Cybersecurity for SAP
ISBN 978-1-4932-2592-7 455 pages, 2025
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2593-4 455 pages, 2025, Print edition hardcover
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2594-1
- Use the NIST Cybersecurity Framework to design your cybersecurity program
- Implement vulnerability management, threat detection, network security, and other techniques in your SAP system
- Map SAP cybersecurity functions to frameworks, standards, and regulatory requirements for compliance
In this book, you'll learn about:
-
Getting Started
Walk through cybersecurity principles, concepts, and frameworks in the context of your SAP system. Learn why your baseline SAP landscape needs additional cybersecurity protection and which tools can be used to defend which parts.
-
Implementing Cybersecurity
Establish robust cybersecurity practices in your SAP landscape! Build a review process for patch day, detect anomalies, create a backup strategy, assess the impact of the cloud on your security protocols, and much, much more.
-
Frameworks and Tools
Discover how to map SAP security functions to standard frameworks like NIST, ISO, and CIS. Explore tools for securing your landscape, such as SAP Trust Center, and discover the RISE with SAP shared responsibility model.
Highlights include:
-
Security architecture
-
NIST Cybersecurity Framework (CSF)
-
Secure operations map
-
Vulnerability management
-
Threat detection
-
Incident response
-
Business continuity
-
Disaster recovery
-
Infrastructure security
-
Network security
-
SAP Trust Center
-
Cloud cybersecurity
You may also like:
-
Enterprise Architecture with SAP: Planning, Management, and Transformation –
562 pages, paperback
Calling all SAP enterprise architects—the strategy guide you need is here! See how the SAP EA Framework supports your enterprise architecture with methodology, reference content, tools, and services. Explore examples of architecture design pattern implementation for real-world use cases, including … More about the bookfrom $84.99
Available
E-book | Print edition | Bundle -
Introducing SAP Cloud Identity Access Governance (IAG)
111 pages
Learn about access management for your cloud and hybrid landscapes with SAP Cloud Identity Access Governance! First, understand the security challenges that SAP Cloud IAG helps solve. Then see how SAP Cloud IAG’s services work, from access analysis and privileged … More about the book$24.99
Available
E-Bite -
Implementing SAP Enterprise Threat Detection
80 pages
Stay ahead of cybersecurity vulnerabilities with SAP Enterprise Threat Detection. Learn to set up and use standard and nonstandard logs to analyze risks in your SAP environment. Review attack detection patterns and create your own custom patterns based on log … More about the book$29.99
Available
E-Bite