Security
Securing your application.
less than a minute
Securing Applications
We strongly recommend applications to implement any necessary authentication and authorization mechanisms to safeguard exposed workloads. This includes implicitly exposed tenant workloads or explictly exposed service workloads.
When using SAP Authorization and Trust Management Service in the app, this may be done as explained in this guide.
Istio
You may also consider using some of Istio’s security features for instance using specific workload selectors to secure exposed workloads.