
SAP is not a security company, even though sometimes they act like it, but they really say that we are not a security company. So, we want to create that standard, whether it is through the tools that we are producing or through the standard that you will see soon. And of course, another project was just to piss off some people and vendors. How can I take a dummy how-to guide on how to protect SAP from these pitfalls?