{"id":10829,"date":"2021-05-04T06:49:00","date_gmt":"2021-05-04T06:49:00","guid":{"rendered":"https:\/\/www.accely.com\/blog\/importance-of-sap-application-management-services-2\/"},"modified":"2025-03-13T07:44:27","modified_gmt":"2025-03-13T07:44:27","slug":"what-to-know-about-design-in-security-and-controls-in-sap-s4-hana","status":"publish","type":"post","link":"https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/","title":{"rendered":"What to know about Design-In Security and Controls in SAP S\/4HANA?"},"content":{"rendered":"\n<section class=\"insights-banner\">\n    <div class=\"container\">\n        <div class=\"insights-banner-wrapper\">\n            <div class=\"insights-banner-left\">\n                                                <h1 class=\"insights-banner-title h3\">What to know about Design-In Security and Controls in SAP S\/4HANA?<\/h1>\n                                <div class=\"badge-wrap d-flex d-flex-wrap\">\n                                                           <span class=\"badge badge-orange\">SAP ERP<\/span>\n                                                      <\/div>\n                                 <p class=\"publish-date\">Published: May 4, 2021<\/p>\n                                \n                 \n\n\n\n            <\/div>\n                        <div class=\"insights-banner-right\">\n            <img decoding=\"async\" src=\"https:\/\/www.accely.com\/wp-content\/uploads\/2021\/05\/What-to-know-about-Design-In-Security-and-Controls-in-SAP-S.webp\"  alt=\"Banner\" class=\"insights-banner-img\" width=\"720\" height=\"471\">\n            <\/div>\n                    <\/div>\n    <\/div>\n<\/section>\n\n    <div class=\"main-content-blog-section\">\n        <div class=\"main-content-blog\">\n                            <div class=\"pdp-sidebar-sec-wrap\">\n                    <div class=\"pdp-sidebar\">\n                        <ul class=\"ul-none pdp-sidebar-menu-wrap\">\n                                                        <li>\n                                <a data-scroll=\"introduction\" href=\"#introduction\" aria-label=\"tab-link\" class=\"active\" >\n                                    <span class=\"body-font-sm text-capitalize\">Introduction<\/span><\/a>\n                            <\/li>\n                                                        <li>\n                                <a data-scroll=\"security\" href=\"#security\" aria-label=\"tab-link\" >\n                                    <span class=\"body-font-sm text-capitalize\">Design-In Security and Control <\/span><\/a>\n                            <\/li>\n                                                        <li>\n                                <a data-scroll=\"security\" href=\"#security\" aria-label=\"tab-link\" >\n                                    <span class=\"body-font-sm text-capitalize\">Access and Security Control<\/span><\/a>\n                            <\/li>\n                                                        <li>\n                                <a data-scroll=\"automated\" href=\"#automated\" aria-label=\"tab-link\" >\n                                    <span class=\"body-font-sm text-capitalize\">Automated or Configuration Controls<\/span><\/a>\n                            <\/li>\n                                                        <li>\n                                <a data-scroll=\"cybersecurity \" href=\"#cybersecurity \" aria-label=\"tab-link\" >\n                                    <span class=\"body-font-sm text-capitalize\">Cybersecurity and Cloud<\/span><\/a>\n                            <\/li>\n                                                        <li>\n                                <a data-scroll=\"classification \" href=\"#classification \" aria-label=\"tab-link\" >\n                                    <span class=\"body-font-sm text-capitalize\">Classification and Governance of Data<\/span><\/a>\n                            <\/li>\n                                                        <li>\n                                <a data-scroll=\"update\" href=\"#update\" aria-label=\"tab-link\" >\n                                    <span class=\"body-font-sm text-capitalize\">Updating Internal Control Matrices and Risk Universe<\/span><\/a>\n                            <\/li>\n                                                    <\/ul>\n                    <\/div>\n                <\/div>\n                <div class=\"content-blog-sections\">\n                                                            <section class=\"insights-middle\"  id=\"introduction\" >\n                        <div class=\"insights-container\">\n                            \n                        <div class=\"insights-middle-content\">\n                            <p>SAP S\/4HANA is one such platform that lays a strong emphasis on simplicity for its users. The platform works over a simplified data model, paired with a simplified technical architecture, and puts a more straightforward business process on the table. While simplifying business processes, it promotes improved performance and more significant business value. It should be noted that migration from your existing SAP to S\/4HANA is not a mere upgrade.