profiling for sap compliance management access control and segregation of duties l.
Skip this Video
Loading SlideShow in 5 Seconds..
Profiling for SAP - Compliance Management, Access Control an PowerPoint Presentation
Download Presentation
Profiling for SAP - Compliance Management, Access Control an

Loading in 2 Seconds...

play fullscreen
1 / 32

Profiling for SAP - Compliance Management, Access Control an - PowerPoint PPT Presentation

  • Uploaded on

Complex ERP systems are potentially susceptible to segregation of duties (SoD) issues. By means of Profiling for SAP

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

Profiling for SAP - Compliance Management, Access Control an

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
profiling for sap compliance management access control and segregation of duties




Profiling for SAP® Compliance Management Access Control and Segregation of Duties

Understand, Optimize and Control your Business and IT


Profiling for SAP supporting Security Compliance for SAP®


Access Management and Segregation of Duties


Optimization of Authorizations


Project Support for SAP Blueprints


Profiling for SAP® Application

Page 2

profiling for sap for compliance and access control
Profiling for SAP for Compliance and Access Control

“Profiling your SAP® Solution delivers our Clients all needed insights to understand, optimize and control their Business and complex SAP® Landscapes.”

Heinz-Jürgen Scherer, CEO TransWare AG




Page 3

profiling for sap featuring sap compliance management
TransWare’s reengineering and optimization solution for SAP®, compliance and performance assessment and process analysis on any SAP® system or SAP® Industry Solution highlights process risks in a system review and will lead to minimized project times with corresponding cost reduction.

The solution reveals the quality of the implementation by analyzing transaction logs, document types, user authorizations with roles and profiles, SAP® HR info types, SAP® customizing and object modifications and other configuration items.

It shows the overall picture of customizing and utilization of the current SAP® system with business related KPIs.

Complex ERP systems are potentially susceptible to segregation of duties (SoD) issues. By means of Profiling for SAP®, the desired responsibilities of SAP® users can be counterchecked against the real usage of SAP®. Reporting of the results can be done per job role, so you know what each role entails in terms of process activities, SAP® business blueprint process steps, SAP® roles and transactions.

Profiling for SAP® featuring SAP Compliance Management

Technical, Functional and Processual Analysis and Optimization of SAP

Page 4

profiling for sap smartly supports the transition phase from as is into an optimized sap landscape
Profiling for SAP® smartly supports the Transition Phase from As-Is into an optimized SAP® Landscape

As-Is Landscape

To-Be Transition

Optimize Landscape


Process IT Support

ASAPProject Methodology


Process IT Support


 Understand



 Optimize


 Control

Access Control and Segregation of Duty





Profiling for SAP® Compliance Management

Profiling for SAP® Compliance Management is based on the technical, functional and processual analysis tool components.

Page 5

increased focus on security and control
Increased Focus on Security and Control
  • Corporate scandals and fraud (Enron, Barings Bank, WorldCom, ...)
  • Security breaches (UCs, BC, Stanford, ...)
  • Regulatory Compliance
    • Sarbanes-Oxley (SOX, EuroSOX)
    • Family Educational Rights and Privacy Act (FERPA)
    • Federal Information Security Management Act of 2002 (FISMA)
    • Gramm-Leach-Bliley Act (GLBA)
    • Health Insurance Portability and Accountability Act (HIPAA)
    • Joint Commission (TJC)

Page 7

security risks security compliance and internal controls
Security Risks, Security Compliance and Internal Controls
  • Access Control
    • Do some users have too much access?
    • Sufficient access restrictions to private information?
  • Control for Segregation of Duties (SoD)
    • Every time a user is added ensure his rights are not in conflict with SoD risk rules
    • A user's profile is amended and the change must not cause any SoD conflict
    • Review of the company SoD requirements on a periodic base

Are there any SoD violations?

Who has access to sensitive transactions?

