Building a GRC System for SAP
Alexey Yudin
The Head of DBs and Business Applications Security Department
Positive Technologies
PHDays III
Plan
― Another three-letter acronym: GRC
― GRC market
― Access Control
― Fraud Management
― SAP authorization concept
― How to build access control mechanism in SAP
― How to build SOD check mechanism in SAP
― Fraud schemes in SAP MM
― Conclusions: to buy, to build or …?
GRC intro
GRC
Governance
Top
management
sets the
company’s goals
and wants to
control them
Risk
Management
A company
identifies risks
for business and
wants to avoid
them
Compliance
Inner and outer
controls,
regulations,
laws, that a
company must
obey
An integrated approach used by corporations to act in accordance with the
guidelines set for each category. Governance, risk management and
compliance (GRC) is not a single activity, but rather a firm-wide approach
to achieving high standards in all three overlapping categories.
What does business really want?
Governance
To make money
Risk management
To save money
Compliance
To save money
― Detecting an unauthorized access to critical business
actions
― Detecting segregation of duties violations
― Detecting fraudulent actions
― IdM integration and automated access control
Russian companies are interested in
GRC market leaders
GRC market leaders
― ERP vendors solutions
• SAP
• Oracle
― GRC vendors solutions
• EMC-RSA
• Protivity
• MetricStream
• SAS
• Software AG
• …..
SAP GRC components
Risk Management
Access Control
Process Control
FraudManagementThe most demanded part of SAP GRC
Access Control
Possible approaches
1. Deployment one of the existing solutions (SAP GRC for SAP
ERP)
• High price
• Long term implementation
• High IT operations cost
• Too complicated
• Need much customization
2. Building own solution
• Need development from scratch
GRC implementation process
― Analyze critical business process
― Assess business actions
― Develop SoD matrix with possible violations
― Create and redesign roles (remove unnecessary roles)
― Map business actions to roles
― Check current usage of roles
― Find users with SoD violations
― Minimize number of SoD violations
― Control role modifications
― Develop and automate user access process
SAP terminology
― SAP Transaction is the execution of a program. The normal
way of executing ABAP code in the SAP system is by
entering a transaction code (for instance, PA30 is the
transaction code for "Maintain HR Master Data").
― Authorization objects are composed of a groups of fields
that are related to AND. These fields’ values are used in
authorization check. For example, authorization object
S_TCODE has one field TCD (transaction code).
― Authorization is a definition of an authorization object, that
is a combination of permissible values in each authorization
field of an authorization object. For example, authorization
S_TCODE: TCD=SE16.
Business Processes in SAP
Authorization 2Authorization 1
Business
Action 1
Business
Action 2
Business Process
SOD in SAP
Business
Action 1
Business
Action 2
Authorization 2
Authorization 1
Authorization 4
Authorization 3
SOD
Where to find SoD matrix
― ISACA - Security, Audit and Control Features SAP ERP, 3rd
Edition
― Australian National Office - SAP ECC 6.0 Security and Control
― http://scn.sap.com
― Google :)
SAP MM
― purchasing,
― goods receiving,
― material storage,
― consumption-based planning,
― inventory.
Procurement cycle overview
Purchasing activities
Critical actions in purchasing
― MM01 – Create Material
― MK01 – Create Vendor
― ME01 – Maintain Source List
― MD11 – Create Planned Order
― ME51N – Create Purchase Requisition
― ME41 – Create RFQ
― ME21N – Create PO
― MIRO – Enter Invoice
How to build a control mechanism
Module Action Transaction Role 1/Profile
1/User 1
Role N/Profile
N/User 1
MM Create
Purchase
Order
ME21
ME21N
Z_Role_1 Z_Role_N
― Create XL table with critical actions
― Run check on regular basis
• Report RSUSR070
• Transaction SUIM
― Compare results in XL
XL example
SOD in purchasing
Create SOD matrix based on particular business processes
Purchasing Document
Creator
Purchasing Document
Approver
Purchasing Document
Creator
X
Purchasing Document
Approver
X
How to build a SOD check mechanism
― Create XL table based on SOD matrix
SOD Name Action 1 Transaction
(Action 1)
Action 2 Transaction
(Action 2)
Role/Profile/
User
CREATE
PURCHASE
ORDER &
CREATE
VENDOR
MASTER
RECORD
Create
Purchase
Order
ME21
ME21N
ME25
ME27
ME31
Create
Vendor
Master
Record
FK01
MK01
XK01
How to build a SOD check mechanism
― Run roles check on regular basis
• Report RSUSR070
• Transaction SUIM
― Compare results in XL
How to build a SOD check mechanism
― Run users check on regular basis
• Report RSUSR002
• Transaction SUIM
― Compare results in XL
Max Patrol
Now
― Helps to analyze roles and authorization profiles
― Monitors users with critical administrative privileges
― Regular control of roles assigned to users
― Regular control of roles modifications (creating, updating
and role removal)
Max Patrol
Near futures
― Create customer business actions
― Map roles to business actions
― Automatically find matches of roles and business action
rules
― Automation in creating and control users and roles that
violate SoD matrix
― Check usage of roles and transactions
MaxPatrol – Role Control
MaxPatrol – Authorization profile control
MaxPatrol –Control administrative
privileges
Fraudulent activity in purchasing
― Purchasing without purchase requisition
― Abuse of one-time vendor accounts
How to build a fraud check mechanism
― Build a possible fraud scheme
― Divide a scheme into separate actions
― Describe each action in SAP terms
― Go to logs and get all users who perform actions
― Analyze users, performed sequence of actions which suits to
a fraud scheme
One-time vendor (OTV) payments
― SAP provides one-time vendor functionality to reduce
administration over the vendor master file by paying
infrequent vendors through a one-time vendor account.
