During this webinar, Greg Wendt and Rajesh Rengarethinam discussed:
- How Attribute-Based Access Controls complement and extend SAP’s role-based security model
- ABAC policies that can be used to quickly scale new security controls without redesigning existing roles and privileges
- Ways fine-grained controls can be used as a stop-gap to mitigate privileged user exploits and remote access risks
- How context-aware controls can shrink your attack surface in cloud-hosted instances