SlideShare a Scribd company logo
Security Mapping  Overview
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Control Techniques Business Process Controls Umbrella Non-SAP Business Processes SAP standard SAP configured Authorization Monitoring Manual SAP Risks Risks Risks Risks Risks
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Have Security? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What defines a Security Role? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Design Approach Observation 3 SAP Position “ Customer  Service” SAP transaction(s) are assigned to roles but a transaction should only be assigned to one role. Roles are mapped to SAP positions which are then mapped to users. Role(s) “ Change Sales Order” SAP Transaction(s) VA01
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Global One Security Template Wave One Wave Two Wave Three Wave Four North America security design as the baseline Final Global  Template Localize Global  Template North American security foundation 80% 20% change from North America Minor changes to Global Template Security can be  accommodated within reason.  (e.g. new transaction codes and new SAP Positions) Design security for Global One
Security Design Approach Observation 3 SAP Position “ Customer  Service” SAP transaction(s) are assigned to roles Roles are mapped to SAP positions which are then mapped to users. Role(s) “ Change Sales Order” SAP Transaction(s) VA01
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Enterprise Structure (Hierarchy) Drives...
Organizational Structure Options and Localization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scope of Organizational Hierarchy for Global One ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Role Example Display Purchasing GM_XXX_FTS_DIS_PURCHASNG Role Transaction Create Purchase Req (ME51) SAP Position Change Purchase Req (ME52) Display Purchase Req (ME53) Display Materials (MM03) Create Purchase  Order (ME21N) Change Purchase  Order (ME22N) Jian Min Carlos Jorge Françoise Strategic  Purchasing  Plant Buyer Create/Change Purch Req GM_XXX_FTS_CHG_PUR_REQ Display Master Data GM_XXX_MDT_GEN_DISPLAY User Create/Change Purchase Order GM_XXX_FTS_CHG_PO
Transactions by roles
Master and Derived roles
List of SAP Positions
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who Are The Data Owners? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AR UY CL CA US Southern Cluster North America Global EXAMPLE 1 -  A Finance User works in Argentina; has access to view or modify Argentina data in SAP: - The Finance User wants access to view and update US information.  The User needs to request approval from the US Data Owner.  This should be the US Finance Data Owner. - Request should also be approved by the Finance Data Owner of the country the person works for, prior to being issued access.  i.e. two approvals, one from Argentina and one from the US PY Security Access Approvers – Data Owners
Security Access Approvers – Data Owners PY CL AR Southern Cluster Global ,[object Object],[object Object],[object Object],[object Object],UY
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Segregation of Duties – Security Team Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Next Steps ,[object Object],[object Object],[object Object],[object Object]
[object Object]

More Related Content

What's hot

SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important QuestionsRagu M
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
grconlinetraining
 
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
Siva Pradeep Bolisetti
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
suresh
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.info
sapdocs. info
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
TLI GrowthSession
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
hkodali
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
Nasir Gondal
 
An Overview of SAP S4/HANA
An Overview of SAP S4/HANAAn Overview of SAP S4/HANA
An Overview of SAP S4/HANA
Debajit Banerjee
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
Latha Kamal
 
Sap security interview question & answers
Sap security interview question & answersSap security interview question & answers
Sap security interview question & answers
Nancy Nelida
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
ERPScan
 
SAP Security interview questions
SAP Security interview questionsSAP Security interview questions
SAP Security interview questions
Siva Pradeep Bolisetti
 
Sap S4 HANA Everything You Need To Know
Sap S4 HANA Everything You Need To Know Sap S4 HANA Everything You Need To Know
Sap S4 HANA Everything You Need To Know
Soumya De
 
Introduction Into SAP Fiori
Introduction Into SAP FioriIntroduction Into SAP Fiori
Introduction Into SAP Fiori
Blackvard
 
SAP Fiori ppt
SAP Fiori pptSAP Fiori ppt
SAP Fiori ppt
Pushkar Vinchurkar
 
Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
Anywhere Gondodza SAP.GRC.FI.B.COM.ACC.HONS (MSU)
 
SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers
Verbella CMG
 
SAP ECC to S/4HANA Move
SAP ECC to S/4HANA MoveSAP ECC to S/4HANA Move
SAP ECC to S/4HANA Move
AGSanePLDTCompany
 

What's hot (20)

SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important Questions
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.info
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
 
165373293 sap-security-q
165373293 sap-security-q165373293 sap-security-q
165373293 sap-security-q
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
 
An Overview of SAP S4/HANA
An Overview of SAP S4/HANAAn Overview of SAP S4/HANA
An Overview of SAP S4/HANA
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
Sap security interview question & answers
Sap security interview question & answersSap security interview question & answers
Sap security interview question & answers
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
SAP Security interview questions
SAP Security interview questionsSAP Security interview questions
SAP Security interview questions
 
Sap S4 HANA Everything You Need To Know
Sap S4 HANA Everything You Need To Know Sap S4 HANA Everything You Need To Know
Sap S4 HANA Everything You Need To Know
 
Introduction Into SAP Fiori
Introduction Into SAP FioriIntroduction Into SAP Fiori
Introduction Into SAP Fiori
 
SAP Fiori ppt
SAP Fiori pptSAP Fiori ppt
SAP Fiori ppt
 
Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
 
SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers
 
SAP ECC to S/4HANA Move
SAP ECC to S/4HANA MoveSAP ECC to S/4HANA Move
SAP ECC to S/4HANA Move
 

Similar to Sap Security Workshop

Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleSalesforce Developers
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
NextLabs, Inc.
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
Anil Kumar
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of III
NextLabs, Inc.
 
Beyond Custom Metadata Types
Beyond Custom Metadata TypesBeyond Custom Metadata Types
Beyond Custom Metadata Types
Salesforce Developers
 
Best Practices for Integrating with Your ERP
Best Practices for Integrating with Your ERPBest Practices for Integrating with Your ERP
Best Practices for Integrating with Your ERPdreamforce2006
 
Aen004 Thorpe 091807
Aen004 Thorpe 091807Aen004 Thorpe 091807
Aen004 Thorpe 091807
Dreamforce07
 
Business analyst 101 program Mumbai India
Business analyst 101 program Mumbai IndiaBusiness analyst 101 program Mumbai India
Business analyst 101 program Mumbai India
Deepak Kadam
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
IBM Analytics
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
guest5bd7a1
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
NextLabs, Inc.
 
Bsa 400 preview full class
Bsa 400 preview full classBsa 400 preview full class
Bsa 400 preview full class
fasthomeworkhelpdotcome
 
Meradia investment performance_systems
Meradia investment performance_systemsMeradia investment performance_systems
Meradia investment performance_systems
Meradia Group
 
5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)randhirlpu
 
Aan008 Root 091907
Aan008 Root 091907Aan008 Root 091907
Aan008 Root 091907
Dreamforce07
 
A comprehensive guide to Salesforce Org Strategy
A comprehensive guide to Salesforce Org StrategyA comprehensive guide to Salesforce Org Strategy
A comprehensive guide to Salesforce Org Strategy
Gaytri khandelwal
 
A Data Warehouse And Business Intelligence Application
A Data Warehouse And Business Intelligence ApplicationA Data Warehouse And Business Intelligence Application
A Data Warehouse And Business Intelligence Application
Kate Subramanian
 
Understanding Multitenancy and the Architecture of the Salesforce Platform
Understanding Multitenancy and the Architecture of the Salesforce PlatformUnderstanding Multitenancy and the Architecture of the Salesforce Platform
Understanding Multitenancy and the Architecture of the Salesforce Platform
Salesforce Developers
 

Similar to Sap Security Workshop (20)

Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of III
 
Beyond Custom Metadata Types
Beyond Custom Metadata TypesBeyond Custom Metadata Types
Beyond Custom Metadata Types
 