― The use of the one-time vendor function overcomes typical
vendor master file authorization and review controls and
may be used to process unauthorized payments.
How to control OTV payments?
― Periodically review one-time vendor payments.
• The vendor line item report RFKEPL00, transaction code
S_ALR_87012103, is the best report to view one-time vendor
payments.
• Payments are also be viewed through the Purchasing
Overview by Vendor Report.
Best Practices
― Focus on prevention
― Automate as many controls as possible
― Automate the flow of manual controls
― Identify business actions that produce risks when executed
by one person
― Perform risk analysis before committing and approving
changes to access controls
― SoD risk identification and remediation should be
performed automatically across multiple ERP environments
and instances
― Automate user provisioning and changes
― Control real transaction and role usage
Conclusions
― GRC is an information security trend
― The most demanded GRC-features:
• Critical actions control
• SOD violation control
• Fraud control
― It’s possible to build a GRC system that satisfies top
management without large-scale deployments.
Thank you for your attention!
Q&A
Grc eng

Grc eng

  • 2.
    Building a GRCSystem for SAP Alexey Yudin The Head of DBs and Business Applications Security Department Positive Technologies PHDays III
  • 3.
    Plan ― Another three-letteracronym: GRC ― GRC market ― Access Control ― Fraud Management ― SAP authorization concept ― How to build access control mechanism in SAP ― How to build SOD check mechanism in SAP ― Fraud schemes in SAP MM ― Conclusions: to buy, to build or …?
  • 4.
  • 5.
    GRC Governance Top management sets the company’s goals andwants to control them Risk Management A company identifies risks for business and wants to avoid them Compliance Inner and outer controls, regulations, laws, that a company must obey An integrated approach used by corporations to act in accordance with the guidelines set for each category. Governance, risk management and compliance (GRC) is not a single activity, but rather a firm-wide approach to achieving high standards in all three overlapping categories.
  • 6.
    What does businessreally want? Governance To make money Risk management To save money Compliance To save money
  • 7.
    ― Detecting anunauthorized access to critical business actions ― Detecting segregation of duties violations ― Detecting fraudulent actions ― IdM integration and automated access control Russian companies are interested in
  • 8.
  • 9.
    GRC market leaders ―ERP vendors solutions • SAP • Oracle ― GRC vendors solutions • EMC-RSA • Protivity • MetricStream • SAS • Software AG • …..
  • 10.
    SAP GRC components RiskManagement Access Control Process Control FraudManagementThe most demanded part of SAP GRC Access Control
  • 11.
    Possible approaches 1. Deploymentone of the existing solutions (SAP GRC for SAP ERP) • High price • Long term implementation • High IT operations cost • Too complicated • Need much customization 2. Building own solution • Need development from scratch
  • 12.
    GRC implementation process ―Analyze critical business process ― Assess business actions ― Develop SoD matrix with possible violations ― Create and redesign roles (remove unnecessary roles) ― Map business actions to roles ― Check current usage of roles ― Find users with SoD violations ― Minimize number of SoD violations ― Control role modifications ― Develop and automate user access process
  • 13.
