Cybersecurity for SAP
ca. € 89,95
Vorbestellbar
Lieferbar ab 05.07.2025
ca. € 89,95
Vorbestellbar
Verfügbar ab 05.07.2025
SAP PRESS, ISBN 978-1-4932-2592-7
E-Book-Formate: PDF, EPUB, Online
SAP PRESS, ISBN 978-1-4932-2593-4
Protect your SAP system from bad actors! Start by getting a thorough grounding in the why and what of cybersecurity before diving into the how. Create your security roadmap using tools like SAP’s secure operations map and the NIST Cybersecurity Framework (CSF). Then walk through key cybersecurity processes: vulnerability management, threat detection, incident response, disaster recovery, and more. With step-by-step instructions for implementing infrastructure and network security and using tools like SAP Trust Center, this guide will help you safeguard your system!
- Learn to use the secure operations map framework for cybersecurity
- Implement vulnerability management, threat detection, network security, and other cybersecurity techniques in your SAP system
- Map SAP cybersecurity functions to frameworks, standards, and regulatory requirements for compliance
In this book, you'll learn about:
-
Getting Started
Walk through cybersecurity principles, concepts, and frameworks in the context of your SAP system. Learn why your baseline SAP landscape needs additional cybersecurity protection and which tools can be used to defend which parts.
-
Implementing Cybersecurity
Establish robust cybersecurity practices in your SAP landscape! Build a review process for patch day, detect anomalies, create a backup strategy, assess the impact of the cloud on your security protocols, and much, much more.
-
Frameworks and Tools
Discover how to map SAP security functions to standard frameworks like NIST, ISO, and CIS. Explore tools that help you secure your landscape like SAP Trust Center and discover the RISE with SAP shared responsibility model.
Highlights include:
- Security architecture
- Secure operations map
- Vulnerability management
- Threat detection
- Incident response
- Business continuity
- Disaster recovery
- Infrastructure security
- Network security
- SAP Trust Center
- Cloud cybersecurity