Get started Bring yourself up to speed with our introductory content.

SAP application security guide

If you're like most IT professionals, security is at the forefront of your concerns. Learn best practices for SAP security and applications security in this learning guide from SearchSAP.com and SearchAppSecurity.com.

Establishing security best practices is made simple with this learning guide, which contains tips, expert advice and step-by-step guides on SAP security and application security information.

TABLE OF CONTENTS

   Fundamentals of SAP security and apps security
   Threats to security
   Analysis
   Action
   More Learning Guides













  Fundamentals of SAP security and apps security  Return to Table of Contents



  Threats to security  Return to Table of Contents

Web application threats

Authentication and Authorization

Web services

  • Why do Web services impact security? (SearchAppSecurity.com)

  • SAP security (SearchSAP.com)

  • OWASP Guide to Building Secure Web Applications, 8: Web Services (SearchAppSecurity.com)

  • January, 2006: Put Web services security on front burner (SearchAppSecurity.com)

  • January, 2006: Analyst: Start thinking Web services security now (SearchWebServices.com)

  • October, 2005: Web services security specs hit the standards track (SearchWebServices.com)

  • August, 2005: Web services security standards to establish trust (SearchWebServices.com)

  • July, 2005: Web services security getting greater scrutiny (SearchWebServices.com)

  Analysis  Return to Table of Contents

SAP vulnerability analysis

  • Securing SAP (SearchSAP.com)

  • Security concerns when upgrading from v.3.1 to v.4.6x (SearchSAP.com)

  • Was a security role removed in R/3 Enterprise? (SearchSAP.com)

  • What's the best tool to get started on security testing? (SearchAppSecurity.com)

  • Are my apps secure? (SearchAppSecurity.com)

  • Reason for application vulnerabilities (SearchAppSecurity.com)

  • Establishing security parameters (SearchSAP.com)

  • Are you leaving your apps open to attack? (SearchAppSecurity.com)

  • Judicious use of tips (SearchSAP.com)

  • Vulnerability assessment: Leave the scanning to someone else? (SearchAppSecurity.com)

  • November, 2005: Flaw opens SAP Web Application Server to phishing scams (SearchSAP.com)

  • July, 2005: Customers warned of critical SAP flaw (SearchSAP.com)

  • Feb, 2006: Web application firewalls critical piece of the app security puzzle (SearchAppSecurity.com)

Standards and Regulations

  • SOX Security School (SearchSecurity.com)

  • Compliance management (SearchSAP.com)

  • Compliance (SearchSecurity.com)

  • March, 2005: SAP to bolster compliance with reseller partnership (SearchSAP.com)

RFID

  • RFID on the rise? (SearchSAP.com)
  • SAP RFID (SearchSAP.com)
  • Is RFID ready for primetime? (SearchSAP.com)
  • Face-off: Debating RFID (SearchSAP.com)
  • RFID secrets: SAP customers ready systems for RFID (SearchSAP.com)

  • April, 2005: Suppliers must look beyond RFID compliance, analyst says (SearchSAP.com)

  • April, 2005: SAP advises to take RFID one step at a time (SearchSAP.com)
  • April, 2005: Will new RFID technology help or hinder security? (SearchSecurity.com)

  Action  Return to Table of Contents

Countermeasures

Vulnerability management

Disaster recovery

Deploying applications securely

Incorporating security in the software development lifecycle


  • Keep the bad guys out: Build security into the SDLC (SearchAppSecurity.com)

  • January, 2006: Incorporation of security in development lifecycle sea of change (SearchAppSecurity.com)

  • January, 2006: Build accountability for security into the development process (SearchAppSecurity.com)

  • Are development security tools necessary? (SearchAppSecurity.com)

  • The methodology of software creation/distribution (SearchAppSecurity.com)

  More Learning Guides  Return to Table of Contents

Dig Deeper on SAP security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchERP

SearchOracle

SearchDataManagement

SearchAWS

SearchBusinessAnalytics

SearchContentManagement

SearchHRSoftware

Close