SlideShare a Scribd company logo
1 of 48
Download to read offline
SAP SECURITY – CLEARING
THE CONFUSION AND
TAKING A HOLISTIC
APPROACH
WWW.MANTRANCONSULTING.COM
25 Mar 2011, ISACA Singapore
Project Controls
SAP
Post
Upgrade
Review
BASIS Controls
SAP
security
and
controls
Information Security Policy and Procedures
Roles, Profiles, Authorizations and Authorization
Objects
Infrastructure security
SAS70
SOX
Logical access
SAP Pre Implementation Review
Change controls
SAPRouter
Change
and
Transport
System
(CTS)
Architecture security
Configurable controls
Access controls
Segregation
Of
Duties
Data Migration
SA38 and SE38
NetWeaver
Security
Authorizations
review
SE16, SM30 & SM31
Transport Management System (TMS)
SAP Post Implementation Review
SOD
SAP*, CPIC, DDIC and EARLYWATCH
Objectives
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
3
3
 Discuss various types of security controls in SAP
 Define framework for SAP security audits
 Discuss integration with IT and operational audits
This presentation does not cover individual SAP security
controls and concepts in detail ….
And it is not a technical presentation on SAP security controls
SAP is a sensitive & critical system
4
4
 SAP is an ERP and a business application system
 Any security vulnerability may result in financial loss,
business disruptions, misstatement of financial
information, etc
 Unlike infrastructure security vulnerability, SAP
security vulnerability may directly impact the business
 SAP is an integrated system – therefore, any errors
may have a widespread impact
 One of the most important system in any organization
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
What is the impact on IT audit?
 It is important to secure SAP system
 To secure SAP, it is not sufficient to enforce controls
inside SAP only
5
5
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
SAP is a part of IT infrastructure
6
6
User PC/ Laptop
User PC/ Laptop
Application Server 3
Application Server 1
Application Server 2 Database
Server
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
What needs to be secured?
 Application – appropriate security controls need to
be enforced in SAP
 Infrastructure – the supporting infrastructure needs to
be secured as well
 Network – routers, switches, firewalls
 Server – application server and database server
 Operating system
 Database
 PCs/ Laptops – presentation layer of the SAP system
7
7
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
What organizations review ..
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
8
8
Don't know/ others
Not performed
Data migration
BASIS controls
Configurable/ automated business…
SAP security policies and procedures
SoD
Authorizations
8%
14%
16%
24%
38%
54%
68%
70%
SAP Audit/Review Scope
Source: MANTRAN SAP Security Practices Survey 2010
Security controls in SAP
9
9
Authorization s
Controls
Segregation of
Duties
(SOD)
BASIS
Controls
Business
Process
Controls
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Authorization controls
10
10
 Allow users in SAP to perform their work while
securing transactions from unauthorized access
 It is a complex and scalable concept
 Determines WHAT activity can be performed by a user as
well as WHERE it can be performed
 Enforced through a pseudo object oriented concept using
authorization objects
 Authorizations are assigned to Roles, which are then
assigned to Users
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Approximately 2,000 authorization objects control access
to more than 100,000 transaction codes
Look for the holes …
11
11
 SAP checks user master record for required
authorizations
 SAP provides information on which authorizations are
required for each transaction codes
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
It is important to look for ‘disabled’
authorization checks!
Disabling authorization checks …
12
12
 The Authorization Object check has been disabled for
the Transaction Code using transaction SU24 (table
USOBT_C and USOBX_C)
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Don’t forget global deactivation of Authorization
Objects through transaction AUTH_SWITCH_OBJECTS
(profile parameter ‘auth/object_disabling_active’
should be set to Y for this to take effect!)
What should be reviewed?
13
13
 Access to critical/ sensitive activities are controlled
 User access is appropriate (i.e., based on their roles
and responsibilities)
 Roles are appropriate (i.e., authorizations within roles
are as per the role definition)
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Segregation of Duties (SoD)
14
14
 Ensures that no one individual has complete control
over major phase of a process
 Key component of any effective internal controls
environment
 Typically enforced through a combination of access
control and mitigating controls
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
What should be reviewed?
15
15
 SoD framework has been defined
 Users do not have SoD conflicts
 Roles do not have SoD conflicts
 If SoD conflicts exists in users, there are appropriate
mitigating controls
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Beyond the basics …
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
16
16
 Mitigating controls – do they work?
 It is important to check whether the mitigating controls work
