SlideShare a Scribd company logo
CONTROLPANELGRC
ALWAYS AUDIT READY™ SERIES:
SAP®
Security Vulnerability
Strategies to Prevent SAP Security Vulnerability and
Improve Audit Readiness
Recently, a company went live with SAP HCM (Human Capital Management). It was
discovered the morning of going live that all users had the ability to view confidential
employee salary data. The reports to display the data were not easily found and it
was not clear if anyone actually ran those reports, but management was appalled by
the risk.
The SAP world is littered with similar stories of security gaps and risks. How could
that risk have been prevented? What other risks haven’t been discovered? Why are
there so many vulnerabilities in SAP security? While being referenced in SAP folklore
as an example of an implementationgone-bad is unsettling, failing an audit due
to excessive IT security risks, is worse. SAP security risks have an impact on the
internal underpinnings of a company, but they also jeopardize compliance efforts.
Even if an enterprise is not subject to external compliance mandates, auditors and
executives want to know the state of their SAP security model. How exposed to the
potential of fraud or catastrophic error is the company?
This paper will cover 1) why SAP security issues are so prevalent; 2) the major areas
of risk to a company; and 3) how an annual “check up’”or vulnerability assessment
can help identify and correct issues.
1
ControlPanelGRC
Always Audit Ready™ Series:
SAP®
Security
Vulnerability
The objective for every company should be to go into an SAP audit confidently,
knowing that any security risks or vulnerabilities have been addressed.
Security gone bad
Setting up and testing a proper SAP security model is often looked over and “under
engineered” in the original SAP implementation. Why? Those who have lived through
SAP implementations know it can get ugly getting to go live. Too often, the focus is
on getting business processes to work and less on mapping access of the related
transactions to job roles. For example, in finance, consultants implementing the solution
are often consumed by making sure goods received flow through properly to accounts
payable. They are likely to overlook whether Gladys or John has a right to process a
particular payable.
Even in implementations where setting up a sound SAP security architecture is in
scope, too often the focus is on what’s known as “positive” security access - whether
a user can access the transactions they need to do their job. Less attention is typically
given to “negative” security testing, which tests whether a user is prevented from
accessing a transaction they have no business executing. For example, a wholesale
distributor our company works with discovered a parts picker in their warehouse had
been accessing several SAP financial transactions which he had no reason to view.
When questioned, he said he was “just curious,” but he could have successfully entered
fraudulent financial data.
Essentially, SAP implementations too often go live with end users having very broad
access to transactions far removed from their actual job functions. Because setting
up and testing SAP security was largely looked over in the implementation, the
traditional knowledge transfer between the System Integrator (SI) consultant and the
internal IT administrator doesn’t happen. When the SI consultant leaves, internal SAP
administrators are left with a poorly implemented security model and little training to
take it from there. Even more problems occur post-implementation, resulting in further
degradation of SAP security controls. The post-implementation problems are focused in
three areas:
–– Poorly trained SAP security administrators
–– Turnover
–– Lack of meaningful controls
Poorly trained SAP security administrators
In many companies, the IT helpdesk organization is responsible for day-today user
add/delete or changes. However, IT helpdesk teams are not usually trained in the
applications themselves. SAP support teams are organized by business areas and
do not necessarily know technical functions like SAP security authorizations. In many
2
ControlPanelGRC
Always Audit Ready™ Series:
SAP®
Security
Vulnerability
shops, the SAP Basis administrator is also asked to administer SAP security. Having the
Basis administrator responsible is also problematic as they don’t necessarily know the
business implications of giving access to particular transactions.
This constant stream of processing user change requests, often with too little rigor,
can create an ever increasingly complex matrix of SAP Roles that become harder and
harder to manage. Increasing the number of Roles greatly increases the risk that a
combination of Roles can enable one user to access a combination of transactions to
