Security must be implemented using a defense-in-depth strategy that spans across internal controls and segregation of duties, points of user access, network infrastructure, cloud data centers, and all the way up the application stack. Simply implementing firewalls between access boundaries is no longer sufficient. Modern cyber threats often target end user devices through spear phishing and malware campaigns designed to hijack user access to SAP resources and thus completely skirt traditional perimeter controls. Only comprehensive architecture based on threat-focused, continuous security capabilities can adequately defend SAP applications against modern cyber threats.
CITATION STYLE
Missbach, M., Staerk, T., Gardiner, C., McCloud, J., Madl, R., Tempes, M., & Anderson, G. (2016). Securing SAP on the Cloud. In Management for Professionals (Vol. Part F477, pp. 75–120). Springer Nature. https://doi.org/10.1007/978-3-662-47418-1_4
Mendeley helps you to discover research relevant for your work.