SAP application security learning guide

Learn best practices for SAP security and applications security in this learning guide from SearchSAP.com and SearchAppSecurity.com.


This guide was created in partnership between:

                   


SearchSAP.com SearchAppSecurity.com

Also, don't forget to send us an e-mail to let us know what other resource guides you'd like to see on SearchSAP.com.

Best regards,
The editors of SearchSAP.com and SearchAppSecurity.com

TABLE OF CONTENTS

   Fundamentals of SAP security and app security
   Threats to security
   Analysis
   Action
   More Learning Guides













  Fundamentals of SAP security and app security

[Return to Table of Contents]


  Threats to security

[Return to Table of Contents]

Web application threats

Authentication and Authorisation

Web services

  • Expert advice>Why do Web services impact security? (SearchAppSecurity.com)
  • Featured Topic>SAP security (SearchSAP.com)
  • Chapter>OWASP Guide to Building Secure Web Applications, 8: Web Services (SearchAppSecurity.com)
  • News>January, 2006: Put Web services security on front burner (SearchAppSecurity.com)
  • News>January, 2006: Analyst: Start thinking Web services security now (SearchWebServices.com)
  • News>October, 2005: Web services security specs hit the standards track (SearchWebServices.com)
  • News>August, 2005: Web services security standards to establish trust (SearchWebServices.com)
  • News>July, 2005: Web services security getting greater scrutiny (SearchWebServices.com)

  Analysis

[Return to Table of Contents]

SAP vulnerability analysis

  • Featured Topic>Securing SAP (SearchSAP.com)
  • Expert advice>Security concerns when upgrading from v.3.1 to v.4.6x (SearchSAP.com)
  • Expert advice>Was a security role removed in R/3 Enterprise? (SearchSAP.com)
  • Expert advice>What's the best tool to get started on security testing? (SearchAppSecurity.com)
  • Expert advice>Are my apps secure? (SearchAppSecurity.com)
  • Expert advice>Reason for application vulnerabilities (SearchAppSecurity.com)
  • Tip>Establishing security parameters (SearchSAP.com)
  • Tip>Are you leaving your apps open to attack? (SearchAppSecurity.com)
  • Tip>Judicious use of tips (SearchSAP.com)
  • Tip>Vulnerability assessment: Leave the scanning to someone else? (SearchAppSecurity.com)
  • News>November, 2005: Flaw opens SAP Web Application Server to phishing scams (SearchSAP.com)
  • News>July, 2005: Customers warned of critical SAP flaw (SearchSAP.com)
  • News>Feb, 2006: Web application firewalls critical piece of the app security puzzle (SearchAppSecurity.com)

Standards and Regulations

  • Guide>SOX Security School (SearchSecurity.com)
  • Guide>Compliance management (SearchSAP.com)
  • Quiz> Compliance (SearchSecurity.com)
  • News>March, 2005: SAP to bolster compliance with reseller partnership (SearchSAP.com)

RFID

  • Featured Topic>RFID on the rise? (SearchSAP.com)
  • Guide>SAP RFID (SearchSAP.com)
  • Expert advice>Is RFID ready for primetime? (SearchSAP.com)
  • Q&A>Face-off: Debating RFID (SearchSAP.com)
  • Q&A>RFID secrets: SAP customers ready systems for RFID (SearchSAP.com)
  • News>April, 2005: Suppliers must look beyond RFID compliance, analyst says (SearchSAP.com)
  • News>April, 2005: SAP advises to take RFID one step at a time (SearchSAP.com)
  • News>April, 2005: Will new RFID technology help or hinder security? (SearchSecurity.com)

  Action

[Return to Table of Contents]

Countermeasures

Vulnerability management

Disaster recovery

Deploying applications securely

Incorporating security in the software development lifecycle

  • Q&A>Keep the bad guys out: Build security into the SDLC (SearchAppSecurity.com)
  • News>January, 2006: Incorporation of security in development lifecycle sea of change (SearchAppSecurity.com)
  • News>January, 2006: Build accountability for security into the development process (SearchAppSecurity.com)
  • Expert advice>Are development security tools necessary? (SearchAppSecurity.com)
  • Expert advice>The methodology of software creation/distribution (SearchAppSecurity.com)

  More learning guides

[Return to Table of Contents]

If you're like most IT professionals, security is at the forefront of your concerns. This learning guide pulls SAP security and application security information from both and its sister site, , to provide the most comprehensive resource around. Discover valuable tips, expert advice and step-by-step guides to help you establish security best practices. Most importantly, you can rest easy, knowing your SAP system and applications are secure.

Read more on Business applications

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close