SAP Apparel And Footwear (AFS)

1y ago
12 Views
1 Downloads
777.93 KB
34 Pages
Last View : 14d ago
Last Download : 3m ago
Upload by : Aarya Seiber
Transcription

Security GuideDocument Version: 2.0 – 2019-12-19SAP Apparel and Footwear (AFS)Release 6.8CUSTOMER

Typographic ConventionsType StyleDescriptionExampleWords or characters quoted from the screen. These include field names, screen titles,pushbuttons labels, menu names, menu paths, and menu options.Textual cross-references to other documents.2ExampleEmphasized words or expressions.EXAMPLETechnical names of system objects. These include report names, program names,transaction codes, table names, and key concepts of a programming language when theyare surrounded by body text, for example, SELECT and INCLUDE.ExampleOutput on the screen. This includes file and directory names and their paths, messages,names of variables and parameters, source text, and names of installation, upgrade anddatabase tools.ExampleExact user entry. These are words or characters that you enter in the system exactly asthey appear in the documentation. Example Variable user entry. Angle brackets indicate that you replace these words and characterswith appropriate entries to make entries in the system.EXAMPLEKeys on the keyboard, for example, F 2 or E N T E R .Customer 2016 SAP SE. All rights reserved.SAP Apparel and Footwear (AFS)Introduction

Document HistoryVersionDateChange1.02016-12-23Document created2.02019-12-19Added new chapter Data ProtectionSAP Apparel and Footwear (AFS)IntroductionCustomer 2016 SAP SE. All rights reserved.3

Table of Contents1Introduction . 52Before You Start . 83Technical System Landscape . 114Authorizations . 125Session Security Protection . 1466.16.26.3Network and Communication Security . 15Communication Channel Security .16Network Security . 17Communication Destinations .187Internet Communication Framework Security . 208Data Storage Security . 2199.19.2Data Protection . 22Deletion of Personal Data . 23Retrieving Personal Data Processed in SAP Apparel and Footwear. 2910Enterprise Services Security . 3011Security-Relevant Logging and Tracing . 3112Services for Security Lifecycle Management . 324Customer 2016 SAP SE. All rights reserved.SAP Apparel and Footwear (AFS)Introduction

1IntroductionCautionThis guide does not replace the administration or operation guides that are available for productiveoperations.Target Audience Technology consultants Security consultants System administratorsThis document is not included as part of the Installation Guides, Configuration Guides, Technical OperationManuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereasthe Security Guides provide information that is relevant for all life cycle phases.Why Is Security Necessary?With the increasing use of distributed systems and the Internet for managing business data, the demands onsecurity are also on the rise. When using a distributed system, you need to be sure that your data and processessupport your business needs without allowing unauthorized access to critical information. User errors,negligence, or attempted manipulation of your system should not result in loss of information or processing time.These demands on security apply likewise to the SAP Apparel and Footwear. To assist you in securing the SAPApparel and Footwear, we provide this Security Guide.About this DocumentThe Security Guide provides an overview of the security-relevant information that applies to the SAP Apparel andFootwear.SAP Apparel and Footwear (AFS)IntroductionCustomer 2016 SAP SE. All rights reserved.5

