Page 18 - ET_Katalog_EN2023
P. 18
SECURITY AND AUTHORIZATIONS 18
Julie Hallett
A Practical Guide to
Cybersecurity in SAP
This book breaks down the application of cyberse-
curity, as it applies to SAP, into actionable items
that can be communicated and implemented into
existing security frameworks. You will under-
stand why cybersecurity applies to SAP, how it
integrates with cybersecurity initiatives within an
organization, and how to implement a security
framework within SAP.
Cyber risk in the SAP landscape
How to harden security
Cybersecurity risk management
programs in SAP
Print $39.95 | eBook $9.99 Risk mitigation for threats
http://5467.espresso-tutorials.com
Sebastian Mayer | Martin Metz
Practical Guide to
Auditing SAP Systems
What do I need to do to successfully complete an SAP
system audit? Receive expert guidance on the top 12
controls that should be included in your audit activities,
including accounts and authorizations, the change-
ability settings of tables, clients, and entire systems,
change logs, and security configuration settings.
Basic principles of the audit function
Common SAP system audit issues
SAP tools and functionality auditors
can use, including pre-defined reports
Print $39.95 | eBook $9.99 Top 12 controls that should be included
http://5248.espresso-tutorials.com in your audit activities