How to implement and enforce a security baseline for SAP ?

About every organization running SAP must have a security baseline somewhere, often buried somewhere in a digital archive instead of being implemented and getting enforced. 

While the SAP systems (ERP, CRM, SRM, HR, ..are regularly updated to keep up with the newest business developments, the responsible administrators also need to ensure the system adheres to a set security baseline and keeps up with continuously evolving security requirements. 

Auditors may, once per year, ask for document that verifies security requirements against e.g. the actual state of the configuration. After an auditall findings are collected in a static document, or in the best case they end up in a vulnerability tracking tool.  

Join and listen to our webinar, to learn how you can use the SecurityBridge platform to define and apply one or multiple baselines, receive alerts whenever the system again deviates from the set standard, and to understand and improve the overall SAP security posture. 

Mission-critical SAP applications are at an increasing speed migrated to the cloud. There are common considerations and risk assumptions that must be considered. To ensure a smooth and successful migration, applying risk mitigation controls may even be an accelerator for your move to the cloud. 

The webinar will answer the following questions:

  • What is a security baseline? 
  • Why applying multiple baselines?  
  • How to track and improve your SAP security posture? 

Duration

45 Minutes

Date & Time

On-Demand

Event Details

Date

On-Demand
Download the White Paper “YOUR ROAD TO SAP SECURITY” to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.
SAP Patchday
SAP customers need to pay attention to the release of the SAP security updates, which have been published on 10th May 2022. This months SAP Security Patch Day contains 13(+2) patches that should be carefully reviewed.
marketing campaign manager
Marketing is your passion? SAP is a familiar term to you? Are you fascinated by cybersecurity? Then join our team as Junior Marketing Campaign Manager and become an SAP Security Hero.
Wouldn’t it be great to have an additional and independent layer for SAP data security which prevents the unauthorized use and distribution of the captured data? The key success factor for this is, to always work with encrypted data.