Where does your data live?
Software needs to be installed in a physical server, which ultimately needs access to a power outlet to turn on and function.
Imagine a building with rooms and rooms full of computer servers - this is called a Data Center. A cloud software provider either owns their own data centers, contracts with third-party data center providers to use a certain number of their physical servers, or both.

There are three key components in a data center:
- Power Supply: The data center is connected to two separate grid sectors operated by the local utility company. If one sector fails, the second one continues to supply power. The data center also houses multiple diesel generators in a separate building as a secondary backup if both power grids were to fail.
- Cooling: All electronic components and processors generate heat when operated. If the heat is not dissipated, the processor's efficiency may decrease to the point component(s) fail. Therefore, cooling a data center is essential - and costly, due to the concentrated computing power.
- Controlled Access: SAP uses state-of-the-art technology and rigorous security to protect data virtually and physically against data breaches, fires, terror attacks, and other threats. Our data centers meet the highest security standards.
Additional Security Measures
Integration, security, and performance between solutions located in different cloud data centers
All communication between Data Centers is encrypted by industry measures. The detail of implementation varies by solution and data flow.
Backup retention procedures
SAP conduct backups in the form of a disk-to-disk copy, which enables rapid data creation and recovery. In addition to full backups done on a daily basis, SAP creates interim backup versions several times each day. These backups are then archived at a secondary data center location for security purposes. Customers can choose where their primary and secondary data centers are located. Please note that locations vary by product - see the availability map here.
Monitoring and logging access to SAP Data Centers
SAP data centers are monitored around the clock with video cameras at every entry point. These cameras are used to record and monitor each access event, which is logged in the access system for 90 days. Single-person access and "mantrap" systems provide access only to authorized individuals. Technicians can enter special rooms using custom-configured ID cards. High-sensitivity areas require authentication through biometric scans.
Technical security features
The multi-layered, partitioned, proprietary network architecture permits only authorized access with:
- A Web dispatcher farm that hides the network topology from the outside world.
- Multiple Internet connections to minimize the impact of distributed denial-of-service (DDoS) attacks.
- Layered security measures that continuously monitor solution traffic for possible attacks.
- Multiple firewalls that divide the network into protected segments and shield the internal network from unauthorized Internet traffic.
- Third-party audits performed throughout the year to support early detection of any newly-introduced security issues.
Note
Check out the SAP Trust Center for more information about SAP Data Centers and Cloud Security.