 Mitigating controls should be documented and tested
regularly!
BASIS controls
17
17
 Refers to technical controls in SAP
 Password controls
 User administration
 Privileged users
 Auditing
 Change controls
 Batch job management
 Direct access to data through tables
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Go beyond the basics
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
18
18
 Client settings – direct changes should not be allowed
on the production client
Don’t forget to check system settings!
And the table logging!
What should be reviewed?
19
19
 BASIS review
 Policies and procedures
 Technical settings in SAP
 IT procedures related to SAP administration and
maintenance
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Business process controls
20
20
 Refers to automated (and IT dependent) controls
available in SAP for various business processes such
as purchasing, sales, financial reporting, inventory,
HR, etc
 Broadly classified under following three categories:
 Inherent controls
 Configurable controls
 Procedural controls
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Business process controls
21
21
 Inherent controls – Enforced by default in SAP
 Sales Order cannot be created with an invalid customer
 Configurable controls – ‘Switches’ that can be set by
turning them on or off based on the business
requirements
 Configured through Implementation Guide (IMG)
 Examples - tolerance limits for three way match, PO
approval hierarchy
 Procedural controls – IT dependent controls (e.g.,
review of exception reports)
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Do organizations use them?
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
22
22
11%
46%
30%
13%
Utilizationof SAP automatedcontrols
Very confident
Somewhat confident
Not confident
Don't know/ others
Source: MANTRAN SAP Security Practices Survey 2010
Some examples of such controls …
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
23
23
16%
25%
24%
35%
PMIN conditionfor pricing
PMIN is used
PMIN is not required
Not aware that SAP has
PMIN
Don't know
Source: MANTRAN SAP Security Practices Survey 2010
A few more examples …
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
24
24
 Dual controls for customer and vendor masters
A few more examples …
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
25
25
 Alternate payee
A few more examples …
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
26
26
 Regular review of vendor reports such as RFKABL00 (Changes
to Vendors)
What should be reviewed?
27
27
 Configuration settings
 Procedural controls
 Exception reports
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Clearing the confusion
28
28
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
1. Business Process Review
2. Configuration Review
3. Blueprint Review
4. IT Automated Controls
(ITAC) Review
5. IT Application Controls
(ITAC) Review
1. BASIS Review
2. IT General Controls (ITGC)
Review
3. Technical Review
1. Authorizations
Review
2. Access Review
3. SoD review
4. Role Review
5. User Review
1. Authorizations
Review
2. Access Review
3. SoD review
4. Role Review
5. User Review
Security controls outside SAP
29
29
 It is equally important to enforce security controls in
the underlying infrastructure components
 SAP interacts with its underlying infrastructure
components in unique ways
 Therefore, it is important to consider controls related
to these interactions at the infrastructure level
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Network controls are important
30
30
 SAP network security
 Can users directly connect to the database through
backend?
 Is the data transmission over the network secure?
 What network communication is allowed between user
machines and application server?
 What network communication is allowed between
application server and database server?
 Apart from usual network security controls, consider
SAP specific controls such as SAPRouter and SNC
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
SAP supports network security
31
31
 SAPRouter
 SAPRouter is an SAP program that serves as an
intermediate station (proxy) in a network connection
between SAP systems or programs
 Controls access to your network (application level gateway)
 Useful extension to an existing firewall
 Secure Network Communications
 SNC is used to secure SAP network connections
 Provides reliable authentication as well as encryption of the
data to be transferred
 SAPRouter allows SNC connections to be set up
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
SAP server needs to be hardened
32
32
 Both application and database servers need to be
hardened
 Consider SAP specific hardening requirements such as
transport tools security, profile parameter file security
and security audit logs security
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
SAP changes are controlled by OS
33
33
 Operating system level transport tools in SAP servers
 Change and Transport System (CTS) is a set of tools to
organize development projects in the ABAP Workbench and
in customizing, and then transport the changes between the
SAP systems and clients
 It broadly consists of Change and Transport Organizer
(CTO), Transport Management System (TMS) and some
