SAP Basics for Auditing Change Management and Security September 8, 2014 Presenter: Linda Yates Consultant, Risk Advisory Services.

Slides:



Advertisements
Similar presentations
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Advertisements

Users & Authorization Users must be setup and roles assigned to user master records before you can use the SAP System. A user can only log on to the system.
CTS & Transport System The Change and Transport System (CTS) is a tool that helps you to organize development projects in the ABAP Workbench and in Customizing,
Visit : Call Us: US: , India:
Visit : Call Us: US: , India:
Chapter Five Users, Groups, Profiles, and Policies.
Visit : Call Us: US: , India:
Visit : Call Us: US: , India:
0 UMN 2011 ERP Terapan SAP BASIS General Concept Session # 3.
University of Southern California Introduction to Enterprise Wide Information Systems Configuring SAP Instructor: Richard W. Vawter.
Lecture 1 Introduction to the ABAP Workbench
Introduction to the ABAP Data Dictionary
Monitoring Security With Standard SAP Tools Session Code 805 Sandi McKinney.
Information Security Policies and Standards
University of Southern California Enterprise Wide Information Systems ABAP/ 4 Programming Language Instructor: Richard W. Vawter.
 SAP AG CSU Chico 102/14/981SAP Security Lecture MINS 298C SAP Configuration & Use: Security Copyright 1996, 1997, James R. Mensching, Gail Corbitt.
Copyright © 2003 Americas’ SAP Users’ Group Segregation of Duties (SOD) Strategies, Techniques, and Tools Christopher Lane Manager – PricewaterhouseCoopers.
Introduction to SAP R/3.
SAP An Introduction October 2012.
EVAT Solution Workshop Public. ©2013 SAP AG. All rights reserved.2 Public 1. eVAT Background 2. SARS process 3. SAP Reporting 4. Note Information 5. Short.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Overview SAP Basis Functions. SAP Technical Overview Learning Objectives What the Basis system is How does SAP handle a transaction request Differentiating.
SAP System LandScape & Transport Request. SAP System LandScape The system landscape contains all the SAP Systems that you have installed. It can consist.
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
0 UMN 2011 ERP Terapan ABAP Introduction Session # 8.
What is Sure BDCs? BDC stands for Batch Data Communication and is also known as Batch Input. It is a technique for mass input of data into SAP by simulating.
Hands-On Microsoft Windows Server 2008
SAP R/3 Fundamentals What is SAP? SAP environment introduction User-specific settings.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
SAP Overview SAP? Company ERP Software package –R/2 –R/3.
SAP ABAP DemoNawin's Training Acadamy1. Enterprise Wide Information Systems ABAP/ 4 Programming Language Mr. RG Nawin Krishna, Bsc(cs);Msc(psychology);MBA(HR);SAP(HCM/HR),
 Maintains the Instrument Database  Generates the Calibration Schedules  Maintains Calibration Records  Provides Facility to enter All types of.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Table of Contents GO TX Overview System Masters System Users System Instruments System Risk.
Authorizations in SAP.
Page 1 Non-Payroll Cost Transfer Enhancements Last update January 24, 2008 What are the some of the new enhancements of the Non-Payroll Cost Transfer?
] COREY PEARSON [ ASUG INSTALLATION MEMBER MEMBER SINCE: 2008 CHAVONE JACOBS [ ASUG INSTALLATION MEMBER MEMBER SINCE: 2003 ALLAN FISHER [ ASUG INSTALLATION.
Introduction to the SAP IMG Interface. Slide 2 Accessing the IMG Use transaction code SPRO or.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
SAP Account Administration Account Administration.
Systems Integration EGN 5623 Enterprise Systems Optimization (Professional MSEM) Fall, 2012 Systems Integration EGN 5623 Enterprise Systems Optimization.
SAP DEVELOPMENT BASICS Bohuslav Tesar. TRAINING OVERVIEW Amazing life of ABAP developer ;) SAP introduction ABAP basics ABAP Reporting.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
SAP CRM Web UI.
Systems Integration EGN 5623 Enterprise Systems Optimization Fall, 2013 Systems Integration EGN 5623 Enterprise Systems Optimization Fall, 2013.
Physical Layer of a Repository. March 6, 2009 Agenda – What is a Repository? –What is meant by Physical Layer? –Data Source, Connection Pool, Tables and.
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
Prerequisites, Scope and Considerations Jan 2013 UI Field Level Security.
CRM Training Courses &Online Courses and Salesforce Online | classroom| Corporate Training | certifications | placements| support.
SAP GRC(Governance Risk and Compliance)/SECURITY ONLINE TRAINING  Magnific Name : SAP GRC/SECURITY 24*7 Technical support  faculty : Real time Experience.
SAP Security Online Training Online | classroom| Corporate Training | certifications | placements| support CONTACT US: MAGNIFIC TRAINING INDIA
Receipt User Guide 1. INDEX Sl. No ProcessSlide no. 1Login procedure4-7 2Gate Inward Entry Process9-19 3Notification Summary for Bonding20 4Receipt23-35.
CTS Change & Transport System. Introduction The Change and Transport System (CTS) is a tool that helps you to organize development projects in the ABAP.
V 0.1Slide 1 Security - User Account How to maintain user account ? Access Control Other Information Configuration  maintain user group and access rights.
SAP security online training CONTACT US: MAGNIFIC TRAINING INDIA USA : CONTACT US: MAGNIFIC TRAINING INDIA
SAP BASIS ONLINE TRAINING Contact our Support Team : SOFTNSOL India: Skype id : softnsoltrainings id:
19 Copyright © 2008, Oracle. All rights reserved. Security.
Dept. of Information Systems St. Francis Xavier University
Architecture Review 10/11/2004
Review of IT General Controls
SAP Security Interview Question & Answers
SAP Overview.
How to Setup and Utilize Functionality
Welcome! To the ETS – Create Client Account & Maintenance
SAP GRC(Governance Risk and Compliance)/SECURITY ONLINE TRAINING UK
SAP University Alliances
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
James Baranello MIS 5121:Business Process, ERP Systems & Controls Week 8: Security 2 – Roles Financial Processes and Controls.
Presentation transcript:

