You might like this latest book release from the SAP Community. [shutterstock: 532904239, jakkaje808]
It’s no secret that security threats, both internal and external, are on the rise. Luckily, so are the methods for preventing them. SAP Press’ new guide answers questions that Basis administrators may not even know they have about how to keep their SAP system secure.
What will you learn?
SAP System Security Guide isn’t this publisher’s first foray into data security, but it is their first comprehensive guide for both identifying and eliminating security threats to your SAP NetWeaver system. It’s also a system administrator’s first step to learning how to implement a strong security policy.
Attempting to cover the entirety of a Basis security administrator’s role is a daunting task, but this guide manages it beautifully with in-depth sections on backend security, identity and access management, and legal compliance.
This book, like any good security plan, is layered with the tools and strategies necessary to succeed. Readers will unwrap layer after layer of knowledge to help them master access management, network security, authorizations, and more, until they conclude with a sound understanding of the fundamentals of SAP system security.
Other highlights include:
- Transaction locks
- Single sign-on (SSO)
- Transport security
- Audit logging
- Client locking
- Secure communication
Who is this book for?
SAP system administrators looking for the technical and functional know-how to strengthen the overall security of their SAP NetWeaver system, be it SAP S/4Hana, SAP BW, or the SAP Business Suite. Newcomers to SAP security will also find value in this 574-page resource with introductory chapters on the roles and responsibilities of a security administrator, as well as common threats and defenses.
Authors Joe Markgraf and Alessandro Banzer are experts in their field who believe that security is a continual practice. New threats and vulnerabilities can appear at any moment. This guide teaches both beginners and practiced security administrators to stay two steps ahead of the threat.