SlideShare a Scribd company logo
SAP
An Introduction
Agenda
What We Will Do…
 Provide a high level overview of what SAP is
 SAP Authorization Concept
 Provide an introduction to Auditing ITGC’s in SAP
 Segregation of Duties in SAP
What is SAP?
What does SAP stand for?
 Systeme, Anwendungen, Produkte in der Datenverarbeitung
Systems,
Applications and
Products in Data Processing
What is SAP?
An order in SAP can automatically generate an inventory movement
and a posting in the GL without any “human” intervention.
SAP can track financial results, procurement, sales, manufacturing,
human resources and payroll.
SAP integrates all business processing through one application.
Links operational results and the financial aspects of those results.
SAP comprises of 18-20 modules in finance, logistics and HR.
One or more SAP modules can be implemented.
SAP is typically accessible by the entire business organisation.
Most company information and transactions originate from SAP.
Integrated
Multifunctional
Modular
Enterprise Wide
“Real Time”
Overview of an SAP Environment
Business process
Controls
(incl. automated,
manual, BPR)
IT General
Controls
Management
reporting
and end-user
controls
SAP configurable controls
SAP Authorisations/User profiles
SAP Basis Module
Database
Operating System and other Infrastructure controls
Database
Infrastructure
Layer
Application Layer
Presentation Layer
SAP Instances
PR1
PH1
PC3
PE1
PA1
SAP R/3 or ECC 6.0
APO Planning
SAP Human Resources
SAP Customer Relationship Management
SAP Procurement
PS1 Solution Manager
PB1 Business Warehouse
SAP Authorization Concept
Overview
What is the SAP authorization concept?
Security within SAP is achieved through the authorization concept
The authorization is designed to ensure :
 Maximum security
 Sufficient privileges for end users to fulfil their job duties
 Powerful user maintenance
User master record
User requires valid
user-ID and password
T-code check
User requires an
authorization for
transactions
Authority check
User requires an
authorization for
underlying
authorization objects
and field values
1
2
3
Overview
Three levels of security in SAP
Transaction Code (t-code)
Provides access to specific functions within SAP
Authorization Object:
Template for security that contains fields with blank values (uncut key)
SAP User Master Record (UMR)
Master data for SAP users
Authorization (Field Values):
Authorization object with completed fields (cut key)
ME21 – Create
Purchase Order
SAP Authorization Concept
The components
Profiles
“Key ring” that contains authorizations (cut keys)
Authority Check
Performed by SAP to ensure that a user ID has the correct
authorization object and field value combination (cut key) to
execute a particular task
Roles
Collection of transaction codes, authorizations and user
assignments
R: Display PO
R: Create PO
Buyer
SAP Authorization Concept
The components
SAP Authorization Concept
Bringing it all together
 Let’s make an analogy…
 … the Lock and the Key
To open the lock, you need the right key!
Profile SAP Security Check
Authorizations
User Master Record
R: Display Purchasing document
R: Create Purchase Order (e.g., ME21)
Buyer
SAP Authorization Concept
Bringing it all together
Auditing ITGC’s in SAP
SAP is not a typical application / environment split
Many traditional environment functions are provided within the
application including:
» development environment
» change control
» system administration and job scheduling
These functions are collectively known as SAP Basis
Combined with SAP integration, this serves to complicate access
security
Risk based approach in a SAP
environment
SAP allows more comprehensive functionality and control, however,
the following needs to be considered:
− Financial transactions are executed throughout the business
making segregation of duties control key
− The SAP access mechanism is complex making security and
segregation of duties a key risk
− Configuration has a large impact to the overall business process
and controls
Risk based approach in a
SAP environment
Key IT General Control Domains
• Consider tests for controls around:
• Access to programs and data
• Changes made to the system (Change management)
• Computer operations
• Weaknesses identified within the IT general controls can potentially
undermine confirmed and tested automated controls and access controls
at the business process level
Key Areas within the SAP environment
Access to Programs and Data
• Key areas to consider include:
• SAP system settings including password parameters
• Access to user administration functions including defining and
assigning profiles to users (Profile Generator)
• Access to run programs/ transaction codes
• Assignment of SAP_ALL, SAP_NEW, other sensitive profiles
• Default passwords of SAP supplied accounts (SAP*, DDIC,
Earlywatch, SAPCPIC etc.)
• Management and review of User IDs and generic User IDs
• Use of audit logs (SAP Table Logging)
• Key areas to consider include:
• Customised programs and tables should be assigned to
appropriate authorisation groups.
• Ability to unlock production environment to make direct changes
to production is restricted and monitored
• Segregation of duties within the change management process
including developer, customizer and approver of the program
change/transport
• Changes to SAP tables and data dictionary in the production
environment is minimized
Key Areas within the SAP environment
Change Management
Key Areas within the SAP environment
Computer Operations
• Key areas to consider include:
• Batch jobs and interface processing should be regularly
monitored, with access to amend them restricted
• Batch jobs run under ANOTHER user should be restricted to
appropriate personnel
• Batch jobs run under ANY user should be completely restricted
• Operating and database system administrator access should be
restricted
Auditing SAP
Segregation of Duties
Example
SOD – Framework – Overview
SOD – Framework – SOD/SA Rule
SOD – Framework – SOD Rule
SOD – Framework – SOD Rule
SOD – Framework – Object Level
SOD – Framework – Object Level
Relationships Between Layers
Ability A
Create Maintain Purchase Order
t-code: ME21
Auth Object: M_BEST_BSA
ACTVT: 01
Create Maintain Vendor Master Records
t-code: FK01
Auth Object: F_LFA1_APP
ACTVT: 01
SAP SOD Example
Ability B
Questions?