potentially commit fraud. Roles growing out of control also increases the chance that a
user might execute transactions outside of their job description or authority.
Turnover
Even in enterprises that did a good job of implementing and maintaining SAP security,
turnover in critical staff can create risk. One of the realities of the global recession
is that IT organizations have been paired to the minimum. Usually IT organizations
are only “one person deep” in many key roles. A void is left with the departure of
a key IT resource. The experience and knowledge learned during the original SAP
implementation and years of functioning in a role literally walks out the door. Too often,
a key resource is backfilled with someone who may be trying hard, but simply doesn’t
have the experience or training to perform his/her duties at the same level as their
predecessor. SAP security administration is a specialized expertise. Without training and
experience, it is very difficult for a new employee to properly maintain SAP security. As a
result, SAP security tends to degrade under the reigns of a junior resource.
Lack of Meaningful Controls
As mentioned above, SAP security is a specialized expertise. Enterprises rely on their
SAP Basis administrators to keep SAP security under control. In addition to all the day-
to-day changes and gaps in knowledge that develop over time, an added strain to SAP
security controls also arises – audit readiness and compliance.
Publicly traded enterprises have been required under Sarbanes Oxley (SOX) legislation
to implement demonstrable controls over access to finance data. This usually means
an annual, painful data gathering and reporting process that shows some controls were
in place at a given point in time, based on some sampling of data. The focus of these
audits in SAP usually center on segregation of duties (SoDs).
Privately held companies may be glad not to have been subjected to SOX mandates,
but many do not even have an annual audit to gain some confidence that bad things
aren’t happening in their SAP systems. A truism is “trust is not a control.” Many
executives simply don’t know the state of their SAP security.
Many enterprises face increasing audit scrutiny. Some are preparing for being acquired
or going public. Others start working with a new audit firm or their existing audit firm
3
ControlPanelGRC
Always Audit Ready™ Series:
SAP®
Security
Vulnerability
changes requirements. It can be a nervous time for executives who may have under
engineered controls in place in the days before an audit. They simply don’t know what is
going to be reported.
Major areas of SAP security risk
This paper has covered some major areas stating why there is SAP security risk – under
engineered security controls during implementation, poorly trained staff, turnover, and
lack of focus on critical compliance controls – and now will shift to understanding what
needs constant vigilance to help ensure SAP security issues don’t become a problem.
–– Major areas of risk to a company include:
–– Segregation of Duties (SoD)
–– Sensitive Authorizations
–– Excessive Access
–– Sensitive Role and Profiles
SoD risks
SoD risks represent instances where a User or Role has the ability to perform multiple
portions of the same business transaction. Companies should understand User/
Role risks by business process, Users/Roles with the highest number of risks and the
percentage of Users/Roles with risk in your organization.
Sensitive Authorizations
These risks occur when a User or Role has the ability to perform sensitive system
functions that should be restricted in production systems. Sensitive Authorization risks
represent instances where Transaction and/or Authorization access can impact data
confidentiality, integrity or availability. Although it is reasonable that some technical users
might require these authorizations in a production system, they should generally not be
available to end-users. Companies should understand User risks by User Group and
identify Users with the highest number of risks.
Excessive Access
Also known as Critical Transactions, these risks occur when a User or Role has the
ability to execute Transactions that are critical from a financial and / or audit perspective.
These critical Transactions are normal functions that are required to run your business.
However, because these Transactions have financial and/or audit implications, they
should be reviewed for reasonableness to ensure that they are assigned to appropriate
Users. Companies should have a good understanding of excessive access risks by
User, business process and Role.
4
ControlPanelGRC
Always Audit Ready™ Series:
SAP®
Security
Vulnerability
Sensitive Roles and Profiles
