AWS Connector for SAP

AWS SDK for ABAP language


  • SAP Archivelink certified, it's an ABAP SDK for AWS
  • Integration with AWS S3, SNS, SQS, Lambda, Athena and DynamoDB
  • Easy installation and lifecycle management
  • Zero conflicts with existing code and SAP Archivelink Compatible
  • Built-in authentication, security (IAM) and token management
  • Built-in Webdynpro App, Fiori app for automated customizing and management
  • Includes testing and migration programs
  • HTTPS connection between SAP and AWS. SSL Certificates
  • Identity and Access Management. Data encryption.
  • Private endpoints


  • Replacement of current content repository to AWS S3 for SAP
  • Migrate data from content repository to the cloud
  • Store attachments and archiving sessions in the cloud
  • Integration with cloud services which use S3 or blob
  • Develop custom programs (Z) that integrate with S3 or Blob
  • Example: Big Data, Machine Learning


£27,200 to £27,200 an instance a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

8 2 3 5 9 0 2 0 6 0 6 7 1 7 9


Telephone: +34 606790471

Service scope

Software add-on or extension
What software services is the service an extension to
SAP systems
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
Minimum SAP Version required
SAP Netweaver 7.0 or higher (SAP Kernel release 720 or higher)
SAP S/4HANA 1809 or higher (SAP Kernel release 753 or higher)
BW/4HANA 2.0
System requirements
  • SAP ABAP system
  • AWS account
  • Network connectivity between SAP and AWS

User support

Email or online ticketing support
Email or online ticketing
Support response times
Standard support covers Mo-Fr 9-18 CET
24/7 coverage is available on Enterprise version
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Mo-Fr 8-18 BT included in standard level price
24/7 at extra cost for Enterprise Licensing, customized
TAM or Cloud support engineer, not by default, on-demand at extra cost
Support available to third parties

Onboarding and offboarding

Getting started
4 hours workshop included in subscription price, for installation and initial configuration
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Users can use migration programs included in the add-on to extract their data and migrate them back to other repository
End-of-contract process
Contract is a subscription, based on use of the connector. Once the period is over, if renewal is not needed, the customer can use the tool to extract their data. No other activity is required.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Service interface
Description of service interface
AWS Connector for SAP management is a webdynpro console integrated in the SAP server that helps to manage their AWS Resources, Content Repositories and other configurations
Accessibility standards
None or don’t know
Description of accessibility
SAP WebDynpro user constraints apply
Accessibility testing
Customisation available
Description of customisation
Users can build their own programs based on the libraries included in the add-on


Independence of resources
All communications are done inside customer infrastructure, so no interfering with other users' demands are possible


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
Other data at rest protection approach
User data is stored in their own cloud account, and specific cloud vendor protection protocols apply
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
By using migration programs included in the add-on
Data export formats
Other data export formats
SAP document classes
Data import formats
Other data import formats
SAP document class

Data-in-transit protection

Data protection between buyer and supplier networks
Other protection between networks
Add-on works inside customer's network, so no communication with external networks is required
Data protection within supplier network
Other protection within supplier network
Add-on works inside customer's network, so no communication with other networks is required

Availability and resilience

Guaranteed availability
All operations using the add-on are performed in the customer network and customer's own cloud account.

Cloud Provider specific SLAs apply in this case.
Approach to resilience
We do not provide datacenter setup.

All add-on operations are done in the customer infrastructure.
Outage reporting
No service offered with the add-on.

Identity and authentication

User authentication needed
Access restrictions in management interfaces and support channels
The access between the add-on and the AWS Cloud is secured by:
- Identity and Access Management policies
- HTTPS and SSL protocols in transit.

The management interface has local access in the customer network. Customer security policies apply.
Access restriction testing frequency
At least once a year
Management access authentication
Description of management access authentication
No management service needed for the add-on usage.

No authentication needed

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Information Security, Cyber Security and Data Protection Policy.
- The policy creates two responsibilities that protect the compliance of the policy:
- ChiefSecurity Officer: Which falls in the position of IT Manager-
- Data ProtectionOfficer: Which falls in the position of Head of Legal·
- The Policy implements an information security breach procedure
- The Policy implements a unique channel of communication for these matters:
- Linke’s Training Plan already contains at least one training session for the entire workforce every year. Likewise, those responsible carry out awareness campaigns taking advantage of World Data Protection Day, reporting some important news about it, taking advantage of the anniversary of the RGPD.
- Linke has a Whistleblowing Policy: Means to file complaints of non-compliance in general and data protection in particular-

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
At least every 6 months, an improvement package is delivered to the customer.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Incident management type
Supplier-defined controls
Incident management approach
User can report incidents through Jira and mail.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£27,200 to £27,200 an instance a year
Discount for educational organisations
Free trial available
Description of free trial
Included the usage of the add-on for a specific free of charge period of time, based on the customer specific usage scenarios.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.