operating system level transport tools
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
SAP Change and Transport System
34
34
Transport Tools
(tp and R3trans)
CTO
Transport
Organizer
Workbench
Organizer
Customizing
Organizer
TMS
Transport
Management
System
RFC RFC
RFC
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
CTS depends on OS files
35
35
 There are two global configuration files –
TP_DOMAIN_<SID>.PFL and TPPARAM that must
include entries for each SAP systems taking part in
transports
 ‘tp’ uses these files for making transports.
 Stored in /usr/sap/trans or <DRIVE>/usr/sap/trans
 Access rights should be configured so that all SAP systems
within the transport group can access these files
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Transport tools reside at OS level
36
36
 Imports can be performed using ‘tp’ program at the
OS level by logging into the target system as user
<SID>adm, going to /usr/sap/trans/bin directory
and calling the program
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
SAP profiles are OS files
37
37
 Profile parameter files stored in SAP server
 A profile in SAP is an operating system file containing
parameters and configuration information of SAP instance
 The profile files are located under the directory
/usr/sap/<SID>/SYS/profile
 This directory is shared by all application servers belonging
to the same SAP system (i.e., SID)
 Access to modify the profile files should be restricted
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Audit log is stored on server
38
38
 Security audit logs stored in SAP server
 Rsau/local/file – define names and locations of the security
audit log files
 Access to the security audit log files and directories should
be restricted
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
And vice versa …..
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
39
39
With appropriate access,
OS level commands can
be executed from within
SAP!
Indicative SAP security framework ..
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
What does it mean for IT auditors?
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
41
41
 SAP audit covers both technical and functional areas
 Requires integration between IT and internal/
operational auditors
 Within IT audit team, coordination between
infrastructure and SAP auditors is important to ensure
that important infrastructure controls are covered
 Excellent opportunity to understand business and
align IT audit with business risks!
Integrated audit is not yet common
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
42
42
32%
14%
32%
22%
IA Approach
No - no integration with
systemic controls in SAP
Yes- to a very small
extent
Yes- to large extent
Don't know/ Others
Source: MANTRAN SAP Security Practices Survey 2010
SAP review through its lifecycle
43
43
 SAP review may be performed at various stages of
SAP lifecycle
 Accordingly, scope and coverage may vary
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
Pre-Implementation
Review
Post-Implementation
Review
Pre-implementation review
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
44
44
 Conducted before SAP is implemented (i.e., before
go-live) and may include
 Blueprint/configuration/ business process controls review
 Authorizations and SoD review
 IT general controls/ BASIS review
 Data migration / conversion/ cutover review
 Project management review
 Program development review
Pre-implementation review
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
45
45
 System may not exist or controls may not have been
implemented
 It is often a document review based on documents
such as
 Business blueprints
 Authorization design documents
 Project plan, strategy and other project documents
 Data migration plan, strategy and cutover plan
 SAP technical design documents
 UAT documents
Post-implementation review
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
46
46
 Usually conducted after system stabilization
 It usually includes the following areas
 Configuration/ business process controls review
 Authorizations and SoD review
 IT general controls/ BASIS review
 Usually conducted by reviewing the system settings
Other areas
© 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
47
47
 There are new security concerns with use of various
NetWeaver products
 Other SAP products such as CRM, SRM, SCM and SLM
have their own security issues
Presented by
Barun Kumar
Director
Mantran Consulting Pte Ltd
+65 8118 9972
Email ID barunkumar@mantranconsulting.com
LinkedIn profile http://www.linkedin.com/in/barunkumar
My blogs http://www.mantranconsulting.blogspot.com/
Questions
© Mantran Consulting Pte Ltd 2011 – All rights reserved.
MANTRAN logo are registered or unregistered trademarks of Mantran Consulting Pte Ltd. All other names, brands, logo, etc
are registered trade or service marks of their respective owners.
SAP, SAP logo and all SAP screenshots are copyright of SAP AG. SAP is a registered trademark of SAP AG.
All information provided in the training is true to best of our knowledge. The information provided is a summarization of
various concepts for ease of understanding. Certain facts may have been ignored or simplified for easy understanding. The
information provided may not be accurate or complete.