SAP Basics for Auditing Change Management and Security September 8, 2014 Presenter: Linda Yates Consultant, Risk Advisory Services

Course Objectives Change Management Identify the critical SAP system parameters to protect the production environment Discuss approach to auditing Change Management and key Change Management transaction codes SAP Security Determine the password defaults and control settings Discuss the architecture of SAP Security Fundamentals of auditing SAP Security Identify the key SAP Security tables and transaction codes

Change Management: System / Client Parameters Auditing Change Management Key Change Management Transaction Codes and Tables

SAP: Client Settings – Specific Change Options Settings for client-specific change options are maintained via transaction SCC4 and can also be viewed in table T000 (create & maintain SAP System clients) Three Client Specific Change Options (Settings) Changes and Transports for Client-Specific Objects Client-Independent Object Changes Protection Against Client Copiers and Comparison Tools

Changes and Transports for Client-Specific Objects Controls whether client-specific objects can be maintained & if corresponding transports can be executed. Potential options: Changes without automatic recording: Allows changes of client-specific objects and changes will not be automatically recorded (Not Recommended) Automatic recording of changes: Changes are automatically recorded (Limitations on use should be applied) No changes allowed: Prevents changes to customizing in the client (Recommended Setting) Changes w/out automatic recording, no transports allowed: Allows changes to cross client-specific objects, no automatic recording of change, and manual transports not allowed (Only recommended for test clients)

Client Independent Object Changes Controls how repository and client-independent customizing objects can be changed within the client. Four Options: Changes to Repository & Cross-Client: All cross-client customizing or repository objects can be maintained. (Not Recommended) No Change to Cross-Client Customizing Objects: Does not allow the maintenance of cross-client customizing objects within the client (Not Recommended) No Changes to Repository Objects: Does not allow the maintenance of repository objects within the client (Not Recommended) No Changes to Repository and Cross-Client Customizing Objects: Does not allow the maintenance of cross-client customizing or repository objects within the client (Recommended Setting)

Protection Against Client Copiers and Comparison Tools Protects the client against reading access for other client, comparison tables cannot be executed and the client is protected against overwriting. Three protection levels are available as follows: Protection Level 0: No restriction – Setting does not protect the client at all. Client can be overwritten by a client copy and reading access from other clients is possible. (Not recommended) Protection Level 1: No overwriting – Client cannot be overwritten by a client copy and will be appropriate to protect the production client (Recommended setting for production environment) Protection Level 2: No overwriting, no external availability - Client cannot be overwritten by a client copy and reading access from other clients is not available (Recommended for client with highly sensitive data)

Examples – Client Settings via SCC4

Examples – Client Settings via Table T000 Transp. Connection Blank = No automatic recording of changes 1 = Changes are recorded 2 = Customizing in client cannot be changed 3 = Customizing can be changed but cannot be transported No Cross-Client Blank = Changes to cross-client & repository allowed 1 = No changes to cross-client allowed 2 = No changes to repository allowed 3 = No changes to repository & cross-client allowed Copy Protection Blank = No protection X = Protection level 1 – No client copy

