able to<SPAN>&nbsp;</SPAN><EM><STRONG>trust</STRONG></EM><SPAN>&nbsp;</SPAN>the Business Processes and Insights which are depending on that Data. And so, in the activity of moving the Data we need to make sure that that piece of Data cannot be modified or destroyed&nbsp;and therefore protect the originality and integrity of the Data</P><P>and it doesn't end there, it's often the case that a 3rd Party Organisation will be getting Data directly from your S/4HANA (as the Source) or posting Data to your S/4HANA (as the Target), in both cases it could be an API which through your Integration Technologies is ultimately exposed to the Internet and where the system calling the API needs to have a User on your S/4HANA.</P><P>And 3rd Party Logistics is only the tip of the iceberg when it comes to Multi-Party Collaboration and Business Transactions and Business Processes. You know how integrated your Systems are with your Business Partners how the data is flowing in and out of your network to and from your Partner's networks.</P><P>And so, here we are,&nbsp;</P><P style=" padding-left : 30px; "><STRONG>The biggest threat to B2B Business Processes is Cyber Security and Cyber Attacks</STRONG></P><P style=" padding-left : 30px; "><STRONG>The biggest threat to Multi-Party Collaboration is Cyber Security and Cyber Attacks</STRONG></P><P>And that's where the Enterprise Blockchain comes in, and this blog is going to explain why.</P><P>This blog will be less about deep dives into Use Cases and more about how Enterprise Blockchain is:</P><P style=" padding-left : 30px; ">. A Secure Store of Data</P><P style=" padding-left : 30px; ">. A Secure Communication Channel for Data</P><P style=" padding-left : 30px; ">. A Common Shared Single Source of Truth in your Organisation and across Organisations</P><P style=" padding-left : 30px; ">. The next generation Data Integration is about having a Common Shared Single Source of Truth</P><P>Subsequent blogs will deep dive individual use case by use case, this one will focus on the principle of Enterprise Blockchain already today being the next generation Secure Store and Secure Communication Channel for Data and how and why.</P><P>Ok let's go&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span></P><P>Welcome to the ninth blog in this series on Enterprise Blockchain and SAP. If you have been following the previous blogs then you'll be familiar with the blog template. We'll begin by talking about and framing the problem, in this case<SPAN>&nbsp;</SPAN><EM>Data Cyber Security for B2B Business Processes</EM><SPAN>&nbsp;</SPAN>and then go in to identifying the enabling technology which will have the best capabilities and be the most appropriate to solving the problem all the way through to the reference solution architecture to be able to implement the solution.</P><P>The blog is going to break the subject down in to three sections:</P><P style=" padding-left : 30px; "><STRONG>Section 1.0: The What is it of B2B Business Processes and SAP, and Enterprise Blockchain&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Section 2.0: The Why is it, of B2B Business Processes and SAP, and Enterprise Blockchain&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Section 3.0: The How is it,&nbsp; of B2B Business Processes and SAP, and Enterprise Blockchain</STRONG></P><P>In case you missed them, the previous blogs in this series are here:</P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_blank">Why I love SAP and Blockchain Databases and why you should too <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_blank">SAP Enterprise Architecture: Positioning Blockchain Database as an Enterprise Technology Standard <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_blank">SAP Enterprise Architecture: Let the Use Case find the Blockchain<span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/oil-amp-gas-ultimate-data-security-blockchain-data-backbone-from-ot-to-sap/ba-p/13640699" target="_blank">Oil &amp; Gas - Ultimate Data Security - Blockchain Data Backbone from OT to SAP IT<span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/the-what-is-the-why-to-the-how-to-of-esg-amp-sap-amp-enterprise-blockchain/ba-p/13642365" target="_blank">The What Is... The Why To... The How To... of: ESG &amp; SAP &amp; Enterprise Blockchain <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/bcp-business-continuity-planning-for-sap-s-4hana-made-easy-with-enterprise/ba-p/13647824" target="_blank">BCP: Business Continuity Planning for SAP S/4HANA - made easy with Enterprise Blockchain <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/trustable-ai-thanks-to-sap-ai-core-amp-sap-hana-cloud-amp-sap-s-4hana-amp/ba-p/13662822" target="_blank">Trustable AI thanks to - SAP AI Core &amp; SAP HANA Cloud &amp; SAP S/4HANA &amp; Enterprise Blockchain <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/iot-ultimate-data-cyber-security-with-enterprise-blockchain-and-sap-btp/ba-p/13676981" target="_blank">IoT - Ultimate Data Cyber Security - with Enterprise Blockchain and SAP BTP <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></SPAN></P><P style=" padding-left : 30px; ">&nbsp;</P><P><STRONG>tl:dr</STRONG></P><P>Enterprise Integrations and Integration Architecture centered around sending and replicating Data to Business Partners results in you losing control of your Data, and losing surety that the Business Partner is looking at the same Data as you are.</P><P>The Digital Transformation of Enterprise Integrations is to have a shared common single source of truth for data with your Business Partners.</P><P>Enterprise Blockchain is the answer, Enterprise Blockchain enables both Business Partners, you and your Business Partner to share the same Distributed Ledger and consequently have a common shared single source of truth for data across multiple Companies.</P><P>That's one thing, the next thing is that thanks to the special characteristics of the Enterprise Blockchain Distributed Ledger, namely, Immutable, Hash Mechanism, Consensus, Distributed, when you or your Business Partner write data to the Enterprise Blockchain, you know, that nobody can modify the Data for their own gains, your know that natively, out of the box you have the highest level of Data Cyber Security and Resilience of any commercial database product available.</P><P>In the 3PL scenario, this is what your SAP Technical Architecture would look like:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enterprise Blockchain as a Shared Common Single Source of Truth for Master and Transactional Data across Organisations with SAP BTP and atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/102990iC37F7791FF332DDF/image-size/large?v=v2&amp;px=999" role="button" title="Enterprise Blockchain as a Shared Common Single Source of Truth for Master and Transactional Data across Organisations with SAP BTP and atkrypto.io .png" alt="Enterprise Blockchain as a Shared Common Single Source of Truth for Master and Transactional Data across Organisations with SAP BTP and atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Enterprise Blockchain as a Shared Common Single Source of Truth for Master and Transactional Data across Organisations with SAP BTP and atkrypto.io</span></span></P><P>&nbsp;</P><P><SPAN>[</SPAN><EM>the finer technical details of the Technical Solution Architecture will be elaborated in the rest of the blog]</EM></P><P><STRONG>The Future of Enterprise Collaboration and Cross Organisation Data Integration and B2B Business Processes (and this is possible today with the SAP BTP and SAP Partner Edge Open EcoSystem Partner Enterprise Blockchain Products).</STRONG></P><P>And as will be explained later in the blog, it's not only about the Enterprise Blockchain being a common shared source of truth across organisations, it's about digitally decoupling the S/4HANA from 3rd Party System Integrations and gradually ring fencing the S/4HANA away from being directly accessed by 3rd Party Systems as it is today with API's.</P><P>This is like pick your own strawberries, instead of sending your Partners the strawberries, you tell your Partner the strawberries are ready and which field they are in and you let your Partners pick the strawberries themselves from the Enterprise Blockchain.</P><P>S/4HANA Data Events write the Data to the Enterprise Blockchain and S/4HANA Notification Events notify the Partner that something has happened, then, instead of calling an API on your SAP S/4HANA, the Partner then calls the API of the Enterprise Blockchain and Reads the Data from there.</P><P>The Enterprise Blockchain Database software is running on your SAP BTP Kyma Runtime and in your Partner's Servers, therefore, creating natively, out of the box, the most secure and resilient common shared single source of truth. Your have a Distributed Ledger running from your SAP BTP to the Partner's Servers.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103118iFC4879EAD29E50BE/image-size/large?v=v2&amp;px=999" role="button" title="Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io .png" alt="Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io</span></span></P><P>&nbsp;</P><P>Therefore, S/4HANA Data Event Writes to the Enterprise Blockchain as the Common Shared Single Source of Truth across the Organisations, and the S/4HANA Notification Event notifies the Partner that something has happened and that they should call the Enterprise Blockchain API to get the Data of what has happened.</P><P><STRONG>Enterprise Blockchain is:</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Store</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Communication Channel</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Shared Common Single Source of Truth for Master and Transactional Data across Organisations</STRONG></P><P><SPAN><STRONG>Enterprise Blockchain is the Cyber Security for Enterprise B2B Business Processes and Multi Party Collaboration.</STRONG></SPAN></P><P>&nbsp;</P><P>and now.... the long answer...</P><P>&nbsp;</P><P><STRONG>Section 1.0: The What is it of B2B Business Processes and SAP, and Enterprise Blockchain</STRONG></P><P>What are B2B Business Processes, what is Multi-Party Collaboration, what are 3rd Party Integrations, what is it all and why do we need it ?</P><P>B2B Business Processes, Multi-Party Collaboration, in the context of this subject,&nbsp; these are any Business Process in your Company which includes your Master and Transactional S/4HANA Data being used&nbsp; by another Company, and results in the other Company needing access to your Data.</P><P>There are many examples, in today's world of outsourcing that which is not considered part of the core Business, Multi-Party Collaboration is very common across most lines of the Business. Another easy and common one is outsources Payroll.</P><P>As described in <A href="https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/how-to-integrate-sap-s-4hana-cloud-with-third-party-payroll-provider/ba-p/13368965" target="_self">this blog</A>, by&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/305372">@mert_turan</a>&nbsp;, your Company is using a 3rd Party Payroll provider to take care of your Payroll, the process and the integration can look like this:</P><P>&nbsp;</P><P><A href="https://community.sap.com/legacyfs/online/storage/blog_attachments/2018/07/Prozess-Payroll.png" target="_self"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Payroll Process by Mert Turan" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103449i9FD9E750D0FE5F8F/image-size/large?v=v2&amp;px=999" role="button" title="Prozess-Payroll" alt="Payroll Process by Mert Turan" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Payroll Process by Mert Turan</span></span></A></P><P>&nbsp;</P><P>This is a classic example of a B2B Business Process, where your Company is sending highly sensitive and highly confidential Data, transferring that Data to a 3rd Party Company, in this case a 3rd Party Payroll Provider. Look at all of the Data transfers which are going on in that Payroll Business Process.</P><P>Just look at the sensitivity and confidentiality of the Data which is being transferred to the 3rd Party Company, Personal and Business Sensitive Master and Transactional Data.</P><P>What could possibly go wrong ?</P><P>What could possibly go wrong with any of these Multi-Party Collaborative Business Processes, Payroll, Supplier Network Collaboration, 3rd Party Logistics, Contract Manufacturing ?&nbsp;</P><P>What is the biggest risk ?&nbsp;</P><P>The Data, again, it's all about the Data, and keeping the Data safe, and reducing the chance that somebody can mess with the Data.</P><P><STRONG>What about the Enterprise Blockchain, what is Enterprise Blockchain ?</STRONG></P><P>Enterprise Blockchain is both:</P><P style=" padding-left : 30px; "><STRONG>. a Secure Store</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Communication Channel</STRONG></P><P><SPAN>McKinsey &amp; Company, in their&nbsp;</SPAN><A href="https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-blockchain" target="_self" rel="nofollow noopener noreferrer">December 2023 Featured Insights Publication</A><SPAN>, gave a beautiful description of what is unique and special about Blockchain, "</SPAN><EM>Blockchain is a secure database shared across a network of participants, where up-to-date information is available to all participants at the same time</EM><SPAN>". If we just pause for a moment and let that sink in, and think about what that means, to Business Processes, to Collaboration, to System Resilience, we start to see what is so special about Blockchain Databases and Distributed Ledger Technology.