A holistic Security Audit for SAP©


Request Details

Scope of an audit

Code Scanner

ABAP Code

Systemkonfiguration

System Configuration

Remoteverbindungen

Remote Connections

Integritätsprüfung

Sytem Integrity

Milestones of an audit

The program "Reveal the Unknown" uses a four-step, structured approach.

1.
KICKOFF

The project kickoff takes place in workshop format. For all target systems, we discuss environment specific settings, authentication procedures, internal processes, and more. In the second half of the workshop, the Intrusion Detection System is installed and configured for the security audit.

2.
IDENTIFY & DETECT

A security audit, that highlights security risks in your environment, takes 3-6 weeks. During this period, SecurityBridge scanners are continuously running and a dedicated security consultant monitors and verifies the automated audit results.

3.
EVALUATION

At the end of the monitoring phase, our security expert evaluates all collected findings and generates a management summary.

4.
SUMMARY
 

The final audit milestone is reached when we present the identified findings and system specific recommendations to remediate vulnerabilities and mitigate security risks.

Timeline

The time table below visualizes the 4 milestones of our security audit program.

In addition, you see how quickly you can get insight into the security risks in your environement! Contact us today.

Use our contact form to express interest in a security audit of your SAP environement.

 

Contact

Contact request

 

Address

NCMI GmbH // ABAP-Experts.com
Germany
 Münchenerstr. 49 / 85051 Ingolstadt
 Phone: +49.911.4902.1918