Symptom
How can customer request for approval of Penetration Testing/ Vulnerability Assessment/ Vulnerability Management?
Read more...
Environment
- SAP Integration Suite
- SAP SuccessFactors / HCM Suite
- SAP Analytics Cloud
- SAP Business Technology Platform
- SAP Enterprise Cloud Services (ECS)
- SAP Enable Now
- SAP Business by Design
- SAP Cloud for Customer
- SAP Integrated Business Planning
- SAP Ariba
- SAP S/4HANA Cloud Public Edition
- SAP Customer Data Cloud
- SAP Commissions
- SAP Commerce Cloud
- SAP Sales Cloud
- SAP Datasphere
- SAP Web IDE
- SAP Signavio Process Insights
- SAP Signavio Process Intelligence
- SAP Signavio Journey Modeler
- SAP Signavio Process Manager
- SAP Signavio Process Governance
- SAP Signavio Process Collaboration Hub
- SAP Custom Domain service
- SAP Multibank Connectivity Solution
- Identity Authentication Service/ Identity Provisioning Service
- SAP Subscription Billing
- SAP Advanced Financial Closing
- SAP Fieldglass
- SAP Concur
- SAP Destination service/ SAP Connectivity service
- SAP Cloud Portal Service
- SAP BTP Kyma Runtime
- SAP Authorization & Trust Management service
- SAP Cloud Integration
- SAP Marketing Cloud
- Cloud Management Tools
- SAP BTP Cloud Integration for data services
- SAP Business Application Studio
- SAP Launchpad service
- SAP Custom Domain Service
- SAP Digital Payment add-on
- SAP S/4HANA Cloud Public Edition for Customer Payments
- SAP E-Mobility
- SAP Advanced Financial Closing
- SAP API Management
- SAP Configure Price Quote
- SAP Build Work Zone
- SAP Cell and Gene Therapy Orchestration
- SAP Cloud ALM
- SAP HANA Cloud
- SAP Intelligent Clinical Supply Management
- SAP Landscape Management Cloud
For any issues & queries concerning the penetration test requests please reach out to pentest@sap.com. Customers whose requests are approved will be informed on how to report their findings to SAP at the time of approval.
Product
Keywords
Customer Penetration Test, Customer Vulnerability Assessment, DORA, TLPT, pentesting report, pentesting , KBA , internal security review issue , application susceptible to buffer overfl , buffer overflow attack , XX-SER-CSPR , Customer pentest request process , How To
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.