Skip to content

Commit 766a6cb

Browse files
committed
ai review
1 parent 730c8d2 commit 766a6cb

File tree

1 file changed

+19
-19
lines changed

1 file changed

+19
-19
lines changed

guides/security/overview.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -36,14 +36,14 @@ For example, authentication can be delegated to a [separate ingress component](.
3636

3737
### Customizable { #key-concept-customizable }
3838

39-
Due to the plugin-based architecture, **CAP allows standard functions to be modified as required or, if necessary, completely replaced**.
40-
This flexibility is crucial for scenarios where the default methods do not fully meet the requirements of the application.
39+
Due to the plugin-based architecture, **you can modify CAP's standard functions as required or, if necessary, completely replace them**.
40+
This flexibility is crucial for scenarios where the default methods do not fully meet your application's requirements.
4141
Moreover, this integration helps to easily incorporate non-CAP and even non-BTP services, thereby providing a flexible and interoperable environment.
4242

4343
![Overview Customizable Components with CAP](./assets/security-customizable.drawio.svg){width="600px" }
4444

45-
For instance, it is possible to define specific endpoints with a [custom authentication strategy](./authentication#custom-auth).
46-
Likewise, the CAP representation of the request user can be overruled to match additional, application-specific requirements.
45+
For instance, you can define specific endpoints with a [custom authentication strategy](./authentication#custom-auth).
46+
Likewise, you can override the CAP representation of the request user to match additional, application-specific requirements.
4747

4848
### Built on Best of Breed { #key-concept-platform-services }
4949

@@ -59,7 +59,7 @@ Likewise, TLS termination is offered by the [platform infrastructure](#platform-
5959

6060
### Decoupled from Business Logic { #key-concept-decoupled-coding }
6161

62-
As security functions are factorized into independent components, **application code is entirely decoupled** and hence is not subject to change in case of any security-related adaptations.
62+
As security functions are factorized into independent components, **application code is entirely decoupled** and hence is not subject to change for any security-related adaptations.
6363
This ensures that business logic remains independent of platform services, which are often subject to security-hardening initiatives.
6464
As a welcome side effect, this also allows testing application security in a **local test or development setup in a self-contained way**.
6565

@@ -85,15 +85,15 @@ The application is responsible for coordinated overall configuration.
8585
## Security Architecture
8686

8787
CAP applications run in a specific context that has a major impact on the security [architecture](#architecture-overview).
88-
CAP requires a dedicated [platform environment](#platform-environment) to integrate with, in order to ensure end-to-end security.
88+
CAP requires a dedicated [platform environment](#platform-environment) to integrate with to ensure end-to-end security.
8989

9090
### Architecture Overview { #architecture-overview }
9191

9292
The following diagram provides a high-level overview of the security-relevant components and interfaces of a deployed CAP application in a cloud environment:
9393

9494
![This TAM graphic is explained in the accompanying text.](./assets/cap-security-architecture-overview.png){width="600px"}
9595

96-
To serve a business request, different runtime components are involved: a request, issued by a UI or technical client ([public zone](#public-zone)), is forwarded by a gateway or ingress router to the CAP application. In case of a UI request, an [Application Router](https://help.sap.com/docs/btp/sap-business-technology-platform/application-router) instance acts as a proxy to manage the login flow and the browser session. The CAP application can have additional services such as a CAP sidecar. All application components ([application zone](#application-zone)) might make use of platform services such as database or identity service ([platform zone](#platform-zone)).
96+
To serve a business request, different runtime components are involved: a request, issued by a UI or technical client ([public zone](#public-zone)), is forwarded by a gateway or ingress router to the CAP application. For a UI request, an [Application Router](https://help.sap.com/docs/btp/sap-business-technology-platform/application-router) instance acts as a proxy to manage the login flow and the browser session. The CAP application can have additional services such as a CAP sidecar. All application components ([application zone](#application-zone)) might make use of platform services such as database or identity service ([platform zone](#platform-zone)).
9797

9898
#### Public Zone { #public-zone }
9999

@@ -107,17 +107,17 @@ Ideally, you should limit the number of exposed endpoints to a minimum, perhaps
107107

108108
The platform zone contains all platform components and services that are *configured and maintained* by the application provider.
109109
CAP applications consume these low-level [platform services](#btp-services) to handle more complex business requests.
110-
For instance, persistence service to store business data and identity service to authenticate the business user play a fundamental role.
110+
For instance, the persistence service stores business data and the identity service authenticates the business user. Both play a fundamental role.
111111

112112
The platform zone also includes the gateway, which is the main entry point for external requests. Additionally, it may contain extra ingress routers.
113113

114114
#### Application Zone { #application-zone}
115115

116-
The application zone comprises all microservices that represent a CAP application. They are tightly integrated and form a **unit of trust**. The application provider is responsible to *develop, deploy and operate* these services:
116+
The application zone comprises all microservices that represent a CAP application. They are tightly integrated and form a **unit of trust**. The application provider is responsible for *developing, deploying, and operating* these services:
117117

118118
- The [Application Router](https://help.sap.com/docs/btp/sap-business-technology-platform/application-router) acts as an optional reverse proxy wrapping the application service and providing business-independent functionality required for UIs.
119119
This includes serving UI content, providing a login flow as well as managing the session with the browser.
120-
It can be deployed as an application (reusable module) or alternatively consumed as a [service](https://help.sap.com/docs/btp/sap-business-technology-platform/managed-application-router).
120+
You can deploy it as an application (reusable module) or alternatively consume it as a [service](https://help.sap.com/docs/btp/sap-business-technology-platform/managed-application-router).
121121

