Security

Securing your application.

Securing Applications

We strongly recommend that applications implement the necessary authentication and authorization mechanisms to safeguard exposed workloads. This includes implicitly exposed tenant workloads and explicitly exposed service workloads.

When using SAP Authorization and Trust Management Service in the application, this can be done as explained in this guide.

Istio

You may also consider using Istio’s security features, for instance using specific workload selectors to secure exposed workloads.