...
Uncover security holes if too many privileges were granted to some user
Show attempts to breach security
Protect the system owner against accusations of security violations and data misuse
Allow the system owner to meet security standards
Monitor HANA XSA events (starting from SP 7.04/8.00)
Following actions are typically audited:
...