More Related Content

What's hot

Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
Guang Ying Yuan
 
Sap security interview question & answers
Sap security interview question & answersSap security interview question & answers
Sap security interview question & answers
Nancy Nelida
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
Nasir Gondal
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
suresh
 
Sap security tasks
Sap security tasksSap security tasks
Sap security tasks
Siva Pradeep Bolisetti
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
nanda nanda
 
Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshop
larrymcc
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
techgurusuresh
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
TL Technologies - Thoughts Become Things
 
SU01 - Background and Instruction
SU01  - Background and InstructionSU01  - Background and Instruction
SU01 - Background and Instruction
Mart Leepin
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
Anil Kumar
 
165373293 sap-security-q
165373293 sap-security-q165373293 sap-security-q
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
Siva Pradeep Bolisetti
 
Sap Security
Sap SecuritySap Security
Sap Security
techgurusuresh
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
yektek
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
ERPScan
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
hkodali
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
AuditBot SAP Security Audit
 
Cua setup procedure SAP security
Cua setup procedure SAP securityCua setup procedure SAP security
Cua setup procedure SAP security
Siva Pradeep Bolisetti
 
SAP GRC
SAP GRC SAP GRC

What's hot (20)

Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
Sap security interview question & answers
Sap security interview question & answersSap security interview question & answers
Sap security interview question & answers
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
 
Sap security tasks
Sap security tasksSap security tasks
Sap security tasks
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
 
Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshop
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
 
SU01 - Background and Instruction
SU01  - Background and InstructionSU01  - Background and Instruction
SU01 - Background and Instruction
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
 
165373293 sap-security-q
165373293 sap-security-q165373293 sap-security-q
165373293 sap-security-q
 
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
 
Sap Security
Sap SecuritySap Security
Sap Security
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
 
Cua setup procedure SAP security
Cua setup procedure SAP securityCua setup procedure SAP security
Cua setup procedure SAP security
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 

Similar to SAP Security & GRC Framework

SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01
Argos
 
Sap
SapSap
ERP Training
ERP TrainingERP Training
ERP Training
Soumya De
 
Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability
Robert Max
 
Business case for SAP HANA
Business case for SAP HANABusiness case for SAP HANA
Business case for SAP HANA
Ajay Kumar Uppal
 
Overview of Dynaflow Solution
Overview of Dynaflow Solution Overview of Dynaflow Solution
Overview of Dynaflow Solution
bpmgeek09
 
BAASS Connect 2013 Development Solutions for your Business
BAASS Connect 2013 Development Solutions for your BusinessBAASS Connect 2013 Development Solutions for your Business
BAASS Connect 2013 Development Solutions for your Business
BAASS Business Solutions Inc.
 
Reduce the Burden Of Managing SAP With Enterprise Identity Management
Reduce the Burden Of Managing SAP With Enterprise Identity ManagementReduce the Burden Of Managing SAP With Enterprise Identity Management
Reduce the Burden Of Managing SAP With Enterprise Identity Management
SBWebinars
 
Tss Reference Architecture Reduced
Tss Reference Architecture   ReducedTss Reference Architecture   Reduced
Tss Reference Architecture Reduced
aadly
 
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
TransWare AG
 
Profiling for SAP - Analysis and redocumentation of SAP ERP
Profiling for SAP - Analysis and redocumentation of SAP ERPProfiling for SAP - Analysis and redocumentation of SAP ERP
Profiling for SAP - Analysis and redocumentation of SAP ERP
TransWare AG
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
NextLabs, Inc.
 
