Onapsis, in collaboration with The Cloud Security Alliance (CSA), a not-for-profit organization dedicated to raising awareness of best practices to help ensure a secure cloud computing environment, has completed The Critical Controls Implementation for SAP white paper. The Critical Controls Implementation for SAP is the first in a series of implementation documents that focuses on specific ERP technologies and aids organizations in securely migrating to and operating ERP applications in cloud environments. In this document, the working group focuses on providing guidelines on controls implementation as well as a set of checklists for SAP administrators. Download this white paper now for control implementation guidance on a variety of controls.
Download Now

About the Author
As CTO, JP leads the innovation team that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical acclaim for the Onapsis Research Labs. JP is regularly invited to speak and host trainings at global industry conferences, including Black Hat, HackInTheBox, AppSec, Troopers, Oracle OpenWorld and SAP TechEd, and is a founding member of the Cloud Security Alliance (CSA) Cloud ERP Working Group. Over his professional career, JP has led many Information Security consultancy projects for some of the world’s biggest companies around the globe in the fields of penetration and web application testing, vulnerability research, cybersecurity infosec auditing/standards, vulnerability research and more.
More about this author
Further Reading
Common Vulnerabilities in SAP Systems
Missing Authorization Checks, Information Disclosure, and Cross-Site Scripting (XSS) were the top three patched vulnerabilities in 2025. Missing Authorization Checks alone accounted for nearly one-third of all security notes, as many SAP functionalities fail to default to protected states. These flaws leave systems exposed to data theft, unauthorized modification, and service disruption, making timely application…
10 Critical Questions to Ask Your SAP Security Vendor
Selecting an SAP security partner is a high-stakes decision. Generic cybersecurity tools cannot effectively secure the business-critical applications that run the global economy. When evaluating a vendor, determine if they simply scan for known issues or if they offer a comprehensive, research-driven platform capable of stopping sophisticated threats. Use these 10 questions to cut through…
The #1 Roadblock to RISE with SAP Success: A Secure-by-Design Guide
The #1 roadblock to a successful RISE with SAP transformation is failing to address security as a core part of the project. RISE with SAP is a “Business Transformation as a Service” (BTaaS) offering, but organizations that treat it as a simple technical migration without embedding security are at high risk. Research shows 70% of…
