Sap Security Concept
Sap Security Concept
ECC System
Raymond Mastre, CISA, CRISC
Director SAP Security/GRC
PwC
Agenda
Introduction
Basic SAP ECC Security Concepts
Securing your SAP ECC System
Choosing Your Role Design Methodology
Audit Compliance Topics (SoD and SA) and
Security Design Monitoring
Case Study
Wrap-up
Introduction
Introduction
Basic SAP ECC Security Concepts
Securing your SAP ECC System
Choosing Your Role Design Methodology
Audit Compliance Topics (SoD and SA) and
Security Design Monitoring
Case Study
Wrap-up
Basics SAP ECC Security Concepts
T-code check
User requires an
authorization
2
for transactions
Authority check
User requires an 3
authorization for
business objects
Authorization Analogy
User
SAP Program
Profile
Authorization
Authorization
Object
Authorization Authorization
Field values Object Fields
SAP Security Key Components
Authorization Authorization
Field values Object Fields
Users
User
Profile
Authorization
Authorization Object
Authorization Authorization
Field values Object Fields
Profile Generator
Menu Authorization
USOBT_C Items Authorization Object
USOBX_C
(SU24)
Authorization
Data Authorization Authorization
Field values Object Fields
Relevant Security Tables
Introduction
Basic SAP ECC Security Concepts
Securing your SAP ECC System
Choosing Your Role Design Methodology
Audit Compliance Topics (SoD and SA) and
Security Design Monitoring
Case Study
Wrap-up
Leading Practice Security Designs
User General
FI Common
AP Clerk AP Display
Processor
Redundant
Access
FI
Document
AP Reversal FI
Manager Document
Processing
What is Job Based?
Security roles are built based on positions/jobs for a group of users (e.g.
Accounts Receivable Manager)
A single role contains all of the access to perform a job
Transaction codes and authorizations typically duplicated in many roles
AP AP
Supervisor Clerk
AP Manager
What is Task Based?
Security is built based on small, definable tasks executed by a user (e.g. Process
Cash Receipts)
Multiple roles are assigned to the user for them to perform their day to day tasks
Transaction codes exist in a single role, with minimal exceptions
FI Document
Reversing
F.80
F.81
SBWP
SU53
FI Document
Processing
FB03 FB01
FBV3
FB02
User General
FI Common
Display
Job vs. Task
T- code
Significant Minimal
Duplication
On-going change
Role Content Change Role Assignment Change
management
High number of roles with SODs and SOD Low or no roles with SODs and remediation is
SOD
remediation is difficult easy
Common Challenges with ECC Security
Introduction
Basic SAP ECC Security Concepts
Securing your SAP ECC System
Choosing Your Role Design Methodology
Audit Compliance Topics (SoD and SA) and
Security Design Monitoring
Case Study
Wrap-up
Key Areas to Review
Introduction
Basic SAP ECC Security Concepts
Securing your SAP ECC System
Choosing Your Role Design Methodology
Audit Compliance Topics (SoD and SA) and
Security Design Monitoring
Case Study
Wrap-up
Case Study Profile
Company Profile
Prior to Project
Prior to Project
Contact me:
raymond.p.mastre@us.pwc.com
This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors.
2014 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved. PwC refers to the US member firm, and may sometimes refer to the
PwC network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details.