Cybersecurity for SAP
written by
Gaurav Singh, Juan Perez-Etchegoyen
500 pages, 2025, Print edition hardcover
ISBN 978-1-4932-2592-7 500 pages, 2025
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2593-4 500 pages, 2025, Print edition hardcover
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2594-1
ISBN 978-1-4932-2592-7 500 pages, 2025
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2593-4 500 pages, 2025, Print edition hardcover
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2594-1
Protect your SAP system from bad actors! Start by getting a thorough grounding in the why and what of cybersecurity before diving into the how. Create your security roadmap using tools like SAP’s secure operations map and the NIST Cybersecurity Framework (CSF). Then walk through key cybersecurity processes: vulnerability management, threat detection, incident response, disaster recovery, and more. With step-by-step instructions for implementing infrastructure and network security and using tools like SAP Trust Center, this guide will help you safeguard your system!
- Learn to use the secure operations map framework for cybersecurity
- Implement vulnerability management, threat detection, network security, and other cybersecurity techniques in your SAP system
- Map SAP cybersecurity functions to frameworks, standards, and regulatory requirements for compliance
About the Book
About the E-book
500 pages, hardcover. Foreword by Mariano Nuñez. Reference book format 7 x 10 in. Printed black and white on 50# offset paper from sustainable sources. Casebound for durability. Reader-friendly serif font (TheAntiquaB 9.5 Pt.). One-column layout.
E-book in full color. PDF and EPUB files for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application.
In this book, you'll learn about:
-
Getting Started
Walk through cybersecurity principles, concepts, and frameworks in the context of your SAP system. Learn why your baseline SAP landscape needs additional cybersecurity protection and which tools can be used to defend which parts.
-
Implementing Cybersecurity
Establish robust cybersecurity practices in your SAP landscape! Build a review process for patch day, detect anomalies, create a backup strategy, assess the impact of the cloud on your security protocols, and much, much more.
-
Frameworks and Tools
Discover how to map SAP security functions to standard frameworks like NIST, ISO, and CIS. Explore tools that help you secure your landscape like SAP Trust Center.
Highlights include:
-
Security architecture
-
Secure operations map
-
Vulnerability management
-
Threat detection
-
Incident response
-
Business continuity
-
Disaster recovery
-
Infrastructure security
-
Network security
-
SAP Trust Center
-
Cloud cybersecurity