To download the whitepaper, please fill out the form

This whitepaper outlines a step-by-step approach organizations can take to secure SAP implementations by mapping SAP cybersecurity to the CIS Controls for Effective Cyber Defense. This approach is largely application-oriented, but also applies network restrictions to underlying network devices and firewalls, in addition to closing loopholes through operational procedures and training. The Four-Step Approach to Applying the CIS Critical Security Controls is:

  • Step 1: Tailor Enterprise Processes (CIS Control: 1, 2, 3, 4, 5, 6, 10, 13, 14, 16)
  • Step 2: Secure the Landscape (CIS Control: 3, 7, 9, 10, 11, 12, 18)
  • Step 3: Configure the Technical Controls (CIS Control: 2, 3, 4, 5, 6, 8, 13, 14,16)
  • Step 4: Create the Human Action Framework (CIS Control: 17, 19, 20),
Onapsis respects your privacy, please view our updated privacy policy.