</SPAN></P><P>In these previous blogs, I made a deep dive in to what Enterprise Blockchain is and why we should be positioning it in our Enterprise Architecture:</P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_blank">Why I love SAP and Blockchain Databases and why you should too<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_blank">SAP Enterprise Architecture: Positioning Blockchain Database as an Enterprise Technology Standard<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_blank">SAP Enterprise Architecture: Let the Use Case find the Blockchain&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;<SPAN>&nbsp;</SPAN></A></P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103466i1F92B45FFAAD6512/image-size/large?v=v2&amp;px=999" role="button" title="Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io .png" alt="Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io</span></span></P><P>&nbsp;</P><P>and in a nutshell, Enterprise Blockchain is:</P><P style=" padding-left : 30px; "><EM><STRONG>. The Digital Transformation of Information Security into Cyber Security</STRONG></EM></P><P style=" padding-left : 30px; "><EM><STRONG>. The Next Generation Data Integrity, Originality, Confidentiality Protection</STRONG></EM></P><P style=" padding-left : 30px; "><STRONG>. Re-imagining Information Security</STRONG></P><P style=" padding-left : 30px; "><STRONG>. Natively, out of the box, due to its special characteristics the strongest, hardest, most resilient Enterprise Database product&nbsp;</STRONG></P><P>To wrap up this section:</P><P style=" padding-left : 30px; ">. B2B Business Processes are about Data</P><P style=" padding-left : 30px; ">. Enterprise Blockchain is about Cyber Security of Data</P><P>&nbsp;</P><P><STRONG>Section 2.0: The Why is it, of B2B Business Processes and SAP, and Enterprise Blockchain</STRONG></P><P><SPAN>So, why B2B Business Processes in the Enterprise IT, when implemented in conjunction with SAP Applications need Enterprise Blockchain ?</SPAN></P><P>Multi-Party Collaboration is about replicating Data to&nbsp; 3rd Party Company, and the Data, this is your Company's Data and in most cases highly sensitive and highly business and personally confidential.</P><P>The problem is the Cyber Security of getting the Data from the your Company's SAP S/4HANA to the 3rd Party Company's Application, and ensuring the originality and integrity of the highly sensitive and confidential Master and Transactional Data which you are replicating to the Partner Company remains intact.&nbsp;</P><P>As we talked about earlier, and this is worth repeating because this is the problem of Multi-Party Collaboration:</P><P style=" padding-left : 30px; "><STRONG>Trust between Partners:&nbsp;</STRONG>The more Partners in a Business Transaction or Business Process, the less trust there is between Partners. This is a very simple graph, as the number of Partners in a Business Transaction or Business Process goes up, so the trust between the Partners goes down. What is trust in a Business Transaction or Business Process, doing what you said you would, data, instruction, confirmation. I will deliver the parcel to the address you gave me, but what if somebody in my Team changes the delivery address for their own benefit ?</P><P style=" padding-left : 30px; "><STRONG>Protect the Originality &amp; Integrity of the Data</STRONG><SPAN>&nbsp;</SPAN>- When your S/4HANA sends the Data to your Business Partner's System we need to make sure that the Data cannot be modified or destroyed and therefore protect the originality and integrity of the Data</P><P style=" padding-left : 30px; "><STRONG>Replicating &amp; Integrating the Data from your S/4HANA to your Business Partner's System and at the same time Protect the Originality &amp; Integrity of the Data</STRONG><SPAN>&nbsp;</SPAN>- we need to get the Data from the S/4HANA to the Business Partner's System and we need to be sure, to have surety that the Data which arrives at the Business Partner's System is the same Data as was sent from your S/4HANA. If this Data can be&nbsp; changed in any way, we won't be able to<SPAN>&nbsp;</SPAN><EM><STRONG>trust</STRONG></EM><SPAN>&nbsp;</SPAN>the Business Processes and Insights which are depending on that Data. And so, in the activity of moving the Data we need to make sure that that piece of Data cannot be modified or destroyed&nbsp;and therefore protect the originality and integrity of the Data</P><P>ITSecurityWire.com, in their article,&nbsp;<A href="https://itsecuritywire.com/featured/best-practices-to-secure-data-integration/" target="_self" rel="nofollow noopener noreferrer">Best Practices to Secure Data Integration</A>, put it like this:</P><P><A href="https://itsecuritywire.com/featured/best-practices-to-secure-data-integration/" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1714416975462.png" style="width: 760px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103476i0DE5CD46D8CCDD4B/image-dimensions/760x564?v=v2" width="760" height="564" role="button" title="AndySilvey_0-1714416975462.png" alt="AndySilvey_0-1714416975462.png" /></span></A></P><P>The<A href="https://www.linkedin.com/advice/0/what-most-common-security-concerns-during-integration-duhbe" target="_self" rel="nofollow noopener noreferrer"> LinkedIn Community</A> describe the risks of Data integration like this:</P><P><A href="https://www.linkedin.com/advice/0/what-most-common-security-concerns-during-integration-duhbe" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1714417205615.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103477iE263E4F04A9345A3/image-dimensions/581x740?v=v2" width="581" height="740" role="button" title="AndySilvey_1-1714417205615.png" alt="AndySilvey_1-1714417205615.png" /></span></A></P><P>&nbsp;</P><P>Those are the problems with today's legacy ways of making your S/4HANA Master and Transaction Data available for 3rd Party Companies in your B2B Business Processes.</P><P>&nbsp;</P><P>And what's the solution ?&nbsp;&nbsp;</P><P>The solution is the Enterprise Blockchain as the Common Data Back Bone across Companies.</P><P>Instead of replicating and sending the Data to your Business Partner, you write the S/4HANA Data to the Enterprise Blockchain.</P><P>This is like pick your own strawberries, instead of sending your Partners the strawberries, you tell your Partner the strawberries are ready and which field they are in and you let your Partners pick the strawberries themselves from the Enterprise Blockchain.</P><P>S/4HANA Data Events write the Data to the Enterprise Blockchain and S/4HANA Notification Events notify the Partner that something has happened, then, instead of calling an API on your SAP S/4HANA, the Partner then calls the API of the Enterprise Blockchain and Reads the Data from there.</P><P>The Enterprise Blockchain Database software is running on your SAP BTP Kyma Runtime and in your Partner's Servers, therefore, creating natively, out of the box, the most secure and resilient common shared single source of truth. Your have a Distributed Ledger running from your SAP BTP to the Partner's Servers.</P><P>Therefore, S/4HANA Data Event Writes to the Enterprise Blockchain as the Common Shared Single Source of Truth across the Organisations, and the S/4HANA Notification Event notifies the Partner that something has happened and that they should call the Enterprise Blockchain API to get the Data of what has happened.</P><P>And as will be explained later in the blog, it's not only about the Enterprise Blockchain being a common shared source of truth across organisations, it's about digitally decoupling the S/4HANA from 3rd Party System Integrations and gradually ring fencing the S/4HANA away from being directly accessed by 3rd Party Systems as it is today with API's.</P><P>Imagine, as described in the previous blog, when we<SPAN>&nbsp;</SPAN><EM><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_self">let the Use Case find the Enterprise Blockchain</A></EM>, we have a Business Requirement, a Business Demand, to make Data for B2B Business Process the safest it can be, the most trustable that it can be.</P><P>When we look in our Enterprise Technology Standards, and we look for the Technology Standard in our Enterprise Portfolio which is<SPAN>&nbsp;</SPAN><EM><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">positioned to bring the strongest protection to Data, we find the Enterprise Blockchain</A></EM>.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_2-1714417544037.png" style="width: 768px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103480i5D02170CDC39C2A3/image-dimensions/768x388?v=v2" width="768" height="388" role="button" title="AndySilvey_2-1714417544037.png" alt="AndySilvey_2-1714417544037.png" /></span></P><P>&nbsp;</P><P><SPAN class="">Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io</SPAN></P><P>In the previous blogs, we have discussed in detail about the special characteristics of Enterprise Blockchain and just why it natively out of the box protects the integrity of data to a level that legacy database products cannot do, in a nutshell....</P><P><SPAN>B2B Business Processes are about Data</SPAN></P><P><SPAN>B2B Business Processes are about the Data that goes from your S/4HANA outside the boundaries of your Company and your Network and to Partner Company's Applications and Networks and Databases.</SPAN></P><P><SPAN>This means B2B Business Processes are about Data and the Data depends on a Database or a Datastore</SPAN></P><P><SPAN>What kind of Database do&nbsp;B2B Business Processes Data need ? What capabilities does the Database for the B2B Business Processes&nbsp; Data need to have ?</SPAN></P><P><SPAN>1. It must not be possible to modify the Data in the Database ]- the Database needs to be immutable</SPAN></P><P><SPAN>2. The Data in the Database, the integrity and originality of that Data must be protected to the highest level that is technically possible</SPAN></P><P><SPAN>3. The Data must be available with the highest availability, the Database must be resilient to attack</SPAN></P><P><SPAN>4. The Database must be running simutaneously in your DataCenter and your Business Partner's DataCenter</SPAN></P><P>5. S/4HANA must not expose any API's to Business Partner Companies</P><P><SPAN>When we look in our&nbsp;<A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">Enterprise Technology Standards we find 1 Technology Standard</A>&nbsp;in the Enterprise which has those capabilities, and that is..... Enterprise Blockchain</SPAN></P><P><SPAN>Enterprise Blockchain ticks those boxes...</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_3-1714417544025.png" style="width: 16px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103478iD26F8C30469C1899/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="AndySilvey_3-1714417544025.png" alt="AndySilvey_3-1714417544025.png" /></span>&nbsp;<SPAN>Immutable - tick that box</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_4-1714417544031.png" style="width: 17px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103479i602D544892334796/image-dimensions/17x17?v=v2" width="17" height="17" role="button" title="AndySilvey_4-1714417544031.png" alt="AndySilvey_4-1714417544031.png" /></span>&nbsp;<SPAN>Integrity must be protected to the highest level - tick that box, thanks to the Enterprise Blockchain Hash Mechanism and the Enterprise Blockchain Consensus Mechanism</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_5-1714417544034.png" style="width: 16px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103481iBA344C7168F0D648/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="AndySilvey_5-1714417544034.png" alt="AndySilvey_5-1714417544034.png" /></span>&nbsp;<SPAN>Highest level of resilience and availability - tick that box thanks to the Distributed and Decentralised nature of the Enterprise Blockchain</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_5-1714417544034.png" style="width: 16px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103481iBA344C7168F0D648/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="AndySilvey_5-1714417544034.png" alt="AndySilvey_5-1714417544034.png" /></span>&nbsp;DeCouples S/4HANA from the process, no need to S/4HANA API's to be exposed to 3rd Party Business Partner's Applications</P><P><SPAN>This is why, Enterprise Blockchain is the enabler of trustable outcomes from Enterprise B2B Business Processes.</SPAN></P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_6-1714417544041.jpeg" style="width: 772px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103482iF49614F1DFBC70A7/image-dimensions/772x386?v=v2" width="772" height="386" role="button" title="AndySilvey_6-1714417544041.jpeg" alt="AndySilvey_6-1714417544041.jpeg" /></span></P><P><EM><SPAN class="">atkrypto.io what is a blockchain</SPAN></EM></P><P>But there's more than that, B2B Business Processes can produce a lot of data, and the volumes of data can be big.</P><P>And this is why, in this blog we take the Enterprise Blockchain Technology story one level further and we introduce the:</P><P style=" padding-left : 30px; ">Enterprise Blockchain Wallet</P><P style=" padding-left : 30px; ">Off-Chain Data Storage</P><P>In the Enterprise Blockchain Platforms, the Enterprise Blockchain Wallet is used for Off-Chain storage of big data and in the following paragraphs we will explain why.</P><P>What is the Enterprise Blockchain Wallet, and what is Off-Chain Data Storage and why would we use them and why do we need them ?</P><P>As we have explained<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_self">in a previous blog</A>, the Enterprise Blockchain Database, the Distributed Ledger, can be looked at simply as a Database Table (which is replicated and synchronised across multiple Servers) and in principle it stores the Data like this:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_7-1714417543852.jpeg" style="width: 759px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103483iB8BF992C4F7704AB/image-dimensions/759x385?v=v2" width="759" height="385" role="button" title="AndySilvey_7-1714417543852.jpeg" alt="AndySilvey_7-1714417543852.jpeg" /></span></P><P><SPAN class="">Blockchain is a very simple form of database atkrypto.io</SPAN></P><P>This is fine, and suited to what we call<SPAN>&nbsp;</SPAN><A href="https://aws.amazon.com/compare/the-difference-between-structured-data-and-unstructured-data/#:~:text=Structured%20data%20is%20data%20that,files%20and%20large%20text%20documents." target="_self" rel="nofollow noopener noreferrer">Structured Data</A>, and as AWS nicely describe,<SPAN>&nbsp;</SPAN><A href="https://aws.amazon.com/what-is/structured-data/" target="_self" rel="nofollow noopener noreferrer">Structured Data</A><SPAN>&nbsp;</SPAN>is information like words and numbers. This kind of data is perfectly suited to being stored in an Enterprise Blockchain Database and also a legacy Database. Examples of the data would Names, Addresses, Phone Numbers, Product Information etc.