Overview of the Main SectionsThe Security Guide comprises the following main sections: Before You StartThis section contains information about why security is necessary, how to use this document and referencesto other Security Guides that build the foundation for this Security Guide. Technical System LandscapeThis section provides an overview of the technical components and communication paths that are used by theSAP Apparel and Footwear. Security Aspects of Data, Data Flow and ProcessesThis section provides an overview of security aspects involved throughout the most widely-used processeswithin the SAP Apparel and Footwear. User Administration and AuthenticationThis section provides an overview of the following user administration and authentication aspects:o Recommended tools to use for user managemento User types that are required by the SAP Apparel and Footwearo Standard users that are delivered with SAP Apparel and Footwearo Overview of the user synchronization strategy, if several components or products are involvedo Overview of how integration into Single Sign-On environments is possible AuthorizationsThis section provides an overview of the authorization concept that applies to the SAP Apparel and Footwear. Session Security ProtectionThis section provides information about activating secure session management, which prevents JavaScript orplug-ins from accessing the SAP logon ticket or security session cookie(s). Network and Communication SecurityThis section provides an overview of the communication paths used by the SAP Apparel and Footwear and thesecurity mechanisms that apply. It also includes our recommendations for the network topology to restrictaccess at the network level. Internet Communication Framework SecurityThis section provides an overview of the Internet Communication Framework (ICF) services that are used bythe SAP Apparel and Footwear. Application-Specific Virus Scan Profile (ABAP)This section provides an overview of the behavior of the AS ABAP when application-specific virus scan profilesare activated. Data Storage SecurityThis section provides an overview of any critical data that is used by the SAP Apparel and Footwear and thesecurity mechanisms that apply. Data ProtectionThis section provides information about how the SAP Apparel and Footwear protects personal or sensitivedata.6Customer 2016 SAP SE. All rights reserved.SAP Apparel and Footwear (AFS)Introduction

Security for Third-Party or Additional ApplicationsThis section provides security information that applies to third-party or additional applications that are usedwith the SAP Apparel and Footwear. Dispensable Functions with Impacts on SecurityThis section provides an overview of functions that have impacts on security and can be disabled or removedfrom the system. Enterprise Services SecurityThis section provides an overview of the security aspects that apply to the enterprise services delivered withthe SAP Apparel and Footwear. Security-Relevant Logging and TracingThis section provides an overview of the trace and log files that contain security-relevant information, forexample, so you can reproduce activities if a security breach does occur. Services for Security Lifecycle ManagementThis section provides an overview of services provided by Active Global Support that are available to assistyou in maintaining security in your SAP systems on an ongoing basis. AppendixThis section provides references to further information.SAP Apparel and Footwear (AFS)IntroductionCustomer 2016 SAP SE. All rights reserved.7

2Before You StartFundamental Security GuidesThe SAP Apparel and Footwear is built from the component applications. Therefore, the corresponding SecurityGuides also apply to SAP Apparel and Footwear. As SAP Apparel and Footwear is provided as an ABAP add-on toSAP ERP, the security guidelines applicable to SAP ERP also apply to SAP Apparel and Footwear. Pay particularattention to the most relevant sections or specific restrictions as indicated in the table below.Fundamental Security GuidesScenario, Application or Component Security GuideMost Relevant Sections or Specific RestrictionsSAP NetWeaver Security GuideIn the SAP NetWeaver Security Guide, chooseSecurity Guides for SAP NetWeaver according toUsage Types Security Guides for Usage Type AS.SAP ERP Central Component Security GuideAll sectionsSAP NetWeaver Security GuideIn the SAP NetWeaver Security Guide, choose SecurityGuides for the Operating System and DatabasePlatforms.For a complete list of the available SAP Security Guides, see SAP Service Marketplace athttp://service.sap.com/securityguide.Important SAP NotesThe most important SAP Notes that apply to the security of the SAP Apparel and Footwear are shown in the tablebelow.TitleSAP NoteComment138498Single Sign-On SolutionsInformation on Single Sign-OnSolutions for SAP systems30724Data Protection and Security inSAP Systems128447Trusted/Trusting SystemsNeeded for Customizing of RFCconnections for trusted/trustingsystemsSecurity Guide ECC 5.0, 6.0The SAP Note covers allproblems discovered after thepublication of the Security Guide,and provides additionalinformation about securityissues.7837588Customer 2016 SAP SE. All rights reserved.SAP Apparel and Footwear (AFS)Before You Start

TitleSAP Note619060QCI: New RFC Server InstallationGuide619057QCI: External Function CallsUsing the CALL SystemCommentFor a list of additional security-relevant SAP Hot News and SAP Notes, see also SAP Service Marketplace athttp://service.sap.com/securitynotes.SAP Apparel and Footwear (AFS)Before You StartCustomer 2016 SAP SE. All rights reserved.9

