{"id":11005,"date":"2024-04-23T10:17:35","date_gmt":"2024-04-23T08:17:35","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=11005"},"modified":"2024-05-16T13:09:56","modified_gmt":"2024-05-16T11:09:56","slug":"migration-to-s-4hana","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/","title":{"rendered":"MIGRATION TO S\/4HANA"},"content":{"rendered":"<p>With an eye on 2027, many companies using SAP\u2019s enterprise management solution (SAP ERP 6.0) are wondering when is the best time to start their migration to S\/4HANA and whether it is a good time to enhance their system security.<\/p>\n<p>As we know, the types of maintenance offered by SAP are as follows:<\/p>\n<ul>\n<li><strong>Mainstream Maintenance<\/strong>: standard maintenance support service for applications. For SAP Business Suite 7 (SAP ERP 6.0) it ends on 12\/31\/2027.<\/li>\n<li><strong>Extended Maintenance<\/strong>: extended support maintenance service until 12\/31\/2030. It has an additional cost and is included in RISE.<\/li>\n<li><strong>Customer-Specific Maintenance<\/strong>: basic maintenance support service with no expiration date. It has an additional cost for addressing unknown issues.<\/li>\n<\/ul>\n<h2>How does the choice of architecture affect security?<\/h2>\n<ul>\n<li>In an On-Premise architecture, the organization is responsible for security and access.<\/li>\n<li>In a Cloud architecture, the organization is responsible for access and application layer security, but not the rest of the system security.<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-11003\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/migracion-S-4HANA.png\" alt=\"\" width=\"698\" height=\"316\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/migracion-S-4HANA.png 1530w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/migracion-S-4HANA-300x136.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/migracion-S-4HANA-1024x464.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/migracion-S-4HANA-600x272.png 600w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><\/p>\n<p>When preparing for the transition to S\/4HANA, how does the transition approach affect system security?<\/p>\n<ul>\n<li><strong>New Implementation:<\/strong>\n<ul>\n<li>Security by default in SAP systems installed from 2021 onward.<\/li>\n<li>Need to define a role model (authorizations).<\/li>\n<\/ul>\n<\/li>\n<li><strong>System Conversion\/Selective Data Transition (migration):<\/strong>\n<ul>\n<li>Possibility to increase system security during the migration process.<\/li>\n<li>Need to adapt the role model to S\/4HANA.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>When it comes to migration, when is the best time to improve security and access?<\/p>\n<ul>\n<li><strong>Before migratio<\/strong>n: it is a good option for those organizations planning the migration to S\/4HANA and want to improve system security in the meantime, as migrating a role model based on best practices to S\/4HANA is very straightforward.<\/li>\n<li><strong>During the migration<\/strong>: it is the ideal option, as it leverages the effort of reviewing business processes to validate changes in security and the role model.<\/li>\n<li><strong>After migration<\/strong>: less recommended scenario, as it would involve revalidating all business processes with the new security options and the new role model.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Regarding SAP security during the migration to S\/4HANA, SAP has a security standard, called the SAP Security Baseline, which is applied by default to all SAP systems installed from 2021. This standard covers ABAP, JAVA, HANA databases, and BTP technologies.<\/p>\n<p>If the organization starts from an SAP ERP 6.0, it can apply this standard before migrating to SAP S\/4HANA or during the migration process and take advantage of the system validation process.<\/p>\n<p>At Inprosec, we specialize in helping companies increase the security levels of their SAP systems, as well as improve user access management and reduce risks of segregation of duties to comply with the principle of least privilege. If you need to delve deeper into any of these aspects, do not hesitate to contact us.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With an eye on 2027, many companies using SAP\u2019s enterprise management solution (SAP ERP 6.0) are wondering when is the best time to start their migration to S\/4HANA and whether it is a good time to enhance their system security. As we know, the types of maintenance offered by SAP are as follows: Mainstream Maintenance:&#8230;<\/p>\n","protected":false},"author":6,"featured_media":11020,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[61],"tags":[153],"class_list":["post-11005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-security-en-2","tag-sap-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>MIGRATION TO S\/4HANA - Inprosec<\/title>\n<meta name=\"description\" content=\"Discover how and when to implement a secure migration to S\/4HANA before 2027. We explore SAP maintenance options, the impact of architecture on security, and the optimal times to enhance system protection during the transition process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MIGRATION TO S\/4HANA\" \/>\n<meta property=\"og:description\" content=\"Discover how and when to implement a secure migration to S\/4HANA before 2027. We explore SAP maintenance options, the impact of architecture on security, and the optimal times to enhance system protection during the transition process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-23T08:17:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T11:09:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/migracion-SAP-S-4HANA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"MIGRATION TO S\\\/4HANA\",\"datePublished\":\"2024-04-23T08:17:35+00:00\",\"dateModified\":\"2024-05-16T11:09:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/\"},\"wordCount\":441,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/migracion-SAP-S-4HANA.jpg\",\"keywords\":[\"SAP Security\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/\",\"name\":\"MIGRATION TO S\\\/4HANA - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/migracion-SAP-S-4HANA.jpg\",\"datePublished\":\"2024-04-23T08:17:35+00:00\",\"dateModified\":\"2024-05-16T11:09:56+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"Discover how and when to implement a secure migration to S\\\/4HANA before 2027. We explore SAP maintenance options, the impact of architecture on security, and the optimal times to enhance system protection during the transition process.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/migracion-SAP-S-4HANA.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/migracion-SAP-S-4HANA.jpg\",\"width\":1536,\"height\":768},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/migration-to-s-4hana\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MIGRATION TO S\\\/4HANA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"MIGRATION TO S\/4HANA - Inprosec","description":"Discover how and when to implement a secure migration to S\/4HANA before 2027. We explore SAP maintenance options, the impact of architecture on security, and the optimal times to enhance system protection during the transition process.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/","og_locale":"en_US","og_type":"article","og_title":"MIGRATION TO S\/4HANA","og_description":"Discover how and when to implement a secure migration to S\/4HANA before 2027. We explore SAP maintenance options, the impact of architecture on security, and the optimal times to enhance system protection during the transition process.","og_url":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/","og_site_name":"Inprosec","article_published_time":"2024-04-23T08:17:35+00:00","article_modified_time":"2024-05-16T11:09:56+00:00","og_image":[{"width":1536,"height":768,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/migracion-SAP-S-4HANA.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"MIGRATION TO S\/4HANA","datePublished":"2024-04-23T08:17:35+00:00","dateModified":"2024-05-16T11:09:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/"},"wordCount":441,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/migracion-SAP-S-4HANA.jpg","keywords":["SAP Security"],"articleSection":["SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/","url":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/","name":"MIGRATION TO S\/4HANA - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/migracion-SAP-S-4HANA.jpg","datePublished":"2024-04-23T08:17:35+00:00","dateModified":"2024-05-16T11:09:56+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"Discover how and when to implement a secure migration to S\/4HANA before 2027. We explore SAP maintenance options, the impact of architecture on security, and the optimal times to enhance system protection during the transition process.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/migracion-SAP-S-4HANA.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/migracion-SAP-S-4HANA.jpg","width":1536,"height":768},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/migration-to-s-4hana\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"MIGRATION TO S\/4HANA"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/11005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=11005"}],"version-history":[{"count":2,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/11005\/revisions"}],"predecessor-version":[{"id":11009,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/11005\/revisions\/11009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/11020"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=11005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=11005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=11005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}