<\/p>\n<p>As many organizations have already planned or begun their <a href=\"\/solutions\/sap-s4-hana\/\">journey to SAP S\/4HANA<\/a>, it is the best time to look into the design-in security and controls to ensure the considerations mentioned earlier.<\/p>\n                            \n                        <\/div>\n                            \n                        <\/div>\n                    <\/section>\n                                                                                <section class=\"insights-middle\"  id=\"security\" >\n                        <div class=\"insights-container\">\n                            \n                        <div class=\"insights-middle-content\">\n                            <h2>Design-In Security and Control to consider for SAP S\/4HANA<\/h2>\n                            \n                        <\/div>\n                            \n                        <\/div>\n                    <\/section>\n                                                                                <section class=\"insights-middle\"  id=\"security\" >\n                        <div class=\"insights-container\">\n                            \n                        <div class=\"insights-middle-content\">\n                            <h3>Access and Security Control<\/h3>\n<p>One of the most discussed topics over the last few years is access and security control being the most compelling designs in the genre. At the same time, such security control settings should always be designed SOD-free to help implement automated access tools for management.<\/p>\n<p>Here, timing plays a crucial role in developing security roles that are SOD-free and run in parallel with real-time upgrades. For organizations that are planning to implement a complete Fiori user experience, security design plays a significant role in initiating the process as there are no quick fixes within such an architecture. The security level design plays a significant role in adding to the UI and controls for appropriate access.<\/p>\n                            \n                        <\/div>\n                            \n                        <\/div>\n                    <\/section>\n                                                                                <section class=\"insights-middle\"  id=\"automated\" >\n                        <div class=\"insights-container\">\n                            \n                        <div class=\"insights-middle-content\">\n                            <h3>Automated or Configuration Controls<\/h3>\n<p>Following the pandemic, companies have started to maximize their opportunities of using S\/4HANA software to enable improved functionality and standard features for improvised control. For example, tolerance limits, establishing three-way matches, system messages, and required fields. These numerous implementations promise to establish controls via their &#8216;out-of-the-box model approach.<\/p>\n<p>Individual businesses need to first get an idea of the configuration settings that can be implemented as a control, then select the appropriate settings suggested on control needs and business requirements. Critical business process decisions require businesses to implement such configuration controls, which generally come with a pre-defined workstream within any suggested S\/4HANA project. The goal of operating with such automated controls is to maximize automation, maximize resource allocations, and standardization through automation.<\/p>\n                            \n                        <\/div>\n                            \n                        <\/div>\n                    <\/section>\n                                                                                <section class=\"insights-middle\"  id=\"cybersecurity \" >\n                        <div class=\"insights-container\">\n                            \n                        <div class=\"insights-middle-content\">\n                            <h3>Cybersecurity and Cloud<\/h3>\n<p>The majority of organizations are switching to reduced technical on-premise footprints and switching to the Cloud due to reduced costs and flexible scalability. Often, such migration introduces new exposures and brings forward the need for refined control measures. However, under such a circumstance, it is essential to understand how the change in Cybersecurity and Cloud impacts the operations inside a given organization.<\/p>\n<p>In addition to incorporating critical changes around the Cloud measures, organizations today are looking forward to understanding the cybersecurity space&#8217;s existing vulnerabilities. Today, organizations are dealing with several automated solutions that help them expedite such assignments while continuously monitoring the processes.<\/p>\n                            \n                        <\/div>\n                            \n                        <\/div>\n                    <\/section>\n                                                                                <section class=\"insights-middle\"  id=\"classification \" >\n                        <div class=\"insights-container\">\n                            \n                        <div class=\"insights-middle-content\">\n                            <h3>Classification and Governance of Data<\/h3>\n<p>While segregating and securing data may sound like a critical attribute, it is harder to execute and implement it. To directly visualize how the security roles of an organization should be assigned and designed, there needs to be a simplified approach to the classification of data and its location in the database.