“Internal Controls are processes designed by management to provide reasonable assurance that the Institute will achieve its objectives.” (From MIT’s Guidelines For Financial Review and Control)

Page 8

profiling for sap compliance management
Profiling for SAP® Compliance Management

A Software Solution for SAP Project and Compliance Process Support

  • Reduce time and efforts when providing ongoing information to internal and external auditors
  • Remove access or assign mitigating controls
  • Used during implementation of new SAP modules and processes or optimizing SAP systems
  • Monitoring transaction and data access based on SAP background job for 24/7 security and compliance control
  • Optionally runs on central SAP Solution Manager to manage complex SAP landscapes as a non-invasive solution
  • Web based BI solution based on a Business Warehouse for Compliance Management

Page 9

profiling for sap compliance application
Profiling for SAP® Compliance Application

A solution for compliance management based on standard software

Profiling is a configurable custom application with integration into SAP that ensures all user’s authorizations are compliant with the company’s compliance rules

  • Useful during all phases of the deployment lifecycle
    • Design – Identify roles, build composite roles based upon team requirements
    • Implementation – Test and verify SoD compliance of roles
    • Production – Ensure compliance of existing users and roles
  • Tight integration within SAP to manage complex SAP Landscapes and to leverage SAP standards
  • Applicable to SAP’s ERP, CRM, SCM and other ECC-based products
  • Web based product, non-invasive, non-deployment solution regarding SAP production systems

Page 10

set of risk rules based on sod conflicts and critical actions
Set of Risk Rules based on SoD conflicts and critical actions

Risk RulesSet

  • Set of Risk Rules for different business domains like FI-GL, MM, SAP Basis, CRM or etc.
  • Define SoD rules and critical actions and add standard or custom transactions to the rule set
  • Define rules on Functional, Transactional or the most detailed Authorization-Object level
  • Define critical rules with high financial risks or potential security risks
  • Modify predefined configuration with a set of rules for SoD best practice


















Page 11

procedure for the definition of sod risk rules on a functional level
Procedure for the Definition of SoD Risk Rules on a Functional Level
  • Define SoD Functions (logical group of tasks)
    • Example:
      • Function A: – Process Sales Order
      • Function B: – Maintain credits master data
  • Assign Transactions to SoD Function
    • Example:
      • Function A – V-01, VA01, VA02, …
      • Function B – FD24, FD32, FD37, …
    • 3. Define and Characterize the SoD Functions with Risk Rules
    • Define a conflict: Function A & Group B
    • Characterize the conflict with financial risk indicators:
      • High, Medium, Low
    • Exclude Rules from predefined configuration as N/A for your organization with a description


Assign Transactions

Define Conflicts and Risks

Page 12

generated excel report of sod conflict matrix
Generated Excel-Report of SoD Conflict Matrix

X=Financial Risk Exists, M = Medium Risk, H = High Risk

Page 16

  • Using the same kind of tools used by chartered accountants reduces service costs for external audit and advisory
  • Reduction of project efforts and establishment of SoD compliant authorizations from the start
  • Fully automated SoD analysis reduces TCO for the ongoing security control process
  • Auditors and IT security staff work on functional level even for complex authorization scenarios
  • Avoidance of manual analysis and false positive assessments
  • Flexible configuration includes custom “Z” transactions or external applications like Portals using BAPI or direct RFC calls
  • Easy identification of users with access to sensitive data by internal security teams lowers costs of the compliance process

Page 18

profiling for sap and sap authorizations
Profiling for SAP® and SAP® Authorizations
  • Profiling for SAP combines information from different data sources like SAP usage, user authorization and SoD configuration with BI based reporting for a comprehensive security analysis.
  • Actions are subject to authorization checks that are performed before the start of a program or table maintenance and mandatory for the SAP applications :
  • · Starting SAP transactions (authorization object S_TCODE)
  • · Starting reports (authorization object S_PROGRAM)
  • · Calling RFC function modules (authorization object S_RFC)
  • · Table maintenance with generic tools (authorization object S_TABU_DIS)

Page 20

slimline your sap authorization management
Slimline your SAP® Authorization Management
  • Identify needless access rights by SAP Modules, Accounts, Transactions, …
  • Optimize your custom roles by identifying critical roles and access overlap
  • Setup segregation of duties by best practice and company compliance

Assigned Role not relevant for execution

of the custom “Y” YXPROC transaction

Example Report:

Page 21

  • Efficient establishment of a tradeoff between Business Requirements and Company Compliance
  • Substantial reduction of project efforts in company compliance initiatives
  • Simplification of information access to complex SAP data for company auditors reduces costs for the compliance process
  • Uniformed use of tools by chartered accountants reduces external audit and advisory services costs
  • Allows the handling of complex SAP landscapes with automatic data retrieval and cross-SAP system analytics
  • Automatic monitoring of changes of user authorizations given by organizational requirements lowers costs for audits and security control

Page 22

blueprinting with asap and sap solution manager
Blueprinting with ASAP and SAP Solution Manager

SAP® Solution Manager (SSM) is the SAP® tool that supports the plan, build and run aspects of ERP solutions based on SAP® NetWeaver and covers all needs for ITIL-compliant application lifecycle management (ALM).