</P><P>But, Payroll can produce a lot of Data, and in large volumes which would&nbsp;be too big to be stored on the Enterprise Blockchain Database itself.</P><P>And that's ok, Enterprise Blockchain Platforms are ready for that, and have been designed to store both Structured Data and Data which is in files which are so big that they cannot be stored in the Enterprise Blockchain Database itself, for example the photographs from a Waste Truck's onboard camera proving that waste was responsibly tipped in the correct location and taken at the same time as recording GPS location coordinates proving the location of the Waste Truck.</P><P>So, if we can't store the large photographs files in large quantities to the Enterprise Blockchain Database, then how, in an Enterprise Blockchain Platform do we store large files of Data ?</P><P>Voila.... bring in the Enterprise Blockchain Platform Wallet. The best Enterprise Blockchain Platform products include what is called the Enterprise Blockchain Platform Wallet, or to make it shorter, the Enterprise Blockchain Wallet.</P><P>The Enterprise Blockchain Wallet enables us to store large Data, like large Files safely and securely off the chain, or '<A href="https://www.bitdegree.org/crypto/learn/crypto-terms/what-is-off-chain" target="_self" rel="nofollow noopener noreferrer">Off-Chain</A>'.&nbsp;</P><P>But if we store the large Data files Off-Chain in the Enterprise Blockchain Wallet, then how do we also have them some how on the Enterprise Blockchain Database ?</P><P>The way this works is elegant, in any decent Enterprise Blockchain Platform, the Enterprise Blockchain Wallet location is completely configurable, and could be anywhere from<SPAN>&nbsp;</SPAN><A href="https://www.sap.com/norway/products/technology-platform/hana/features/cloud-data-lake.html" target="_self" rel="noopener noreferrer">SAP HANA Cloud (Data Lake)</A>, or for example&nbsp;multiple hyperscaler object stores, such as Amazon S3, OSS (Alicloud Object Storage<BR />Service), SAP HANA Cloud, Data Lake, and Azure Blob Storage.</P><P>The configurable Enterprise Blockchain Wallet of the Enterprise Blockchain Platform looks like this:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_8-1714417544026.jpeg" style="width: 764px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103484i7ABA58A3F3211791/image-dimensions/764x427?v=v2" width="764" height="427" role="button" title="AndySilvey_8-1714417544026.jpeg" alt="AndySilvey_8-1714417544026.jpeg" /></span></P><P><SPAN class="">Enterprise Blockchain Platform - Enterprise Blockchain Wallets - Configurable Enterprise Wallets - atkrypto.io</SPAN></P><P>Ok, so we've got the large volumes of Data stored in the (configurable) Enterprise Blockchain Wallet, but what about securing the Data ? Obviously the Enterprise Blockchain Wallet storage location has built in security, for example the SAP HANA Cloud, the AWS S3 Buckets, but we need more than the out of the box security of these products, the reason we are using the Enterprise Blockchain Database is because of the amazing security strengths that it natively out of the box has, and so, what about the Enterprise Blockchain Wallet, doesn't the Enterprise Blockchain Platform have some cool super hard way of protecting the data in the Enterprise Blockchain Wallet ?</P><P>Well yes it does, this is the magic of Enterprise Blockchain Database 'Off-Chain' storage in the Enterprise Blockchain Wallet. This is so unique to Blockchain Technologies.</P><P>What happens is this, when store data in the Enterprise Blockchain Wallet, the Enterprise Blockchain Platform software runs a hash algorithm over the data that we have stored and the data, and<SPAN>&nbsp;</SPAN><A href="https://codesigningstore.com/what-is-hashing-algorithm-how-it-works#:~:text=In%20cryptography%2C%20hashing%20is%20a,output%20of%20the%20same%20length." target="_self" rel="nofollow noopener noreferrer">the large file gets hashed</A>:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_9-1714417544035.png" style="width: 693px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103486i83CF189B36A2E212/image-dimensions/693x205?v=v2" width="693" height="205" role="button" title="AndySilvey_9-1714417544035.png" alt="AndySilvey_9-1714417544035.png" /></span></P><P>&nbsp;</P><P>The data or the file in the Enterprise Blockchain Wallet gets hashed, and then, that hash is stored in the Enterprise Blockchain Database.</P><P>This means we now have a unique hash of that data or file, and if anybody or anything makes even the tiniest teeniest change to that data or file, next time we run a hash over that data or file the result will be different that the original hash which is safely stored in the Enterprise Blockchain Database and this is how we will know that the data has been changed and we cannot trust the Data and therefore we cannot use it for our Enterprise Business Processes.</P><P>On the other hand, if just before we load the data in to the SAP Enterprise Applications, eg SAP Asset Performance Management and SAP S/4HANA,&nbsp; from the Enterprise Blockchain Wallet, if we run a hash over the data and the hash result is the same as we have in the Enterprise Blockchain Database, then we will know we can trust the Data and we can use it in our SAP Applications and we will have trustable Data.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_10-1714417544032.jpeg" style="width: 764px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103485i9F24EC8DB66E5B5E/image-dimensions/764x430?v=v2" width="764" height="430" role="button" title="AndySilvey_10-1714417544032.jpeg" alt="AndySilvey_10-1714417544032.jpeg" /></span></P><P><SPAN class="">Enterprise Blockchain Wallet Data Hashes Stored in the Enterprise Blockchain Database - atkrypto.io</SPAN></P><P>&nbsp;</P><P><STRONG>And this is why, for all of these reasons,&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Trustable Enterprise B2B Business Processes depends on Data being stored in the Enterprise Blockchain</STRONG></P><P>&nbsp;</P><P>But that's not the end of the b2B Business Processes need Enterprise Blockchain.&nbsp;</P><P>As we showed at the beginning of the blog in this picture:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103493i11EBBF92E743C95A/image-size/large?v=v2&amp;px=999" role="button" title="Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io .png" alt="Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Enterprise Blockchain Multi Party Business Processes Data Sharing atkrypto.io</span></span></P><P>&nbsp;</P><P>&nbsp;</P><P>As the picture shows, we have an Enterprise Blockchain Database Tenant installed on a Server Host at the in your DataCenter, in your Network on your SAP BTP Kyma Service AND we have an Enterprise Blockchain Database Tenant installed on your B2B Business Partner's Network, if they are a SAP Customer then like you they can put it on the SAP BTP Kyma Service, if not they can run it on Kubernetes.</P><P>The consequence of this is that we have a distributed Enterprise Blockchain Database table which stretches from your DataCenter and Network where your S/4HANA is writing Data to it and stretches&nbsp; all the way across the Network to your Business Partner's DataCenter.</P><P>This means we have Enterprise Blockchain Data Protection from the source from your S/4HANA to the target your B2B Business Partner's It infrastructure enabling the trusted resilient reliable Business Processes to be completed.</P><P>At the same time, we are not exposing S/4HANA or the API's on the S/4HANA to any 3rd Party Applications.</P><P>We have digitally decoupled the S/4HANA from the Business Process.</P><P>And this is why we say, Enterprise Blockchain is a Secure Communication Channel, because instead of integrating Applications sending and replicating Data across Networks, we are sharing the Data across the Enterprise Blockchain and the Enterprise Blockchain is the Secure Communication Channel.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enterprise Blockchain as a Shared Common Single Source of Truth for Master and Transactional Data across Organisations with SAP BTP and atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103496i58458018AE29EF3B/image-size/large?v=v2&amp;px=999" role="button" title="Enterprise Blockchain as a Shared Common Single Source of Truth for Master and Transactional Data across Organisations with SAP BTP and atkrypto.io .png" alt="Enterprise Blockchain as a Shared Common Single Source of Truth for Master and Transactional Data across Organisations with SAP BTP and atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Enterprise Blockchain as a Shared Common Single Source of Truth for Master and Transactional Data across Organisations with SAP BTP and atkrypto.io</span></span></P><P>&nbsp;</P><P>To conclude this section, the<SPAN>&nbsp;</SPAN><EM>Why to, B2B Business Processes and Enterprise Blockchain</EM>, B2B Business Process Data needs to safely replicated and trustable.</P><P>Enterprise Blockchain, due to its native super strong security strength when used as a store of Data enables B2B Business Processes to be both Secure, and Trustable.</P><P><SPAN>And as we will see in the next section, it's not only about the Enterprise Blockchain being a common shared source of truth across Organisations, it's about digitally decoupling the S/4HANA from 3rd Party System Integrations and gradually ring fencing the S/4HANA away from being directly accessed by 3rd Party Systems as it is today with API's.</SPAN></P><P>&nbsp;</P><P><SPAN><STRONG>Section 3.0: The How is it,&nbsp; of B2B Business Processes and SAP, and Enterprise Blockchain</STRONG></SPAN></P><P>The goal of this blog was to show how instead of using the legacy fire and forget approach of replicating data to 3rd Party Business Partners, the Enterprise Blockchain can be deployed as a common shared single source of truth running, with an Enterprise Blockchain Tenant running close to your S/4HANA and another Enterprise Blockchain Tenant running close to your Business Partner's Application.</P><P>In this section of the blog we will show all of the possible potential Technical Solution Architectures which will enable you to implement this next generation approach to sharing Data with the highest level of Cyber Security already today.</P><P>As described above one of the many beauties of this approach is your S/4HANA writes to the Enterprise Blockchain and your Business Partner's Application reads from the same Enterprise Blockchain. This achieves a number of things including:</P><P>. Total Control - you have total control over the Data you are sharing with the Business Partner, and you know that as long as your Business Partner's Application reads the Data from the common shared source, the Enterprise Blockchain</P><P>. Ultimate Cyber Security - then you know the maximum has been done to minimise the chance for Cyber Security risks and the maximum has been done to protect originality, integrity, and confidentiality of the Data</P><P>. S/4HANA Digitally DeCoupled from the Business Process - and on top of this, the S/4HANA has been digitally disconnected from the Business Process, because no longer do any 3rd Party Applications directly call API's on the S/4HANA</P><P>In the Technical Solution Archecture there would be two main ways for getting the data from the S/4HANA and writing it to the Enterprise Blockchain, these would be:</P><P>. API's</P><P>. Events</P><P>In these Technical Solution Architecture examples we will prioritise using S/4HANA Events to write the Data to the Enterprise Blockchain, we will be sending the Event Notification and the Event Payload, we could of course draw the same Technical Solution Architecture with API's, but we prefer the Events for the simplicity and reduced call backs to the S/4HANA and therefore making the S/4HANA more Digitally DeCoupled and therefore, enabling the S/4HANA to be protected to the higher security level and exposed to less Cyber Security risk.</P><P>S/4HANA Data Events write the Data to the Enterprise Blockchain and S/4HANA Notification Events notify the Partner that something has happened, then, instead of calling an API on your SAP S/4HANA, the Partner then calls the API of the Enterprise Blockchain and Reads the Data from there.</P><P>The Enterprise Blockchain Database software is running on your SAP BTP Kyma Runtime and in your Partner's Servers, therefore, creating natively, out of the box, the most secure and resilient common shared single source of truth. Your have a Distributed Ledger running from your SAP BTP to the Partner's Servers.</P><P>Ok, let's go with the Technical Solution Architectures, in these examples we will focus on the OutSourced Payroll as the integration and B2B Business Process Example.