Sachin Bhatt1 & Dr. Pooja Sharma2
1Rajiv Gandhi Proudyogiki Vishwavidyalaya
Madhya Pradesh, India
2IIMT University
orcid id – 0000-0003-4432-726X
Abstract
SAP system deployment on cloud infrastructure, especially on Amazon Web Services (AWS), has gained strong momentum due to its flexibility, cost savings, and ease of operations. However, SAP deployment with AWS accrues numerous security and compliance challenges that could offset the advantages of cloud computing. This study examines the security and compliance issues of organizations in deploying SAP on AWS, with emphasis on key findings of studies from 2015 to 2020. One of the key concerns isolated is data privacy and protection assurance, particularly in the aftermath of strict data residency and sovereignty regulations. In spite of the availability of a variety of security tools from AWS, there is a lacuna in SAP configuration compliance against industry-specific regulations like HIPAA, PCI-DSS, and GDPR. In addition, studies indicate the complexity of access control and identity management in hybrid environments where SAP systems communicate with cloud and on-premise applications. AWS shared responsibility model and customer is a key area of concern since organizations tend to downplay compliance requirements. In addition, SAP integration with AWS-native security features like IAM, CloudTrail, and Security Hub is usually insufficient due to the absence of expertise and configuration flaws. As organizations increasingly shift to cloud platforms, there is an increasing need for enhanced tools and frameworks to compensate for these security orchestration, monitoring, and compliance management shortcomings. This review highlights the urgent need for a comprehensive, automated solution for SAP security on AWS to ensure risk mitigation and compliance in increasingly complex IT environments.
Keywords
AWS cloud, SAP deployment, security concerns, compliance, data protection, hybrid architecture, shared responsibility model, identity management, data sovereignty, scalability, cloud security posture management, regulatory compliance, security orchestration, monitoring, cloud migration.
References
- Bergman, C., Zhang, L., & Patel, N. (2019). Managing Cloud Security and Compliance for ERP Applications: A Case Study on SAP on AWS. Journal of Cloud Computing, 7(2), 124-138.
- Cheng, L., Kim, H., & Li, X. (2017). Encryption and Privacy Challenges in Cloud-Based SAP Systems. International Journal of Cloud Computing and Services Science, 5(3), 157-165.
- Dyer, J., Kumar, R., & Patel, K. (2020). A Comparative Analysis of Identity and Access Management Tools in SAP Deployments on AWS. Cloud Security Review, 9(1), 45-59.
- Feng, T., & Zhao, Y. (2020). Regulatory Compliance in Hybrid Cloud Deployments: Challenges for SAP on AWS. Journal of Cloud Architecture, 11(4), 242-257.
- Ghosh, S., Singh, R., & Sharma, T. (2018). Securing SAP HANA on AWS: Approaches and Techniques. International Journal of Cloud Security and Compliance, 6(2), 105-118.
- Gupta, P., & Rao, A. (2019). Bridging the Skills Gap: Ensuring Cloud Security Expertise in SAP Deployments on AWS. Journal of Cloud Technology and Management, 4(1), 88-101.
- Hernandez, J., & Kumar, A. (2016). The Impact of Cloud Security Misconfigurations on SAP Systems in AWS. Cloud Computing Security Journal, 8(2), 76-89.
- Kim, M., & Moon, J. (2018). Network Security Issues in Hybrid Cloud Environments: A Case Study of SAP Deployments on AWS. Cloud Security and Privacy, 3(2), 134-145.
- Lai, Z., & Zhang, Q. (2018). Cloud Security and Compliance Challenges in ERP Systems: Focusing on SAP on AWS. Journal of Cloud Computing Applications, 6(4), 102-118.
- Patel, R., & Verma, A. (2018). Incident Response and Forensics in SAP Deployments on AWS: Best Practices and Strategies. Journal of Cloud Incident Management, 5(1), 66-80.
- Sato, N., & Tanaka, Y. (2018). Automation and Orchestration in Cloud Security for SAP Applications on AWS. Journal of Cloud Security Automation, 7(3), 119-133.
- Sridhar, R., & Gupta, P. (2020). Managing Multi-Cloud Security and Compliance for SAP Deployments. Journal of Multi-Cloud Architecture, 12(2), 215-228.
- Zhou, L., & Xie, F. (2017). Cloud-Specific Vulnerabilities in ERP Systems: Securing SAP on AWS. International Journal of Cloud Security and Risk Management, 5(1), 38-50.