10 Best Practices for Developing and Implementing SAP Security Policies

  • by Kehinde Eseyin, Security Architect
  • June 23, 2009
There are good and bad ways of setting up a security policy in your organization. See 10 areas that deserve consideration when making your policy.

A number of attributes are common denominators for effective SAP security policies and procedures. These are best practices that, if adopted, make security policy formulation, enforcement, and continuous compliance a breeze. The issues addressed here border on what makes security policies and procedures effective and successful in an enterprise.

In my previous article, “Combat Chaos with a Lock-Down Security Policy in 12 Key Areas of Your SAP Environment,” I looked at how to craft a security policy to keep your SAP environment safe and well-maintained. Now I’ll show you a number of factors to consider in the context of setting up such a policy.

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.

See more by this author


No comments have been submitted on this article. 

Please log in to post a comment.

To learn more about subscription access to premium content, click here.