You are on page 1of 36

SAP Security Concepts,

Segregation of Duties,
Sensitive Access &
Mitigating Controls

Jonathan Levitt
March 2015
Agenda

1. Introduction
2. SAP Security Design Overview
3. The SAP Authorization Concept
4. Approaches to SAP Security
5. Segregation of Duties & Sensitive Access
6. Mitigating Controls
7. Questions

March 2015
PwC 2
Objectives

At the end of the session, the participant will:


Gain an understanding of the SAP security environment and why security is important
to the audit;
Define and understand what a segregation of duties conflict in SAP is, and how to
monitor/address it; and
Define and understand mitigating controls.

March 2015
PwC 3
SAP Security Design Overview

March 2015
PwC 4
SAP Security Design Overview
Introduction

What is SAP Security Design?


At its most fundamental level, SAP Security Design refers to the architectural structure of
SAP security roles. However, effective security design is achieved via the convergence of
role architecture:
1. SAP Security Organizational Structure & Governance
- Ownership, Policies, and Accountability
2. SAP Security Processes
- User Provisioning, Role Change Management, Emergency Access
3. Ongoing Management & Monitoring of the Security Environment
- KPIs, Recertification, Get Clean & Stay Clean

March 2015
PwC 5
SAP Security Design Overview
Introduction

Org
Structure &
Security & Governance
Provisioning
Processes

SAP Security
Architecture

Monitoring

Effective SAP
M Security Design

Management

March 2015
PwC 6
SAP Security Design Overview
SAP Security Design Challenges
Misalignment of IT vs Business
Objectives
User provisioning process with Lack of Strategic Security Design
insufficient automation & Org Decisions
information Structure & No Role or Security Design
Security & Governance Ownership
Role Change Mgmt lacks risk and
quality controls Provisioning
Processes
Inefficient emergency support process
Overly Complex Security Design
SAP Security Lacks flexibility to respond to
Architecture ongoing changes
Management KPIs for Security Design Lacks scalability to grow with
are not established organization
Lack of automation for ongoing Inefficient Role Build Approach
monitoring & recertification No Documentation of Security
Monitoring
procedures Control Points
Insufficient SoD and/or Mitigating Inherent Segregation of Duties
control frameworks Risk
Effective SAP
M Security Design

Management

March 2015
PwC 7
SAP Security Design Overview
Audit Issues & Complexity
Poor security can lead to audit issues
When access controls are not in place, it impact the amount of reliance audit can
place on reports coming from SAP
Segregation of Duties is a key underlying principle of internal controls, and is the
concept of having more than one person required to complete a task. Security can
have a detrimental impact on this control (to be discussed in greater detail later in
presentation).
It is sometimes difficult for auditors to dig deep into SAP because security is complex:
In SAP ERP 6.0
o 108,000 transaction codes
o 2,600 authorization objects
Several transaction codes can perform similar tasks

March 2015
PwC 8
The SAP Authorization Concept

March 2015
PwC 9
The SAP Authorization Concept
Introduction

Org
Structure &
Security & Governance
Provisioning
Processes

SAP Security
Architecture

Monitoring

Effective SAP
M Security Design

Management

March 2015
PwC 10
The SAP Authorization Concept
Introduction (continued)

SAP Security Security within the SAP application is achieved through the
Architecture authorization concept.

The authorization concept is to help establish maximum security, sufficient privileges for
end users to fulfil their job duties, and easy user maintenance.

March 2015
PwC 11
The SAP Authorization Concept
Three levels of security in SAP

User master
record
User requires valid
user-ID and password 1

T-code check

User requires an
authorization for 2
transactions

Authority check
User requires an
authorization for
underlying 3
authorization objects
and field values

March 2015
PwC 12
The SAP Authorization Concept
The Components
Roles
SAP User Master Record Contains transaction codes, authorizations
Master data for SAP users
(mapped to one profile) and user assignments

Authority Check
Profiles Performed by SAP to help establish that a user
Container of authorizations has the correct authorization to execute a
particular task.

Authorization Object:
Template for security that contains fields with
blank values

Authorization (Field Values):


Authorization object with completed fields

March 2015
PwC 13
The SAP Authorization Concept
Bringing it together

Lets make an analogy the Lock and the Key

To open the lock, the proper key must be cut specifically for
a certain lock

March 2015
PwC 14
The SAP Authorization Concept
User Types
SAP Authorization
Structure

User Type
User
Dialog A
System B
Communication C
Service S Role
Reference L

Profile

Authorization

March 2015
PwC 15
The SAP Authorization Concept
Authorization Structure
SAP Authorization
Structure

User

Role

Authorization is not the same as Profile


transaction. Why?