SAP ABAP Online Training Institute in Hyderabad - C-Point
SAP ABAP Online Training Institute in Hyderabad - C-PointSAP ABAP Online Training Institute in Hyderabad - C-Point
SAP ABAP Online Training Institute in Hyderabad - C-Point
cpointss
 
Becoming a Process Minding Organization - a Solution Overview
Becoming a Process Minding Organization  - a Solution OverviewBecoming a Process Minding Organization  - a Solution Overview
Becoming a Process Minding Organization - a Solution Overview
Dafna Levy
 
SAP Overview for Managers
SAP Overview for ManagersSAP Overview for Managers
SAP Overview for Managers
Atanu Ghosh
 
SAP Business Workflow - Best Practices
SAP Business Workflow - Best PracticesSAP Business Workflow - Best Practices
SAP Business Workflow - Best Practices
Warren Eiserman
 
Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Project
hani2253
 
01_Team_03_CS_591_Project
01_Team_03_CS_591_Project01_Team_03_CS_591_Project
01_Team_03_CS_591_Project
harsh mehta
 
Integrating SAP and Low-Code Plaforms
Integrating SAP and Low-Code PlaformsIntegrating SAP and Low-Code Plaforms
Integrating SAP and Low-Code Plaforms
Warren Eiserman
 
Oracle eBS Overview.pptx
Oracle eBS Overview.pptxOracle eBS Overview.pptx
Oracle eBS Overview.pptx
ssuser9dce1e1
 

Similar to SAP Security & GRC Framework (20)

SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01
 
Sap
SapSap
Sap
 
ERP Training
ERP TrainingERP Training
ERP Training
 
Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability
 
Business case for SAP HANA
Business case for SAP HANABusiness case for SAP HANA
Business case for SAP HANA
 
Overview of Dynaflow Solution
Overview of Dynaflow Solution Overview of Dynaflow Solution
Overview of Dynaflow Solution
 
BAASS Connect 2013 Development Solutions for your Business
BAASS Connect 2013 Development Solutions for your BusinessBAASS Connect 2013 Development Solutions for your Business
BAASS Connect 2013 Development Solutions for your Business
 
Reduce the Burden Of Managing SAP With Enterprise Identity Management
Reduce the Burden Of Managing SAP With Enterprise Identity ManagementReduce the Burden Of Managing SAP With Enterprise Identity Management
Reduce the Burden Of Managing SAP With Enterprise Identity Management
 
Tss Reference Architecture Reduced
Tss Reference Architecture   ReducedTss Reference Architecture   Reduced
Tss Reference Architecture Reduced
 
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
 
Profiling for SAP - Analysis and redocumentation of SAP ERP
Profiling for SAP - Analysis and redocumentation of SAP ERPProfiling for SAP - Analysis and redocumentation of SAP ERP
Profiling for SAP - Analysis and redocumentation of SAP ERP
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
 
SAP ABAP Online Training Institute in Hyderabad - C-Point
SAP ABAP Online Training Institute in Hyderabad - C-PointSAP ABAP Online Training Institute in Hyderabad - C-Point
SAP ABAP Online Training Institute in Hyderabad - C-Point
 
Becoming a Process Minding Organization - a Solution Overview
Becoming a Process Minding Organization  - a Solution OverviewBecoming a Process Minding Organization  - a Solution Overview
Becoming a Process Minding Organization - a Solution Overview
 
SAP Overview for Managers
SAP Overview for ManagersSAP Overview for Managers
SAP Overview for Managers
 
SAP Business Workflow - Best Practices
SAP Business Workflow - Best PracticesSAP Business Workflow - Best Practices
SAP Business Workflow - Best Practices
 
Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Project
 
01_Team_03_CS_591_Project
01_Team_03_CS_591_Project01_Team_03_CS_591_Project
01_Team_03_CS_591_Project
 
Integrating SAP and Low-Code Plaforms
Integrating SAP and Low-Code PlaformsIntegrating SAP and Low-Code Plaforms
Integrating SAP and Low-Code Plaforms
 
Oracle eBS Overview.pptx
Oracle eBS Overview.pptxOracle eBS Overview.pptx
Oracle eBS Overview.pptx
 