<\/p>\n<p>Embedding a resilient data governance program helps ensure better control around the given data to ensure compliance with the regulations over GDPR and CCPA. Interestingly, there are several automated solutions to help businesses with the same.<\/p>\n                            \n                        <\/div>\n                            \n                        <\/div>\n                    <\/section>\n                                                                                <section class=\"insights-middle\"  id=\"update\" >\n                        <div class=\"insights-container\">\n                            \n                        <div class=\"insights-middle-content\">\n                            <h3>Updating Internal Control Matrices and Risk Universe<\/h3>\n<p>Moving to the last step of the post, the internal control matrices are an aspect that should not be overlooked as well. This step helps intertwine every detail that is listed above. When the organization <a href=\"\/services\/sap-s4hana-migration\/\">migrates to SAP S\/4HANA<\/a>, it becomes mandatory to revisit SAP applications that already exist.<\/p>\n<p>Let us suppose that the company shifts to a new model of configuration controls in the business process. In that case, it&#8217;s time to update your work program, eliminate manual controls, and give the credits to automated methods of control.<\/p>\n                            \n                        <\/div>\n                            \n                        <\/div>\n                    <\/section>\n                                                        <\/div>\n            \n            \n        <\/div>\n    <\/div>\n\n<section class=\"insights-middle insights-middle-conclusion\" id=\"conclusion\">\n    <div class=\"insights-container\">\n        <div class=\"insights-middle-content\">\n            <div>\n                           <div class=\"insights-conclusion\">\n                                        <h4 class=\"insights-conclusion-title\">Conclusion<\/h4>\n                                        <div class=\"insights-conclusion-text\">\n                        <p>If your organization is not ready to have such discussions, the chances are that you might find yourself in a situation where you have to retrofit to a confined area post the initial upgrade. This way, it ends up costing a significantly large part of the budget, time, and end-user disruption. Having said that, we hope to have covered everything that we think, you should know about design-in security and controls in SAP S\/4HANA.<\/p>\n                    <\/div>\n                                    <\/div>\n                        <\/div> \n        <\/div>\n    <\/div>\n<\/section>\n\n<div class=\"insights-middle insights-middle-conclusion\">\n    <div class=\"insights-container\">\n        <div class=\"insights-middle-content\">\n             <div class=\"insights-conclusion-bottom\">\n                <div class=\"insights-conclusion-profile\">\n                                        <img decoding=\"async\" src=\"https:\/\/www.accely.com\/wp-content\/uploads\/2025\/07\/Vikas-Chopra.webp\" class=\"insights-conclusion-profile-img\" alt=\"Profile\" width=\"56\" height=\"56\">\n                                        <div class=\"insights-conclusion-profile-content\">\n                        <p class=\"conclusion-profile-name\">Vikas Chopra<\/p>\n                                                <p class=\"conclusion-profile-designation\">Practice Head SAP S\/4HANA<\/p>\n                       \n                                               \n                    <\/div>\n                     <\/div>\n                                \n                <ul class=\"insights-conclusion-share ul-none\">\n                    <li><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.accely.com%2Feg-en%2Fblog%2Fwhat-to-know-about-design-in-security-and-controls-in-sap-s4-hana%2F&#038;title=What+to+know+about+Design-In+Security+and+Controls+in+SAP+S%2F4HANA%3F\" target=\"_blank\" aria-label=\"link\" class=\"conclusion-share-link\"><span class=\"icon-linkedin\" rel=\"noopener noreferrer\"><\/span><\/a><\/li>\n                    <li><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.accely.com%2Feg-en%2Fblog%2Fwhat-to-know-about-design-in-security-and-controls-in-sap-s4-hana%2F&#038;text=What+to+know+about+Design-In+Security+and+Controls+in+SAP+S%2F4HANA%3F\" target=\"_blank\" aria-label=\"link\" class=\"conclusion-share-link\" rel=\"noopener noreferrer\"><span class=\"icon-twitter\"><\/span><\/a><\/li>\n                    <li><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.accely.com%2Feg-en%2Fblog%2Fwhat-to-know-about-design-in-security-and-controls-in-sap-s4-hana%2F\" target=\"_blank\" aria-label=\"link\" class=\"conclusion-share-link\" rel=\"noopener noreferrer\"><span class=\"icon-facebook\"><\/span><\/a><\/li>\n                <\/ul>\n                <a aria-label=\"link\" href=\"#\"  target=\"_self\" class=\"btn btn-outline-dark insights-conclusion-btn copy-link-btn\" data-post-link=\"https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/\">Copy link\n                    <span class=\"btn-icon icon-arrow-right\"><\/span>\n                <\/a>\n                \n\n            <\/div>\n            \n                                     <p class=\"conclusion-profile-info \">SAP Solution Architect with 23+ years in logistics and SCM. Expert in SAP S\/4HANA with hands-on experience in global rollouts, upgrades, and enterprise solution delivery.