Authorization

In SAP, you can perform the same


function with different transactions.

March 2015
PwC 16
The SAP Authorization Concept
Authorization Structure (continued)
SAP Authorization SAP Program Access
Structure Elements

User SAP is delivered with


about 1500 authorization
objects
An object is a structure
provided by SAP to grant
Role access to a data element
or a task in a
specific content.

Profile

Authorization
Authorization
Object

Authorization Authorization
Field Values Object Fields

March 2015
PwC 17
The SAP Authorization Concept
Authorization Structure (continued)
SAP Authorization SAP Authorization SAP Program Access
Structure Structure Elements

User

Role

Menu Items Profile

USOBT_C
Authorization
USOBX_C Authorization
Object
(SU24)

Authorization Authorization Authorization


Data Field Values Object Fields

March 2015
PwC 18
The SAP Authorization Concept
Why are authorization objects required?

In SAP, you can perform the same function with different transactions:
Transaction Code
MK01 FK01 XK01
Conventional approach
protection via menu/function

SAP approach protection


Create Vendor once via authorization

March 2015
PwC 19
The SAP Authorization Concept
The Authority Check
Transaction Code check:
Object S_TCODE Start T Code
Field 1 TCD Start T Code FB03

Authorization check:
Object F_BKPF_BUK Display posting
Field 1 ACTVT Display 03
Field 2 BUKRS Company Code 1000

March 2015
PwC 20
Approaches to SAP Security

March 2015
PwC 21
SAP Security Approaches
Task Based vs. Job Based Security Design
Job Based: Task Based:
Security is built based on positions/jobs within Security is built based on small, definable tasks,
the organization, such as AR credit associate. executed by the user, such as process cash
receipts.
Provisioning access is based on job
responsibilities. Larger number of roles per user decreased risk
of duplicate access.
Smaller number of roles per user increased risk
for granting functionality more than once. Transaction codes in one roles with minimal
exceptions
Transaction codes and authorizations typically
duplicated in many roles. User assignment flexibility simple to grant
additional access to only the tasks necessary.
Users may be granted more access than necessary
as a result of additional job or backup Supports future growth and sustainability role
responsibilities. modification decreased as a result of
functionality improvements and rollouts.
Appropriate for static organizations.
Appropriate for dynamic organizations.

March 2015
PwC 22
SAP Security Approaches
Job Based Security Design

Security roles are built based on positions/jobs for a group of users (e.g. Accounts
Payable Clerk).
A single role contains the access to perform a job.
Transaction codes and authorizations typically duplicated in many roles.

AP AP
Supervisor Clerk

AP Manager

March 2015
PwC 23
SAP Security Approaches
Task Based Security Design
A task-based design begins by bucketing transactions into one of 4 access tiers: General, Display,
Functional and Control Point. Task-based roles contain access to only one of these tiers.

USER PROFILE TIER 1: GENERAL ACCESS


General access is provisioned via one single role
made up of tasks common to users such as
printing, inbox, SU53, etc.

TIER 2: DISPLAY ACCESS


Display access is provisioned via a set of roles
User General defined by functional area that allow display
and reporting access intended to compliment
the functional roles of the users.
What

TIER 3: FUNCTIONAL ACCESS


AR Common Display
AP Display FI Common Display Functional access is provisioned via multiple
single task based roles. Role grouping of
activities that are the lowest common
denominator of tasks and permission
components to suit the needs of the end-users.
Vendor Master
Contract Maintenance Process Billing These groupings usually are SoD free and part
Maintenance
of a sub-process such as Invoice Processing or
Material Master Maintenance.

TIER 4: CONTROL POINTS


Where Organizational Organizational
Roles that provide additional control point
Grouping - A Grouping - B
access or granularity needed by Tiers 1-3 such
as Company Code, Plant, etc.

