
The list of Security Recommendations for major SAP cloud products is published on the SAP Trust Center, as shown in Figure 1.
Figure 1: Security Recommendations published on SAP Trust Center
Customers have been asking for a unified view of the security configuration of their deployed cloud solutions. This central visualization should report on the configuration status of SAP services and compare it against recommended settings.
To achieve this goal, we initially had to provide a check list with human readable security recommendations documents.
Together with SAP BTP and SAP Customer Success (owners of the SAP Security Baseline standards [1], mostly covering on premise), we drafted the main structure of the security recommendations. Let us highlight the main differences between the security recommendations and the security guides:
Finally, we introduced the requirement for a standardized security recommendation documentation in our software development lifecycle, targeting major SAP cloud products.
[1] Access to SAP customers only
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
14 | |
12 | |
12 | |
11 | |
10 | |
9 | |
8 | |
7 | |
7 | |
6 |