Identify - Access

Identify

Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities.

Access

Consideration of access control and user authorizations measures and methodologies of SAP software.