Additional InformationFor more information about specific topics, see the Quick Links as shown in the table below.ContentQuick Link on SAP Service Marketplace or curity Guideshttp://service.sap.com/securityguideRelated SAP p.com/securitynotes10Released platformshttp://service.sap.com/pamNetwork securityhttp://service.sap.com/securityguideSAP Solution Managerhttp://service.sap.com/solutionmanagerSAP tomer 2016 SAP SE. All rights reserved.SAP Apparel and Footwear (AFS)Before You Start

3Technical System LandscapeUseFor more information about the technical system landscape, see the resources listed in the table below.TopicGuide/ToolQuick Link on SAP Service Marketplace orSCNTechnical description for SAPApparel and FootwearMaster Guidehttp://service.sap.com/instguidesHigh availabilitySee applicable documentshttp://scn.sap.com/docs/DOC-7848Technical landscape designSee applicable ee applicable documentshttp://scn.sap.com/community/securityand the underlying componentssuch as SAP NetWeaverSAP Apparel and Footwear (AFS)Technical System LandscapeCustomer 2016 SAP SE. All rights reserved.11

4AuthorizationsUseSAP Apparel and Footwear uses the authorization concept provided by the SAP NetWeaver AS ABAP or AS Java.Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver ASSecurity Guide ABAP and SAP NetWeaver AS Security Guide Java also apply to SAP Apparel and Footwear.The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For rolemaintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management Engine’suser administration console on the AS Java.NoteFor more information about how to create roles, see Role Administration [SAP Library].Standard Authorization ObjectsThe table below shows the security-relevant authorization objects that are used by the SAP Apparel and Footwear.Standard Authorization ObjectsAuthorization ObjectDescriptionFieldsJ 3AMTMODJ 3A ARMTTARun OptimizerJ 3AMTFCOJ 3AMTTYPJ 3AARMDJ 3A ARUNAllocation runJ 3AARFCOJ 3AARTYP12J 3A BEWERMaterial valuationWERKSJ 3A CSASTCustomer Sales Area stockconsumptionACTVTJ 3A CSA SCustomer Sales Area Super UserACTVTJ 3A LIKAPVendor capacityJ 3A MAPPMapping profilesJ 3A MATRIMaterial gridJ 3A PPBDPlanned requirementsCustomer 2016 SAP SE. All rights reserved.AKTTYPEKORGJ 3AMAPTYPACTVTACTVTJ 3ASGTPWERKSSAP Apparel and Footwear (AFS)Authorizations

Authorization ObjectDescriptionFieldsACTVTJ 3A PRESPresizingWERKSJ 3A QUOTQuota maintenanceACTVTWERKSJ 3A SOALLSource allocationEKORGWERKSJ 4KCATWSAP Apparel and Footwear (AFS)AuthorizationsWhole category fieldACTVTCustomer 2016 SAP SE. All rights reserved.13

5Session Security ProtectionTo increase security and prevent access to the SAP logon ticket and security session cookie(s), we recommendactivating secure session management.We also highly recommend using SSL to protect the network communications where these security-relevantcookies are transferred.Session Security Protection on the AS ABAPTo activate session security on the AS ABAP, set the corresponding profile parameters and activate the sessionsecurity for the client(s) using the transaction SICF SESSIONS.For more information, a list of the relevant profile parameters, and detailed instructions, see Activating HTTPSecurity Session Management on AS ABAP [SAP Library] in the AS ABAP security documentation.14Customer 2016 SAP SE. All rights reserved.SAP Apparel and Footwear (AFS)Session Security Protection

