EconPapers    
Economics at your fingertips  
 

Securing SAP on the Cloud

Michael Missbach, Thorsten Staerk, Cameron Gardiner, Joshua McCloud, Robert Madl, Mark Tempes and George Anderson
Additional contact information
Michael Missbach: Cisco Systems

Chapter 4 in SAP on the Cloud, 2016, pp 75-120 from Springer

Abstract: Abstract Security must be implemented using a defense-in-depth strategy that spans across internal controls and segregation of duties, points of user access, network infrastructure, cloud data centers, and all the way up the application stack. Simply implementing firewalls between access boundaries is no longer sufficient. Modern cyber threats often target end user devices through spear phishing and malware campaigns designed to hijack user access to SAP resources and thus completely skirt traditional perimeter controls. Only comprehensive architecture based on threat-focused, continuous security capabilities can adequately defend SAP applications against modern cyber threats.

Keywords: Cloud Environment; Public Cloud; Private Cloud; Hybrid Cloud; Mobile Zone (search for similar items in EconPapers)
Date: 2016
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:mgmchp:978-3-662-47418-1_4

Ordering information: This item can be ordered from
http://www.springer.com/9783662474181

DOI: 10.1007/978-3-662-47418-1_4

Access Statistics for this chapter

More chapters in Management for Professionals from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-04-11
Handle: RePEc:spr:mgmchp:978-3-662-47418-1_4