More Related Content

Similar to SAP_Security_ISACA.pdf

Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Oracle
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...akquinet enterprise solutions GmbH
 
Supply Chain Control Tower - Design & Deployment Concept
Supply Chain Control Tower - Design & Deployment ConceptSupply Chain Control Tower - Design & Deployment Concept
Supply Chain Control Tower - Design & Deployment ConceptShaik Abdul Khadar
 
Stay Two Steps Ahead of Your Auditor
 Stay Two Steps Ahead of Your Auditor Stay Two Steps Ahead of Your Auditor
Stay Two Steps Ahead of Your Auditoreprentise
 
Alignia for Business Applications
Alignia for Business ApplicationsAlignia for Business Applications
Alignia for Business ApplicationsLaurie LeBlanc
 
Alignia for Business Applications
Alignia for Business ApplicationsAlignia for Business Applications
Alignia for Business ApplicationsLaurie LeBlanc
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]akquinet enterprise solutions GmbH
 
Gourav ladha - Profile
Gourav ladha - ProfileGourav ladha - Profile
Gourav ladha - ProfileGourav Ladha
 
Infrastructure Monitoring Maturity: Modeling Technology, Process, & Culture
Infrastructure Monitoring Maturity: Modeling Technology, Process, & CultureInfrastructure Monitoring Maturity: Modeling Technology, Process, & Culture
Infrastructure Monitoring Maturity: Modeling Technology, Process, & CultureEnterprise Management Associates
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 Englishguest5bd7a1
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?SAPinsider Events
 
Resume-APOORVA KABRA
Resume-APOORVA KABRAResume-APOORVA KABRA
Resume-APOORVA KABRAApoorva Kabra
 
Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Jay Steidle
 
ERP SYSTEM POST IMPLEMENTATION AUDIT_TRNG_May,2023 - Part-1.pptx
ERP SYSTEM POST IMPLEMENTATION AUDIT_TRNG_May,2023 - Part-1.pptxERP SYSTEM POST IMPLEMENTATION AUDIT_TRNG_May,2023 - Part-1.pptx
ERP SYSTEM POST IMPLEMENTATION AUDIT_TRNG_May,2023 - Part-1.pptxRamanaBulusu1
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...akquinet enterprise solutions GmbH
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps EraMike Kavis
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
E2E technology Asset Management Transformation Example
E2E technology Asset Management Transformation ExampleE2E technology Asset Management Transformation Example
E2E technology Asset Management Transformation ExampleAkshyadeep Raghav
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 

Similar to SAP_Security_ISACA.pdf (20)

Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
Supply Chain Control Tower - Design & Deployment Concept
Supply Chain Control Tower - Design & Deployment ConceptSupply Chain Control Tower - Design & Deployment Concept
Supply Chain Control Tower - Design & Deployment Concept
 
Stay Two Steps Ahead of Your Auditor
 Stay Two Steps Ahead of Your Auditor Stay Two Steps Ahead of Your Auditor
Stay Two Steps Ahead of Your Auditor
 
Alignia for Business Applications
Alignia for Business ApplicationsAlignia for Business Applications
Alignia for Business Applications
 
Alignia for Business Applications
Alignia for Business ApplicationsAlignia for Business Applications
Alignia for Business Applications
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
Gourav ladha - Profile
Gourav ladha - ProfileGourav ladha - Profile
Gourav ladha - Profile
 
Infrastructure Monitoring Maturity: Modeling Technology, Process, & Culture
Infrastructure Monitoring Maturity: Modeling Technology, Process, & CultureInfrastructure Monitoring Maturity: Modeling Technology, Process, & Culture
Infrastructure Monitoring Maturity: Modeling Technology, Process, & Culture
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
 
Resume-APOORVA KABRA
Resume-APOORVA KABRAResume-APOORVA KABRA
Resume-APOORVA KABRA
 
Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15
 
ERP SYSTEM POST IMPLEMENTATION AUDIT_TRNG_May,2023 - Part-1.pptx
ERP SYSTEM POST IMPLEMENTATION AUDIT_TRNG_May,2023 - Part-1.pptxERP SYSTEM POST IMPLEMENTATION AUDIT_TRNG_May,2023 - Part-1.pptx
ERP SYSTEM POST IMPLEMENTATION AUDIT_TRNG_May,2023 - Part-1.pptx
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
E2E technology Asset Management Transformation Example
E2E technology Asset Management Transformation ExampleE2E technology Asset Management Transformation Example
E2E technology Asset Management Transformation Example
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 