Sensitive Roles and Profiles represent instances where Users are assigned to Roles
or Profiles that are known to contain large numbers of Segregation of Duty, Sensitive
Authorization or Excessive Access risks. Assignments to these Roles or Profiles should
be monitored separately to ensure they are restricted to appropriate Users.
How to monitor and assess security risk areas
Enterprises who reach a tipping point and want to understand the current state of
their SAP security model and vulnerabilities may consider asking their existing staff
to conduct a point-in-time analysis. This approach is problematic as existing staff is
probably too busy to take on a burdensome, incremental task. In fact, existing staff may
be the source of the concerns. Third party vendors or consultants may offer services to
perform a pointin-time assessment. While helpful, these consulting based services can
be expensive and still demand an extensive time commitment from internal staff.
Other assessment services exist like ControlPanelGRC
’s Security Health Check. These
services provide a software based solution that can provide critical insights based on a
simple data export, run through a sophisticated software analysis engine and reviewed
by a senior SAP security consultants. This approach is cost-effective, minimally
disruptive and provides needed critical insights. This approach also provides a perhaps
needed layer of “insulation” from internal staff.
Longer term, companies should consider continuous control monitoring (CCM)
software. While health checks can detect issues, CCM software helps prevent and
detect security vulnerabilities. For instance, CCM would help you assess whether a
change was adding risk and let you make changes to prevent those issues.
Summing up SAP security issues
SAP, as the enterprise system of record for thousands of companies, is critical to a
company’s success yet many executives don’t know the state of their SAP security.
Furthermore, many SAP experts within a company – for a number of reasons – may
not know the state of the SAP security risks. However, security risks can result in an
incident of theft, fraud or a failed audit. Honing in on SoD, Sensitive Authorizations,
Excessive Access, and Sensitive Roles and Profiles risks, can help prevent most
common SAP security risks. Companies that perform regular checks, or SAP security
“physicals,” are the best equipped to manage and prevent risk. Additionally, compliance
automation functionality exists, particularly continuous controls monitoring (CCM) that
can provide in real-time risk analysis, ensuring a company is aware of risks at any time.
5
ControlPanelGRC
Always Audit Ready™ Series:
SAP®
Security
Vulnerability
6
Always
Audit Ready™
About ControlPanelGRC
ControlPanelGRC™ is a new
breed of Governance Risk
and Compliance (GRC)
automation solutions –
one that focuses on rapid
implementation, ease of
use and broad functionality
aimed at making SAP®
users Always Audit Ready™.
Part of Milwaukee-based
Symmetry Corporation,
ControlPanelGRC
’s integrated
GRC technology suite
addresses the major areas
of compliance concerns
for SAP users. With over
50 implementations in two
years, ControlPanelGRC
has given its clients the
ability to confidently satisfy
compliance requirements
while accelerating workflows
that enhance their team’s
productivity.
For more information
about ControlPanelGRC
,
visit Symmetrycorp.com
or call 1-888-SYM-CORP.
About ControlPanelGRC
’s Security Health Check
The ControlPanelGRC
Security Health Check is a risk assessment service that helps
identify potential audit risks in SAP. The assessment is for any organization that:
–– Uses SAP as the core system of record and is subjected to audits
–– Strives to have a customized review of their compliance risk areas
–– Wants to know SAP security risks before an auditor discovers them
–– Needs to convince senior management of the gaps in the company’s
compliance program
–– Strives to understand strategies and tools needed to overcome potential
security risk areas
The ControlPanelGRC
Risk Analysis Engine
We export a company’s security model and run it through the ControlPanelGRC
Risk Analysis
Engine. Within less than two weeks, a comprehensive report that contains over 40 charts and
graphs assesses potential and specific risk areas.
The ControlPanelGRC
Security Health Check report is divided into four sections of analysis –
Segregation of Duty risks, Sensitive Authorization risks, Excessive Access risks, and Sensitive
Roles and Profiles risks. Each section will indicate where there are low, medium, high and
critical risks. Moreover, the report, which is presented in a one to two hour working session,
provides strategies to overcome potential risk areas.

