Cloud 101CircleEventsBlog
Register now for CSA’s free Virtual AI Summit taking place January 17-18th

Download Publication

Critical Controls Implementation for SAP
Critical Controls Implementation for SAP

Critical Controls Implementation for SAP

Release Date: 01/06/2020

The Critical Controls Implementation for SAP is the first in a series of implementation documents that the CSA Enterprise Resource Planning (ERP) Security Working Group aims to develop. These documents will focus on specific ERP technologies, starting with SAP. The Critical Controls Implementation for SAP document will be released in 2 parts. Part 1 will feature the first 10 controls with the second part featuring the rest at a later date. The document takes a technical and granular approach including information such as implementation checklists and SAP transaction numbers.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
How to Design a Secure Serverless Architecture
How to Design a Secure Serverless Architecture
Data Loss Prevention in Healthcare
Data Loss Prevention in Healthcare
What is IAM for the Cloud?
What is IAM for the Cloud?
5 Tips to Defend Against Access Brokers This Holiday Season
5 Tips to Defend Against Access Brokers This Holiday Season
Published: 11/27/2023
Accelerating Zero Trust Maturity: Strategic Quick Wins
Accelerating Zero Trust Maturity: Strategic Quick Wins
Published: 11/20/2023
The Difference Between CSPM and SSPM
The Difference Between CSPM and SSPM
Published: 11/20/2023
I’m Implementing Generative AI Into My Company’s Cybersecurity Product. Here’s What I’ve Learned.
I’m Implementing Generative AI Into My Company’s Cybersecurity Prod...
Published: 11/09/2023

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Victor Chin Headshot Missing
Victor Chin

Victor Chin

This person does not have a biography listed with CSA.

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

This person does not have a biography listed with CSA.

Juan Perez-Etchegoyen
Juan Perez-Etchegoyen

Juan Perez-Etchegoyen

As CTO and co-founder of Onapsis, JP leads the innovation and research teams that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical a...

Read more

Frederik Weidemann Headshot Missing
Frederik Weidemann

Frederik Weidemann

This person does not have a biography listed with CSA.

Sergio Abraham Headshot Missing
Sergio Abraham

Sergio Abraham

This person does not have a biography listed with CSA.

Hugh Fraser Headshot Missing
Hugh Fraser

Hugh Fraser

This person does not have a biography listed with CSA.

Thomas Kastner Headshot Missing
Thomas Kastner

Thomas Kastner

This person does not have a biography listed with CSA.

Fredrik Pihl Headshot Missing
Fredrik Pihl

Fredrik Pihl

This person does not have a biography listed with CSA.

Charlie Singh
Charlie Singh

Charlie Singh

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training