SCC4 Change Logs Survey conducted by ACL Services Ltd When changes are made to the client settings, change logs can be viewed via transaction code SCC4. Change Logs will show: Date and Time Stamp of the Change User who made the change Old Value of Changes New Value of Changes

Example: SCC4 Change Log

Change Management Landscape SAP is basically divided into three (3) different landscapes as follows: Development (DEV): Where changes to code, programs, configuration and security are developed. Can have multiple clients, for example a Sandbox Client, Development client, Unit Testing client, etc. Quality (QAS): Where changes to code, programs, configuration and security are tested. Multiple clients could exist supporting Integration Testing, Training, Security, etc. Production (PRD): Business transactions are executed and recorded. Multiple clients could exists to support the client’s business hierarchy and structure

Change Management Landscape Example

Changes Moved or Made in Production Use table E070 (via transaction SE16) to obtain a list of changes moved into or made directly in the production environment E070 Parameters: At a minimum, input the date range of the requests/tasks (transports) moved or made in the production environment Naming convention of the transports can provide information where the change was initiated or if the change was made directly in the production environment

Table E070 and Parameters

Results of Query for Table E070

View Transports Detailed view of transports can be displayed via transaction code SE03 based on specified parameters

Transports based on Query Parameters

Change Management: Key Transaction Codes & Tables Tables for Change & Transport System: E070: Change & Transport System – Header of Request/Tasks E07T: Change & Transport System – Short Texts for Request/Tasks E071: Object Entries of Request and Tasks Key Transaction Codes for Change & Transport System, Programing and Configuration of System: STMS: Transport Management System SE01: Transport Organizer SE03: Workbench Organizer (Tools)

Change Management: Key Transaction Codes & Tables - Continued SE06: Set up Workbench Organizer SE09: Workbench Organizer SE10: Customizing Organizer SE11: Data Dictionary Maintenance SE38: ABAP / Program Editor SPRO: SAP System Customizing, IMG SM30: Maintenance Table Views

SAP Security: Password Controls Security Architecture Auditing SAP Security Key Transaction Codes and Tables

SAP Password Controls Default Passwords: Report RSUSR003 shows if the default passwords have been changed for all standard SAP IDs that include SAP* and DDIC.

SAP Password Controls - Continued Prohibited Passwords: Prohibited passwords can be viewed in table ‘USR40’ Password Control Settings: Parameters can be obtained through transaction code RSPFPAR. At a minimum, the following should be reviewed: login/min_password_lng login/password_expiration_time login/fails_to_user_lock login/min_password_diff login/password_history_size Other parameters for consideration for strong password controls: login/min_password_digits login/min_password_letters login/min_password_specials login/disable_multi_gui_login

Extract from RSPFPAR

User Creation in SAP User Master Records are created for every ID through transaction code SU01 and can be viewed using transaction SU01D. Validity dates for the user can be maintained within the master record, along with administrator locks. All users are recorded in the USR02 table (via transaction code SE16), which shows the Validity dates, User Type, User Lock, Created By, Creation Date, last logon date / time, etc. Identify user IDs created during a specified period of time (new users) Identify inactive user IDs (stale users) Identify disabled user IDs (terminated users) Security Roles and associated profiles are assigned to the user’s Master Record along with validity dates for the role assignment

Example – User Master Record via SU01D

Table USR02 – User Master Record Table via Transaction Code SE16 or SE16N

Example of Output from Table USR02

User Types in SAP To identify the type or classification of the user ID, 1 of 5 ‘User Types’ is assigned to each User Master Record as follows: User Type ‘A’: Dialog ID and can logon directly to SAP. System checks for expired and initial passwords and provides an option to change the password. User Type ‘B: System ID used for internal system processes (e.g., background processing, ALE, workflow, TMS, CUA). Direct logon is not possible. User Type C: Communication ID used for communication between systems like RFC. Direct logon is not possible User Type S: Service ID is a dialog user that is available to an anonymous, larger group of users. Generally, this type of user should only be assigned very restricted authorizations. During logon, the system does not check for expired and initial passwords. Only the user administrator can change the password. User Type L: Reference ID is a general user, not assigned to a particular person. You cannot log on using a reference user. The reference user is only used to assign additional authorization and implemented to equip Internet users with identical authorizations.

SAP: Security Architecture SAP Security is based on field values assigned to authorization objects within a profile. A Profile is assigned to a security a Role, which is assigned to a User within the User Master Record.