</P><P>What do we have and what do we need:</P><P>Your Company will need:</P><P style=" padding-left : 30px; ">. S/4HANA</P><P style=" padding-left : 30px; ">. SAP EM and preferably SAP AEM since it has richer Security and Event Payload size capabilities and can Publish Events from Non-SAP Enterprise Applications and connect to your Enterprise Event Mesh</P><P style=" padding-left : 30px; ">. SAP BTP</P><P style=" padding-left : 30px; ">. SAP BTP Kyma Runtime Service - this is where the Enterprise Blockchain Container will run</P><P style=" padding-left : 30px; ">. Enterprise Blockchain Platform Software which can run on Kubernetes&nbsp;</P><P style=" padding-left : 30px; ">. If there will be larger Data objects then you will need Large Storage for Large Data and the Enterprise Blockchain Wallet in the form of&nbsp;&nbsp;<A href="https://www.sap.com/norway/products/technology-platform/hana/features/cloud-data-lake.html" target="_self" rel="noopener noreferrer">SAP HANA Cloud (Data Lake)</A></P><P>Your Business Partner will need:</P><P style=" padding-left : 30px; ">. Obviously their Payroll Application</P><P style=" padding-left : 30px; ">. Either SAP BTP with Kyma Runtime, or Servers which can run Kubernetes Containers</P><P style=" padding-left : 30px; ">. n.b. there is an Optional Technical Solution Architecture where you simply allow your Business Partner to read data from your Enterprise Blockchain where the Enterprise Blockchain Platform is running exclusively on your BTP, we will show that Option as well</P><P>Technical Reference Solution Architecture for SAP S/4HANA and SAP SuccessFactors and OutSourced 3rd Party Payroll Provider using Enterprise Blockchain as a Common Shared Single Source of Truth for Data and the Ultimate Cyber Data Security for B2B Business Processes...</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103791i21C7D097BB07A758/image-size/large?v=v2&amp;px=999" role="button" title="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain atkrypto.io.png" alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain atkrypto.io</span></span></P><P>&nbsp;</P><P>In the next example, we have the same basic Technical Solution Architecture as the previous example, except, this Reference Use Case is ready for the Enterprise Blockchain needed to be able to handle large volumes of data and brings the Enterprise Wallet in to the picture. In the Enterprise Blockchain Platform the Enterprise Wallet storage is configurable and therefore could be SAP HANA Cloud (DataLake) or AWS S3 Buckets or other HyperScaler Data stores.</P><P>All of the other Cyber Security characteristics remain the same, S/4 is digitally decoupled from the Business Partner, Enterprise Blockchain is used as a common shared single source of truth for Master and Transactional Data, and the Enterprise Blockchain Tenants are running in both your DataCenter (AnyPremise) and the Business Partner's DataCenter (AnyPremise):</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain &amp; Enterprise Wallet atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103850iECD5D7A39C33F86C/image-size/large?v=v2&amp;px=999" role="button" title="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain &amp; Enterprise Wallet atkrypto.io.png" alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain &amp; Enterprise Wallet atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain &amp; Enterprise Wallet atkrypto.io</span></span></P><P>&nbsp;</P><P>The next example Reference Technical Solution Architecture is a little bit different, let's assume, for their own reasons, your Business Partner is not going to run an Enterprise Blockchain Tenant in their (AnyPremise) DataCenter.</P><P>This is still fine, you will set up the Enterprise Blockchain Platform in your DataCenter(s) (AnyPremise) and your B2B Business Partner, in this case the outsourced 3rd Party Payroll Vendor will simply use API's to read and write to and from your Enterprise Blockchain.</P><P>All of the other benefits of the design remain the same, all of the other next generation Data sharing Cyber Security characteristics are still there,&nbsp;S/4 is digitally decoupled from the Business Partner, Enterprise Blockchain is used as a common shared single source of truth for Master and Transactional Data.</P><P>Here it is:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to your Enterprise Blockchain atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103851i3C3A80AFB9D5FEF3/image-size/large?v=v2&amp;px=999" role="button" title="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to your Enterprise Blockchain atkrypto.io.png" alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to your Enterprise Blockchain atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to your Enterprise Blockchain atkrypto.io</span></span></P><P>&nbsp;</P><P>Finally, we have the same Reference Technical Architecture as above, but to be able to cater for large volumes of Data we include the Enterprise Wallet in the design:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise your Blockchain &amp; Enterprise Wallet atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103852i18F7677AE8C70CBC/image-size/large?v=v2&amp;px=999" role="button" title="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise your Blockchain &amp; Enterprise Wallet atkrypto.io.png" alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise your Blockchain &amp; Enterprise Wallet atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise your Blockchain &amp; Enterprise Wallet atkrypto.io</span></span></P><P>&nbsp;</P><P>Ok let's wrap this up, the conclusions:</P><P>Ultimate Cyber Security for B2B Business Processes is Enterprise Blockchain, where the Enterprise Blockchain acts a common shared single source of truth for Data across Organisations</P><P>Enterprise Blockchain is:</P><P style=" padding-left : 30px; ">. A Secure Store of Data</P><P style=" padding-left : 30px; ">. A Secure Communication Channel for Data</P><P style=" padding-left : 30px; ">. A Common Shared Single Source of Truth in your Organisation and across Organisations</P><P style=" padding-left : 30px; ">. The next generation Data Integration is about having a Common Shared Single Source of Truth</P><P>The next generation Integrations don't replicate Data, that's legacy, the next generation Integrations use Enterprise Blockchain as a common shared single source of truth.</P><P><STRONG>The configurable Enterprise Blockchain Wallet enables you to store Big Data 'Off-Chain' and the hashes of the Data are stored safely and securely on the Enterprise Blockchain Database.</STRONG></P><P>&nbsp;</P><P>The good news is, as we discussed in the previous blog, this is no longer hype, we can do all of this today,<SPAN>&nbsp;</SPAN><SPAN>and now, within the&nbsp;</SPAN><A href="https://www.sap.com/norway/partners/partner-program/build.html" target="_self" rel="noopener noreferrer">SAP Partner Edge Open EcoSystem</A><SPAN>&nbsp;there are enabling technology Blockchain Products designed and built by SAP Experts specifically for the needs of SAP Customers to make doing Blockchain and SAP easy, and so you can do SAP and Blockchain, today it's real and there's nothing stopping you.</SPAN></P><P>So what are we waiting for ? Oh yeah, deep dive in to more use cases, ok, that will be the next blog.&nbsp;</P><P><SPAN>What do you think, are the words Blockchain, Web3, Distributed Ledger Technology, starting to appear in your Company's visions and technology visions ? What use cases are you looking at ? Let's chat about it in the comments.</SPAN></P><P>For now, over and out.</P><P>Andy Silvey.</P><P>Independent SAP Technical Architect and CEO of atkrypto.io</P><P>Author Bio:</P><P>Andy Silvey is a 25 years SAP Technology veteran&nbsp;[<EM>15 years SAP Basis and 10 years SAP Tech Arch including Tech, Integration, Security, Data from 3.1H to S/4HANA PCE on RISE and the BTP and everything in between, and<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/welcome-corner-blog-posts/andy-silvey-scn-moderator-spotlight/ba-p/13054438" target="_self">former SCN Moderator and Mentor alumni</A>].</EM></P><P data-unlink="true">Andy is also co-Founder of<SPAN>&nbsp;</SPAN>atkrypto&nbsp;<SPAN>&nbsp;</SPAN>inc, an startup whose ambition is to make Blockchain easy for Enterprise.</P><P>atkrypto.io's flagship product is the atkrypto Enterprise Blockchain Platform for SAP,&nbsp; and atkrypto.io is a SAP Partner Edge Open EcoSystem Partner.&nbsp;</P><P>The&nbsp;atkrypto Enterprise Blockchain Platform for SAP has been designed by SAP Independent Experts for the needs of SAP Customers and to be deployed on the SAP BTP Kyma Runtime Service and leverage native integration to SAP Products.</P><P>atkrypto&nbsp;Enterprise Blockchain Platform for SAP has a number of unique qualities, including being the only Blockchain software in the world which has a DataCenter version and a light mobile version which can run on Edge/IoT/Mobile devices and enables data to be written to the Blockchain at the Edge where that same Blockchain is running on a Server in the DataCenter, protecting the integrity and originality of data from the Edge to Insights. Taking Blockchain to the Data at the Edge instead of taking the Data to the Blockchain.</P><P><SPAN>All of this makes atkrypto,io the DePIN Decentralised Physical Infrastructure Network solution for Enterprise.</SPAN></P><P data-unlink="true"><SPAN>atkrypto is one of the&nbsp;Next20 startups&nbsp;&nbsp;being featured at&nbsp;TM Forum's DTW Ignite in Copenhagen in June&nbsp;</SPAN></P><P>If you will be at DTW24 come and talk to us about Cyber Security of SAP Data with Enterprise Blockchain.</P><P>&nbsp;</P><P>&nbsp;</P> 2024-05-07T09:54:43.546000+02:00 https://community.sap.com/t5/technology-blogs-by-members/ringfencing-amp-decoupling-s-4hana-with-enterprise-blockchain-and-sap-btp/ba-p/13639467 RingFencing & DeCoupling S/4HANA with Enterprise Blockchain and SAP BTP - Ultimate Cyber Security 🚀 2024-05-14T13:56:58.227000+02:00 AndySilvey https://community.sap.com/t5/user/viewprofilepage/user-id/1397601 <P>tl;dr</P><P>As part of S/4HANA Transformation Programs, Security, Accessibility, Resilience are being re-imagined.</P><P>The going in position for a lot of S/4HANA Transformation Programs includes the Cyber Security principles:</P><UL><LI>Only Employees will have direct access to the Digital Core as End Users</LI><LI>There will be no direct access to the Digital Core by 3rd Party Applications</LI></UL><P>The first principle, 'Only Employees will have direct access to the Digital Core as Users', decoupling the SAP system for External Users has been an architectural design pattern for more than a decade.&nbsp; For example, due to the extremely sensitive and confidential nature of Product LifeCycle Management Data, 13 years ago SAP were advocating, <A href="https://help.sap.com/docs/SAP_ERP/38b3b859b68e464c90164894f04503e9/467980226c3b4a17ab1181a29a0a2de5.html?q=SAP%20PLM%20DMZ" target="_self" rel="noopener noreferrer">building an empty SAP PLM system in the DMZ</A> which would use RFC's to communicate with the actual SAP PLM system in the Secure Network Zone:</P><P>&nbsp;</P><P><A href="https://help.sap.com/docs/SAP_ERP/38b3b859b68e464c90164894f04503e9/467980226c3b4a17ab1181a29a0a2de5.html?q=SAP%20PLM%20DMZ" target="_self" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1715237780340.png" style="width: 810px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107844iB7A8E744542D4B5C/image-dimensions/810x593?v=v2" width="810" height="593" role="button" title="AndySilvey_0-1715237780340.png" alt="AndySilvey_0-1715237780340.png" /></span></A></P><P>&nbsp;</P><P>The beauty of this design is that it decouples End User Access from the core SAP PLM system, therefore enhancing the security protection of the SAP PLM system.&nbsp;</P><P>Today's equivalent of that is to put the SAP Build Work Zone Launchpad in front of the S/4HANA Digital Core.</P><P>That is fine, that means the Digital Core is digitally decoupled for End Users,&nbsp; but what about Machine to Machine, Application to Application, 3rd Party Applications which want to get Data from the S/4HANA ?</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Do you really want 3rd Party Companies calling APIs on your Digital Core - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109763i172CAB6D70FBDD6E/image-size/large?v=v2&amp;px=999" role="button" title="Do you really want 3rd Party Companies calling APIs on your Digital Core - atkrypto.io .jpg" alt="Do you really want 3rd Party Companies calling APIs on your Digital Core - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Do you really want 3rd Party Companies calling APIs on your Digital Core - atkrypto.io</span></span></P><P>&nbsp;</P><P>When a 3rd Party Company calls an API on your S/4HANA Digital Core, you are replicating your Data to that 3rd Party Company.</P><P>How can the S/4HANA Digital Core be decoupled when 3rd Party Applications need to get Data from the S/4HANA, how can the&nbsp;S/4HANA Digital Core be architected in such a way that there are no Machine to Machine calls directly to the S/4HANA for the purpose of getting Data ?</P><P>As elaborated in more detail in a <A href="https://community.sap.com/t5/technology-blogs-by-members/b2b-business-processes-ultimate-cyber-data-security-with-blockchain-and-sap/ba-p/13680992" target="_self">previous blog</A>, API's enable your Data to be replicated to 3rd Party Applications which can also be in 3rd Party Partner Companies, and this brings a set of problems centered around:</P><P style=" padding-left : 30px; "><STRONG>Trust between Partners:&nbsp;</STRONG>The more Partners in a Business Transaction or Business Process, the less trust there is between Partners. This is a very simple graph, as the number of Partners in a Business Transaction or Business Process goes up, so the trust between the Partners goes down. What is trust in a Business Transaction or Business Process, doing what you said you would, data, instruction, confirmation. I will deliver the parcel to the address you gave me, but what if somebody in my Team changes the delivery address for their own benefit ?