Skip to Content
Contact Us


Focus on your business and customer relationships, while knowing that your data is safe and reliable. With a proactive, predictive approach, SAP helps ensure compliance and data security in the cloud and within an on-premise data center.
Previous Next

Product Security

Our processes, guidelines, tools, and training help keep security integral to product architecture, design, and implementation.


Preventative controls and measures guard data from security breaches with threat detection and continuous monitoring and response.

Data Center Security

Continuous technology and infrastructure testing helps ensure that the data center is running smoothly around the clock.

What are Meltdown and Spectre?

Technically, Spectre and Meltdown are different variations of the same architectural vulnerability that affects nearly every computer chip manufactured in the last 20 years. It could, if exploited, allow attackers to get access to data previously considered protected. Security researchers have published information about these vulnerabilities in early 2018.

Previous Next

Vulnerability variants

Each variant was given its own CVE number (CVE-2017-5715CVE-2017-5753, and CVE-2017-5754). Two of these vulnerabilities are grouped together as Spectre and are used to read privileged CPU memory data. The third one is called Meltdown, which allows data read from kernel memory (kernel address space).

Are SAP systems affected?

SAP has thoroughly investigated the impact of these vulnerabilities and is closely aligning with corresponding vendors, providers, and the Open Source community. SAP Security and SAP Operations are working on investigating if where and how our platforms, databases, application and cloud operations are affected. 

Taking a proactive approach

We are fixing potential flaws derived from Spectre and Meltdown without undue delay. As a consumer of affected software and hardware, we largely depend on the availability of patches provided by respective vendors, providers or the open source community. The schedule of applying appropriate patches is to a large extent determined by their availability. 

Recommendation to customers

SAP recommends that all customers carefully monitor and follow the advice on implementing security patches provided by  hardware and operating system providers as soon as they become available. We will ensure that fixes are applied to our cloud infrastructure without undue delay. SAP Global Security is constantly monitoring the situation.

Hear from our Chief Security Officer

Previous Next

Cloud Security for the Digital Economy

Listen to Justin Somaini, Chief Security Officer at SAP, as he discusses our security strategy on protecting the confidentiality, integrity, and availability of our customers' information and how we meet the highest security standards to deliver cloud services in a secured environment.

The Future of Enterprise Software Security

Hear Dr. Craig Brown, author of “Untapped Potential,” and Justin Somaini, chief security officer of SAP, discuss how the challenges of enterprise software security will continue to evolve and what your business can do now to be prepared.

Product Security

Cloud application security is extremely important as cyber threats try to identify and exploit vulnerabilities. At SAP, product security is the responsibility of quality management. We cover the complete product code, as well as the key security functions that are necessary to safeguard product use.
Previous Next

A Secure Software Development Lifecycle

Discover the security phases of product development for on-premise or cloud-based use. Look at our framework for integrating security throughout the lifecycle of standard software products from SAP.

Secure Source Code Scanning

Increase the security of your software development efforts. Apply the same automated source code scans that SAP uses to detect and eliminate security flaws at an early stage in the development cycle.

Identity and Access Management

Ease the adoption of cloud applications with end-to-end identity and access management. Learn how businesses that have cloud-heavy deployments are improving processes and security.


Every business expects ironclad information security for its on-premise, cloud, and mobile environments. To meet these expectations, we work continuously to strengthen and improve security features in all of our software and service offerings, while protecting our own company and assets.
Previous Next

Trusted Security

Secure your technology environment with attention to people, processes, and technology. Consider data-center best practices for innovating and operating confidently, while building security into critical systems.

Platform Security

Protect your data by meeting ever-increasing cybersecurity challenges, securing systems, and adhering to compliance and regulatory needs. Determine how breakthrough technologies are driving major trends.

Secure Cloud

Promote data privacy and cybersecurity in the cloud to Run Simple. Learn how SAP Cloud Secure services can help you comply with legislation by increasing transparency into system controls and measures.

Report a Potential Security Issue to SAP

SAP is committed to identifying and addressing every security issue that affects SAP software and cloud solutions. If you want to report a potential security issue, please visit this page.

Data Center Security

Because data centers are the backbone of our cloud business, SAP strives to help ensure our data centers meet the highest security standards. We use state-of-the-art technology and rigorous security methodologies to protect data virtually and physically against data breaches, fires, and other threats.
Previous Next

How a Data Center Works

Data centers process, analyze, and save data nonstop. Get a full understanding of why they are necessary, and take a deep dive into the data center at SAP to check out what they contain and how they are operated.

Data Center Locations

Get an inside look at SAP data centers around the world. Our live Cloud Service Status page provides you with transparency into availability, downtime, and maintenance of our software inside our data centers.

Data Center Standards

Benefit from data centers that meet the highest security standards. See how the latest technologyies and rigorous security methodologies from SAP are protecting data from the threat of data breaches, fires, and other risks.

Back to top