    SAP terminology ― SAPTransaction is the execution of a program. The normal way of executing ABAP code in the SAP system is by entering a transaction code (for instance, PA30 is the transaction code for "Maintain HR Master Data"). ― Authorization objects are composed of a groups of fields that are related to AND. These fields’ values are used in authorization check. For example, authorization object S_TCODE has one field TCD (transaction code). ― Authorization is a definition of an authorization object, that is a combination of permissible values in each authorization field of an authorization object. For example, authorization S_TCODE: TCD=SE16.
  • 14.
    Business Processes inSAP Authorization 2Authorization 1 Business Action 1 Business Action 2 Business Process
  • 15.
    SOD in SAP Business Action1 Business Action 2 Authorization 2 Authorization 1 Authorization 4 Authorization 3 SOD
  • 16.
    Where to findSoD matrix ― ISACA - Security, Audit and Control Features SAP ERP, 3rd Edition ― Australian National Office - SAP ECC 6.0 Security and Control ― http://scn.sap.com ― Google :)
  • 17.
    SAP MM ― purchasing, ―goods receiving, ― material storage, ― consumption-based planning, ― inventory.
  • 18.
  • 19.
  • 20.
    Critical actions inpurchasing ― MM01 – Create Material ― MK01 – Create Vendor ― ME01 – Maintain Source List ― MD11 – Create Planned Order ― ME51N – Create Purchase Requisition ― ME41 – Create RFQ ― ME21N – Create PO ― MIRO – Enter Invoice
  • 21.
    How to builda control mechanism Module Action Transaction Role 1/Profile 1/User 1 Role N/Profile N/User 1 MM Create Purchase Order ME21 ME21N Z_Role_1 Z_Role_N ― Create XL table with critical actions ― Run check on regular basis • Report RSUSR070 • Transaction SUIM ― Compare results in XL
  • 22.
  • 23.
    SOD in purchasing CreateSOD matrix based on particular business processes Purchasing Document Creator Purchasing Document Approver Purchasing Document Creator X Purchasing Document Approver X
  • 24.
    How to builda SOD check mechanism ― Create XL table based on SOD matrix SOD Name Action 1 Transaction (Action 1) Action 2 Transaction (Action 2) Role/Profile/ User CREATE PURCHASE ORDER & CREATE VENDOR MASTER RECORD Create Purchase Order ME21 ME21N ME25 ME27 ME31 Create Vendor Master Record FK01 MK01 XK01
  • 25.
    How to builda SOD check mechanism ― Run roles check on regular basis • Report RSUSR070 • Transaction SUIM ― Compare results in XL
  • 26.
    How to builda SOD check mechanism ― Run users check on regular basis • Report RSUSR002 • Transaction SUIM ― Compare results in XL
  • 27.
    Max Patrol Now ― Helpsto analyze roles and authorization profiles ― Monitors users with critical administrative privileges ― Regular control of roles assigned to users ― Regular control of roles modifications (creating, updating and role removal)
  • 28.
    Max Patrol Near futures ―Create customer business actions ― Map roles to business actions ― Automatically find matches of roles and business action rules ― Automation in creating and control users and roles that violate SoD matrix ― Check usage of roles and transactions
  • 29.
  • 30.
  • 31.
  • 32.
    Fraudulent activity inpurchasing ― Purchasing without purchase requisition ― Abuse of one-time vendor accounts
  • 33.
    How to builda fraud check mechanism ― Build a possible fraud scheme ― Divide a scheme into separate actions ― Describe each action in SAP terms ― Go to logs and get all users who perform actions ― Analyze users, performed sequence of actions which suits to a fraud scheme
  • 34.
    One-time vendor (OTV)payments ― SAP provides one-time vendor functionality to reduce administration over the vendor master file by paying infrequent vendors through a one-time vendor account. ― The use of the one-time vendor function overcomes typical vendor master file authorization and review controls and may be used to process unauthorized payments.
  • 35.
    How to controlOTV payments? ― Periodically review one-time vendor payments. • The vendor line item report RFKEPL00, transaction code S_ALR_87012103, is the best report to view one-time vendor payments. • Payments are also be viewed through the Purchasing Overview by Vendor Report.
  • 36.
    Best Practices ― Focuson prevention ― Automate as many controls as possible ― Automate the flow of manual controls ― Identify business actions that produce risks when executed by one person ― Perform risk analysis before committing and approving changes to access controls ― SoD risk identification and remediation should be performed automatically across multiple ERP environments and instances ― Automate user provisioning and changes ― Control real transaction and role usage
  • 37.
    Conclusions ― GRC isan information security trend ― The most demanded GRC-features: • Critical actions control • SOD violation control • Fraud control ― It’s possible to build a GRC system that satisfies top management without large-scale deployments.
  • 38.
    Thank you foryour attention! Q&A