</P><P style=" padding-left : 30px; "><STRONG>Protect the Originality &amp; Integrity of the Data</STRONG><SPAN>&nbsp;</SPAN>- When your S/4HANA sends the Data to your Business Partner's System we need to make sure that the Data cannot be modified or destroyed and therefore protect the originality and integrity of the Data</P><P style=" padding-left : 30px; "><STRONG>Replicating &amp; Integrating the Data from your S/4HANA to your Business Partner's System and at the same time Protect the Originality &amp; Integrity of the Data</STRONG><SPAN>&nbsp;</SPAN>- we need to get the Data from the S/4HANA to the Business Partner's System and we need to be sure, to have surety that the Data which arrives at the Business Partner's System is the same Data as was sent from your S/4HANA. If this Data can be&nbsp; changed in any way, we won't be able to<SPAN>&nbsp;</SPAN><EM><STRONG>trust</STRONG></EM><SPAN>&nbsp;</SPAN>the Business Processes and Insights which are depending on that Data. And so, in the activity of moving the Data we need to make sure that that piece of Data cannot be modified or destroyed&nbsp;and therefore protect the originality and integrity of the Data</P><P>and it doesn't end there, it's often the case that a 3rd Party Organisation will be getting Data directly from your S/4HANA (as the Source) or posting Data to your S/4HANA (as the Target), in both cases it could be an API which through your Integration Technologies is ultimately exposed to the Internet and where the system calling the API needs to have a User on your S/4HANA.</P><P>As ever, the pattern is the same, the theme is the same,</P><P style=" padding-left : 30px; "><STRONG>it's all about the Data</STRONG></P><P style=" padding-left : 30px; "><STRONG>what are the security, sensitivity, confidentiality, availability, criticality requirements of the Data</STRONG></P><P>Ring Fencing S/4HANA raises the Cyber Security by reducing the attack surface.</P><P>The most secure way is with Enterprise Blockchain as a Data Ring Fence around the S/4HANA Digital Core, therefore digitally decoupling access and integration of the S/4HANA Data from other Applications.</P><P>The Enterprise Blockchain is:</P><P style=" padding-left : 30px; ">. Ring Fencing of the S/4HANA&nbsp;</P><P style=" padding-left : 30px; ">. S/4HANA does not expose API's directly to any 3rd Party Companies</P><P style=" padding-left : 30px; ">. A Secure Store of Data</P><P style=" padding-left : 30px; ">. A Secure Communication Channel for Data</P><P style=" padding-left : 30px; ">. A Common Shared Single Source of Truth in your Organisation and across Organisations</P><P style=" padding-left : 30px; ">. The next generation Data Integration is about having a Common Shared Single Source of Truth</P><P>The S/4HANA Ring Fencing with Enterprise Blockchain as a shared single source of truth could involve the Enterprise Blockchain running on your SAP BTP Kyma Runtime and at the same time running on Kubernetes Servers in your Business Partner's Data Center:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108033iDE3DDBBCDEF532AC/image-size/large?v=v2&amp;px=999" role="button" title="S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io .jpg" alt="S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io</span></span></P><P>&nbsp;</P><P>Or alternatively the S/4HANA Ring Fencing with Enterprise Blockchain could be where the Enterprise Blockchain is running on your SAP BTP Kyma Runtime and your 3rd Party Business Partner Company reads the Data from your Enterprise Blockchain on your SAP&nbsp; BTP Kyma Runtime as a shared common single source of truth for the Data:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="S4HANA RingFenced by your own Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108035iACB5FCB38784CA5A/image-size/large?v=v2&amp;px=999" role="button" title="S4HANA RingFenced by your own Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io .jpg" alt="S4HANA RingFenced by your own Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">S4HANA RingFenced by your own Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io</span></span></P><P>&nbsp;</P><P>Read on for the full story... <span class="lia-unicode-emoji" title=":rocket:">🚀</span></P><P>&nbsp;</P><P>&nbsp;<STRONG>Introduction</STRONG></P><P>The reason I am so interested in this is I have been securing availability and accessibility of SAP systems for the last 25 years, and back in 2013 I wrote this blog about "<A href="https://community.sap.com/t5/technology-blogs-by-members/alternatives-for-securing-internet-facing-sap-applications/ba-p/13022930" target="_self">Alternatives for Securing Internet Facing Applications</A>".</P><P>There is so much to talk about on this subject, let's get in to it. Back in 2013 at a Customer, we were looking at Ring Fencing critical systems.</P><P>Back then the focus was on DeCoupling the SAP system where End User access was required from people coming in from the Internet, infact the reasons for the RingFencing were centered around:</P><P>&nbsp;</P><UL><LI>Access - Authentication &amp; Authorisation&nbsp;</LI><LI>Storage of Data</LI><LI>Communication Channels</LI><LI>DeCoupling especially for Internet Collaboration</LI></UL><P>&nbsp;</P><P>The DeCoupling for Internet Collaboration was based around SAP's <A href="https://help.sap.com/docs/SAP_ERP/930f133a36a843318dc3347afe00a9d6/19fb1caa59874deb8813bf399de8436f.html?version=6.18.latest" target="_self" rel="noopener noreferrer">SAP PLM Reference Architecture</A>,</P><P><A href="https://help.sap.com/docs/SAP_ERP/930f133a36a843318dc3347afe00a9d6/19fb1caa59874deb8813bf399de8436f.html?version=6.18.latest" target="_self" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1715242480140.png" style="width: 794px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107868i0C00E16A2EB6E3C7/image-dimensions/794x122?v=v2" width="794" height="122" role="button" title="AndySilvey_0-1715242480140.png" alt="AndySilvey_0-1715242480140.png" /></span></A></P><P>and the <A href="https://help.sap.com/docs/SAP_ERP/38b3b859b68e464c90164894f04503e9/467980226c3b4a17ab1181a29a0a2de5.html?q=SAP%20PLM%20DMZ" target="_self" rel="noopener noreferrer">SAP PLM Technical System Landscape recommendation</A>:</P><P><A href="https://help.sap.com/docs/SAP_ERP/38b3b859b68e464c90164894f04503e9/467980226c3b4a17ab1181a29a0a2de5.html?q=SAP%20PLM%20DMZ" target="_self" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1715242557723.png" style="width: 807px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107870i72E499A54D343B32/image-dimensions/807x585?v=v2" width="807" height="585" role="button" title="AndySilvey_1-1715242557723.png" alt="AndySilvey_1-1715242557723.png" /></span></A></P><P>&nbsp;</P><P>Fast forward to today, and SAP Customers have the luxury that the worry of securing End User Internet Access to their SAP systems is outsourced to SAP through the implementation of the <A href="https://help.sap.com/docs/build-work-zone-standard-edition/sap-build-work-zone-standard-edition/what-is-sap-build-work-zone-standard-edition" target="_self" rel="noopener noreferrer">SAP BTP Build Work Zone Launchpad</A>. It should not go unnoticed that when you implement the SAP BTP Build Work Zone Launchpad Service, you also don't have to care for Web Access Firewalls and the Security of Internet Access.</P><P>But what about API's, what about System to System, Machine to Machine ? What about Integrations ? What about when Non-SAP Applications in your Company or other Companies need data from the S/4HANA ?</P><P>S/4HANA has a rich collection of API's which is always growing, but, should Applications from your Partner Companies call API end points on the S/4HANA Digital Core ?</P><P>Should 3rd Party Applications, and 3rd Party Partner's Applications be directly accessing the Digital Core S/4HANA API's ?&nbsp;</P><P>Regardless of whether the S/4HANA is an [Any]OnPremise, S/4HANA RISE Private Cloud Edition, S/4HANA Public Cloud Edition, should 3rd Party Applications be allowed to directly call API's on your S/4HANA ?</P><P>Let's take the S/4HANA Business Partner API, should Applications from your Partner Companies be allowed/able to call this API on your Digital Core S/4HANA to retrieve changes to Business Partner Data ?</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Legacy API Integrations calling S4HANA API and Replicating Data to 3rd Party Company Applications - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107911i4605FDA55AA3DD21/image-size/large?v=v2&amp;px=999" role="button" title="Legacy API Integrations calling S4HANA API and Replicating Data to 3rd Party Company Applications - atkrypto.io.jpg" alt="Legacy API Integrations calling S4HANA API and Replicating Data to 3rd Party Company Applications - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Legacy API Integrations calling S4HANA API and Replicating Data to 3rd Party Company Applications - atkrypto.io</span></span></P><P>&nbsp;</P><P>If you have doubts or think the answer is no, then read on, there is a solution, it is very nice, and very easy, and very secure.</P><P>One of the biggest Cyber Security threats to your Data and therefore your Operations and therefore your Business, is allowing 3rd Party Applications from 3rd Party Companies to call Data from API's on your S/4HANA Digital Core, and then, replicate your Data to Servers in their Company.</P><P>As ever, the pattern is the same, the theme is the same,</P><P style=" padding-left : 30px; "><STRONG>it's all about the Data</STRONG></P><P style=" padding-left : 30px; "><STRONG>what are the security, sensitivity, confidentiality, availability, criticality requirements of the Data</STRONG></P><P>Like the other blogs in this series, this blog is going to break the subject down in to three sections:</P><P style=" padding-left : 30px; "><STRONG>Section 1.0: The What is it of RingFencing and DeCoupling S/4HANA, and Enterprise Blockchain&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Section 2.0: The Why is it, of RingFencing and DeCoupling S/4HANA, and Enterprise Blockchain&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Section 3.0: The How is it,&nbsp; of RingFencing and DeCoupling S/4HANA, and Enterprise Blockchain</STRONG></P><P>In case you missed them, the previous blogs in this series are here:</P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_blank">Why I love SAP and Blockchain Databases and why you should too&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_blank">SAP Enterprise Architecture: Positioning Blockchain Database as an Enterprise Technology Standard&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_blank">SAP Enterprise Architecture: Let the Use Case find the Blockchain&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/oil-amp-gas-ultimate-data-security-blockchain-data-backbone-from-ot-to-sap/ba-p/13640699" target="_blank">Oil &amp; Gas - Ultimate Data Security - Blockchain Data Backbone from OT to SAP IT&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/the-what-is-the-why-to-the-how-to-of-esg-amp-sap-amp-enterprise-blockchain/ba-p/13642365" target="_blank">The What Is... The Why To... The How To... of: ESG &amp; SAP &amp; Enterprise Blockchain&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/bcp-business-continuity-planning-for-sap-s-4hana-made-easy-with-enterprise/ba-p/13647824" target="_blank">BCP: Business Continuity Planning for SAP S/4HANA - made easy with Enterprise Blockchain&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/trustable-ai-thanks-to-sap-ai-core-amp-sap-hana-cloud-amp-sap-s-4hana-amp/ba-p/13662822" target="_blank">Trustable AI thanks to - SAP AI Core &amp; SAP HANA Cloud &amp; SAP S/4HANA &amp; Enterprise Blockchain&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></SPAN></P><P style=" padding-left : 30px; "><SPAN><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/iot-ultimate-data-cyber-security-with-enterprise-blockchain-and-sap-btp/ba-p/13676981" target="_blank">IoT - Ultimate Data Cyber Security - with Enterprise Blockchain and SAP BTP&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></SPAN></P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/b2b-business-processes-ultimate-cyber-data-security-with-blockchain-and-sap/ba-p/13680992" target="_blank">B2B Business Processes - Ultimate Cyber Data Security - with Blockchain and SAP BTP&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A>&nbsp;</P><P>&nbsp;</P><P><STRONG>Section 1.0: The What is it of RingFencing and DeCoupling S/4HANA, and Enterprise Blockchain</STRONG></P><P>What is RingFencing ? There is a very nice description <A href="https://fastercapital.com/content/Data-Security--Ringfencing-Your-Data--Strengthening-Cybersecurity-Measures.html" target="_self" rel="nofollow noopener noreferrer">here</A>:</P><P>&nbsp;</P><P><A href="https://fastercapital.com/content/Data-Security--Ringfencing-Your-Data--Strengthening-Cybersecurity-Measures.html" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1715261427109.png" style="width: 752px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108043i2533B5D86CC60AAB/image-dimensions/752x280?v=v2" width="752" height="280" role="button" title="AndySilvey_0-1715261427109.png" alt="AndySilvey_0-1715261427109.png" /></span></A></P><P>&nbsp;</P><P>RingFencing is about isolating Data, away from the most important SAP system, the S/4HANA Digital Core.</P><P>DeCoupling, the word DeCoupling has a number of meanings in Enterprise IT. What we are talking about here in the case of the S/4HANA Digital Core and Data access by 3rd Party Company Applications is that we are DeCoupling the Data access away from directly on the S/4HANA, by DeCoupling we are making the S/4HANA Data indirectly accessible.</P><P>It can be thought that if we are RingFencing, or Isolating, or DeCoupling the S/4HANA Data away from the S/4HANA then we are creating another copy of the Data, another Replica of the Data, which is true, we are, and that is the same as when Data is replicated to 3rd Party Systems via API, whichever way you look at it, the ultimate goal is a Replica of the S/4HANA Data which is available and accessible to the 3rd Party Company Application for the reasons of that Application of Business Transaction.