Best Practices for Integrating with Your ERP
Best Practices for Integrating with Your ERPBest Practices for Integrating with Your ERP
Best Practices for Integrating with Your ERP
 
Aen004 Thorpe 091807
Aen004 Thorpe 091807Aen004 Thorpe 091807
Aen004 Thorpe 091807
 
Business analyst 101 program Mumbai India
Business analyst 101 program Mumbai IndiaBusiness analyst 101 program Mumbai India
Business analyst 101 program Mumbai India
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
 
Bsa 400 preview full class
Bsa 400 preview full classBsa 400 preview full class
Bsa 400 preview full class
 
Meradia investment performance_systems
Meradia investment performance_systemsMeradia investment performance_systems
Meradia investment performance_systems
 
5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)
 
Soa To The Rescue
Soa To The RescueSoa To The Rescue
Soa To The Rescue
 
shravan
shravanshravan
shravan
 
Aan008 Root 091907
Aan008 Root 091907Aan008 Root 091907
Aan008 Root 091907
 
A comprehensive guide to Salesforce Org Strategy
A comprehensive guide to Salesforce Org StrategyA comprehensive guide to Salesforce Org Strategy
A comprehensive guide to Salesforce Org Strategy
 
A Data Warehouse And Business Intelligence Application
A Data Warehouse And Business Intelligence ApplicationA Data Warehouse And Business Intelligence Application
A Data Warehouse And Business Intelligence Application
 
Understanding Multitenancy and the Architecture of the Salesforce Platform
Understanding Multitenancy and the Architecture of the Salesforce PlatformUnderstanding Multitenancy and the Architecture of the Salesforce Platform
Understanding Multitenancy and the Architecture of the Salesforce Platform
 

Sap Security Workshop

  • 1. Security Mapping Overview
  • 2.
  • 3. Control Techniques Business Process Controls Umbrella Non-SAP Business Processes SAP standard SAP configured Authorization Monitoring Manual SAP Risks Risks Risks Risks Risks
  • 4.
  • 5.
  • 6.
  • 7. Security Design Approach Observation 3 SAP Position “ Customer Service” SAP transaction(s) are assigned to roles but a transaction should only be assigned to one role. Roles are mapped to SAP positions which are then mapped to users. Role(s) “ Change Sales Order” SAP Transaction(s) VA01
  • 8.
  • 9. Global One Security Template Wave One Wave Two Wave Three Wave Four North America security design as the baseline Final Global Template Localize Global Template North American security foundation 80% 20% change from North America Minor changes to Global Template Security can be accommodated within reason. (e.g. new transaction codes and new SAP Positions) Design security for Global One
  • 10. Security Design Approach Observation 3 SAP Position “ Customer Service” SAP transaction(s) are assigned to roles Roles are mapped to SAP positions which are then mapped to users. Role(s) “ Change Sales Order” SAP Transaction(s) VA01
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Role Example Display Purchasing GM_XXX_FTS_DIS_PURCHASNG Role Transaction Create Purchase Req (ME51) SAP Position Change Purchase Req (ME52) Display Purchase Req (ME53) Display Materials (MM03) Create Purchase Order (ME21N) Change Purchase Order (ME22N) Jian Min Carlos Jorge Françoise Strategic Purchasing Plant Buyer Create/Change Purch Req GM_XXX_FTS_CHG_PUR_REQ Display Master Data GM_XXX_MDT_GEN_DISPLAY User Create/Change Purchase Order GM_XXX_FTS_CHG_PO
  • 18. List of SAP Positions
  • 19.
  • 20.
  • 21. AR UY CL CA US Southern Cluster North America Global EXAMPLE 1 - A Finance User works in Argentina; has access to view or modify Argentina data in SAP: - The Finance User wants access to view and update US information. The User needs to request approval from the US Data Owner. This should be the US Finance Data Owner. - Request should also be approved by the Finance Data Owner of the country the person works for, prior to being issued access. i.e. two approvals, one from Argentina and one from the US PY Security Access Approvers – Data Owners
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.