More Related Content

PPT
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
PPTX
Extreme risk - how bad tech mgmt destroys firms
PDF
Security & Segregation of Duties for PeopleSoft
PPTX
Government and SOX Compliance for ERP Systems
PDF
Reduce sod access violations with effective roles management techniques
PDF
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
PDF
200606_NWC_Strategic Security
PDF
Review the five signs that you need a new Segregation of Duties compliance st...
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Extreme risk - how bad tech mgmt destroys firms
Security & Segregation of Duties for PeopleSoft
Government and SOX Compliance for ERP Systems
Reduce sod access violations with effective roles management techniques
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
200606_NWC_Strategic Security
Review the five signs that you need a new Segregation of Duties compliance st...

What's hot (20)

PDF
Dynamics - Administre sus usuarios, roles y perfiles en SAP
PDF
What CISOs should know about SAP security
PPT
SAP grc
PDF
081712 isaca-atl-auditing sap-grc
PDF
Why your works council has nothing to fear from SAP security. [Webinar]
PDF
Connecting Access Governance and Privileged Access Management
 
PPT
Sap Security Assessment V3 English
PDF
Website Security Statistics Report 2013
PPTX
SAP Governance,Risk and Compliance
PDF
Iia los angeles sap security presentation
PDF
10 Observations on Using Technology for SMCR - Senior Managers and Certificat...
DOC
Sap Risk Advisory Service V1.0
PPTX
How can managed services improve your SAP security and compliance? [Webinar]
PDF
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
PDF
Pragmatic software governance
PDF
Webinar: Simplify, Gain Insight, Strengthen with SAP GRC 10.1
PPTX
SAP Risk Management
PDF
SAP Security – Dealing with the Internal Threat of Working from Home
PPTX
Security assessment isaca sv presentation jan 2016
PDF
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
Dynamics - Administre sus usuarios, roles y perfiles en SAP
What CISOs should know about SAP security
SAP grc
081712 isaca-atl-auditing sap-grc
Why your works council has nothing to fear from SAP security. [Webinar]
Connecting Access Governance and Privileged Access Management
 
Sap Security Assessment V3 English
Website Security Statistics Report 2013
SAP Governance,Risk and Compliance
Iia los angeles sap security presentation
10 Observations on Using Technology for SMCR - Senior Managers and Certificat...
Sap Risk Advisory Service V1.0
How can managed services improve your SAP security and compliance? [Webinar]
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Pragmatic software governance
Webinar: Simplify, Gain Insight, Strengthen with SAP GRC 10.1
SAP Risk Management
SAP Security – Dealing with the Internal Threat of Working from Home
Security assessment isaca sv presentation jan 2016
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
Ad

Similar to Prevent SAP Security Vulnerabilities | Symmetry (20)

PDF
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
PDF
How vulnerable are you to insider attacks?.pdf
PPT
Isms5
PDF
ControlPanelGRC® Security Risk Assessment | Symmetry
PDF
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
PDF
The Role of SAP in Strengthening Cybersecurity for Enterprises.pdf
PPT
Brochure Auditing Erp System V2
PDF
Sap GRC Basic Information | GRC 12 online training
PDF
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
PPTX
10 tips to safeguard your critical business data in SAP systems.pptx
PDF
SAP Compliance Management Demystified | Symmetry
PDF
Blinde la seguridad de su empresa
PDF
SAP security made easy
PDF
Sap basis and_security_administration
PPTX
GRC Essentials for Customers using SAP
PPT
SAP: How risk savvy are you? Presentation to SAP User Group in New South Wale...
PDF
Audit and Compliance BDR Knowledge Training
PPT
Sap Security Workshop
PPT
3c 2 Information Systems Audit
PPTX
SAP Role Desgin for Success Best Practices and Tips
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
How vulnerable are you to insider attacks?.pdf
Isms5
ControlPanelGRC® Security Risk Assessment | Symmetry
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
The Role of SAP in Strengthening Cybersecurity for Enterprises.pdf
Brochure Auditing Erp System V2
Sap GRC Basic Information | GRC 12 online training
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
10 tips to safeguard your critical business data in SAP systems.pptx
SAP Compliance Management Demystified | Symmetry
Blinde la seguridad de su empresa
SAP security made easy
Sap basis and_security_administration
GRC Essentials for Customers using SAP
SAP: How risk savvy are you? Presentation to SAP User Group in New South Wale...
Audit and Compliance BDR Knowledge Training
Sap Security Workshop
3c 2 Information Systems Audit
SAP Role Desgin for Success Best Practices and Tips
Ad

More from Symmetry™ (14)