6Network and Communication SecurityYour network infrastructure is extremely important in protecting your system. Your network needs to support thecommunication necessary for your business needs without allowing unauthorized access. A well-defined networktopology can eliminate many security threats based on software flaws (at both the operating system level andapplication level) or network attacks such as eavesdropping. If users cannot log on to your application or databaseservers at the operating system or database layer, then there is no way for intruders to compromise the machinesand gain access to the backend system’s database or files. Additionally, if users are not able to connect to theserver LAN (local area network), they cannot exploit well-known bugs and security holes in network services onthe server machines.The network topology for the SAP Apparel and Footwear is based on the topology used by the SAP NetWeaverplatform. Therefore, the security guidelines and recommendations described in the SAP NetWeaver SecurityGuide also apply to the SAP Apparel and Footwear. Details that specifically apply to the SAP Apparel and Footwearare described in the following topics: Communication Channel SecurityThis topic describes the communication paths and protocols used by the SAP Apparel and Footwear. Network SecurityThis topic describes the recommended network topology for the SAP Apparel and Footwear. It shows theappropriate network segments for the various client and server components and where to use firewalls foraccess protection. It also includes a list of the ports needed to operate the SAP Apparel and Footwear. Communication DestinationsThis topic describes the information needed for the various communication paths, for example, which usersare used for which communications.For more information, see the following sections in the SAP NetWeaver Security Guide: Network and Communication Security Security Guides for Connectivity and Interoperability TechnologiesSAP Apparel and Footwear (AFS)Network and Communication SecurityCustomer 2016 SAP SE. All rights reserved.15

6.1Communication Channel SecurityUseThe table below shows the communication channels used by the SAP Apparel and Footwear, the protocol used forthe connection, and the type of data transferred.Communication PathProtocol UsedType of DataTransferredData Requiring SpecialProtectionFront-end client usingSAP GUI for Windows toapplication serverDIAGAll application dataFor example, masterdata, business dataFrontend client using aWeb browser toapplication serverHTTP (S)All application dataFor example,passwords, businessdata, master dataApplication server toapplication serverRFC, HTTP(S), SOAPIntegration dataFor example, businessdata, field dataDIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connectionsare protected using the Secure Sockets Layer (SSL) protocol. SOAP connections are protected with Web servicessecurity.RecommendationWe strongly recommend using secure protocols (SSL, SNC) whenever possible.For more information, see Transport Layer Security and Web Services Security in the SAP NetWeaver SecurityGuide.16Customer 2016 SAP SE. All rights reserved.SAP Apparel and Footwear (AFS)Network and Communication Security

6.2Network SecurityUsePortsThe SAP Apparel and Footwear runs on SAP NetWeaver and uses the ports from the AS ABAP or AS Java. Formore information, see the topics for AS ABAP Ports and AS Java Ports in the corresponding SAP NetWeaverSecurity Guides. For other components, for example, SAPinst, SAProuter, or the SAP Web Dispatcher, see alsothe document TCP/IP Ports Used by SAP Applications, which is located on SAP Developer Network athttp://scn.sap.com/community/security under Infrastructure Security Network and CommunicationsSecurity.SAP Apparel and Footwear (AFS)Network and Communication SecurityCustomer 2016 SAP SE. All rights reserved.17

6.3Communication DestinationsUseThe table below shows an overview of the communication destinations used by the SAP Apparel and Footwear.Users and authorizations can be a security risk if used irresponsibly. For this reason, you must note the followingsecurity measures when communicating between SAP ERP systems: Use the System and Communication user categories. Do not give a user more authorizations than necessary. Choose a secure password and do not inform anyone else of your password. Only save user-specific logon data for users from the System and Communication category. As far as possible, use trusted system functions, rather than user-specific logon data when saving data.SAP Apparel and Footwear uses standard interfaces to SAP Customer Relationship Management (SAP CRM),SAP Supply Chain Management (SAP SCM), SAP Global Trade Services (SAP GTS), SAP Business Intelligence(SAP BI), Internet Sales and SAP Retail systems.Quick Links to Additional Information18DestinationDeliveredSAP Customer RelationshipManagement (SAP CRM)service.sap.com/securityguide SAP Security Guides SAPBusiness Suite Applications - SAP CRM - SAP Security Guidefor SAP CRMSAP Supply ChainManagement (SAP SCM)service.sap.com/securityguide SAP Security Guides SAPBusiness Suite Applications - SAP SCM - SAP Security Guidefor SAP SCMSAP Global Trade Services(SAP GTS)service.sap.com/securityguide SAP ERP 2005 SecurityGuides Update SAP ERP 2005 Security Guides EHP4 SECGUIDE ECC 604 EN 20102008.pdf (refer to the section onGlobal Trade)SAP Business Intelligence(SAP BI)service.sap.com/securityguide SAP Business InformationWarehouse Security Guides SAP Business InformationWarehouse Sec.GuideInternet Salesservice.sap.com/securityguide SAP CRM Security Guides Security Guide for SAP CRM 7.0 EHP1 (Refer to section onComponent-Specific Guidelines: Web Channel Enablement)Customer 2016 SAP SE. All rights reserved.SAP Apparel and Footwear (AFS)Network and Communication Security