Role / Profile Assigned to a User’s Master Record

Profile, Authorization, Authorization Objects and Field Values (Profile T-DV860568 / Authorization T-DV86056800)

SAP: Security Architecture SAP checks for required authorizations in the User Master Record (SU01) when executing transaction codes SAP provides information on which authorization objects are required for each transaction code and can be viewed via transaction code SU24 or through the USOBT_C table Security Roles are developed using the Profile Generator in the Development environment and are moved into production via the Transport Management System. Profiles not assigned to a security role can be assigned to a user

SU24 Example for SE11

Table USOBT_C Example for SE11

Auditing SAP Security - SUIM Main auditing transaction code used when auditing SAP security is 'SUIM’ (User Information System), which can be used for the following: Identify Users: Authorization to execute specific transaction codes based on complex selection criteria using authorization objects and field values By specific User ID, Roles, Profiles, Authorizations, etc. Users with unsuccessful logons or based on last logon date and password change Identify Roles: Roles containing authorizations to execute specific transaction codes By Role Name or by User, Transaction or Profile assignment Other: SUIM can also be used to perform other queries including change documents

Access to Critical SAP Profiles SAP has profiles, containing authorizations that are automatically developed with the delivery of the system. These profiles are not assigned to a security role and can be assigned to a user’s Master Record. Some of these profiles are critical and have access to critical functions within the SAP environment. Critical profiles include: SAP_ALL S_RFC SAP_NEW S_TABU S_A.CUSTOMIZ S_A.CPIC S_A.DEVELOP S_A.ADMIN S_A.SYSTEM S_ABAP_ALL S_A.USER S_RZL_ADMIN S_USER_ALL S_NEW_* S_USER_GRP S_ADMI_ALL

Users Assigned to Critical Profiles Utilize transaction code SUIM (Users > Users by Complex Selection Criteria>By Profiles) Generate queries for each of the critical SAP profiles that are in scope for the audit.

Users Assigned to Critical Profiles - Results Output of query will show the users that have the specific security profile assigned to their User Master Record. Here is the result for the query of users assigned to the ‘SAP_ALL’ profile:

Identify Users with Access to Specific Transactions To identify users with access and the ability to execute specific transaction codes, conduct the following: Identify the authorization objects and field values required to execute the transaction Utilize the SUIM transaction code and follow the path: User Information System>User>Users by Complex Selection Criteria>Users by Complex Selection Criteria>Users Input the authorization and associated field values and execute the query. Output: Users that have the authorization objects and field values assigned to their User Master Record that would allow them to execute the transaction code

SUIM Execution and Access List Example Find users with access to execute transaction code SE11: Authorization Objects for SE11: S_TCODE, field value = SE11 S_DEVELOP, field Activity (ACTVT), field value = 01 (Create), 02 (Change) and 06 (Delete) Utilize SUIM and execute Users by Complex Selection Criteria and input the authorization objects and execute a query for each activity value Results for the 3 queries: 48 User IDs with activity ‘01’, 52 User IDs with activity ’02’ and 48 User IDs with activity ‘06’ What would happen if generated 1 query for all 3 activity values or 2 of the 3 activity values?

Access to Transactions & Authorization Objects

SE11 / Activity 01 SUIM Query Inputs

SUIM Query Results for SE11 w/Activity 01

Roles or Profiles Containing Authorization Objects To identify the security roles assigned to the users that contain the authorization objects to execute the transaction code: Highlight all users and select Roles ‘In Accordance with Selection’. To identify the profiles assigned to the users that contain the authorization objects to execute the transaction code: Highlight all users and select Profiles ‘In Accordance with Selection’.

SUIM Query Results – Roles in Accordance with Selection x

SUIM Query Results – Roles in Accordance with Selection

SUIM Query Results – Profiles in Accordance with Selection

Key Security Transaction Codes SU01 - Create User Master Record SU01D – View User Master Record SU02 – Maintain Authorization Profiles SU03 – Maintain Authorizations SU10 – User Mass Maintenance SU24 – Maintain Authorization Defaults SUIM – User Information System PFCG – Role Maintenance (Profile Generator) RZ10 – Maintain Profile Parameters

Key SAP Security Tables USR02 – User Logon Data USOBT_C – Relating Transaction Code to Authorization Objects AGR_USERS – Roles assigned to Users AGR_TCODES – Transaction codes assigned to Roles AGR_1016B – Roles assigned to Profiles AGR_AGRS – Roles in Composite Roles AGR_1250 – Role and Authorization Data AGR_1251 – Role, Object, Field and Value AGR_1252 – Organizational Elements for Authorizations TSTCT – Transaction Code Text DD02T – SAP Table Text TACT – Available Activities and Values

Questions and Comments Consultant, Risk Advisory Services Linda Yates Consultant, Risk Advisory Services Linda.yates@experis.com 704-617-0639