Recently uploaded

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 

Recently uploaded (20)

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

SAP_Security_ISACA.pdf

  • 1. SAP SECURITY – CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH WWW.MANTRANCONSULTING.COM 25 Mar 2011, ISACA Singapore
  • 2. Project Controls SAP Post Upgrade Review BASIS Controls SAP security and controls Information Security Policy and Procedures Roles, Profiles, Authorizations and Authorization Objects Infrastructure security SAS70 SOX Logical access SAP Pre Implementation Review Change controls SAPRouter Change and Transport System (CTS) Architecture security Configurable controls Access controls Segregation Of Duties Data Migration SA38 and SE38 NetWeaver Security Authorizations review SE16, SM30 & SM31 Transport Management System (TMS) SAP Post Implementation Review SOD SAP*, CPIC, DDIC and EARLYWATCH
  • 3. Objectives © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 3 3  Discuss various types of security controls in SAP  Define framework for SAP security audits  Discuss integration with IT and operational audits This presentation does not cover individual SAP security controls and concepts in detail …. And it is not a technical presentation on SAP security controls
  • 4. SAP is a sensitive & critical system 4 4  SAP is an ERP and a business application system  Any security vulnerability may result in financial loss, business disruptions, misstatement of financial information, etc  Unlike infrastructure security vulnerability, SAP security vulnerability may directly impact the business  SAP is an integrated system – therefore, any errors may have a widespread impact  One of the most important system in any organization © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 5. What is the impact on IT audit?  It is important to secure SAP system  To secure SAP, it is not sufficient to enforce controls inside SAP only 5 5 © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 6. SAP is a part of IT infrastructure 6 6 User PC/ Laptop User PC/ Laptop Application Server 3 Application Server 1 Application Server 2 Database Server © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 7. What needs to be secured?  Application – appropriate security controls need to be enforced in SAP  Infrastructure – the supporting infrastructure needs to be secured as well  Network – routers, switches, firewalls  Server – application server and database server  Operating system  Database  PCs/ Laptops – presentation layer of the SAP system 7 7 © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 8. What organizations review .. © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 8 8 Don't know/ others Not performed Data migration BASIS controls Configurable/ automated business… SAP security policies and procedures SoD Authorizations 8% 14% 16% 24% 38% 54% 68% 70% SAP Audit/Review Scope Source: MANTRAN SAP Security Practices Survey 2010
  • 9. Security controls in SAP 9 9 Authorization s Controls Segregation of Duties (SOD) BASIS Controls Business Process Controls © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 10. Authorization controls 10 10  Allow users in SAP to perform their work while securing transactions from unauthorized access  It is a complex and scalable concept  Determines WHAT activity can be performed by a user as well as WHERE it can be performed  Enforced through a pseudo object oriented concept using authorization objects  Authorizations are assigned to Roles, which are then assigned to Users © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. Approximately 2,000 authorization objects control access to more than 100,000 transaction codes
  • 11. Look for the holes … 11 11  SAP checks user master record for required authorizations  SAP provides information on which authorizations are required for each transaction codes © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. It is important to look for ‘disabled’ authorization checks!
  • 12. Disabling authorization checks … 12 12  The Authorization Object check has been disabled for the Transaction Code using transaction SU24 (table USOBT_C and USOBX_C) © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. Don’t forget global deactivation of Authorization Objects through transaction AUTH_SWITCH_OBJECTS (profile parameter ‘auth/object_disabling_active’ should be set to Y for this to take effect!)
  • 13. What should be reviewed? 13 13  Access to critical/ sensitive activities are controlled  User access is appropriate (i.e., based on their roles and responsibilities)  Roles are appropriate (i.e., authorizations within roles are as per the role definition) © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 14. Segregation of Duties (SoD) 14 14  Ensures that no one individual has complete control over major phase of a process  Key component of any effective internal controls environment  Typically enforced through a combination of access control and mitigating controls © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 15. What should be reviewed? 15 15  SoD framework has been defined  Users do not have SoD conflicts  Roles do not have SoD conflicts  If SoD conflicts exists in users, there are appropriate mitigating controls © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 16. Beyond the basics … © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 16 16  Mitigating controls – do they work?  It is important to check whether the mitigating controls work  Mitigating controls should be documented and tested regularly!