\r\n<\/p>\n             \n  <\/div>\n    <\/div>\n            <\/div>\n<script>\n    jQuery(document).ready(function($) {\n    $('.copy-link-btn').on('click', function(e) {\n        e.preventDefault(); \/\/ Prevent default anchor behavior\n\n        \/\/ Get the post link from data attribute\n        var postLink = $(this).data('post-link');\n\n        \/\/ Create a temporary input element\n        var tempInput = $('<input>');\n        $('body').append(tempInput);\n\n        \/\/ Assign the post link as input value\n        tempInput.val(postLink).select();\n\n        \/\/ Copy the link to clipboard\n        document.execCommand('copy');\n\n        \/\/ Remove the temporary input element\n        tempInput.remove();\n\n        \/\/ Provide feedback to the user (optional)\n        $(this).text('Link Copied!');\n\n        \/\/ Reset anchor text after a short delay (optional)\n        setTimeout(function() {\n            $('.copy-link-btn').text('Copy link');\n        }, 2000); \/\/ 2000 milliseconds = 2 seconds\n    });\n});\n\n<\/script>\n\n<section class=\"blog-list-sec related-posts-sec\">\n    <div class=\"container\">\n                <h4>Explore related blogs <\/h4>\n                        <ul class=\"blog-list-wrapper ul-none\">\n                    <li class=\"blog-list-item\">\n                <div class=\"blog-list-item-top\">\n                                        <img decoding=\"async\" src=\"https:\/\/www.accely.com\/wp-content\/uploads\/2021\/04\/What-is-the-difference-between-SAP-HANA-and-S.webp\" class=\"blog-thumbnail-img\" width=\"638\" height=\"320\" alt=\"blog-thumbnail\">\n                                        <div class=\"blog-meta d-flex d-space-between color-white\"> \n                        <div class=\"left\">\n                                                        <p class=\"body-font-md author-name\">Vikas Chopra<\/p>\n                                                        <p class=\"body-font-sm blog-post-date\">27 April 2021<\/p>\n                        <\/div>\n                                                <div class=\"right\">\n                                                        <p class=\"body-font-md blog-category\">SAP ERP<\/p>\n                                                    <\/div>\n                        \n                    <\/div>\n                <\/div>\n                <div class=\"blog-list-item-bottom\">\n                                        <h5 class=\"h6 blog-title\">What is the difference between SAP HANA and S\/4HANA?<\/h5>\n                                        <p class=\"body-font-md blog-excerpt\">Let\u2019s take a look at the most common and confused concept that runs in the minds of a majority of SAP users. Well, there is a lot to talk about. Visit to read more!<\/p>\n                                        <a href=\"https:\/\/www.accely.com\/eg-en\/blog\/difference-between-sap-hana-and-s4-hana\/\" aria-label=\"link\" class=\"body-font-lg link\">Read more<span class=\"link-icon icon-arrow-right\"><\/span> <\/a>\n                                    <\/div>\n            <\/li>\n                        <li class=\"blog-list-item\">\n                <div class=\"blog-list-item-top\">\n                                        <img decoding=\"async\" src=\"https:\/\/www.accely.com\/wp-content\/uploads\/2021\/04\/Key-Guidance-for-SAP-ECC-Customers-in-2022.webp\" class=\"blog-thumbnail-img\" width=\"638\" height=\"320\" alt=\"blog-thumbnail\">\n                                        <div class=\"blog-meta d-flex d-space-between color-white\"> \n                        <div class=\"left\">\n                                                        <p class=\"body-font-md author-name\">Vikas Chopra<\/p>\n                                                        <p class=\"body-font-sm blog-post-date\">20 April 2021<\/p>\n                        <\/div>\n                                                <div class=\"right\">\n                                                        <p class=\"body-font-md blog-category\">SAP ERP<\/p>\n                                                    <\/div>\n                        \n                    <\/div>\n                <\/div>\n                <div class=\"blog-list-item-bottom\">\n                                        <h5 class=\"h6 blog-title\">Key Guidance for SAP ECC Customers in 2021<\/h5>\n                                        <p class=\"body-font-md blog-excerpt\">SAP customers are aware of the SAP HANA migration process. Considering that the SAP platform&#039;s current users will need to decide between staying with ECC or migrating to S\/4HANA or consider other alternatives. Visit to read more!