DestinationDeliveredSAP Retailservice.sap.com/securityguide SAP ERP 2005 SecurityGuides Update SAP ERP 2005 Security Guides EHP4 SECGUIDE ECC 604 EN 20102008.pdf (refer to the section onRetail)SAP Apparel and Footwear (AFS)Network and Communication SecurityCustomer 2016 SAP SE. All rights reserved.19

7Internet Communication FrameworkSecurityYou should only activate those services that are needed for the applications running in your system. Use thetransaction SICF to activate these services.If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settingsaccordingly.For more information, see Activating and Deactivating ICF Services in the SAP NetWeaver Library documentation.For more information about ICF security, see the RFC/ICF Security Guide.20Customer 2016 SAP SE. All rights reserved.SAP Apparel and Footwear (AFS)Internet Communication Framework Security

8Data Storage SecurityUseThe data storage security of SAP NetWeaver and components installed on this base is described in detail in theSAP NetWeaver Security Guide.For information about the data storage security of SAP NetWeaver, see SAP Service Marketplace atservice.sap.com/securityguide SAP NetWeaver Security Guide Security Guides for the Operating Systemand Database Platforms.SAP Apparel and Footwear (AFS)Data Storage SecurityCustomer 2016 SAP SE. All rights reserved.21

9Data ProtectionData protection is associated with numerous legal requirements and privacy concerns. In addition to compliancewith general data privacy acts, it is necessary to consider compliance with industry-specific legislation in differentcountries. This section describes the specific features and functions that SAP provides to support compliancewith the relevant legal requirements and data privacy.This section and any other sections in this Security Guide do not give any advice on whether these features andfunctions are the best method to support company, industry, regional or country-specific requirements.Furthermore, this guide does not give any advice or recommendations with regard to additional features thatwould be required in a particular environment; decisions related to data protection must be made on a case-bycase basis and under consideration of the given system landscape and the applicable legal requirements.NoteIn the majority of cases, compliance with data privacy laws is not a product feature.SAP software supports data privacy by providing security features and specific data-protection-relevantfunctions such as functions for the simplified blocking and deletion of personal data.SAP does not provide legal advice in any form. The definitions and other terms used in this guide are nottaken from any given legal source.GlossaryTermDefinitionPersonal dataInformation about an identified or identifiable natural person.Business purposeA legal, contractual, or in other form justified reason for the processing ofpersonal data. The assumption is that any purpose has an end that is usuallyalready defined when the purpose starts.BlockingA method of restricting access to data for which the primary business purposehas ended.DeletionDeletion of personal data so that the data is no longer usable.Retention periodThe time period during which data must be available.End of purpose (EoP)A method of identifying the point in time for a data set when the processing ofpersonal data is no longer required for the primary business purpose. After theEoP has been reached, the data is blocked and can only be accessed by userswith special authorization.Some basic requirements that support data protection are often referred to as technical and organizationalmeasures (TOM). The following topics are related to data protection and require appropriate TOMs: 22Access control: SAP Apparel and Footwear uses the user management and authentication mechanismsprovided with the SAP NetWeaver platform. Therefore, the security recommendations and guidelines for useradministration and authentication as described in the SAP NetWeaver Application Server ABAP SecurityGuide [SAP Library] also apply to SAP Apparel and Footwear.Customer 2016 SAP SE. All rights reserved.SAP Apparel and Footwear (AFS)Data Protection