</P><P>We can replicate the Data using an S/4HANA API to the 3rd Party Company Application and lose all control of the Data and also have to deal with how to secure Authentication and Authorisation and Network Access to the API, or we can replicate to our own RingFenced isolated trusted location.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP S4HANA RingFenced DeCoupled Data Cyber Security Principles - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108051i720015EC6E37F61F/image-size/large?v=v2&amp;px=999" role="button" title="SAP S4HANA RingFenced DeCoupled Data Cyber Security Principles - atkrypto.io .jpg" alt="SAP S4HANA RingFenced DeCoupled Data Cyber Security Principles - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP S4HANA RingFenced DeCoupled Data Cyber Security Principles - atkrypto.io</span></span></P><P>&nbsp;</P><P><STRONG>What about the Enterprise Blockchain, what is Enterprise Blockchain ?</STRONG></P><P>Enterprise Blockchain is:</P><P style=" padding-left : 30px; "><STRONG>. a Secure Store</STRONG></P><P style=" padding-left : 30px; "><STRONG>. a Secure Communication Channel</STRONG></P><P style=" padding-left : 30px; ">. <STRONG>A Common Shared Single Source of Truth in your Organisation and across Organisations</STRONG></P><P style=" padding-left : 30px; "><STRONG>. The next generation Data Integration is about having a Common Shared Single Source of Truth</STRONG></P><P><SPAN>McKinsey &amp; Company, in their&nbsp;</SPAN><A href="https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-blockchain" target="_self" rel="nofollow noopener noreferrer">December 2023 Featured Insights Publication</A><SPAN>, gave a beautiful description of what is unique and special about Blockchain, "</SPAN><EM>Blockchain is a secure database shared across a network of participants, where up-to-date information is available to all participants at the same time</EM><SPAN>". If we just pause for a moment and let that sink in, and think about what that means, to Business Processes, to Collaboration, to System Resilience, we start to see what is so special about Blockchain Databases and Distributed Ledger Technology.</SPAN></P><P>In these previous blogs, I made a deep dive in to what Enterprise Blockchain is and why we should be positioning it in our Enterprise Architecture:</P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_blank">Why I love SAP and Blockchain Databases and why you should too&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></P><P>&nbsp;</P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_blank">SAP Enterprise Architecture: Positioning Blockchain Database as an Enterprise Technology Standard&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></P><P style=" padding-left : 30px; "><A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_blank">SAP Enterprise Architecture: Let the Use Case find the Blockchain&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span>&nbsp;</A></P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108061i0B9C9B7C1EDECD31/image-size/large?v=v2&amp;px=999" role="button" title="S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io .jpg" alt="S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io</span></span></P><P>&nbsp;</P><P>and in a nutshell, Enterprise Blockchain is:</P><P style=" padding-left : 30px; "><EM><STRONG>. The Digital Transformation of Information Security into Cyber Security</STRONG></EM></P><P style=" padding-left : 30px; "><EM><STRONG>. The Next Generation Data Integrity, Originality, Confidentiality Protection</STRONG></EM></P><P style=" padding-left : 30px; "><STRONG>. Re-imagining Information Security</STRONG></P><P style=" padding-left : 30px; "><STRONG>. Natively, out of the box, due to its special characteristics the strongest, hardest, most resilient Enterprise Database product&nbsp;</STRONG></P><P>To wrap up this section:</P><P style=" padding-left : 30px; ">. RingFencing is about isolating and protecting Data</P><P style=" padding-left : 30px; ">. Enterprise Blockchain is about Cyber Security of Data</P><P>&nbsp;</P><P><STRONG>Section 2.0: The Why is it, of RingFencing and DeCoupling S/4HANA, and Enterprise Blockchain&nbsp;</STRONG></P><P>Why would we want to RingFence and DeCouple S/4HANA, the Digital Core from 3rd Party systems which legitimately need S/4HANA Data ?</P><P>The answer is simple, Cyber Security, Cyber Threats.</P><P>Not so long ago, the focus was on High Availability and Disaster Recovery, the biggest threat was the system going down and not coming back.</P><P>Today, things have changed, and the biggest threat is a malicious actor rendering our business Data unusable.</P><P>Today we know we can buy new servers, we know we can get a Data Center up and running, but how do we repair Data which has been maliciously rendered unusable ? Think about the <A href="https://www.ncsc.gov.uk/ransomware/home" target="_self" rel="nofollow noopener noreferrer">Ransomware</A> attack.</P><P>&nbsp;</P><P><A href="https://www.ncsc.gov.uk/ransomware/home" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1715622721595.png" style="width: 772px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109766iDE0DD72EEF3B0A4E/image-dimensions/772x336?v=v2" width="772" height="336" role="button" title="AndySilvey_0-1715622721595.png" alt="AndySilvey_0-1715622721595.png" /></span></A></P><P>&nbsp;</P><P>So what is <A href="https://fastercapital.com/content/Data-Security--Ringfencing-Your-Data--Strengthening-Cybersecurity-Measures.html" target="_self" rel="nofollow noopener noreferrer">ring fencing</A>&nbsp; and why do we need to do it ?</P><P>&nbsp;</P><P><A href="https://fastercapital.com/content/Data-Security--Ringfencing-Your-Data--Strengthening-Cybersecurity-Measures.html" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1715622817849.png" style="width: 761px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109767i880EBD11FE47EB7A/image-dimensions/761x232?v=v2" width="761" height="232" role="button" title="AndySilvey_1-1715622817849.png" alt="AndySilvey_1-1715622817849.png" /></span></A></P><P>&nbsp;</P><P>Ring Fencing is about reducing exposure to Cyber Threats.</P><P>What are the biggest easiest ways that we can reduce exposure to Cyber Threat ?</P><P style=" padding-left : 30px; "><STRONG>Stop 3rd Party Companies from calling API's on the S/4HANA Digital Core.</STRONG></P><P style=" padding-left : 30px; "><STRONG>Stop publishing API's for 3rd Party Application access on the S/4HANA Digital Core.</STRONG></P><P>Stop doing this:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Do you really want 3rd Party Companies calling APIs on your Digital Core - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109769iC3BBAFEE9323A8B9/image-size/large?v=v2&amp;px=999" role="button" title="Do you really want 3rd Party Companies calling APIs on your Digital Core - atkrypto.io .jpg" alt="Do you really want 3rd Party Companies calling APIs on your Digital Core - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Do you really want 3rd Party Companies calling APIs on your Digital Core - atkrypto.io</span></span></P><P>&nbsp;</P><P>And what's the solution ?&nbsp;&nbsp;</P><P>The solution is the Enterprise Blockchain as the Common Data Back Bone across Companies.</P><P>Instead of replicating and sending the Data to your Business Partner, you write the S/4HANA Data to the Enterprise Blockchain.</P><P>This is like pick your own strawberries, instead of sending your Partners the strawberries, you tell your Partner the strawberries are ready and which field they are in and you let your Partners pick the strawberries themselves from the Enterprise Blockchain.</P><P>S/4HANA Data Events write the Data to the Enterprise Blockchain and S/4HANA Notification Events notify the Partner that something has happened, then, instead of calling an API on your SAP S/4HANA, the Partner then calls the API of the Enterprise Blockchain and Reads the Data from there.</P><P>The Enterprise Blockchain Database software is running on your SAP BTP Kyma Runtime and in your Partner's Servers, therefore, creating natively, out of the box, the most secure and resilient common shared single source of truth. Your have a Distributed Ledger running from your SAP BTP to the Partner's Servers.</P><P>Therefore, S/4HANA Data Event Writes to the Enterprise Blockchain as the Common Shared Single Source of Truth across the Organisations, and the S/4HANA Notification Event notifies the Partner that something has happened and that they should call the Enterprise Blockchain API to get the Data of what has happened.</P><P>And as will be explained later in the blog, it's not only about the Enterprise Blockchain being a common shared source of truth across organisations, it's about digitally decoupling the S/4HANA from 3rd Party System Integrations and gradually ring fencing the S/4HANA away from being directly accessed by 3rd Party Systems as it is today with API's.</P><P>Imagine, as described in the previous blog, when we<SPAN>&nbsp;</SPAN><EM><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_self">let the Use Case find the Enterprise Blockchain</A></EM>, we have a Business Requirement, a Business Demand, to make Data for B2B Business Process the safest it can be, the most trustable that it can be.</P><P>When we look in our Enterprise Technology Standards, and we look for the Technology Standard in our Enterprise Portfolio which is<SPAN>&nbsp;</SPAN><EM><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">positioned to bring the strongest protection to Data, we find the Enterprise Blockchain</A></EM>.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109784i1ECEA63BF0102C5B/image-size/large?v=v2&amp;px=999" role="button" title="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io .png" alt="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io</span></span></P><P>&nbsp;</P><P>In the previous blogs, we have discussed in detail about the special characteristics of Enterprise Blockchain and just why it natively out of the box protects the integrity of data to a level that legacy database products cannot do, in a nutshell....</P><P><SPAN>B2B Business Processes are about Data</SPAN></P><P><SPAN>B2B Business Processes are about the Data that goes from your S/4HANA outside the boundaries of your Company and your Network and to Partner Company's Applications and Networks and Databases.</SPAN></P><P><SPAN>This means B2B Business Processes are about Data and the Data depends on a Database or a Datastore</SPAN></P><P><SPAN>What kind of Database do&nbsp;B2B Business Processes Data need ? What capabilities does the Database for the B2B Business Processes&nbsp; Data need to have ?</SPAN></P><P><SPAN>1. It must not be possible to modify the Data in the Database ]- the Database needs to be immutable</SPAN></P><P><SPAN>2. The Data in the Database, the integrity and originality of that Data must be protected to the highest level that is technically possible</SPAN></P><P><SPAN>3. The Data must be available with the highest availability, the Database must be resilient to attack</SPAN></P><P><SPAN>4. The Database must be running simutaneously in your DataCenter and your Business Partner's DataCenter</SPAN></P><P>5. S/4HANA must not expose any API's to Business Partner Companies</P><P><SPAN>When we look in our&nbsp;<A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">Enterprise Technology Standards we find 1 Technology Standard</A>&nbsp;in the Enterprise which has those capabilities, and that is..... Enterprise Blockchain</SPAN></P><P><SPAN>Enterprise Blockchain ticks those boxes...</SPAN></P><P>&nbsp;<SPAN>Immutable - tick that box</SPAN></P><P>&nbsp;<SPAN>Integrity must be protected to the highest level - tick that box, thanks to the Enterprise Blockchain Hash Mechanism and the Enterprise Blockchain Consensus Mechanism</SPAN></P><P>&nbsp;<SPAN>Highest level of resilience and availability - tick that box thanks to the Distributed and Decentralised nature of the Enterprise Blockchain&nbsp;</SPAN>DeCouples S/4HANA from the process, no need to S/4HANA API's to be exposed to 3rd Party Business Partner's Applications</P><P><SPAN>This is why, Enterprise Blockchain is the enabler of trustable outcomes from Enterprise B2B Business Processes.</SPAN></P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="atkrypto.io what is a blockchain" style="width: 930px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109785i88B9E15917C59179/image-size/large?v=v2&amp;px=999" role="button" title="atkrypto.io what is a blockchain.jpg" alt="atkrypto.io what is a blockchain" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">atkrypto.io what is a blockchain</span></span></P><P>&nbsp;</P><P>But there's more than that, B2B Business Processes can produce a lot of data, and the volumes of data can be big.</P><P>And this is why, in this blog we take the Enterprise Blockchain Technology story one level further and we introduce the:</P><P style=" padding-left : 30px; ">Enterprise Blockchain Wallet</P><P style=" padding-left : 30px; ">Off-Chain Data Storage</P><P>In the Enterprise Blockchain Platforms, the Enterprise Blockchain Wallet is used for Off-Chain storage of big data and in the following paragraphs we will explain why.</P><P>What is the Enterprise Blockchain Wallet, and what is Off-Chain Data Storage and why would we use them and why do we need them ?