Securing SAP on the Cloud

1Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security must be implemented using a defense-in-depth strategy that spans across internal controls and segregation of duties, points of user access, network infrastructure, cloud data centers, and all the way up the application stack. Simply implementing firewalls between access boundaries is no longer sufficient. Modern cyber threats often target end user devices through spear phishing and malware campaigns designed to hijack user access to SAP resources and thus completely skirt traditional perimeter controls. Only comprehensive architecture based on threat-focused, continuous security capabilities can adequately defend SAP applications against modern cyber threats.

Cite

CITATION STYLE

APA

Missbach, M., Staerk, T., Gardiner, C., McCloud, J., Madl, R., Tempes, M., & Anderson, G. (2016). Securing SAP on the Cloud. In Management for Professionals (Vol. Part F477, pp. 75–120). Springer Nature. https://doi.org/10.1007/978-3-662-47418-1_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free