Skip to Content

SAP Trust Center

Find the information you need on cloud performance, security, privacy, and compliance.

SAP Compliance Offerings - Explore Certificates, Reports, and Attestations

At SAP, we keep our finger on the pulse of ever-increasing security challenges by building a security foundation based on industry standards and compliance and regulatory requirements. View SAP’s latest security certifications and reports.

Compliance resources

Additional access to documentation

The support portal edition of the SAP Trust Center extends the public offering by granting access to additional information, documents, and other content available only to SAP customers and partners with a valid SAP user ID. Sign in and learn more.

Ethics and compliance at SAP

By doing business the right way, SAP can positively impact social and economic development, furthering education, justice, democracy, prosperity, development, and health worldwide. 

Security Compliance

Security compliance focuses on ensuring an organization acts in accordance with security requirements based on laws, regulations, industry standards, and the organization’s published policies.

Compliance FAQs

Since 1998 SAP has held an ISO 9001 certificate. We are also certified according to ISO 27001, ISO 22301, and BS 10012. All locations worldwide work according to one common process framework, including data security and privacy regulations. We regularly check compliance though internal reviews and audits.

It specifies a framework for implementing a personal information management system (PIMS)2 in compliance with the General Data Protection Regulation (GDPR) and mandates the implementation of such a system within corporate security programs. It describes a framework to manage the privacy of personal data and implement necessary policies, procedures, and controls to help ensure compliance with the GDPR.

It specifies a framework for implementing a personal information management system (PIMS)2 in compliance with the General Data Protection Regulation (GDPR) and mandates the implementation of such a system within corporate security programs. It describes a framework to manage the privacy of personal data and implement necessary policies, procedures, and controls to help ensure compliance with the GDPR.

Go to the Compliance Finder web page and search for the document you need.

Go to the Compliance Finder web page and search for the document you need.

A SOC 2 report, similar to a SOC 1 report, evaluates internal controls, policies, and procedures. However, the difference is that a SOC 2 reports on controls that directly relate to the security, availability, processing integrity, confidentiality, and privacy at a service organization.

A SOC 2 report, similar to a SOC 1 report, evaluates internal controls, policies, and procedures. However, the difference is that a SOC 2 reports on controls that directly relate to the security, availability, processing integrity, confidentiality, and privacy at a service organization.

Back to top