<\/p>\n                                        <a href=\"https:\/\/www.accely.com\/eg-en\/blog\/key-guidance-for-sap-ecc-customers-in-2021\/\" aria-label=\"link\" class=\"body-font-lg link\">Read more<span class=\"link-icon icon-arrow-right\"><\/span> <\/a>\n                                    <\/div>\n            <\/li>\n                        <li class=\"blog-list-item\">\n                <div class=\"blog-list-item-top\">\n                                        <img decoding=\"async\" src=\"https:\/\/www.accely.com\/wp-content\/uploads\/2021\/02\/How-SAP-C4HANA-is-Revolutionizing-the-Landscape-of-CRM-Market.webp\" class=\"blog-thumbnail-img\" width=\"638\" height=\"320\" alt=\"blog-thumbnail\">\n                                        <div class=\"blog-meta d-flex d-space-between color-white\"> \n                        <div class=\"left\">\n                                                        <p class=\"body-font-md author-name\">Vikas Chopra<\/p>\n                                                        <p class=\"body-font-sm blog-post-date\">15 February 2021<\/p>\n                        <\/div>\n                                                <div class=\"right\">\n                                                        <p class=\"body-font-md blog-category\">SAP ERP<\/p>\n                                                    <\/div>\n                        \n                    <\/div>\n                <\/div>\n                <div class=\"blog-list-item-bottom\">\n                                        <h5 class=\"h6 blog-title\">How SAP C\/4HANA is Revolutionizing the Landscape of CRM Market<\/h5>\n                                        <p class=\"body-font-md blog-excerpt\">SAP C\/4 HANA is a cluster of different cloud solutions that help companies design and modernize the different aspects of CRM operations. SAP C\/4HANA has helped businesses develop a reliable scope at operations.<\/p>\n                                        <a href=\"https:\/\/www.accely.com\/eg-en\/blog\/how-sap-c-4hana-is-revolutionizing-the-landscape-of-crm-market\/\" aria-label=\"link\" class=\"body-font-lg link\">Read more<span class=\"link-icon icon-arrow-right\"><\/span> <\/a>\n                                    <\/div>\n            <\/li>\n                        <li class=\"blog-list-item\">\n                <div class=\"blog-list-item-top\">\n                                        <img decoding=\"async\" src=\"https:\/\/www.accely.com\/wp-content\/uploads\/2020\/10\/Intelligent-Innovation-with-SAP-HANA-Cloud.webp\" class=\"blog-thumbnail-img\" width=\"638\" height=\"320\" alt=\"blog-thumbnail\">\n                                        <div class=\"blog-meta d-flex d-space-between color-white\"> \n                        <div class=\"left\">\n                                                        <p class=\"body-font-md author-name\">Vikas Chopra<\/p>\n                                                        <p class=\"body-font-sm blog-post-date\">16 October 2020<\/p>\n                        <\/div>\n                                                <div class=\"right\">\n                                                        <p class=\"body-font-md blog-category\">SAP ERP<\/p>\n                                                    <\/div>\n                        \n                    <\/div>\n                <\/div>\n                <div class=\"blog-list-item-bottom\">\n                                        <h5 class=\"h6 blog-title\">Intelligent Innovation with SAP HANA Cloud<\/h5>\n                                        <p class=\"body-font-md blog-excerpt\">SAP HANA Cloud is an in-memory database that enables the centralization of data from multiple sources; on-premise and cloud.<\/p>\n                                        <a href=\"https:\/\/www.accely.com\/eg-en\/blog\/intelligent-innovation-with-sap-hana-cloud\/\" aria-label=\"link\" class=\"body-font-lg link\">Read more<span class=\"link-icon icon-arrow-right\"><\/span> <\/a>\n                                    <\/div>\n            <\/li>\n            \n        \n        <\/ul>\n                    <\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>While simplifying business processes, the SAP S\/4HANA promotes improved performance and more significant business value. Visit our website to know more!<\/p>\n","protected":false},"author":7,"featured_media":37350,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"product-post":[],"industry-post":[],"solution-post":[140],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What to know about Design-In Security and Controls in SAP S\/4HANA?<\/title>\n<meta name=\"description\" content=\"While simplifying business processes, the SAP S\/4HANA promotes improved performance and more significant business value. Visit our website to know more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to know about Design-In Security and Controls in SAP S\/4HANA?