PDF
Delivering Unparalleled System Uptime and Peace-of-Mind For Critical Systems ...
PDF
Carlisle Construction Materials: Value Achieved in Automated Controls in an S...
PDF
An SAP upgrade and HANA Cloud Case Study: Carlisle Construction Materials | S...
PDF
Managed Hosting Buyer’s Checklist | Symmetry
PDF
Roadmap to SAP® Security and Compliance | Symmetry
PDF
SAP HANA® Deployment Guide | Symmetry
PDF
3 Ways to Future-Proof Your SAP® on IBM i Implementation
PDF
Simplifying the path to SAP Solution Manager 7.2 | Symmetry™
PDF
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
PDF
Best Practices for SAP Access Controls | Symmetry™
PDF
Compliant Cloud Hosting: What You Need to Know | Symmetry™
PDF
Get Audit Ready | Enterprise Risk Management Implementation | Symmetry™
PDF
Compliance Automation: The Complete Journey | Symmetry™
PPTX
Symmetry and smartShift | Revolutionizing SAP® Technology Transformation
Delivering Unparalleled System Uptime and Peace-of-Mind For Critical Systems ...
Carlisle Construction Materials: Value Achieved in Automated Controls in an S...
An SAP upgrade and HANA Cloud Case Study: Carlisle Construction Materials | S...
Managed Hosting Buyer’s Checklist | Symmetry
Roadmap to SAP® Security and Compliance | Symmetry
SAP HANA® Deployment Guide | Symmetry
3 Ways to Future-Proof Your SAP® on IBM i Implementation
Simplifying the path to SAP Solution Manager 7.2 | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Best Practices for SAP Access Controls | Symmetry™
Compliant Cloud Hosting: What You Need to Know | Symmetry™
Get Audit Ready | Enterprise Risk Management Implementation | Symmetry™
Compliance Automation: The Complete Journey | Symmetry™
Symmetry and smartShift | Revolutionizing SAP® Technology Transformation

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Empathic Computing: Creating Shared Understanding
PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Encapsulation_ Review paper, used for researhc scholars
MIND Revenue Release Quarter 2 2025 Press Release
Empathic Computing: Creating Shared Understanding
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Understanding_Digital_Forensics_Presentation.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm

Prevent SAP Security Vulnerabilities | Symmetry

  • 1. CONTROLPANELGRC ALWAYS AUDIT READY™ SERIES: SAP® Security Vulnerability Strategies to Prevent SAP Security Vulnerability and Improve Audit Readiness Recently, a company went live with SAP HCM (Human Capital Management). It was discovered the morning of going live that all users had the ability to view confidential employee salary data. The reports to display the data were not easily found and it was not clear if anyone actually ran those reports, but management was appalled by the risk. The SAP world is littered with similar stories of security gaps and risks. How could that risk have been prevented? What other risks haven’t been discovered? Why are there so many vulnerabilities in SAP security? While being referenced in SAP folklore as an example of an implementationgone-bad is unsettling, failing an audit due to excessive IT security risks, is worse. SAP security risks have an impact on the internal underpinnings of a company, but they also jeopardize compliance efforts. Even if an enterprise is not subject to external compliance mandates, auditors and executives want to know the state of their SAP security model. How exposed to the potential of fraud or catastrophic error is the company? This paper will cover 1) why SAP security issues are so prevalent; 2) the major areas of risk to a company; and 3) how an annual “check up’”or vulnerability assessment can help identify and correct issues. 1 ControlPanelGRC Always Audit Ready™ Series: SAP® Security Vulnerability
  • 2. The objective for every company should be to go into an SAP audit confidently, knowing that any security risks or vulnerabilities have been addressed. Security gone bad Setting up and testing a proper SAP security model is often looked over and “under engineered” in the original SAP implementation. Why? Those who have lived through SAP implementations know it can get ugly getting to go live. Too often, the focus is on getting business processes to work and less on mapping access of the related transactions to job roles. For example, in finance, consultants implementing the solution are often consumed by making sure goods received flow through properly to accounts payable. They are likely to overlook whether Gladys or John has a right to process a particular payable. Even in implementations where setting up a sound SAP security architecture is in scope, too often the focus is on what’s known as “positive” security access - whether a user can access the transactions they need to do their job. Less attention is typically given to “negative” security testing, which tests whether a user is prevented from accessing a transaction they have no business executing. For example, a wholesale distributor our company works with discovered a parts picker in their warehouse had been accessing several SAP financial transactions which he had no reason to view. When questioned, he said he was “just curious,” but he could have successfully entered fraudulent financial data. Essentially, SAP implementations too often go live with end users having very broad access to transactions far removed from their actual job functions. Because setting up and testing SAP security was largely looked over in the implementation, the traditional knowledge transfer between the System Integrator (SI) consultant and the internal IT administrator doesn’t happen. When the SI consultant leaves, internal SAP administrators are left with a poorly implemented security model and little training to take it from there. Even more problems occur post-implementation, resulting in further degradation of SAP security controls. The post-implementation problems are focused in three areas: –– Poorly trained SAP security administrators –– Turnover –– Lack of meaningful controls Poorly trained SAP security administrators In many companies, the IT helpdesk organization is responsible for day-today user add/delete or changes. However, IT helpdesk teams are not usually trained in the applications themselves. SAP support teams are organized by business areas and do not necessarily know technical functions like SAP security authorizations. In many 2 ControlPanelGRC Always Audit Ready™ Series: SAP® Security Vulnerability
  • 3. shops, the SAP Basis administrator is also asked to administer SAP security. Having the Basis administrator responsible is also problematic as they don’t necessarily know the business implications of giving access to particular transactions. This constant stream of processing user change requests, often with too little rigor, can create an ever increasingly complex matrix of SAP Roles that become harder and harder to manage. Increasing the number of Roles greatly increases the risk that a combination of Roles can enable one user to access a combination of transactions to potentially commit fraud. Roles growing out of control also increases the chance that a user might execute transactions outside of their job description or authority. Turnover Even in enterprises that did a good job of implementing and maintaining SAP security, turnover in critical staff can create risk. One of the realities of the global recession is that IT organizations have been paired to the minimum. Usually IT organizations are only “one person deep” in many key roles. A void is left with the departure of a key IT resource. The experience and knowledge learned during the original SAP implementation and years of functioning in a role literally walks out the door. Too often, a key resource is backfilled with someone who may be trying hard, but simply doesn’t have the experience or training to perform his/her duties at the same level as their predecessor. SAP security administration is a specialized expertise. Without training and experience, it is very difficult for a new employee to properly maintain SAP security. As a result, SAP security tends to degrade under the reigns of a junior resource. Lack of Meaningful Controls As mentioned above, SAP security is a specialized expertise. Enterprises rely on their SAP Basis administrators to keep SAP security under control. In addition to all the day- to-day changes and gaps in knowledge that develop over time, an added strain to SAP security controls also arises – audit readiness and compliance. Publicly traded enterprises have been required under Sarbanes Oxley (SOX) legislation to implement demonstrable controls over access to finance data. This usually means an annual, painful data gathering and reporting process that shows some controls were in place at a given point in time, based on some sampling of data. The focus of these audits in SAP usually center on segregation of duties (SoDs). Privately held companies may be glad not to have been subjected to SOX mandates, but many do not even have an annual audit to gain some confidence that bad things aren’t happening in their SAP systems. A truism is “trust is not a control.” Many executives simply don’t know the state of their SAP security. Many enterprises face increasing audit scrutiny. Some are preparing for being acquired or going public. Others start working with a new audit firm or their existing audit firm 3 ControlPanelGRC Always Audit Ready™ Series: SAP® Security Vulnerability
