+ All Categories
Home > Documents > Untangling SAP Security - pwc.com · PDF fileMany medium to large organizations today use SAP...

Untangling SAP Security - pwc.com · PDF fileMany medium to large organizations today use SAP...

Date post: 16-Mar-2018
Category:
Upload: vuhuong
View: 217 times
Download: 2 times
Share this document with a friend
2
Many medium to large organizations today use SAP to help operate their complex business environment. SAP is the largest enterprise resource planning (ERP) system in the world. It is a total business solution which supports several financial and non- financial processes such as sales, distribution, production, financial and management accounting, human resources, inventory and logistics management. SAP‘s unique authorization concept, as well as its extensive configuration and security settings offer many control options. SAP security configuration however, may not always be applied consistently due to its highly complex nature and the amount of flexibility the application provides. How can PwC help? PwC has developed an industry leading tool called Automated Controls Evaluator (ACE*) . The purpose of this tool is to analyze SAP security settings and identify privileged access and potential segregation of duties issues accurately and efciently. Our tool comes with a set of pre-dened segregation of duty (SoD) conict cases. These cases include the required transaction codes, authorization objects and eld values necessary to enable meaningful results which are representative of the levels of access any particular user has been granted. False positives are therefore minimized and this greatly reduces the level of effort required to analyze the results. What does ACE* do? The tool extracts relevant security and conguration data from the SAP system, analyzes it and generates exception reports by role or by user for management review and follow-up. As the security data interrogation and analysis is performed on an independent computer, there is no impact on the organization’s system performance. The tool requires two ACE* ABAPs (Advanced Business Application Programming) les to be run on the production system. The extracted data appears in a format that can only be read by ACE*. The ABAP les introduce no changes to the production systems and settings. Prole or role designs and user allocations are interrogated against SAP administrative objects, critical module transactions and other transaction combinations. SoD conict test cases can be selected from a set of pre-dened tests inside the global test library or can be custom designed as per client requirements. Untangling SAP Security
Transcript
Page 1: Untangling SAP Security - pwc.com · PDF fileMany medium to large organizations today use SAP to help operate their complex business environment. SAP is the largest enterprise resource

Many medium to large organizations today use SAP to help operate their complex business environment. SAP is the largest enterprise resource planning (ERP) system in the

world. It is a total business solution which supports

several financial and non-financial processes such as

sales, distribution, production, financial and management

accounting, human resources, inventory and logistics

management. SAP‘s unique authorization concept, as well as its extensive configuration

and security settings offer many control options. SAP

security configuration however, may not always be

applied consistently due to its highly complex nature and

the amount of flexibility the application provides.

How can PwC help?

PwC has developed an industry leading tool called Automated Controls Evaluator (ACE*).

The purpose of this tool is to analyze SAP security settings and identify privileged access and potential segregation of duties issues accurately and effi ciently. Our tool comes with a set of pre-defi ned segregation of duty (SoD) confl ict cases. These cases include the required transaction codes, authorization objects and fi eld values necessary to enable meaningful results which are representative of the levels of access any particular user has been granted. False positives are therefore minimized and this greatly reduces the level of effort required to analyze the results.

What does ACE* do?

The tool extracts relevant security and confi guration data from the SAP system, analyzes it and generates exception reports by role or by user for management review and follow-up. As the security data interrogation and analysis is performed on an independent computer, there is no impact on the organization’s system performance. The tool requires two ACE* ABAPs (Advanced Business Application Programming) fi les to be run on the production system. The extracted data appears in a format that can only be read by ACE*. The ABAP fi les introduce no changes to the production systems and settings. Profi le or role designs and user allocations are interrogated against SAP administrative objects, critical module transactions and other transaction combinations. SoD confl ict test cases can be selected from a set of pre-defi ned tests inside the global test library or can be custom designed as per client requirements.

Untangling SAP Security

Page 2: Untangling SAP Security - pwc.com · PDF fileMany medium to large organizations today use SAP to help operate their complex business environment. SAP is the largest enterprise resource

Andrea Major Partner+36 1 461 9364 [email protected]

Angelika Jonás Manager+36 1 461 [email protected]

Gábor TömöriAssistant Manager+36 1 461 [email protected]

© 2012 PricewaterhouseCoopers Auditing Ltd. All rights reserved. PwC refers to PricewaterhouseCoopers Auditing Ltd. and may sometimes refer to the PwC network. Each member fi rm is a separate legal entity. Please see http://www.pwc.com/structure for further details.

Privileged Access Review

ACE* identifi es security risks within SAP by analyzing access to the following high risk areas:

• Critical basis transactions;• User provisioning process;• Program changes and development;• Computer operations; and• SAP tables and programs.

Segregation of Duties Review

ACE* analyzes the potential segregation of duties issues within and across business processes by reviewing the confl icting access at:• Role and profi le level;• Ability level (group of SAP transactions allowing

a user to perform the same business functionality);• Transaction level; and• Object and fi eld levels.

In case of an GRC implementation, it supports the evaluation of the ruleset.

Confi guration Review

ACE* analyzes key SAP confi guration settings which act as automated application controls such as “three-way match” and “release strategy.”

ACE* can be used to assess security and confi guration within all business cycles.

Standard SoD confl ict cases have been set-up for business cycles in the global test library.

The ACE* tool facilitates the following types of analysis in SAP:

Cont

act


Recommended