</P><P>As we have explained<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_self">in a previous blog</A>, the Enterprise Blockchain Database, the Distributed Ledger, can be looked at simply as a Database Table (which is replicated and synchronised across multiple Servers) and in principle it stores the Data like this:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Blockchain is a very simple form of database atkrypto.io" style="width: 896px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109786i522F51693A60D613/image-size/large?v=v2&amp;px=999" role="button" title="Blockchain is a very simple form of database atkrypto.io .jpg" alt="Blockchain is a very simple form of database atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Blockchain is a very simple form of database atkrypto.io</span></span></P><P>&nbsp;</P><P>This is fine, and suited to what we call<SPAN>&nbsp;</SPAN><A href="https://aws.amazon.com/compare/the-difference-between-structured-data-and-unstructured-data/#:~:text=Structured%20data%20is%20data%20that,files%20and%20large%20text%20documents." target="_self" rel="nofollow noopener noreferrer">Structured Data</A>, and as AWS nicely describe,<SPAN>&nbsp;</SPAN><A href="https://aws.amazon.com/what-is/structured-data/" target="_self" rel="nofollow noopener noreferrer">Structured Data</A><SPAN>&nbsp;</SPAN>is information like words and numbers. This kind of data is perfectly suited to being stored in an Enterprise Blockchain Database and also a legacy Database. Examples of the data would Names, Addresses, Phone Numbers, Product Information etc.</P><P>But, Payroll can produce a lot of Data, and in large volumes which would&nbsp;be too big to be stored on the Enterprise Blockchain Database itself.</P><P>And that's ok, Enterprise Blockchain Platforms are ready for that, and have been designed to store both Structured Data and Data which is in files which are so big that they cannot be stored in the Enterprise Blockchain Database itself, for example the photographs from a Waste Truck's onboard camera proving that waste was responsibly tipped in the correct location and taken at the same time as recording GPS location coordinates proving the location of the Waste Truck.</P><P>So, if we can't store the large photographs files in large quantities to the Enterprise Blockchain Database, then how, in an Enterprise Blockchain Platform do we store large files of Data ?</P><P>Voila.... bring in the Enterprise Blockchain Platform Wallet. The best Enterprise Blockchain Platform products include what is called the Enterprise Blockchain Platform Wallet, or to make it shorter, the Enterprise Blockchain Wallet.</P><P>The Enterprise Blockchain Wallet enables us to store large Data, like large Files safely and securely off the chain, or '<A href="https://www.bitdegree.org/crypto/learn/crypto-terms/what-is-off-chain" target="_self" rel="nofollow noopener noreferrer">Off-Chain</A>'.&nbsp;</P><P>But if we store the large Data files Off-Chain in the Enterprise Blockchain Wallet, then how do we also have them some how on the Enterprise Blockchain Database ?</P><P>The way this works is elegant, in any decent Enterprise Blockchain Platform, the Enterprise Blockchain Wallet location is completely configurable, and could be anywhere from<SPAN>&nbsp;</SPAN><A href="https://www.sap.com/norway/products/technology-platform/hana/features/cloud-data-lake.html" target="_self" rel="noopener noreferrer">SAP HANA Cloud (Data Lake)</A>, or for example&nbsp;multiple hyperscaler object stores, such as Amazon S3, OSS (Alicloud Object Storage<BR />Service), SAP HANA Cloud, Data Lake, and Azure Blob Storage.</P><P>The configurable Enterprise Blockchain Wallet of the Enterprise Blockchain Platform looks like this:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enterprise Blockchain Platform - Enterprise Blockchain Wallets - Configurable Enterprise Wallets - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109787i908D88B47AA86B97/image-size/large?v=v2&amp;px=999" role="button" title="Enterprise Blockchain Platform - Enterprise Blockchain Wallets - Configurable Enterprise Wallets - atkrypto.io .jpg" alt="Enterprise Blockchain Platform - Enterprise Blockchain Wallets - Configurable Enterprise Wallets - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Enterprise Blockchain Platform - Enterprise Blockchain Wallets - Configurable Enterprise Wallets - atkrypto.io</span></span></P><P>&nbsp;</P><P>Ok, so we've got the large volumes of Data stored in the (configurable) Enterprise Blockchain Wallet, but what about securing the Data ? Obviously the Enterprise Blockchain Wallet storage location has built in security, for example the SAP HANA Cloud, the AWS S3 Buckets, but we need more than the out of the box security of these products, the reason we are using the Enterprise Blockchain Database is because of the amazing security strengths that it natively out of the box has, and so, what about the Enterprise Blockchain Wallet, doesn't the Enterprise Blockchain Platform have some cool super hard way of protecting the data in the Enterprise Blockchain Wallet ?</P><P>Well yes it does, this is the magic of Enterprise Blockchain Database 'Off-Chain' storage in the Enterprise Blockchain Wallet. This is so unique to Blockchain Technologies.</P><P>What happens is this, when store data in the Enterprise Blockchain Wallet, the Enterprise Blockchain Platform software runs a hash algorithm over the data that we have stored and the data, and<SPAN>&nbsp;</SPAN><A href="https://codesigningstore.com/what-is-hashing-algorithm-how-it-works#:~:text=In%20cryptography%2C%20hashing%20is%20a,output%20of%20the%20same%20length." target="_self" rel="nofollow noopener noreferrer">the large file gets hashed</A>:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_8-1715623249902.png" style="width: 784px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109780i6359638B6E44B57D/image-dimensions/784x232?v=v2" width="784" height="232" role="button" title="AndySilvey_8-1715623249902.png" alt="AndySilvey_8-1715623249902.png" /></span></P><P>&nbsp;</P><P>&nbsp;</P><P>The data or the file in the Enterprise Blockchain Wallet gets hashed, and then, that hash is stored in the Enterprise Blockchain Database.</P><P>This means we now have a unique hash of that data or file, and if anybody or anything makes even the tiniest teeniest change to that data or file, next time we run a hash over that data or file the result will be different that the original hash which is safely stored in the Enterprise Blockchain Database and this is how we will know that the data has been changed and we cannot trust the Data and therefore we cannot use it for our Enterprise Business Processes.</P><P>On the other hand, if just before we load the data in to the SAP Enterprise Applications, eg SAP Asset Performance Management and SAP S/4HANA,&nbsp; from the Enterprise Blockchain Wallet, if we run a hash over the data and the hash result is the same as we have in the Enterprise Blockchain Database, then we will know we can trust the Data and we can use it in our SAP Applications and we will have trustable Data.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enterprise Blockchain Wallet Data Hashes Stored in the Enterprise Blockchain Database - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109788i3271545F050395A2/image-size/large?v=v2&amp;px=999" role="button" title="Enterprise Blockchain Wallet Data Hashes Stored in the Enterprise Blockchain Database - atkrypto.io .jpg" alt="Enterprise Blockchain Wallet Data Hashes Stored in the Enterprise Blockchain Database - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Enterprise Blockchain Wallet Data Hashes Stored in the Enterprise Blockchain Database - atkrypto.io</span></span></P><P>&nbsp;</P><P><STRONG>And this is why, for all of these reasons,&nbsp;</STRONG></P><P style=" padding-left : 30px; "><STRONG>Ring Fencing S/4HANA Digital Core&nbsp; depends on Data being stored in the Enterprise Blockchain</STRONG></P><P>&nbsp;</P><P>But that's not the end of the Ring Fencing need Enterprise Blockchain.&nbsp;</P><P>As we showed at the beginning of the blog in this picture:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109789iE2C8DF277B4A36A2/image-size/large?v=v2&amp;px=999" role="button" title="S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io .jpg" alt="S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">S4HANA RingFenced by Enterprise Blockchain S4HANA does not expose any APIs directly to 3rd Party Companies Ultimate Cyber Security - atkrypto.io</span></span></P><P>&nbsp;</P><P>As the picture shows, we have an Enterprise Blockchain Database Tenant installed on a Server Host at the in your DataCenter, in your Network on your SAP BTP Kyma Service AND we have an Enterprise Blockchain Database Tenant installed on your B2B Business Partner's Network, if they are a SAP Customer then like you they can put it on the SAP BTP Kyma Service, if not they can run it on Kubernetes.</P><P>The consequence of this is that we have a distributed Enterprise Blockchain Database table which stretches from your DataCenter and Network where your S/4HANA is writing Data to it and stretches&nbsp; all the way across the Network to your Business Partner's DataCenter.</P><P>This means we have Ring Fenced S/4HANA with Enterprise Blockchain Data Protection from the source from your S/4HANA to the target your B2B Business Partner's It infrastructure enabling the trusted resilient reliable Business Processes to be completed.</P><P>At the same time, we are not exposing S/4HANA or the API's on the S/4HANA to any 3rd Party Applications.</P><P>We have Ring Fenced and&nbsp; digitally decoupled the S/4HANA Data and Access from the Business Process.</P><P>And this is why we say, Enterprise Blockchain is a Secure Communication Channel, because instead of integrating Applications sending and replicating Data across Networks, we are sharing the Data across the Enterprise Blockchain and the Enterprise Blockchain is the Secure Communication Channel.</P><P>To conclude this section, the<SPAN>&nbsp;</SPAN><EM>Why to, B2B Ring Fencing S/4HANA and Enterprise Blockchain</EM>, B2B Business Process Data needs to safely replicated and trustable.</P><P>Enterprise Blockchain, due to its native super strong security strength when used as a store of Data enables B2B Business Processes to be both Secure, and Trustable.</P><P><SPAN>And as we will see in the next section, it's not only about the Enterprise Blockchain being a common shared source of truth across Organisations, it's about Ring Fencing and digitally decoupling the S/4HANA and removing the attack surface from 3rd Party System Integrations and gradually ring fencing the S/4HANA away from being directly accessed by 3rd Party Systems as it is today with API's.</SPAN></P><P>&nbsp;</P><P><SPAN><STRONG>Section 3.0: The How is it,&nbsp; of RingFencing and DeCoupling S/4HANA, and Enterprise Blockchain</STRONG></SPAN></P><P>The goal of this blog was to show how instead of using the legacy fire and forget approach of replicating data to 3rd Party Business Partners, the Enterprise Blockchain can be deployed as a common shared single source of truth running, with an Enterprise Blockchain Tenant running close to your S/4HANA and another Enterprise Blockchain Tenant running close to your Business Partner's Application. Thus Ring Fencing and Digitally DeCoupling S/4HANA Digital Core and bringing the highest level of Cyber Security and attacked surface reduction.</P><P>In this section of the blog we will show all of the possible potential Technical Solution Architectures which will enable you to implement this next generation approach to sharing Data with the highest level of Cyber Security already today.</P><P>As described above one of the many beauties of this approach is your S/4HANA writes to the Enterprise Blockchain and your Business Partner's Application reads from the same Enterprise Blockchain. This achieves a number of things including:</P><P>. Total Control - you have total control over the Data you are sharing with the Business Partner, and you know that as long as your Business Partner's Application reads the Data from the common shared source, the Enterprise Blockchain</P><P>. Ultimate Cyber Security - then you know the maximum has been done to minimise the S/4HANA attack surface and the chance for Cyber Security risks and the maximum has been done to protect originality, integrity, and confidentiality of the Data</P><P>. S/4HANA Ring Fenced and&nbsp; Digitally DeCoupled from the Business Process - and on top of this, the S/4HANA has been digitally disconnected from the Business Process, because no longer do any 3rd Party Applications directly call API's on the S/4HANA</P><P>In the Technical Solution Archecture there would be two main ways for getting the data from the S/4HANA and writing it to the Enterprise Blockchain, these would be:</P><P>. API's</P><P>. Events</P><P>In these Technical Solution Architecture examples we will prioritise using S/4HANA Events to write the Data to the Enterprise Blockchain, we will be sending the Event Notification and the Event Payload, we could of course draw the same Technical Solution Architecture with API's, but we prefer the Events for the simplicity and reduced call backs to the S/4HANA and therefore making the S/4HANA more Ring Fenced and Digitally DeCoupled and therefore, enabling the S/4HANA to be protected to the higher security level and exposed to less Cyber Security risk.</P><P>S/4HANA Data Events write the Data to the Enterprise Blockchain and S/4HANA Notification Events notify the Partner that something has happened, then, instead of calling an API on your SAP S/4HANA, the Partner then calls the API of the Enterprise Blockchain and Reads the Data from there.</P><P>The Enterprise Blockchain Database software is running on your SAP BTP Kyma Runtime and in your Partner's Servers, therefore, creating natively, out of the box, the most secure and resilient common shared single source of truth. Your have a Distributed Ledger running from your SAP BTP to the Partner's Servers.</P><P>Ok, let's go with the Technical Solution Architectures, in these examples we will focus on the OutSourced Payroll as the integration and B2B Business Process Example.