Security and sovereignty options
Advanced protections tailored to your needs
We help you manage a modern and compliant IT landscape by enabling you to make decisions about data and application management in hybrid cloud landscapes.
Security and sovereignty options
We also offer options to increase sovereignty, data residency, and provide more localized operations.
Customer managed encryption keys and local data residency
- Enhanced encryption-key control to help you create and control an initial application-level data isolation layer.
- Additional business case driven data center regions to help customers in certain regions meet data center requirements.
With an increased regulatory and data protection driven environment in Europe, data residency and processing within legal guidelines require a specific set of organizational and technical measures which we address via our EU access option.
Organizational and technical measures in our EU access option comply with European data residency and processing laws in an increasingly regulatory and protective environment.
Sovereign cloud capabilities
SAP sovereign cloud capabilities are our security hardened SAP Cloud solutions, aligned with industry standards (NIST 800-53) for regulated industries and governments.
SAP has been delivering scalable and consistent sovereign cloud services for over 15 years and has experience in helping customers meet strict national regulations regarding data access, data residency, local and credentialed personnel, and secured facilities.
We manage sovereignty holistically and provide an answer to local regulatory demand and operate with additional local entities where it is required.
Sovereign cloud capabilities are offered in the following regions:
Understand the levels of sovereignty
Based on your specific business case, regulatory or location requirement, the core aspects of sovereignty will help you select the right option.
- Data sovereignty
Keep data securely within your country's borders and subject to that country's regulations. - Operational sovereignty
Ensure that your sovereign cloud operations (including the staff and facilities involved) must follow the regulations of the country in which they are used and be free from noncompliant influences. - Technical sovereignty
Gain the control, transparency, and flexibility of your organization's technologies so you can manage your cloud workloads as you see fit or as required.
See how customers and partners are succeeding with SAP
Toll Group bolsters its cyber resilience with sovereign cloud capabilities from SAP
Perry Singh, President of Government and Defense, Toll Group
Secure your business with support from an innovative and reliable partner
Amanda Williamson, IBM Australia’s Business
Additional security, compliance and risk related solutions from SAP:
SAP Cloud Identity Access Governance
Govern access authorizations through the cloud and allow companies to enforce segregation of duties while minimizing mistakes, misuse, and financial loss.
SAP Cloud Identity Services
Enable cloud-based user authentication and provisioning, which are core requirements for integration and extension scenarios of an intelligent enterprise.
SAP Secure Login Service for SAP GUI
Enhance the user experience and strengthen security with a lean cloud service, providing risk-based and multi-factor authentication for SAP GUI applications.
SAP Identity Management
Embed identity management into business processes and centralized user access management in diverse business environments.
SAP Enterprise Threat Detection
Identify, analyze, and neutralize cyberattacks in SAP applications as they happen and before serious damage occurs.
SAP Focused Run
Monitor security configurations across your ERP landscape through a centralized, policy-based system.
SAP Early Watch Alert
Analyze the essential administrative areas of SAP systems through a free, automated cloud service.
SAP Code Vulnerability Analyzer
Identify and fix security vulnerabilities in ABAP programming language, avoiding potential exploits and cyberattacks.
SAP Customer Data Platform
Help ensure customer data is accurate and credible with a solution built on an enterprise identity and data privacy foundation.
SAP Data Privacy Integration
Support data privacy compliance through the processing of personal data with purpose management, retrieval of personal data, and data deletion records.
UI data protection
Refine access to sensitive data, improve protection against misuse, and support key requirements of data protection and privacy through an ERP add-on.
SAP Risk Management
Support responsible, risk-aware decisions and monitor the effectiveness of cybersecurity measures and controls.
SAP Process Control
Run more confident, simplified internal cybersecurity programs by automating processes and compliance management.
SAP Audit Management
Improve audit quality and deliver insights by aligning your businesses with critical cyberrisks and controls.
Security dashboard
Combine feeds from security solutions and allow executives to prioritize mitigations, leveraging risk scoring and quantification through a single dashboard.
SAP software deployment strategies
You can choose from three different types of cloud deployment: public, private, and hybrid. Many companies choose more than one approach and set up a multi-cloud environment.
Public cloud
In public cloud deployment, customers receive services over a network available for usage by the provider’s clients. Public clouds are typically efficient and affordable. They are also often multi-tenant – meaning the provider runs your service in a shared environment.
Private cloud
In private cloud, providers maintain services on a private network protected by a firewall. You can build a private cloud within your own data center or subscribe to one hosted by a vendor.
Hybrid cloud
Hybrid cloud deployment is a combination of public cloud, private cloud, and on-premises infrastructure. Hybrid clouds let you keep sensitive information in a traditional data center or a private cloud while taking advantage of public cloud resources.