15.2 Planning for Secure SAP Landscape
532
15.2.1 System Architecture
532
15.2.2 Network and Perimeter Security
535
15.2.3 Identity and Access Management
536
15.2.4 Communication Security
537
15.2.5 Application-Level Security
537
15.2.6 Database Security
538
15.2.7 Logging and Monitoring
538
15.2.8 Patch Management
539
15.2.9 Governance and Operating Model
539
15.2.10 Security Baseline Template
540
15.2.11 Secure Operations Map
541