SAP An Introduction October 2012.

Slides:



Advertisements
Similar presentations
All Materials in this Presentation are Fulton County Schools Confidential SAP A+ Fulton County Schools Introduction to Human Capital Management Version.
Advertisements

Take the ‘dread’ out of your XA Security Audit Belinda Daub, Senior Consultant Technical Services
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Enhanced Security Management, Separation of Duties and Audit Support for XA Belinda Daub, Senior Consultant Technical Services
DEPARTMENT OBJECTIVES 1. To Identify and deploy information technology to meet business objective at CKPL. 2.To Provide support to users for systems usage.
The most comprehensive Oracle applications & technology content under one roof Procure to Pay Automation Bevan Wright Fusion5 NZ Oracle User Group.
MIS 5121: Exam 3 – Review Sheet
The TRUTH About SOX, Auditors & Oracle Applimation is the leading provider of Application Lifecycle Management solutions.
Copyright © 2003 Americas’ SAP Users’ Group Authorizations in the Finance & Controlling Modules Ranvir Singh, Sherman Wright Business Analysts, LSI LOGIC.
Process Management and Control and Physical Inventory SAP Implementation
Module 6 Setup for Posting. Document  In SAP, a document is an electronic record of a business transaction  Documents are the link between the business.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
 SAP AG CSU Chico 102/14/981SAP Security Lecture MINS 298C SAP Configuration & Use: Security Copyright 1996, 1997, James R. Mensching, Gail Corbitt.
Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
Implementation Audit and Control Background Internal Audit Role Go-Live Criteria Audit Approach - Systems Audit Approach - People Summary Agenda.
Copyright © 2003 Americas’ SAP Users’ Group Segregation of Duties (SOD) Strategies, Techniques, and Tools Christopher Lane Manager – PricewaterhouseCoopers.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
Principles of Information Systems, Seventh Edition2 An organization’s TPS must support the routine, day-to- day activities that occur in the normal course.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Principles of Information Systems, Sixth Edition Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
Introduction to SAP R/3.
SAP R/3 Materials Management Module
9 C H A P T E R Transaction Processing and Enterprise Resource Planning Systems.
Business Driven Technology Unit 3
Production Planning Processes Theories & Concepts
Slide 1 Session 15 – ERP Security 1.Objectives 2.Oracle ERP Overview 3.Oracle ERP Security 4.Oracle Workflow and Security 5.How to Secure Oracle Applications.
SECURITY ERP.
Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
Introduction to Enterprise Systems
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
IS 466 ADVANCED TOPICS IN INFORMATION SYSTEMS LECTURER : NOUF ALMUJALLY 3 – 10 – 2011 College Of Computer Science and Information, Information Systems.
McGraw-Hill/Irwin Copyright © 2011 The McGraw-Hill Companies, All Rights Reserved Chapter 14 Enterprise Resource Planning Systems.
The Islamic University of Gaza
Principles of Information Systems, Sixth Edition Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
Overview of SAP ERP- Training Steps
SAP Overview SAP? Company ERP Software package –R/2 –R/3.
Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
Master Data for SCM (1) Master Data in Demand Planning & Fulfillment Processes EGN 5346 Logistics Engineering (MSEM, Professional) Fall, 2013.
Principles of Information Systems, Sixth Edition Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
IT Service Delivery And Support Week Eleven – Auditing Application Control IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA.
Event Management & ITIL V3
Enterprise Resource Planning ERP Systems
PwC 21 CFR Part 11 – A Risk Management Perspective Patrick D. Roche 07 March 2003, Washington D.C.
Authorizations in SAP.
普 华 永 道 Phase 1: Project Preparation Phase 1: Project Preparation Phase Overview Phase Overview.
Master Data for SCM (1) Master Data in Demand Planning & Fulfillment Processes EGN 5623 Enterprise Systems Optimization (Professional MSEM) Fall, 2011.
] COREY PEARSON [ ASUG INSTALLATION MEMBER MEMBER SINCE: 2008 CHAVONE JACOBS [ ASUG INSTALLATION MEMBER MEMBER SINCE: 2003 ALLAN FISHER [ ASUG INSTALLATION.
Chapter 2 Introduction to Enterprise Systems Partial adoption from Magal and Word | Integrated Business Processes with ERP Systems | © 2011 Timothy L.
T EST T OOLS U NIT VI This unit contains the overview of the test tools. Also prerequisites for applying these tools, tools selection and implementation.
HRMS Implementation Project HRMS Security Overview Module.
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
SAP MATERIALS MANAGEMENT(MM) TRAINING IN SOUTHAFRICA,AUSTRALIA
 TATA CONSULTANCY SERVICES MATERIALS MANAGEMENT.
Chapter 1 Overview of the FI Module
Accounting Information Systems: An Overview
Review of IT General Controls
Information Systems By Kundang K Juman, Ir. MMSI
SAP Overview.
Flya Kite Introduction to SAP
Security Management: Successes and Failures
What a non-IT auditor needs to know about IT & IT controls
Colorado University October 3, 2007
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
James Baranello MIS 5121:Business Process, ERP Systems & Controls Week 8: Security 2 – Roles Financial Processes and Controls.
Financial Accounting (FI)
High-Level OP Planning
Enterprise Resource Planning Systems
Presentation transcript:

SAP An Introduction October 2012

Personal Introductions Marc Trevino, PwC Senior Associate 6 years with PwC 6 years working with SAP clients 6 years of ISACA membership CISA, CPA, CIA Michael Baker, PwC Senior Associate 2 years with PwC 2 years working with SAP clients CPA Currently pursuing CISA

Agenda What We Will Do… Provide a high level overview of what SAP is SAP Authorization Concept Provide an introduction to Auditing ITGC’s in SAP Segregation of Duties in SAP

What is SAP? Talk through the agenda and sessions at a high level.

What does SAP stand for? Systeme, Anwendungen, Produkte in der Datenverarbeitung Systems, Applications and Products in Data Processing

What is SAP? An order in SAP can automatically generate an inventory movement and a posting in the GL without any “human” intervention. SAP can track financial results, procurement, sales, manufacturing, human resources and payroll. SAP integrates all business processing through one application. Links operational results and the financial aspects of those results. SAP comprises of 18-20 modules in finance, logistics and HR. One or more SAP modules can be implemented. SAP is typically accessible by the entire business organisation. Most company information and transactions originate from SAP. Integrated Multifunctional Modular Enterprise Wide “Real Time” Real time – There is batch processing as well… but then it is mainly for interface of data.

Overview of an SAP Environment Business process Controls (incl. automated, manual, BPR) IT General Management reporting and end-user controls SAP configurable controls SAP Authorisations/User profiles SAP Basis Module Database Operating System and other Infrastructure controls Infrastructure Layer Application Layer Presentation Layer On this slide, start bottom up from ITGC. > Link OS and DB to data centres and infrastructure > Refer SAP Authorisation to Segregation of Duties. Further mention that SAP Authorisation is split because - SOD is within business (create and approve PO) and IT process (making and transporting the changes) - sign off is done by business and execution is done by IT > Basis = technical system settings. Distinguish it from configuration controls. Mention that Basis would be covered in detail later > End user controls = manual controls The most important message on this slide is that all the layers are inter-related. We need to get comfort from bottom to top across all the elements. A good starting point when understanding what an SAP system looks like is to break it down into some basic components. By doing this you will be able to better structure what could be areas of audit focus. If we look at the triangle, the lower elements are what would typically be considered to be the underlying IT control environment, the bedrock if you like that ensures the integrity of the overall SAP system. Unlike many business IT systems SAP has a core module referred to as ‘BASIS’ that sits at the centre of this control environment. We will cover this module in more detail later but at this point it is worth noting that it is the key to ensuring that user access and the way the system has been set up to operate is maintained in a controlled manner. The SAP Basis module also underpins the overall application’s interaction with the Operating system (for example UNIX) on which SAP resides and with the database (for example Oracle). The diagram shows the SAP authorization layer spanning the IT control environment layer and the Business process layer. This represents a key message and links to one of the key audit challenges that we spoke of earlier. As an integrated system, access to all functionality within the application, from support functions used by application administrators to access to review a report is controlled by the application. The business process control layers that sit within the upper end of this triangle will typically sit within the modules And the way in which they are customized and configured discussed earlier in this session. As an integrated solution, an SAP business process will often make use of a mix of user access, configuration, and reporting functionality. A good example of the sort of thing that we are talking about here would be where part of a process has been turned into a workflow; in this case, the SAP application may be configured to require a user to key in certain key information into say, an order that being routed to an approver (defined by access profile) before the system will automatically process the order to the next stage. An exception report could be set up to identify any transactions that are not authorized in a timely manner. Now, for that workflow to be effective, adequate control must exist to ensure that the configuration is not changed inappropriately, that the approver is the correct individual and that the report contains all the transactions it should. We will come back to some of the key considerations around the IT control environment later in the course.

SAP Instances PR1 SAP R/3 or ECC 6.0 PH1 SAP Human Resources PC3 PE1 PA1 SAP R/3 or ECC 6.0 APO Planning SAP Human Resources SAP Customer Relationship Management SAP Procurement PS1 Solution Manager PB1 Business Warehouse Real time – There is batch processing as well… but then it is mainly for interface of data. PH1 – the key thing to note here is this is where employees view the workbench that includes benefit information etc. Managers will view the manager workbench here. They do this through the net weaver portal (manager workbench) PC3 – has to do with Customers and rebates PA1 – has to do with Budgeting and forecasting (Sheri Bassett Preston) look into PA1 for forecasting and budgeting PS1 – this is where the rev track system sits, change management and global production planning

SAP Authorization Concept Talk through the agenda and sessions at a high level.