SAP® describes ALM by the Run SAP® operational support methodology and the Accelerate SAP® (ASAP) project methodology. SSM serves as an interface between technology and business processes.

For SAP solution development like upgrades or implementations, the SAP solution is consistently documented in SSM by the Blueprint that describes the business processes and the resulting system configuration.

An important part of the SAP solution development is the configuration of organizational structures and optimized business and security compliance requirements.

Profiling for SAP® supports this aspect of SAP ALM to lower development and maintenance costs and improve process and compliance quality

Page 24

sap blueprint procedure for compliant authorizations
SAP Blueprint Procedure for Compliant Authorizations

Support ASAP methodology and SAP Solution Manager Projects

  • Define your functional Task Groups in SAP Solution Manger as Jobs or Org.-Units as End-User-Roles
  • Setup the Blueprint Process Structure by Business Process Management Methodology including organizational assignments to End-User-Roles
  • Assign Transactions manually or use predefined Reference Models with T-Codes assigned like the SAP Business Process Repository (BPR )
  • Run Reports to analyze organizational Access Requirements
  • Automatically identify standard SAP right roles or profiles supported
  • Customize Roles (PCFG) and assign users
  • Run analytic reports for SoD compliance and risk control

Define Blueprint

Analyze AccessRequirements

Define Roles and User Access

Page 25

sap solution manager for sap blueprints
SAP Solution Manager for SAP Blueprints

Optimized user authorizations from project start-up

SAP Blueprint with Masterdata, Org.-Unit Data, Scenarios, Processes, Process-Steps, Transactions and Documentation

Assign End-User-Roles to Process-Steps, Master-Data or Organizational-Unit Data

Process-Steps with Assigned Transactions

Page 26

sap solution manager for sap blueprints27
SAP Solution Manager for SAP Blueprints

Export the Blueprint structure for analytic reporting

Cross-Reference between Objects

(T-Code, Forms, Reports etc) and End-User-Roles

SAP Blueprint Structure (SAP Project)

Assigned User, Jobs, Org.-Units

Page 27

  • Support of SAP Solution Manager improves the SAP Blueprint business process definition in terms of Compliance and Risk Management
  • Synchronize organizational structures, functional access requirements, business processes and access control for slimline, fine tuned and fully SoD compliant SAP authorizations
  • Leverage SAP tools, methodologies and best practice by a tight SAP integration with a BI based solution that reduces SAP® project planning and implementation efforts
  • Reduce SAP maintenance efforts by a consistent business process and security control documentation
  • Ensure compliance through SAP improvements like ERP Enhancement Packages and organizational changes
  • Define authorizations on functional level and support setup of technical roles and profiles.

Page 28

sod analysis and the process for compliance
SoD Analysis and the Process for Compliance

1. Extract

2. Define

3. Analyze






Predefined set of Risk Rules

  • Auditors, IT Security
  • Analytic reports and dashboards
  • Conflicts and potential conflicts of Accounts and/or Roles, Profiles
  • Authorizations
  • Usage (Transactions, Reports, RFC Calls)
  • Define Risk Rules
  • Critical activity groups
  • Activities conflict matrix

Page 30

profiling for sap product components
Profiling for SAP Product Components
  • Profiling for SAP application customizing for SoD (configuration)
  • Definition of Task groups, specifies a set of tasks with identifiers
  • Assignments of critical transactions to task groups
  • Risk rules combining Task Groups with Financial Risk Values
  • Includes best practice for configuration settings
  • Analytic Reports (examples)
  • Charts plotting risks and SoD issues per e.g. SAP module
  • Role Compliance Check: Identifies roles that have SoD conflicts based upon the underlying transactions
  • User Compliance Check: Identifies SoD conflicts in user’s profile
  • SAP Solution Manager integration (optional)

Page 31

solutions by transware
Solutions by TransWare

TransWare Software Solutions AG

Fritz-Wunderlich-Str. 49

66869 Kusel


Phone: +49-(0)6381-916-0



All product, service and company names mentioned herein are for identification purposes only and may be trademarks or registered trademarks of their respective owners

Page 32