March 2015
PwC 24
SAP Security Approaches
Task Based Security Design (continued)

Security roles are built based on positions/jobs for a group of users (e.g. Accounts
Payable Clerk).
User assigned to the tasks needed to perform his/her job (not a job-based role)
User receives multiple single roles
Flexibility to each individual users role assignments

AP Clerk

Organizational
User General AP Common Display Process Billing
Grouping - A

March 2015
PwC 25
Segregation of Duties & Sensitive
Access

March 2015
PwC 26
Segregation of Duties & Sensitive Access
Introduction

Segregation of Duties Sensitive or Critical Access


A segregation of duties risk is when a A sensitive or critical access risk is
combination of abilities that when where the direct assignment of an
assigned to a backend user constitutes a ability to a backend user constitutes a
risk. risk.
Objective of this risk is to facilitate the Objective of this risk is to help establish
appropriate division of responsibilities. that access is restricted to the
appropriate individuals.

March 2015
PwC 27
Segregation of Duties & Sensitive Access
Introduction (continued)

Segregation of Duties Sensitive or Critical Access


Example risk: Example risk:
Maintain Accounting Periods vs. Post Post Accounting Document in GL
Accounting Document in GL
Should be restricted to authorized users
Allow a user to inappropriately open to thereby decrease the risk of
accounting periods previously closed fraudulent, malicious of erroneous
and fraudulently post documents to journal entries being posted.
that period after month end.

March 2015
PwC 28
Segregation of Duties & Sensitive Access
Examples
Finance: Maintenance of accounting periods should be segregated from the posting of
financial transactions in the wrong period.
Inventory: The receipt/maintenance of inventory should be segregated from order
and invoicing activities.
Accounts Payable: Reconciling and releasing blocked vendor invoices should be
segregated from daily processing and posting activities.
Procurement: Maintenance of contracts and terms should be segregated from
payment and billing document changes.

March 2015
PwC 29
Segregation of Duties Walkthrough

March 2015
PwC 30
Segregation of Duties Walkthrough

March 2015
PwC 31
Segregation of Duties & Sensitive Access
How to monitor?

Companies have many different ways to monitor segregation of duties and sensitive
access:
SAP GRC Access Control
Other access control systems (Approva, ControlPannel, SecurityWeaver, ACL,
etc.) or homegrown monitoring tools
Reporting transaction code SUIM.

March 2015
PwC 32
Mitigating Controls

March 2015
PwC 33
Mitigating Controls
Introduction

Defining and applying Mitigating Controls


If violating access cannot be remediated as there is a legitimate business purpose for
access then mitigation is going to be required. Mitigating controls are designed to cover
the residual risk of a user having that access.
For example, if a business unit is too small to segregate duties in the purchasing
department and users must have the ability to create and approve purchase orders for the
business to function, the business may choose to establish a mitigating control to analyze
transactions by users with access to both sides of the SOD conflict to mitigate the risk:
Risk: A user can create and approve a fictitious PO.
Key Control: The ability to release (approve) and create purchase orders is
segregated.
Mitigating Control: Location supervisor analyze purchase orders entered into SAP
by the two Purchasing Clerks from the business unit

March 2015
PwC 34
Mitigating Controls
Considerations

No Deactivate or
Is the risk truly a risk for
Switch to Low
compliance requirement?
Risk
Determine the
controls in place
Yes that mitigate

Preventive Detective

Scenario 1: Scenario 2: Scenario 3: Scenario 4:


No intent to grant access. Some Users Require Remediation of Access Detective Controls
Access Occurring
Management does not intend The SOD is enforced partially Management intends to Management has detective
that any users receive access in the environment, most enforce the SOD however controls in place that mitigate
to the risk. No mitigating users do not have the access, most users currently have the associated risk.
controls should be created. however some need it. access as the business Management does not intend
Detective controls (mitigating) processes require redesign to segregate the access in
are put in place for these and/or the access the system to mitigate the risk
users. remediation. in a preventive manner.
Detective controls (mitigating)
are put in place while
remediation occurs.

Mitigation
Process
March 2015
PwC 35
Questions?

This publication has been prepared for general guidance on matters of interest only, and does
not constitute professional advice. You should not act upon the information contained in this
publication without obtaining specific professional advice. No representation or warranty
(express or implied) is given as to the accuracy or completeness of the information contained
in this publication, and, to the extent permitted by law, PricewaterhouseCoopers LLP, its
members, employees and agents do not accept or assume any liability, responsibility or duty of
care for any consequences of you or anyone else acting, or refraining to act, in reliance on the
information contained in this publication or for any decision based on it.

2015 PricewaterhouseCoopers LLP. All rights reserved. In this document, PwC refers to
PricewaterhouseCoopers LLP which is a member firm of PricewaterhouseCoopers
International Limited, each member firm of which is a separate legal entity.

You might also like