Security has always been important for SAP applications, but this has historically been primarily focused on access and process control for applications. With the focus on moving enterprise applications into the cloud space, overall security is becoming more and more critical, as is compliance to various government regulations and standards. Content in this topic area will focus on ensuring that SAP systems are secure from both internal and external security threats, as well as what organizations need to do to prepare systems for potential cybersecurity attacks. It will additionally cover compliance topics, the impact of different compliance regulations, and what steps SAPinsiders need to take to ensure that their applications and data meet these requirements.


  1. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

    Reading time: 2 mins

  2. Impact of Cloud and SAP HANA on Enterprise Security Strategy Benchmark Report

    Reading time: 1 mins

  3. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

    Reading time: 5 mins


  1. Dell Technologies

    Reading time: 5 mins

    Dell Technologies helps organizations and individuals build their digital future and transform how they work, live, and play. The company provides customers with the industry’s broadest and most innovative technology and services portfolio for the data era. For SAP users worldwide, Dell makes the Intelligent Enterprise a reality, with SAP-certified solutions that advance cloud momentum, bridge data sources, and enable real-time intelligence. From infrastructure and data protection platforms to flexible consumption programs and professional services for SAP HANA deployment, migration and re-platforming, Dell offers choice, no matter where you are on the SAP journey.

  2. Ensure and Track Security Across Your SAP System Landscape Using SAP NetWeaver 7.0 BI Analysis Security

    Reading time: 2 mins

    In today’s climate of heightened regulations and precautions, security has become a primary focus for many companies. IT departments are no different. Cyber-crime is a growing field, and securing your SAP system landscape has turned out to be more important than ever. This article discusses the new analysis security features of SAP NetWeaver BI 7.0…...…
  3. Using SAP NetWeaver Process Integration (PI) to Ensure the Safe Transfer of Data Across Security Domain Boundaries

    Reading time: 3 mins

    Your data is one of your most valuable assets, so you protect it by separating it into systems with varying levels of security, depending on the sensitivity of the information. But what if processes running in lower-level security areas need to access data stored in higher-level security areas? This article shows you how to use…...…
  4. Overcome Security Challenges with Customizations in mySAP SRM

    Reading time: 31 mins

    Find out about the minimal authorization customizations that you must implement in mySAP Supplier Relationship Management (SRM) so employees can browse online catalogs, create a shopping cart, and check its status when procuring supplies. In addition, learn how to configure the system so SRM managers can approve or reject shopping carts. Key Concept mySAP SRM…...…
  5. How PCI Security Compliance Requirements Affect Your SAP System

    Reading time: 11 mins

    Card issuers are requiring merchants, banks, service providers, and card processors to take stringent measures to protect stored data. Establishing user security roles and minimizing end-user access to non-encrypted card data within your SAP system is essential for compliance. Key Concept The Payment Card Industry Data Security Standard (PCI DSS) represents a common set of…...…
  6. Ensure the Confidentiality of Your SOAP Message Content — XML Encryption Using Web Services Security in SAP NetWeaver XI

    Reading time: 20 mins

    These are some of the major tasks for a BW to HANA migration. by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Karl Kessler and Joachim Jakob, SAP AG SAPinsider -…
  7. Ensure the Security of Documents Before They Enter Your SAP Systems — Built-In Virus Scanning Support in SAP NetWeaver

    Reading time: 19 mins

    These are some of the major tasks for a BW to HANA migration. by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Karl Kessler and Joachim Jakob, SAP AG SAPinsider -…
  8. Link Defaults, Limits, and Other Values Directly to Security Roles

    Reading time: 12 mins

    Personalization data functionality introduced with SAP R/3 Release 4.6C enables you to link and maintain default settings, values, limits, and other data directly against security roles and user masters. Key Concept Even with all the customizing options available in SAP systems, every so often you need to store a little extra data to default settings…...…
  9. Manage Key Area Authorization Objects for Business Transactions in SAP PM

    Reading time: 63 mins

    You can manage authorizations by user role for business transactions in the Plant Maintenance (PM) module. See how to use authorization field BETRVORG to simplify your PM authorization customization. Key Concept Companies manage authorizations for working with Plant Maintenance (PM) internal orders, equipment, functional locations, and notifications within a user’s role. The role provides the…...…
  10. Speed Up Security Testing Using eCATT

    Reading time: 18 mins

    The Extended Computer Aided Test Tool (eCATT), successor of SAP’s CATT, can test a wide range of SAP applications running in the SAPGUI for Windows or Java environments. It can also access data in the database (including customizing data) and ABAP coding on the application server. See how to use eCATT to speed up testing…...…