  • 17. BASIS controls 17 17  Refers to technical controls in SAP  Password controls  User administration  Privileged users  Auditing  Change controls  Batch job management  Direct access to data through tables © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 18. Go beyond the basics © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 18 18  Client settings – direct changes should not be allowed on the production client Don’t forget to check system settings! And the table logging!
  • 19. What should be reviewed? 19 19  BASIS review  Policies and procedures  Technical settings in SAP  IT procedures related to SAP administration and maintenance © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 20. Business process controls 20 20  Refers to automated (and IT dependent) controls available in SAP for various business processes such as purchasing, sales, financial reporting, inventory, HR, etc  Broadly classified under following three categories:  Inherent controls  Configurable controls  Procedural controls © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 21. Business process controls 21 21  Inherent controls – Enforced by default in SAP  Sales Order cannot be created with an invalid customer  Configurable controls – ‘Switches’ that can be set by turning them on or off based on the business requirements  Configured through Implementation Guide (IMG)  Examples - tolerance limits for three way match, PO approval hierarchy  Procedural controls – IT dependent controls (e.g., review of exception reports) © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 22. Do organizations use them? © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 22 22 11% 46% 30% 13% Utilizationof SAP automatedcontrols Very confident Somewhat confident Not confident Don't know/ others Source: MANTRAN SAP Security Practices Survey 2010
  • 23. Some examples of such controls … © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 23 23 16% 25% 24% 35% PMIN conditionfor pricing PMIN is used PMIN is not required Not aware that SAP has PMIN Don't know Source: MANTRAN SAP Security Practices Survey 2010
  • 24. A few more examples … © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 24 24  Dual controls for customer and vendor masters
  • 25. A few more examples … © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 25 25  Alternate payee
  • 26. A few more examples … © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 26 26  Regular review of vendor reports such as RFKABL00 (Changes to Vendors)
  • 27. What should be reviewed? 27 27  Configuration settings  Procedural controls  Exception reports © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 28. Clearing the confusion 28 28 © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 1. Business Process Review 2. Configuration Review 3. Blueprint Review 4. IT Automated Controls (ITAC) Review 5. IT Application Controls (ITAC) Review 1. BASIS Review 2. IT General Controls (ITGC) Review 3. Technical Review 1. Authorizations Review 2. Access Review 3. SoD review 4. Role Review 5. User Review 1. Authorizations Review 2. Access Review 3. SoD review 4. Role Review 5. User Review
  • 29. Security controls outside SAP 29 29  It is equally important to enforce security controls in the underlying infrastructure components  SAP interacts with its underlying infrastructure components in unique ways  Therefore, it is important to consider controls related to these interactions at the infrastructure level © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 30. Network controls are important 30 30  SAP network security  Can users directly connect to the database through backend?  Is the data transmission over the network secure?  What network communication is allowed between user machines and application server?  What network communication is allowed between application server and database server?  Apart from usual network security controls, consider SAP specific controls such as SAPRouter and SNC © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 31. SAP supports network security 31 31  SAPRouter  SAPRouter is an SAP program that serves as an intermediate station (proxy) in a network connection between SAP systems or programs  Controls access to your network (application level gateway)  Useful extension to an existing firewall  Secure Network Communications  SNC is used to secure SAP network connections  Provides reliable authentication as well as encryption of the data to be transferred  SAPRouter allows SNC connections to be set up © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 32. SAP server needs to be hardened 32 32  Both application and database servers need to be hardened  Consider SAP specific hardening requirements such as transport tools security, profile parameter file security and security audit logs security © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 33. SAP changes are controlled by OS 33 33  Operating system level transport tools in SAP servers  Change and Transport System (CTS) is a set of tools to organize development projects in the ABAP Workbench and in customizing, and then transport the changes between the SAP systems and clients  It broadly consists of Change and Transport Organizer (CTO), Transport Management System (TMS) and some operating system level transport tools © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 34. SAP Change and Transport System 34 34 Transport Tools (tp and R3trans) CTO Transport Organizer Workbench Organizer Customizing Organizer TMS Transport Management System RFC RFC RFC © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 35. CTS depends on OS files 35 35  There are two global configuration files – TP_DOMAIN_<SID>.PFL and TPPARAM that must include entries for each SAP systems taking part in transports  ‘tp’ uses these files for making transports.  