How can you monitor critical authorization assignments in SAP Systems?
Sükrü Ilker BIRAKO?LU
Managing Partner - CTO @ SAGESSE TECH / Securing SAP and other ERP Systems with state-of-the art products and solutions
Controls for preventing, detecting and mitigating misconduct are a requirement to comply with legislation such as Sarbanes-Oxley (SOX). Organizations are largely free to implement these controls as they see fit, but they are audited for compliance and can incur significant penalties if found inadequate.
In the last decade, organizations have come to pay more attention to internal control and risk management in ERP systems such as SAP. This increased attention is partly but not solely the result of stricter legislation. Actual daily practice has shown that authorization related controls –?as a part of internal control?– are still not functionally sound. Users have been assigned undesirable combinations of authorizations, and a relatively high number of users are authorized to access critical functional transactions or system functionality. In the past, management frequently initiated efforts to reconfigure their authorization processes and procedures. Unfortunately, it often turned out that problems with the assigned authorizations resurfaced after some years, which allows for undesirable segregation of duty conflicts to show up again, while the costs of control remain high.
The authorization management process in SAP Systems can subsequently be divided into the following sub-processes:?
?
?
Authorizing access to a person or object in any SAP system is usually based on arrangements made beforehand: a policy is established for granting access, for example. These arrangements are made by the management, as a rule, and in virtually all cases they aim to ensure that risks or threats to an organization remain on an acceptable level.?
?
Authorizations are an integral part of the internal control system of an organization. “Segregation of duties” is based on the principle of avoiding conflicting interests within an organization. The aim is to ensure that, within a business process, a person cannot carry out several successive (critical) tasks that may result in irregularities –?accidentally or on purpose?– that are not discovered in time or during the normal course of the process
?
The assignment of right roles to right people in organizations is one part of the problem. The second part is, monitoring in real time if users in system are using their assigned roles accordingly. At LogPoint, we have created a solution which monitors access in SAP Systems and reports problems.
领英推荐
?
You can see users with critical authorizations like:
?
·??????Users authorized to lock or delete users
·??????Users authorized to change super user accounts
·??????Users authorized to change user groups
·??????Roles for changing super user groups
·??????Role for changing super user accounts
·??????…
?SAGESSE TECH, global SAP Security / Oracle Security / ERP Security Tech Company, is providing SAP Threat Detection Products integrated with SIEM, SAP PenTest Framework ,an SAP Audit Service and SAP Threat Detection Products integrated with SIEM Solutions which control these kinds of configurations, vulnerabilities and much more in your SAP Systems. You can contact SAGESSE TECH(E-mail : [email protected] or [email protected] ), if you would like to have a Vulnerability Scanning, SAP Audit or SAP PenTest on your SAP Systems.
?