122122
- The CAP application service exposes the API to serve business requests. Usually, it makes use of lower-level platform services. As built on CAP, a significant number of security requirements is covered either out of the box or by adding minimal configuration.
123123

@@ -144,7 +144,7 @@ This **frees CAP applications from the need to manage trust certificates**. The
144144

145145
3. **Secrets** that are required to protect the application or to consume other platform services **are injected by the platform** into the application microservices in a secure way.
146146

147-
All supported [environments](#cloud) fulfill the given requirements. Additional requirements could be added in future.
147+
All supported [environments](#cloud) fulfill the given requirements. Additional requirements may be added in future.
148148

149149
::: tip
150150
Custom domain certificates must be signed by a trusted certificate authority.
@@ -190,12 +190,12 @@ Currently, CAP supports to run on two cloud runtimes of [SAP Business Technology
190190
- [SAP BTP, Cloud Foundry Runtime](https://help.sap.com/docs/btp/sap-business-technology-platform/cloud-foundry-environment)
191191
- [SAP BTP, Kyma Runtime](https://help.sap.com/docs/btp/sap-business-technology-platform/kyma-environment)
192192

193-
Application providers are responsible to ensure a **secure platform environment**.
193+
Application providers are responsible for ensuring a **secure platform environment**.
194194
In particular, this includes *configuring* [platform services](#btp-services) the application consumes.
195-
For instance, the provider (user) administrator needs to configure the [identity service](#identity-service) to separate platform users from business users that come from different identity providers.
195+
For instance, you as the provider (user) administrator need to configure the [identity service](#identity-service) to separate platform users from business users that come from different identity providers.
196196
Likewise, login policies (for example, multifactor authentication or single-sign-on) must be aligned with company-specific requirements.
197197

198-
Note, that achieving production-ready security requires to meet all relevant aspects of the **development process** as well.
198+
Note that achieving production-ready security requires meeting all relevant aspects of the **development process** as well.
199199
For instance, source code repositories must be protected and must not contain any secrets or personal data.
200200
Likewise, the **deployment process** must be secured. This includes not only setting up CI/CD pipelines running on technical platform users, but also defining integration tests to ensure properly secured application endpoints.
201201

@@ -219,23 +219,23 @@ Find more about BTP platform security here:
219219

220220
### Security Platform Services { #btp-services }
221221

222-
SAP BTP provides a range of platform services that your CAP applications can utilize to meet production-grade security requirements. To ensure the security of your CAP applications, it's crucial to comply with the service level agreement (SLA) of these platform services. *As the provider of the application, you play a key role in meeting these requirements by correctly configuring and using these services.*
222+
SAP BTP provides a range of platform services that your CAP applications can use to meet production-grade security requirements. To ensure the security of your CAP applications, comply with the service level agreement (SLA) of these platform services. *As the provider of the application, you play a key role in meeting these requirements by correctly configuring and using these services.*
223223

224224
::: tip
225225
SAP BTP services and the underlying platform infrastructure hold various certifications and attestations, which can be found under the naming of SAP Cloud Platform in the [SAP Trust Center](https://www.sap.com/about/trust-center/certification-compliance/compliance-finder.html?search=SAP%20Business%20Technology%20Platform%20ISO).
226226
:::
227227
[Webcast SAP BTP Cloud Identity and Security Services](https://assets.dm.ux.sap.com/webinars/sap-user-groups-k4u/pdfs/221117_sap_security_webcast_series_sap_btp_cloud_identity_and_security_services.pdf){.learn-more}
228228

229229

230-
The CAP framework offers flexible APIs that you can integrate with various services, including your custom services. If you replace platform services with your custom ones, it's important to ensure that the service level agreements (SLAs) CAP depends on are still met.
230+
The CAP framework offers flexible APIs that you can integrate with various services, including your custom services. If you replace platform services with your custom ones, ensure that the service level agreements (SLAs) CAP depends on are still met.
231231

232232
The most important services for security offered by the platform:
233233

234234
#### [SAP Cloud Identity Services - Identity Authentication](https://help.sap.com/docs/IDENTITY_AUTHENTICATION) { #identity-service }
235235

236-
The Identity Authentication service defines the user base for (CAP) applications and services, and allows to control access.
237-
Customers can integrate their third-party or on-premise identity provider (IdP) and harden security by defining multifactor authentication or by narrowing client IP ranges.
238-
This service helps to introduce a strict separation between platform users (provider) and business users (subscribers), a requirement of CAP. It supports various authentication methods, including SAML 2.0 and [OpenID Connect](https://openid.net/connect/), and allows for the configuration of single sign-on access.
236+
The Identity Authentication service defines the user base for (CAP) applications and services, and allows you to control access.
237+
You can integrate your third-party or on-premise identity provider (IdP) and harden security by defining multifactor authentication or by narrowing client IP ranges.
238+
This service helps introduce a strict separation between platform users (provider) and business users (subscribers), a requirement of CAP. It supports various authentication methods, including SAML 2.0 and [OpenID Connect](https://openid.net/connect/), and allows you to configure single sign-on access.
239239

240240
[Learn more in the SAP Cloud Identity - Security Guide.](https://help.sap.com/docs/IDENTITY_AUTHENTICATION?#discover_task-security){.learn-more}
241241

0 commit comments

Comments
 (0)