\" \/>\n<meta property=\"og:description\" content=\"While simplifying business processes, the SAP S\/4HANA promotes improved performance and more significant business value. Visit our website to know more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/\" \/>\n<meta property=\"og:site_name\" content=\"Accely\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-04T06:49:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T07:44:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.accely.com\/wp-content\/uploads\/2021\/05\/What-to-know-about-Design-In-Security-and-Controls-in-SAP-S.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Vikas Chopra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vikas Chopra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to know about Design-In Security and Controls in SAP S\/4HANA?","description":"While simplifying business processes, the SAP S\/4HANA promotes improved performance and more significant business value. Visit our website to know more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What to know about Design-In Security and Controls in SAP S\/4HANA?","og_description":"While simplifying business processes, the SAP S\/4HANA promotes improved performance and more significant business value. Visit our website to know more!","og_url":"https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/","og_site_name":"Accely","article_published_time":"2021-05-04T06:49:00+00:00","article_modified_time":"2025-03-13T07:44:27+00:00","og_image":[{"width":720,"height":432,"url":"https:\/\/www.accely.com\/wp-content\/uploads\/2021\/05\/What-to-know-about-Design-In-Security-and-Controls-in-SAP-S.webp","type":"image\/webp"}],"author":"Vikas Chopra","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vikas Chopra","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/","url":"https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/","name":"What to know about Design-In Security and Controls in SAP S\/4HANA?","isPartOf":{"@id":"https:\/\/www.accely.com\/eg-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/#primaryimage"},"image":{"@id":"https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/#primaryimage"},"thumbnailUrl":"https:\/\/www.accely.com\/wp-content\/uploads\/2021\/05\/What-to-know-about-Design-In-Security-and-Controls-in-SAP-S.webp","datePublished":"2021-05-04T06:49:00+00:00","dateModified":"2025-03-13T07:44:27+00:00","author":{"@id":"https:\/\/www.accely.com\/eg-en\/#\/schema\/person\/620a43ddeed41aa8a188ad5e32b059fc"},"description":"While simplifying business processes, the SAP S\/4HANA promotes improved performance and more significant business value. Visit our website to know more!","breadcrumb":{"@id":"https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/#breadcrumb"},"inLanguage":"eg-en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/"]}]},{"@type":"ImageObject","inLanguage":"eg-en","@id":"https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/#primaryimage","url":"https:\/\/www.accely.com\/wp-content\/uploads\/2021\/05\/What-to-know-about-Design-In-Security-and-Controls-in-SAP-S.webp","contentUrl":"https:\/\/www.accely.com\/wp-content\/uploads\/2021\/05\/What-to-know-about-Design-In-Security-and-Controls-in-SAP-S.webp","width":720,"height":432,"caption":"What to know about Design-In Security and Controls in SAP S\/4HANA?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.accely.com\/eg-en\/blog\/what-to-know-about-design-in-security-and-controls-in-sap-s4-hana\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.accely.com\/eg-en\/"},{"@type":"ListItem","position":2,"name":"What to know about Design-In Security and Controls in SAP S\/4HANA?"}]},{"@type":"WebSite","@id":"https:\/\/www.accely.com\/eg-en\/#website","url":"https:\/\/www.accely.com\/eg-en\/","name":"Accely","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.accely.com\/eg-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"eg-en"},{"@type":"Person","@id":"https:\/\/www.accely.com\/eg-en\/#\/schema\/person\/620a43ddeed41aa8a188ad5e32b059fc","name":"Vikas Chopra","image":{"@type":"ImageObject","inLanguage":"eg-en","@id":"https:\/\/www.accely.com\/eg-en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c94a0b8ca39f39e3c9b0f792e9d00306?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c94a0b8ca39f39e3c9b0f792e9d00306?s=96&d=mm&r=g","caption":"Vikas Chopra"}}]}},"_links":{"self":[{"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/posts\/10829"}],"collection":[{"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/comments?post=10829"}],"version-history":[{"count":7,"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/posts\/10829\/revisions"}],"predecessor-version":[{"id":64290,"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/posts\/10829\/revisions\/64290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/media\/37350"}],"wp:attachment":[{"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/media?parent=10829"}],"wp:term":[{"taxonomy":"product-post","embeddable":true,"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/product-post?post=10829"},{"taxonomy":"industry-post","embeddable":true,"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/industry-post?post=10829"},{"taxonomy":"solution-post","embeddable":true,"href":"https:\/\/www.accely.com\/eg-en\/wp-json\/wp\/v2\/solution-post?post=10829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}