Summary
Well, this concludes our discussion on security and connectivity. Later in this book, we will continue touching upon security topics from different angles. However, what we have discussed so far should enable you to incorporate security in your SAP BTP architecture designs as a crucial ingredient.
In this chapter, you learned how SAP, as its provider, ensures the security of SAP BTP and how you can find out more about their compliance with the standards underpinning the security measures they apply. Because, as the consumer, you share the responsibility for securing the application and data layers, we discussed how you could achieve this when building your custom applications and when using SAP BTP services. As a closely related topic, we talked about data protection and privacy. Additionally, a large part of this chapter was about IAM. We briefly discussed IAM concepts at the generic level and then how SAP BTP implements its processes. Finally, we covered how SAP BTP securely...