Securing SAP on the Cloud
Michael Missbach,
Thorsten Staerk,
Cameron Gardiner,
Joshua McCloud,
Robert Madl,
Mark Tempes and
George Anderson
Additional contact information
Michael Missbach: Cisco Systems
Chapter 4 in SAP on the Cloud, 2016, pp 75-120 from Springer
Abstract:
Abstract Security must be implemented using a defense-in-depth strategy that spans across internal controls and segregation of duties, points of user access, network infrastructure, cloud data centers, and all the way up the application stack. Simply implementing firewalls between access boundaries is no longer sufficient. Modern cyber threats often target end user devices through spear phishing and malware campaigns designed to hijack user access to SAP resources and thus completely skirt traditional perimeter controls. Only comprehensive architecture based on threat-focused, continuous security capabilities can adequately defend SAP applications against modern cyber threats.
Keywords: Cloud Environment; Public Cloud; Private Cloud; Hybrid Cloud; Mobile Zone (search for similar items in EconPapers)
Date: 2016
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:mgmchp:978-3-662-47418-1_4
Ordering information: This item can be ordered from
http://www.springer.com/9783662474181
DOI: 10.1007/978-3-662-47418-1_4
Access Statistics for this chapter
More chapters in Management for Professionals from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().