SAP Knowledge Base Article - Preview

3080379 - Customer Penetration Testing Request Process

Symptom

How can customer request for approval of Penetration Testing/ Vulnerability Assessment/ Vulnerability Management?


Read more...

Environment

  • SAP Integration Suite 
  • SAP SuccessFactors / HCM Suite
  • SAP Analytics Cloud
  • SAP Business Technology Platform
  • SAP Enterprise Cloud Services (ECS)
  • SAP Enable Now
  • SAP Business by Design
  • SAP Cloud for Customer
  • SAP Integrated Business Planning
  • SAP Ariba
  • SAP S/4HANA Cloud Public Edition
  • SAP Customer Data Cloud
  • SAP Commissions
  • SAP Commerce Cloud
  • SAP Sales Cloud
  • SAP Datasphere
  • SAP Web IDE
  • SAP Signavio Process Insights
  • SAP Signavio Process Intelligence
  • SAP Signavio Journey Modeler
  • SAP Signavio Process Manager
  • SAP Signavio Process Governance
  • SAP Signavio Process Collaboration Hub
  • SAP Custom Domain service
  • SAP Multibank Connectivity Solution
  • Identity Authentication Service/ Identity Provisioning Service
  • SAP Subscription Billing
  • SAP Advanced Financial Closing
  • SAP Fieldglass
  • SAP Concur
  • SAP Destination service/ SAP Connectivity service
  • SAP Cloud Portal Service
  • SAP BTP Kyma Runtime
  • SAP Authorization & Trust Management service
  • SAP Cloud Integration
  • SAP Marketing Cloud
  • Cloud Management Tools
  • SAP BTP Cloud Integration for data services
  • SAP Business Application Studio
  • SAP Launchpad service
  • SAP Custom Domain Service
  • SAP Digital Payment add-on
  • SAP S/4HANA Cloud Public Edition for Customer Payments
  • SAP E-Mobility
  • SAP Advanced Financial Closing
  • SAP API Management
  • SAP Configure Price Quote
  • SAP Build Work Zone
  • SAP Cell and Gene Therapy Orchestration
  • SAP Cloud ALM

For any issues & queries concerning the penetration test requests please reach out to pentest@sap.com.

Please reach out to secure@sap.com for remediation related queries

Product

Ariba Procurement, cloud edition all versions ; BTP 1.00 ; Cloud Integration 4.0 ; Concur Expense 3.0 ; Identity Authentication 1.0 ; SAP Advanced Financial Closing 1.0 ; SAP Analytics Cloud all versions ; SAP Ariba Procurement, cloud edition all versions ; SAP BTP, Kyma runtime 1.0 ; SAP Build Work Zone, standard edition 1.0 ; SAP Business Application Studio 3.0 ; SAP Business ByDesign all versions ; SAP Business Technology Platform all versions ; SAP Cloud ALM 2.0 ; SAP Cloud Portal service 2.0 ; SAP Cloud for Customer add-ins all versions ; SAP Cloud for Customer core applications all versions ; SAP Commerce Cloud all versions ; SAP Connectivity service 2.0 ; SAP Customer Data Cloud 7.4 ; SAP Data Intelligence Cloud 1.0 ; SAP Datasphere 1.0 ; SAP E-Mobility 1.0 ; SAP Enable Now, cloud edition all versions ; SAP Fieldglass Vendor Management System all versions ; SAP HANA Enterprise Cloud administrator toolset all versions ; SAP Integrated Business Planning for Supply Chain all versions ; SAP Integration Suite 1.0 ; SAP Jam Collaboration all versions ; SAP Marketing 2020 ; SAP Multi-Bank Connectivity all versions ; SAP S/4HANA Cloud Public Edition all versions ; SAP S/4HANA Cloud all versions ; SAP S/4HANA Cloud for customer payments 1.0 ; SAP S/4HANA, add-on for SAP Cell and Gene Therapy Orchestration 2311 ; SAP Sales Cloud, starter edition all versions ; SAP Signavio Journey Modeler 1.0 ; SAP Signavio Process Collaboration Hub 2.0 ; SAP Signavio Process Collaboration Hub 3.0 ; SAP Signavio Process Governance 2.0 ; SAP Signavio Process Governance 3.0 ; SAP Signavio Process Insights 1.0 ; SAP Signavio Process Insights 2.0 ; SAP Signavio Process Intelligence 2.0 ; SAP Signavio Process Intelligence 3.0 ; SAP Signavio Process Manager all versions ; SAP Subscription Billing 1.0 ; SAP SuccessFactors HCM Suite all versions ; SAP SuccessFactors Incentive Management all versions ; SAP Web IDE, personal edition all versions ; SAP digital payments add-on 1.0

Keywords

Customer Penetration Test, Customer Vulnerability Assessment, DORA, TLPT, pentesting report, pentesting , KBA , internal security review issue , application susceptible to buffer overfl , buffer overflow attack , XX-SER-CSPR , Customer pentest request process , How To

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.