SAP Authorizations Audit Information System Cockpit - SAP Stuff

Direkt zum Seiteninhalt
Audit Information System Cockpit
Ensuring secure administration
Like all other security issues, SAP authorizations must be integrated into the framework used. The risks associated with incorrectly assigned authorizations must be classified as very high. The definition of a holistic governance, risk and compliance management system is required. This ensures that risks are recorded, analyzed, evaluated, coordinated and forwarded within the company at an early stage. Accordingly, the risks arising from incorrectly assigned SAP authorizations or from a lack of a process for monitoring authorizations are also included here.

Protect your system from unauthorised calls to RFC function blocks from the S_RFC authorization object by obtaining the necessary permissions using the statistical usage data. In many organisations, the primary focus in the permission environment is on protecting dialogue access. For each required transaction, you decide in detail which groups of people are allowed access. It is often overlooked that the critical S_RFC privilege object requires an analogue permission assignment. If the RFC (Remote Function Call) external access permissions are unneatly defined and assigned to the users, the S_TCODE authorization object quickly bypasses the primary protection for bootable applications.
Maintain permission values using trace evaluations
The security audit log is evaluated via the SM20 or SM20N transaction or the RSAU_SELECT_EVENTS report. We recommend using the report as you have more options to personalise the evaluation and to include archived logs of different application servers in the evaluation.

With "Shortcut for SAP systems" you can automate the assignment of roles after a go-live.

At "www.sap-corner.de" you will also find a lot of useful information on the subject of SAP authorizations.

Here we show you a section of the table with our example role Z_SE63.

SAP Stuff
Zurück zum Seiteninhalt