Authorizations: Authorization concept as described in section Authorizations. Transmission control / Communication security: as described in section Network and CommunicationSecurity. Availability control as described in:o Section Data Storage Securityo SAP NetWeaver Database Administration [SAP Library] documentationo SAP Business Continuity documentation in the SAP NetWeaver Application Help under Function-OrientedView Solution Life Cycle Management SAP Business Continuity Separation by purpose: Is subject to the organizational model implemented and must be applied as part ofthe authorization concept.CautionThe extent to which data protection is ensured depends on secure system operation. Network security,security note implementation, adequate logging of system changes, and appropriate usage of the systemare the basic technical requirements for compliance with data privacy legislation and other legislation.Configuration of Data Protection FunctionsCertain central functions that support data protection compliance are grouped in Customizing for CrossApplication Components under Data Protection.Additional industry-specific, scenario-specific or application-specific configuration might be required.For information about the application-specific configuration, see the application-specific Customizing in SPRO.9.1Deletion of Personal DataUseSAP Apparel and Footwear might process data (personal data) that is subject to the data protection lawsapplicable in specific countries as described in SAP Note 1825544.The SAP Information Lifecycle Management (ILM) component supports the entire software lifecycle including thestorage, retention, blocking, and deletion of data. SAP Apparel and Footwear uses SAP ILM to support the deletionof personal data as described in the following sections.SAP delivers an end of purpose check for SAP Apparel and Footwear. For more information, see Business PartnerEnd of Purpose Check in SAP Apparel and Footwear.For information about the Customizing of blocking and deletion for SAP Apparel and Footwear, see Configuration:Simplified Blocking and Deletion.End of Purpose Check (EoP)An end of purpose check determines whether data is still relevant for business activities based on the retentionperiod defined for the data. The retention period of data consists of the following phases. Phase one: The relevant data is actively used. Phase two: The relevant data is actively available in the system.SAP Apparel and Footwear (AFS)Data ProtectionCustomer 2016 SAP SE. All rights reserved.23

Phase three: The relevant data needs to be retained for other reasons.For example, processing of data is no longer required for the primary business purpose, but to comply withlegal rules for retention, the data must still be available. In phase three, the relevant data is blocked.Blocking of data prevents the business users of SAP applications from displaying and using data that mayinclude personal data and is no longer relevant for business activities.Blocking of data can impact system behavior in the following ways: Display: The system does not display blocked data. Change: It is not possible to change a business object that contains blocked data. Create: It is not possible to create a business object that contains blocked data. Copy/Follow-Up: It is not possible to copy a business object or perform follow-up activities for a businessobject that contains blocked data. Search: It is not possible to search for blocked data or to search for a business object using blocked data inthe search criteria.It is possible to display blocked data if a user has special authorization; however, it is still not possible to create,change, copy, or perform follow-up activities on blocked data.For information about the configuration settings required to enable this three-phase based end of purpose check,see Process Flow and Configuration: Simplified Blocking and Deletion.Integration with Other SolutionsIn the majority of cases, different installed applications run interdependently as shown in following graphic.Integrated Systems using Central Master DataMaster DatacBPBPCRMLIFNRBPERPKUNNRTransactional Data:Orders, DocumentsSD transactional dataCRM transactional dataBPISFI transactional dataHCM transactional dataBP MandatoryFoundation 2014 SAP AG or an SAP affiliate company. All rights reserved.24Customer 2016 SAP SE. All rights reserved. c AddressManagementConfidential1SAP Apparel and Footwear (AFS)Data Protection