</P><P>What do we have and what do we need:</P><P>Your Company will need:</P><P style=" padding-left : 30px; ">. S/4HANA</P><P style=" padding-left : 30px; ">. SAP EM and preferably SAP AEM since it has richer Security and Event Payload size capabilities and can Publish Events from Non-SAP Enterprise Applications and connect to your Enterprise Event Mesh</P><P style=" padding-left : 30px; ">. SAP BTP</P><P style=" padding-left : 30px; ">. SAP BTP Kyma Runtime Service - this is where the Enterprise Blockchain Container will run</P><P style=" padding-left : 30px; ">. Enterprise Blockchain Platform Software which can run on Kubernetes&nbsp;</P><P style=" padding-left : 30px; ">. If there will be larger Data objects then you will need Large Storage for Large Data and the Enterprise Blockchain Wallet in the form of&nbsp;&nbsp;<A href="https://www.sap.com/norway/products/technology-platform/hana/features/cloud-data-lake.html" target="_self" rel="noopener noreferrer">SAP HANA Cloud (Data Lake)</A></P><P>Your Business Partner will need:</P><P style=" padding-left : 30px; ">. Obviously their Payroll Application</P><P style=" padding-left : 30px; ">. Either SAP BTP with Kyma Runtime, or Servers which can run Kubernetes Containers</P><P style=" padding-left : 30px; ">. n.b. there is an Optional Technical Solution Architecture where you simply allow your Business Partner to read data from your Enterprise Blockchain where the Enterprise Blockchain Platform is running exclusively on your BTP, we will show that Option as well</P><P>Technical Reference Solution Architecture for SAP S/4HANA and SAP SuccessFactors and OutSourced 3rd Party Payroll Provider using Enterprise Blockchain as a Common Shared Single Source of Truth for Data and the Ultimate Cyber Data Security for B2B Business Processes...</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109796iAAEB8B150B86C587/image-size/large?v=v2&amp;px=999" role="button" title="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain atkrypto.io.png" alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain atkrypto.io</span></span></P><P>&nbsp;</P><P>In the next example, we have the same basic Technical Solution Architecture as the previous example, except, this Reference Use Case is ready for the Enterprise Blockchain needed to be able to handle large volumes of data and brings the Enterprise Wallet in to the picture. In the Enterprise Blockchain Platform the Enterprise Wallet storage is configurable and therefore could be SAP HANA Cloud (DataLake) or AWS S3 Buckets or other HyperScaler Data stores.</P><P>All of the other Cyber Security characteristics remain the same, S/4 is ring fenced and digitally decoupled from the Business Partner, Enterprise Blockchain is used as a common shared single source of truth for Master and Transactional Data, and the Enterprise Blockchain Tenants are running in both your DataCenter (AnyPremise) and the Business Partner's DataCenter (AnyPremise):</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain &amp; Enterprise Wallet atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109798i2EF01053D4CE9FE3/image-size/large?v=v2&amp;px=999" role="button" title="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain &amp; Enterprise Wallet atkrypto.io.png" alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain &amp; Enterprise Wallet atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to Enterprise Blockchain &amp; Enterprise Wallet atkrypto.io</span></span></P><P>&nbsp;</P><P>The next example Reference Technical Solution Architecture is a little bit different, let's assume, for their own reasons, your Business Partner is not going to run an Enterprise Blockchain Tenant in their (AnyPremise) DataCenter.</P><P>This is still fine, you will set up the Enterprise Blockchain Platform in your DataCenter(s) (AnyPremise) and your B2B Business Partner, in this case the outsourced 3rd Party Payroll Vendor will simply use API's to read and write to and from your Enterprise Blockchain.</P><P>All of the other benefits of the design remain the same, all of the other next generation Data sharing Cyber Security characteristics are still there,&nbsp;S/4 is ring fenced and digitally decoupled from the Business Partner, Enterprise Blockchain is used as a common shared single source of truth for Master and Transactional Data.</P><P>Here it is:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to your Enterprise Blockchain atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109799iF8BF786F376184ED/image-size/large?v=v2&amp;px=999" role="button" title="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to your Enterprise Blockchain atkrypto.io.png" alt="OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to your Enterprise Blockchain atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">OutSourced Payroll Process B2B Business Processes with S4HANA and Ultimate Data Cyber Security thanks to your Enterprise Blockchain atkrypto.io</span></span></P><P>&nbsp;</P><P>Finally, we have the same Reference Technical Architecture as above, but to be able to cater for large volumes of Data we include the Enterprise Wallet in the design.</P><P>&nbsp;</P><P>Ok let's wrap this up, the conclusions:</P><P>Ring Fencing the S/4HANA Digital Core substantially raises the Cyber Security and reduces the attack surface for 3rd Party Attackers, Ultimate Cyber Security for Ring Fencing S/4HANA&nbsp; is the Enterprise Blockchain, where the Enterprise Blockchain acts a common shared single source of truth for Data across Organisations</P><P>Enterprise Blockchain is:</P><P style=" padding-left : 30px; ">. Ring Fencing and Digitally DeCoupling the S/4HANA Digital Core</P><P style=" padding-left : 30px; ">. A Secure Store of Data</P><P style=" padding-left : 30px; ">. A Secure Communication Channel for Data</P><P style=" padding-left : 30px; ">. A Common Shared Single Source of Truth in your Organisation and across Organisations</P><P style=" padding-left : 30px; ">. The next generation Data Integration is about having a Common Shared Single Source of Truth</P><P>The next generation Integrations don't allow direct access to API's published in the S/4HANA and replicate Data, that's legacy, the next generation Integrations use Enterprise Blockchain as a common shared single source of truth.</P><P><STRONG>The configurable Enterprise Blockchain Wallet enables you to store Big Data 'Off-Chain' and the hashes of the Data are stored safely and securely on the Enterprise Blockchain Database.</STRONG></P><P>&nbsp;</P><P>The good news is, as we discussed in the previous blog, this is no longer hype, we can do all of this today,<SPAN>&nbsp;</SPAN><SPAN>and now, within the&nbsp;</SPAN><A href="https://www.sap.com/norway/partners/partner-program/build.html" target="_self" rel="noopener noreferrer">SAP Partner Edge Open EcoSystem</A><SPAN>&nbsp;there are enabling technology Blockchain Products designed and built by SAP Experts specifically for the needs of SAP Customers to make doing Blockchain and SAP easy, and so you can do SAP and Blockchain, today it's real and there's nothing stopping you.</SPAN></P><P>So what are we waiting for ? Oh yeah, deep dive in to more use cases, ok, that will be the next blog.&nbsp;</P><P><SPAN>What do you think, are the words Blockchain, Web3, Distributed Ledger Technology, starting to appear in your Company's visions and technology visions ? What use cases are you looking at ? Let's chat about it in the comments.</SPAN></P><P>For now, over and out.</P><P>Andy Silvey.</P><P>Independent SAP Technical Architect and CEO of atkrypto.io</P><P>Author Bio:</P><P>Andy Silvey is a 25 years SAP Technology veteran&nbsp;[<EM>15 years SAP Basis and 10 years SAP Tech Arch including Tech, Integration, Security, Data from 3.1H to S/4HANA PCE on RISE and the BTP and everything in between, and<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/welcome-corner-blog-posts/andy-silvey-scn-moderator-spotlight/ba-p/13054438" target="_self">former SCN Moderator and Mentor alumni</A>].</EM></P><P data-unlink="true">Andy is also co-Founder of<SPAN>&nbsp;</SPAN>atkrypto&nbsp;<SPAN>&nbsp;</SPAN>inc, an startup whose ambition is to make Blockchain easy for Enterprise.</P><P>atkrypto.io's flagship product is the atkrypto Enterprise Blockchain Platform for SAP,&nbsp; and atkrypto.io is a SAP Partner Edge Open EcoSystem Partner.&nbsp;</P><P>The&nbsp;atkrypto Enterprise Blockchain Platform for SAP has been designed by SAP Independent Experts for the needs of SAP Customers and to be deployed on the SAP BTP Kyma Runtime Service and leverage native integration to SAP Products.</P><P>atkrypto&nbsp;Enterprise Blockchain Platform for SAP has a number of unique qualities, including being the only Blockchain software in the world which has a DataCenter version and a light mobile version which can run on Edge/IoT/Mobile devices and enables data to be written to the Blockchain at the Edge where that same Blockchain is running on a Server in the DataCenter, protecting the integrity and originality of data from the Edge to Insights. Taking Blockchain to the Data at the Edge instead of taking the Data to the Blockchain.</P><P><SPAN>All of this makes atkrypto,io the DePIN Decentralised Physical Infrastructure Network solution for Enterprise.</SPAN></P><P data-unlink="true"><SPAN>atkrypto is one of the&nbsp;Next20 startups&nbsp;&nbsp;being featured at&nbsp;TM Forum's DTW Ignite in Copenhagen in June&nbsp;</SPAN></P><P>If you will be at DTW24 come and talk to us about Cyber Security of SAP Data with Enterprise Blockchain.</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P> 2024-05-14T13:56:58.227000+02:00 https://community.sap.com/t5/financial-management-blogs-by-members/security-by-default-vs-security-by-design-2/ba-p/13706057 Security by Default vs Security by Design # 2 2024-05-19T09:56:24.460000+02:00 GRCwithRaghu https://community.sap.com/t5/user/viewprofilepage/user-id/600573 <P>In my previous article, I’ve detailed about the nuances of securing SAP systems and the debate surrounding <STRONG>Security by default</STRONG> and <STRONG>Security by design</STRONG>. Those who missed it, can have a look at the blog post using this link.</P><P><A href="https://community.sap.com/t5/financial-management-blogs-by-members/security-by-default-vs-security-by-design/ba-p/13593897" target="_blank">https://community.sap.com/t5/financial-management-blogs-by-members/security-by-default-vs-security-by-design/ba-p/13593897</A></P><P>Now, let's further explore the imperative of adopting a “Security by design” approach within SAP environments. As mentioned, with cyber threats becoming increasingly sophisticated and pervasive, organizations must embed security considerations into every facet of SAP solutions is more critical than ever.</P><P><STRONG>The Evolution of Security by Design</STRONG></P><P><STRONG>Wait, I know you have in your mind! If Security by Design is important, why hasn't SAP included these features as standard?</STRONG></P><P>The concept of "Security by Design" has become increasingly vital to address various requirements to arrest Cyberattacks. “Security by Design” approach emphasizes integrating additional security measures in various levels of software systems and just not in the foundation. However, despite its recognized importance, some may wonder why SAP, hasn't made Security by Design a standard feature in its products?</P><P>The answer is simple!</P><P>SAP’s focus is ERP and automating and integrating various business functions, but not a core Cybersecurity function. However, SAP is bringing various solutions now starting from SAP GRC solution suite, till implementing of various frameworks such as NIST. Here is how SAP is bringing it’s various solutions to meet the NIST Cybersecurity framework:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GRCwithRaghu_0-1716105064873.png" style="width: 682px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/112698i11547A46552063D8/image-dimensions/682x349?v=v2" width="682" height="349" role="button" title="GRCwithRaghu_0-1716105064873.png" alt="GRCwithRaghu_0-1716105064873.png" /></span></P><P>Source: SAP</P><P>Before we understand how these solutions can be used, here are the few steps that you should implement. I am not covering this from a 7 layer perspective and as Security as the primary focus considering the “Security by Design” approach. The broad layers to be focused are:</P><OL><LI>Environment</LI><LI>System</LI><LI>Application</LI><LI>Processes, and</LI><LI>Organization</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GRCwithRaghu_1-1716105168070.png" style="width: 668px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/112699i83AABBE66EE9CDAA/image-dimensions/668x704?v=v2" width="668" height="704" role="button" title="GRCwithRaghu_1-1716105168070.png" alt="GRCwithRaghu_1-1716105168070.png" /></span><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GRCwithRaghu_2-1716105212393.png" style="width: 670px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/112700i011208F133D3F01E/image-dimensions/670x838?v=v2" width="670" height="838" role="button" title="GRCwithRaghu_2-1716105212393.png" alt="GRCwithRaghu_2-1716105212393.png" /></span></P><P>Security by design emphasizes proactive risk mitigation, empowering organizations to identify and address security vulnerabilities at the earliest stages. By conducting comprehensive risk assessments and threat modeling exercises, organizations can anticipate potential security threats and implement safeguards accordingly.</P><P>Additionally, relying solely on static security measures is insufficient in combating evolving cyber threats. Security by design advocates for the implementation of adaptive defense mechanisms that can dynamically respond to emerging threats in real-time. This includes leveraging machine learning (ML) algorithms and artificial intelligence (AI) to detect anomalous behavior and pre-emptively mitigate security risks.</P><P>In conclusion, the adoption of a security by design approach is indispensable for securing SAP environments in an increasingly volatile threat landscape. By integrating security considerations into every stage of the SAP development lifecycle, organizations can mitigate risks, enhance resilience, and safeguard critical assets from cyber threats. I will provide more detailed insights into each of these levels in my next article. Stay tuned!</P><P>&nbsp;</P> 2024-05-19T09:56:24.460000+02:00