Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Uncover security holes if too many privileges were granted to some user

  • Show attempts to breach security

  • Protect the system owner against accusations of security violations and data misuse

  • Allow the system owner to meet security standards

  • Monitor HANA XSA events (starting from SP 7.04/8.00)

Following actions are typically audited:

...