SAP Security & GRC Framework

  • 2. Agenda What We Will Do…  Provide a high level overview of what SAP is  SAP Authorization Concept  Provide an introduction to Auditing ITGC’s in SAP  Segregation of Duties in SAP
  • 4. What does SAP stand for?  Systeme, Anwendungen, Produkte in der Datenverarbeitung Systems, Applications and Products in Data Processing
  • 5. What is SAP? An order in SAP can automatically generate an inventory movement and a posting in the GL without any “human” intervention. SAP can track financial results, procurement, sales, manufacturing, human resources and payroll. SAP integrates all business processing through one application. Links operational results and the financial aspects of those results. SAP comprises of 18-20 modules in finance, logistics and HR. One or more SAP modules can be implemented. SAP is typically accessible by the entire business organisation. Most company information and transactions originate from SAP. Integrated Multifunctional Modular Enterprise Wide “Real Time”
  • 6. Overview of an SAP Environment Business process Controls (incl. automated, manual, BPR) IT General Controls Management reporting and end-user controls SAP configurable controls SAP Authorisations/User profiles SAP Basis Module Database Operating System and other Infrastructure controls Database Infrastructure Layer Application Layer Presentation Layer
  • 7. SAP Instances PR1 PH1 PC3 PE1 PA1 SAP R/3 or ECC 6.0 APO Planning SAP Human Resources SAP Customer Relationship Management SAP Procurement PS1 Solution Manager PB1 Business Warehouse
  • 9. Overview What is the SAP authorization concept? Security within SAP is achieved through the authorization concept The authorization is designed to ensure :  Maximum security  Sufficient privileges for end users to fulfil their job duties  Powerful user maintenance
  • 10. User master record User requires valid user-ID and password T-code check User requires an authorization for transactions Authority check User requires an authorization for underlying authorization objects and field values 1 2 3 Overview Three levels of security in SAP
  • 11. Transaction Code (t-code) Provides access to specific functions within SAP Authorization Object: Template for security that contains fields with blank values (uncut key) SAP User Master Record (UMR) Master data for SAP users Authorization (Field Values): Authorization object with completed fields (cut key) ME21 – Create Purchase Order SAP Authorization Concept The components
  • 12. Profiles “Key ring” that contains authorizations (cut keys) Authority Check Performed by SAP to ensure that a user ID has the correct authorization object and field value combination (cut key) to execute a particular task Roles Collection of transaction codes, authorizations and user assignments R: Display PO R: Create PO Buyer SAP Authorization Concept The components
  • 13. SAP Authorization Concept Bringing it all together  Let’s make an analogy…  … the Lock and the Key To open the lock, you need the right key!
  • 14. Profile SAP Security Check Authorizations User Master Record R: Display Purchasing document R: Create Purchase Order (e.g., ME21) Buyer SAP Authorization Concept Bringing it all together
  • 16. SAP is not a typical application / environment split Many traditional environment functions are provided within the application including: » development environment » change control » system administration and job scheduling These functions are collectively known as SAP Basis Combined with SAP integration, this serves to complicate access security Risk based approach in a SAP environment
  • 17. SAP allows more comprehensive functionality and control, however, the following needs to be considered: − Financial transactions are executed throughout the business making segregation of duties control key − The SAP access mechanism is complex making security and segregation of duties a key risk − Configuration has a large impact to the overall business process and controls Risk based approach in a SAP environment
  • 18. Key IT General Control Domains • Consider tests for controls around: • Access to programs and data • Changes made to the system (Change management) • Computer operations • Weaknesses identified within the IT general controls can potentially undermine confirmed and tested automated controls and access controls at the business process level
  • 19. Key Areas within the SAP environment Access to Programs and Data • Key areas to consider include: • SAP system settings including password parameters • Access to user administration functions including defining and assigning profiles to users (Profile Generator) • Access to run programs/ transaction codes • Assignment of SAP_ALL, SAP_NEW, other sensitive profiles • Default passwords of SAP supplied accounts (SAP*, DDIC, Earlywatch, SAPCPIC etc.) • Management and review of User IDs and generic User IDs • Use of audit logs (SAP Table Logging)
  • 20. • Key areas to consider include: • Customised programs and tables should be assigned to appropriate authorisation groups. • Ability to unlock production environment to make direct changes to production is restricted and monitored • Segregation of duties within the change management process including developer, customizer and approver of the program change/transport • Changes to SAP tables and data dictionary in the production environment is minimized Key Areas within the SAP environment Change Management
  • 21. Key Areas within the SAP environment Computer Operations • Key areas to consider include: • Batch jobs and interface processing should be regularly monitored, with access to amend them restricted • Batch jobs run under ANOTHER user should be restricted to appropriate personnel • Batch jobs run under ANY user should be completely restricted • Operating and database system administrator access should be restricted
  • 22. Auditing SAP Segregation of Duties Example
  • 23. SOD – Framework – Overview
  • 24. SOD – Framework – SOD/SA Rule
  • 25. SOD – Framework – SOD Rule
  • 26. SOD – Framework – SOD Rule
  • 27. SOD – Framework – Object Level
  • 28. SOD – Framework – Object Level
  • 30. Ability A Create Maintain Purchase Order t-code: ME21 Auth Object: M_BEST_BSA ACTVT: 01 Create Maintain Vendor Master Records t-code: FK01 Auth Object: F_LFA1_APP ACTVT: 01 SAP SOD Example Ability B

Editor's Notes

  1. 07/16/96