SAP Security Tutorial
SAP Security Tutorial
SAP Security Tutorial
Whilst it is true that most organisations require some form of assistance from SAP experts to
implement the software, there are a number of ways that in-house security resources and
personnel can contribute to the implementation and maintenance of a secure SAP
environment.
This brief SAP security tutorial outlines ten key SAP security implementation steps every
SAP installation should cover, and considers how an IT security department can contribute to
ensuring the organisation has incorporated them.
Look for the following, which should all be set to follow the organisation’s predefined rules:
The passwords of these generic IDs should be reset, and the high-privileged profiles
(SAP_ALL and SAP_NEW) should be removed. It is important to note that the SAP*
account can recreate itself with a default and commonly known password when
deleted. Accordingly, it is important that the SAP* account is secured but not deleted and
system parameter login/no_automatic_user_sapstar is set to = 1.
The most important high-privileged access profile to be aware of in the SAP system is the
SAP_ALL profile. This gives access to all transactions and authorisation objects, and,
therefore, to any function or action in the SAP system. It is critical that this profile isn’t
allocated on a routine basis. Similarly, the SAP_NEW profile gives access to all transactions
and to all new authorisation objects.
Transaction SUIM allows detailed reporting on user access. Organisations can use the report
to review the allocation of wide-access profiles to users and, using the ‘Users to Profiles’
report, can display a list of user IDs allocated to the SAP_ALL or SAP_NEW profiles. With
this information, user access can be revised and restricted according to need.
To ensure support and project team users have been adequately restricted, look for role
specifications outlining the access requirements of these users and a set of roles defined for
each group. Broadly speaking, at a minimum, roles defined for the following groups should
be found:
Developers
BASIS Administrators
Security (Role) Administration
Security (User) Administration
Functional / Configuration
A process should also be in place that confirms the roles are correctly defined for the
organisation’s needs.
In order to ensure segregation of duties is incorporated into the organisation’s role design and
access administration processes, a tool such as SAP GRC Risk Analysis & Remediation
(RAR) should be installed to manage these risks. Manual processes can be employed as an
alternative in smaller organisations, but the limitations of these processes (e.g. monitoring at
role level as opposed to transaction level) should be recognised and managed.
Emergency access procedures and processes and the use of tools such as SAP GRC Super
User Privilege Management (SPM) can control and monitor the allocation and use of high-
privilege access.
7. User access and housekeeping reviews
Ongoing monitoring and review is critical in order to maintain compliance with the
organisation’s security policies and to meet the rigorous expectations that internal and
external audits have of the SAP systems. SAP system administration processes must include
regular reviews of duplicate user IDs, generic accounts, password parameters, etc., as well as
the periodic review to check that the access currently allocated is appropriate.
Whilst some of the review procedures required in an SAP environment will have activities
specific to the SAP system, the majority of such procedures should be present in any well-
controlled application environment.
In addition to managing access to the relevant CTS functions, effective change management
in the SAP environment will also involve the operation of more generic change management
practices. These include documentation and testing of all modifications and the maintenance
of an audit trail of business approvals for all changes.
The auditor may be able to provide a list of those functions that should be more carefully
restricted, such as the following:
Without adequate understanding and design of the permissions structures, business approvers
are not able to make informed approval decisions. It is therefore important that the SAP role
design utilised in the environment be simple enough for approvers to understand and the
project include an element of training or education for approvers, both in the initial
implementation and on an ongoing basis.
Conclusion
The advice above covers only the rudiments of security in an SAP deployment. However,
exploring these elements is intended to demonstrate that these SAP security basics are similar
to those that should be found in any well-controlled application security environment.
Ultimately, SAP is just another business application and, whilst the use of specialist SAP
skills is essential to getting things right the first time, it is also important that an
organization’s IT security department embrace its responsibilities in the SAP deployment and
not defer all responsibility to SAP specialists.
The key is to remember that the CIO is accountable for the overall security and compliance of
the enterprise. At this level, there is little room for distinction between general IT security,
such as email, firewalls and Web servers, and SAP security, which includes the control of
how people access the system, the data they process, and the functionality they
execute. Effective IT departments adopt a similar philosophy by viewing the IT security
picture in its entirety across the whole organisation, thereby reducing the risk of breaches of
any kind.
March 2, 2016 / Blog