Stored in /usr/sap/trans or <DRIVE>/usr/sap/trans  Access rights should be configured so that all SAP systems within the transport group can access these files © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 36. Transport tools reside at OS level 36 36  Imports can be performed using ‘tp’ program at the OS level by logging into the target system as user <SID>adm, going to /usr/sap/trans/bin directory and calling the program © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 37. SAP profiles are OS files 37 37  Profile parameter files stored in SAP server  A profile in SAP is an operating system file containing parameters and configuration information of SAP instance  The profile files are located under the directory /usr/sap/<SID>/SYS/profile  This directory is shared by all application servers belonging to the same SAP system (i.e., SID)  Access to modify the profile files should be restricted © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 38. Audit log is stored on server 38 38  Security audit logs stored in SAP server  Rsau/local/file – define names and locations of the security audit log files  Access to the security audit log files and directories should be restricted © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 39. And vice versa ….. © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 39 39 With appropriate access, OS level commands can be executed from within SAP!
  • 40. Indicative SAP security framework .. © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved.
  • 41. What does it mean for IT auditors? © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 41 41  SAP audit covers both technical and functional areas  Requires integration between IT and internal/ operational auditors  Within IT audit team, coordination between infrastructure and SAP auditors is important to ensure that important infrastructure controls are covered  Excellent opportunity to understand business and align IT audit with business risks!
  • 42. Integrated audit is not yet common © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 42 42 32% 14% 32% 22% IA Approach No - no integration with systemic controls in SAP Yes- to a very small extent Yes- to large extent Don't know/ Others Source: MANTRAN SAP Security Practices Survey 2010
  • 43. SAP review through its lifecycle 43 43  SAP review may be performed at various stages of SAP lifecycle  Accordingly, scope and coverage may vary © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. Pre-Implementation Review Post-Implementation Review
  • 44. Pre-implementation review © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 44 44  Conducted before SAP is implemented (i.e., before go-live) and may include  Blueprint/configuration/ business process controls review  Authorizations and SoD review  IT general controls/ BASIS review  Data migration / conversion/ cutover review  Project management review  Program development review
  • 45. Pre-implementation review © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 45 45  System may not exist or controls may not have been implemented  It is often a document review based on documents such as  Business blueprints  Authorization design documents  Project plan, strategy and other project documents  Data migration plan, strategy and cutover plan  SAP technical design documents  UAT documents
  • 46. Post-implementation review © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 46 46  Usually conducted after system stabilization  It usually includes the following areas  Configuration/ business process controls review  Authorizations and SoD review  IT general controls/ BASIS review  Usually conducted by reviewing the system settings
  • 47. Other areas © 2011 MANTRAN Consulting Pte. Ltd. All rights reserved. 47 47  There are new security concerns with use of various NetWeaver products  Other SAP products such as CRM, SRM, SCM and SLM have their own security issues
  • 48. Presented by Barun Kumar Director Mantran Consulting Pte Ltd +65 8118 9972 Email ID barunkumar@mantranconsulting.com LinkedIn profile http://www.linkedin.com/in/barunkumar My blogs http://www.mantranconsulting.blogspot.com/ Questions © Mantran Consulting Pte Ltd 2011 – All rights reserved. MANTRAN logo are registered or unregistered trademarks of Mantran Consulting Pte Ltd. All other names, brands, logo, etc are registered trade or service marks of their respective owners. SAP, SAP logo and all SAP screenshots are copyright of SAP AG. SAP is a registered trademark of SAP AG. All information provided in the training is true to best of our knowledge. The information provided is a summarization of various concepts for ease of understanding. Certain facts may have been ignored or simplified for easy understanding. The information provided may not be accurate or complete.