  • 4. changes requirements. It can be a nervous time for executives who may have under engineered controls in place in the days before an audit. They simply don’t know what is going to be reported. Major areas of SAP security risk This paper has covered some major areas stating why there is SAP security risk – under engineered security controls during implementation, poorly trained staff, turnover, and lack of focus on critical compliance controls – and now will shift to understanding what needs constant vigilance to help ensure SAP security issues don’t become a problem. –– Major areas of risk to a company include: –– Segregation of Duties (SoD) –– Sensitive Authorizations –– Excessive Access –– Sensitive Role and Profiles SoD risks SoD risks represent instances where a User or Role has the ability to perform multiple portions of the same business transaction. Companies should understand User/ Role risks by business process, Users/Roles with the highest number of risks and the percentage of Users/Roles with risk in your organization. Sensitive Authorizations These risks occur when a User or Role has the ability to perform sensitive system functions that should be restricted in production systems. Sensitive Authorization risks represent instances where Transaction and/or Authorization access can impact data confidentiality, integrity or availability. Although it is reasonable that some technical users might require these authorizations in a production system, they should generally not be available to end-users. Companies should understand User risks by User Group and identify Users with the highest number of risks. Excessive Access Also known as Critical Transactions, these risks occur when a User or Role has the ability to execute Transactions that are critical from a financial and / or audit perspective. These critical Transactions are normal functions that are required to run your business. However, because these Transactions have financial and/or audit implications, they should be reviewed for reasonableness to ensure that they are assigned to appropriate Users. Companies should have a good understanding of excessive access risks by User, business process and Role. 4 ControlPanelGRC Always Audit Ready™ Series: SAP® Security Vulnerability
  • 5. Sensitive Roles and Profiles Sensitive Roles and Profiles represent instances where Users are assigned to Roles or Profiles that are known to contain large numbers of Segregation of Duty, Sensitive Authorization or Excessive Access risks. Assignments to these Roles or Profiles should be monitored separately to ensure they are restricted to appropriate Users. How to monitor and assess security risk areas Enterprises who reach a tipping point and want to understand the current state of their SAP security model and vulnerabilities may consider asking their existing staff to conduct a point-in-time analysis. This approach is problematic as existing staff is probably too busy to take on a burdensome, incremental task. In fact, existing staff may be the source of the concerns. Third party vendors or consultants may offer services to perform a pointin-time assessment. While helpful, these consulting based services can be expensive and still demand an extensive time commitment from internal staff. Other assessment services exist like ControlPanelGRC ’s Security Health Check. These services provide a software based solution that can provide critical insights based on a simple data export, run through a sophisticated software analysis engine and reviewed by a senior SAP security consultants. This approach is cost-effective, minimally disruptive and provides needed critical insights. This approach also provides a perhaps needed layer of “insulation” from internal staff. Longer term, companies should consider continuous control monitoring (CCM) software. While health checks can detect issues, CCM software helps prevent and detect security vulnerabilities. For instance, CCM would help you assess whether a change was adding risk and let you make changes to prevent those issues. Summing up SAP security issues SAP, as the enterprise system of record for thousands of companies, is critical to a company’s success yet many executives don’t know the state of their SAP security. Furthermore, many SAP experts within a company – for a number of reasons – may not know the state of the SAP security risks. However, security risks can result in an incident of theft, fraud or a failed audit. Honing in on SoD, Sensitive Authorizations, Excessive Access, and Sensitive Roles and Profiles risks, can help prevent most common SAP security risks. Companies that perform regular checks, or SAP security “physicals,” are the best equipped to manage and prevent risk. Additionally, compliance automation functionality exists, particularly continuous controls monitoring (CCM) that can provide in real-time risk analysis, ensuring a company is aware of risks at any time. 5 ControlPanelGRC Always Audit Ready™ Series: SAP® Security Vulnerability
  • 6. 6 Always Audit Ready™ About ControlPanelGRC ControlPanelGRC™ is a new breed of Governance Risk and Compliance (GRC) automation solutions – one that focuses on rapid implementation, ease of use and broad functionality aimed at making SAP® users Always Audit Ready™. Part of Milwaukee-based Symmetry Corporation, ControlPanelGRC ’s integrated GRC technology suite addresses the major areas of compliance concerns for SAP users. With over 50 implementations in two years, ControlPanelGRC has given its clients the ability to confidently satisfy compliance requirements while accelerating workflows that enhance their team’s productivity. For more information about ControlPanelGRC , visit Symmetrycorp.com or call 1-888-SYM-CORP. About ControlPanelGRC ’s Security Health Check The ControlPanelGRC Security Health Check is a risk assessment service that helps identify potential audit risks in SAP. The assessment is for any organization that: –– Uses SAP as the core system of record and is subjected to audits –– Strives to have a customized review of their compliance risk areas –– Wants to know SAP security risks before an auditor discovers them –– Needs to convince senior management of the gaps in the company’s compliance program –– Strives to understand strategies and tools needed to overcome potential security risk areas The ControlPanelGRC Risk Analysis Engine We export a company’s security model and run it through the ControlPanelGRC Risk Analysis Engine. Within less than two weeks, a comprehensive report that contains over 40 charts and graphs assesses potential and specific risk areas. The ControlPanelGRC Security Health Check report is divided into four sections of analysis – Segregation of Duty risks, Sensitive Authorization risks, Excessive Access risks, and Sensitive Roles and Profiles risks. Each section will indicate where there are low, medium, high and critical risks. Moreover, the report, which is presented in a one to two hour working session, provides strategies to overcome potential risk areas.