Using a cloud-based integration platform imposes dedicated security requirements on the software vendor (SAP) that hosts the platform, and on the customers who use the platform.
Customers who use Cloud Integration agree that a significant part of their (and their customers’) sensitive data is processed by and stored within an infrastructure not owned by themselves.
The core task of an integration platform is to serve as the transit place for messages that can contain sensitive customer data. First and foremost, these messages must be protected against eavesdropping and unauthorized access.
Therefore, the integration platform must fulfill the following main requirements:
The integration infrastructure is already designed and built in such a way that it meets the highest security standards. For more information on compliance, visit the SAP Trust Center.
You must guarantee that the technical system landscape, the communication between the components of the integration platform, and the storage locations of messages are secure.
The processes related to the usage of Cloud Integration meet the highest security standards.
These processes include processes at SAP related to the development and upgrade of the Cloud Integration software, the processes related to the provisioning and operation of the customers' virtual environment by the infrastructure provider, and the customer onboarding process during which customers set up secure connections between their infrastructure and SAP's integration platform.
Customers have several options to configure how messages are exchanged within an integration scenario so that the involved data is protected at the highest level.
When designing integration flows, customers can choose between several options to protect messages by establishing secure communication channels (transport-level security) and by configuring digital encryption and digital signing of messages (message-level security).