An example of an application that uses central master data is an SAP for Healthcare (IS-H) application that usesthe purchase order data stored in Financial Accounting (FI) or Controlling (CO).Relevant Application Objects and Available Deletion FunctionalityApplication AreaApplication ObjectsProvided Deletion FunctionalityVendor Capacity PlanningJ 3ASUCAHDestruction object: J 3ASUCAHJ 3ASUCALILM object: J 3ASUCAHAllocation run (ARUN) logs/AFS/ARUN/PROSchedule a regular job for deletion report/AFS/MRP DES.Material requirements planning(MRP) logsJ 3ADBBASchedule a regular job for deletion report/AFS/ARUN DES.Relevant Application Objects and Available EoP functionalityApplicationImplemented Solution (EoP orWU

The SAP Apparel and Footwear is built from the component applications. Therefore, the corresponding Security Guides also apply to SAP Apparel and Footwear. As SAP Apparel and Footwear is provided as an ABAP add-on to SAP ERP, the security guidelines applicable to SAP ERP also apply to SAP Apparel and Footwear. Pay particular

Related Documents:

SAP Apparel and Footwear (SAP AFS) to SAP S/4HANA, the supported release is AFS 6.0, SAP Note 2836840 SAP EWM to Decentralized EWM, the lowest supported EWM release is EWM 5.1 (SAP NetWeaver 7.0). SAP CRM to SAP S/4HANA for Customer Management (SAP CRM 7.0) Necessary preparations in the system landscape

SAP ERP SAP HANA SAP CRM SAP HANA SAP BW SAP HANA SAP Runs SAP Internal HANA adoption roadmap SAP HANA as side-by-side scenario SAP BW powered by SAP HANA SAP Business Suite powered by SAP HANA Simple Finance 1.0 2011 2013 2014 2015 Simple Finance 2.0 S/4 HANA SAP ERP sFin Add-On 2.0

SAP Certification Material www.SAPmaterials4u.com SAP Certification Material for SAP Aspirants at Low cost Home Home SAP Business Objects SAP BPC CPM SAP BPC 7.0 SAP EWM SAP GTS SAP Public Sector SAP Real Estate SAP FSCM SAP FI/CO SAP AC - FI/CO SAP BI 7.0 SAP CRM 5.0

SourceAmerica Apparel, Accessories, Home United States Suntex Apparel Industries * Apparel Pakistan Swiss Cotton Garments Company Apparel Egypt Tejidos Gulfer SAS Apparel Colombia Textifull S.A.S Apparel Colombia Tianjin Xinfa Woolen Knitwear Co.Ltd. * Apparel China TONGXIANG ZEAN IMP.& EXP.TRADING CO.,LTD. † Apparel China

SAP Master Data Governance SAP Information Steward SAP HANA smart data integration SAP Data Hub SAP Cloud Platform Big Data Services SAP HANA, platform edition SAP Vora Customer Experience IoT Workforce Engagement SAP Cloud for Customer SAP Commerce SAP Marketing SAP Asset Intelligence Network SAP Predictive Maintenance and Service SAP .

SAP Business Suite SAP BW SAP Apps Partner Apps SAP HANA PLATFORM Planning and Calculation Engine Real-Time Replication Services Information Composer & Modeling Studio SAP UI HTML5 Mobile SAP BI 4 SAP ERP SAP CRM SAP SCM SAP PLM SAP SRM SAP Netweaver Predictive Analytics & Business Function Libraries In-Memory

SAP HANA Appliance SAP HANA DB In-Memory A io BI Client non-ABAP (SAP supported DBs) SAP Business Suite SAP Business Suite SAP Business Suite SAP Business Suite SAP Business Suite SAP Business Suite SAP Business Warehouse SAP HANA DB r In-Memory Source Systems SAP LT Replication Ser

Beverages COCKTAILS Belgian Pilsner - Draft 8 Stella Artois 5% IBU tbd Japanese Pilsner 10 Coedo Ruri Premium 5% IBU tbd Japanese Black Lager 10 Coedo Shikkoku 5% IBU tbd Kona Wailua Wheat 7 Hawaii, USA 5.2% IBU 15 Kona Hanalei Island IPA 7 Hawaii, USA 4.5% IBU tbd Prosecco, Avissi 11/49 Veneto-Italy