Security Specifics of the Cloud Foundry Environment
The figure shows the security specifics within the Cloud Foundry environment.

SAP Business Technology Platform (SAP BTP) on Cloud Foundry provides several security features and best practices:
- Application Layer Security:
- Implement frontend security measures like input validation
- Follow product security standards to protect against cross-site scripting (XSS) and cross-site request forgery (XSRF)
- Utilize SAP BTP security services such as SAP Authorization and Trust Management service for authentication and authorization
- Service Layer Security:
- Employ identity and access management practices
- Implement data protection measures
- Ensure regulatory compliance management
- Infrastructure Security:
- Utilize network security features like firewalls, gateways, and proxies
- Implement advanced intrusion detection and prevention controls
- Conduct regular penetration testing to identify vulnerabilities
- User and Authorization Management:
- Distinguish between platform users (administrators, operators) and business users
- Manage users and roles at various levels: global account, subaccount, and space
- Use role collections to assign authorizations for resources and services
- Identity Provider Integration:
- Configure trust to an application identity provider in your subaccount
- Assign role collections directly to users or map them to user groups
- Secure Communication:
- Implement secure protocols for inbound and outbound communication
- Use token-based, certificate-based, or basic authentication methods as appropriate
- Establish trust relationships between SAP BTP and external systems or identity providers
- Development Best Practices:
- SAP provides tutorials for securing applications in various languages and frameworks, including Node.js, Java, Spring Boot, and J2EE
- Learn how to implement service-to-service communication securely
- Utilize libraries and tools for JSON web token (JWT) validation and OAuth token validation in different programming languages
By implementing these security measures and following the provided guidelines, you can ensure a robust security posture for your SAP BTP applications on Cloud Foundry.
Security Specifics of the Kyma Environment
The figure shows the security specifics of the Kyma environment.

SAP BTP Kyma runtime provides several key security features and best practices:
- Cloud Infrastructure Security:
- Deployed on SAP-managed IaaS provider accounts with strict security guidelines
- Regular monitoring of secure configurations
- Preventive controls to revert critical configurations that could weaken security
- Authentication and Authorization:
- Strict password policies and multi-factor authentication
- Role-based access control (RBAC) for permissions
- Principle of least privilege is followed
- Data Protection:
- Storage services are not publicly accessible
- Encryption using Advanced Encryption Standard (AES) with a key length of at least 256
- Kubernetes Security:
- Managed Kubernetes offering using Gardener
- Control plane hosted as a set of Pods in the Gardener environment
- DDoS Protection:
- Default DDoS protection offered by the IaaS provider
- Varies based on the cloud provider (Azure, AWS, and Google Cloud)
- Secure Development Practices:
- Pod security recommendations
- Network traffic restriction using Kubernetes Network Policies
- Enabling Istio sidecar proxy injection for namespaces
- Secure workload exposure using Istio and API Gateway modules
- Vulnerability Management:
- Regular vulnerability scans of the Kyma runtime
- Analysis of vulnerabilities by Kyma development teams to assess severity
- Custom Security Configurations:
- Option to configure a custom identity provider for Kyma
- Ability to assign and manage roles in the Kyma environment
- Auditing and Logging: Auditing and logging capabilities are available in Kyma
To ensure a robust security posture in SAP BTP Kyma runtime, it's recommended to follow these security measures, and regularly review and update security configurations based on SAP's latest guidelines and best practices.
Security Specifics of the ABAP Runtime Environment
There is an ABAP runtime available in the SAP public cloud as part of SAP Business Technology Platform (SAP BTP). Here are the key details:
- ABAP Environment: Within the Cloud Foundry environment of SAP BTP, you can create a dedicated space for ABAP development, known as the ABAP environment.
- Cloud-Based ABAP Development: This environment allows you to:
- Create extensions for ABAP-based products like SAP S/4HANA Cloud
- Develop new cloud applications
- Transform existing ABAP-based custom code or extensions to the cloud
- Technology Stack: The ABAP environment is based on the latest ABAP platform cloud release used for SAP S/4HANA Cloud and leverages SAP HANA innovations.
- Features and Capabilities:
- Supports the ABAP RESTful Application Programming Model
- Includes SAP Fiori and Core Data Services (CDS)
- Offers SAP services and APIs based on released objects
- Can be integrated with other SAP BTP services like SAP Destination service, SAP Build Work Zone, and SAP Workflow Management
- Database: Each ABAP system in this environment uses a dedicated SAP HANA database, provided by the SAP Cloud Platform SAP HANA service and managed by the ABAP environment.
It's important to note that this ABAP runtime is specifically designed for cloud development and may have some differences compared to traditional on-premises ABAP environments.
The ABAP environment in SAP Business Technology Platform (SAP BTP) provides several security features for running ABAP applications in the public cloud:
- Dedicated Runtime: The ABAP environment offers a dedicated application runtime for ABAP development, ensuring isolation and security for your ABAP applications.
- Cloud-Native Architecture: It leverages a cloud-native architecture based on the latest ABAP platform cloud release, which incorporates modern security practices.
- SAP HANA Integration: Each ABAP system in the environment utilizes a dedicated SAP HANA database, provided by the SAP Cloud Platform SAP HANA and managed by the ABAP environment. This 1:1 linkage enhances data security and isolation.
- Integration with SAP BTP Services: The ABAP environment can be integrated with other SAP BTP security services, such as:
- SAP Destination service for secure connectivity
- SAP Build Work Zone for secure user interfaces
- SAP Workflow Management for secure process automation
- ABAP RESTful Application Programming Model: Supports this model, which includes built-in security features for developing secure APIs and applications.
- Released Objects Approach: SAP services and APIs are offered according to the new approach of released objects, which helps maintain a clear separation between custom code and SAP code, enhancing security and simplifying upgrades.
- Cloud Qualities: ABAP Cloud, the modern way to develop ABAP, provides tools and techniques that ensure cloud qualities, including security aspects for cloud-ready business applications and extensions.
- Lifecycle-Stable Development: ABAP Cloud allows you to build lifecycle-stable applications, which can help maintain security across different stages of the application lifecycle.