SAP provides a comprehensive set of security recommendations for BTP to help customers evaluate and enhance the security configuration of their SAP BTP environment. Here are the key aspects of these recommendations:
- The recommendations assist in evaluating the security of SAP BTP configuration
- They cover various SAP BTP services, with a focus on core services
- The list is continuously expanding to include more services
By following these security recommendations, customers can significantly enhance the security posture of their SAP BTP environment and align with industry best practices for cloud security.
For more information, see SAP BTP Security Recommendations.
How to Use SAP BTP Security Recommendations?
The following figure shows examples of SAP BTP Security Recommendations.

Using SAP BTP Security Recommendations
To optimally use the SAP BTP Security Recommendations, you should first identify all components or services that require protection. These include all components or services that are currently used or have been installed or provisioned. For each of these components or services, review the security recommendations carefully. Based on your specific security requirements and their priority, decide whether to implement a recommendation.
It is crucial to track the "Last Update" and "Index" information for regular reviews of the Security Recommendations. "Index" helps you identify obsolete or new recommendations, while "Last Update" indicates if a recommendation has been modified since your last review.