Overview What is the SAP authorization concept? Security within SAP is achieved through the authorization concept The authorization is designed to ensure : Maximum security Sufficient privileges for end users to fulfil their job duties Powerful user maintenance Security strategy between business and IT: Lack of efficient communication between business and IT, which leads to gaps between business requirements and actual security implementation SAP security is inherently complex and is often seen as one of the most cumbersome and time-consuming parts of an SAP implementation. Our experience shows that, unfortunately, during an SAP implementation, the importance of logical access security is usually underestimated. Security strategy should support the implementation of a security model that supports the business, reduce financial risks to the organization and provides flexibility for change. As business requirements provide the basis for the design and implementation of a sound security model, it is important that business and IT are tightly integrated. An inefficient security design will lead to users with too many authorizations and increased exposure to risk. In short, the security strategy provides a roadmap for the design and implementation of a sustainable process for managing security of your SAP environment. Security strategy and design will be discussed in detail tomorrow, as part of the “SAP Security Administration” training class. Most restrictive: roles/profiles are designed with a minimum set of permissions Least restrictive: roles/profiles are designed with a wide range of permissions

Overview Three levels of security in SAP User master record User requires valid user-ID and password T-code check User requires an authorization for transactions 1 2 3 User logs onto SAP User authorizations loaded into the user buffer User executes the transaction directly or via the menu tree SAP checks if the transaction exists (all transactions have an entry in table TSTC) SAP checks if the transaction is locked (transactions are locked via transaction SM01) SAP verifies access to the transaction code in the user buffer (checks S_TCODE) Authorizations required read from ABAP program. SAP verifies that authorizations are available in the user buffer (checks additional authorization objects) If any of the above verifications fail – Access is denied Table TSTC links transaction codes to SAP programs Transactions in TSTC can be locked to prevent use by all users (using T-Code SM01) Customised transactions can be developed (using T-Code SE93) - New transactions should follow SAP naming convention (e.g. prefixed with a ‘Z’) The same SAP program can be used by multiple transactions using different sets of parameters Authority check User requires an authorization for underlying authorization objects and field values

SAP Authorization Concept The components SAP User Master Record (UMR) Master data for SAP users Transaction Code (t-code) Provides access to specific functions within SAP ME21 – Create Purchase Order Authorization Object: Template for security that contains fields with blank values (uncut key) Can we ensure they talk about the risk of “inheritance” when discussing the auth concept? Transaction codes provide access to a specific function within SAP, for example create purchase orders. Transaction codes are derived from the German language (since SAP is a German application). Most transactions related to Finance start with an “F”, Materials Management start with an “M” and Sales & Distribution start with a “V”. Authorization Object An authorization object is a template for security and controls what a user can do related to a particular transaction code. Defines what activities (e.g., create, change, display), document types (e.g., debit memo, vendor documents, customer documents) or organization components (e.g., plant, company code, credit control area) a user can access. Examples: S_TABU_DIS – controls what activities a user can perform (display, change) on which table groups (security tables, finance tables, etc.) S_PROGRAM – controls which activities a user can perform (run programs, schedule in background, change variants) for which types of programs. V_VBAK_AAT – controls which activities a user can perform (create, change, display, delete, release) for which document types (sales order, debit memo, rebate, etc) Authorization An authorization determines exactly what a user can do related to a particular transaction code. Authorization (Field Values): Authorization object with completed fields (cut key)

SAP Authorization Concept The components Profiles “Key ring” that contains authorizations (cut keys) Authority Check Performed by SAP to ensure that a user ID has the correct authorization object and field value combination (cut key) to execute a particular task Roles Collection of transaction codes, authorizations and user assignments R: Display PO R: Create PO Buyer Role: bucket containing t-codes, authorization data (authorization objects and field values) and user assignments. Technically, the role is a grouping of the authorizations required to perform specific abilities (e.g., A/P payments, rebate processing, contract display) Composite Role: logical grouping of two or more single roles that includes all system related activities an individual requires to perform their job function, such as Customer Support Specialist or Accounts Receivable Manager. For IT support roles, examples include Basis Administrator, Security Administrator, Developer, etc. Most users will be assigned to one composite role. Examples: Cash Applications Manager Customer/Contract Analyst Basis Admin Authority checks: An authority check is performed when users try to process a transaction. The initial authority-check is when users enter a transaction code, which may be requested directly or by menu tree. SAP then verifies access to the transaction code in user master record (UMR). This process is performed by SAP to ensure that a user ID has the correct authorization. Authority checks are normally written into the program (ABAP code behind the transaction). There may be multiple authority checks in one program; there is typically one at the start of the program as well as throughout the program when entering data/processing.

SAP Authorization Concept Bringing it all together Let’s make an analogy… … the Lock and the Key To open the lock, you need the right key!

SAP Authorization Concept Bringing it all together Profile SAP Security Check Authorizations User Master Record R: Display Purchasing document R: Create Purchase Order (e.g., ME21) Buyer

Auditing ITGC’s in SAP Talk through the agenda and sessions at a high level.

Risk based approach in a SAP environment SAP is not a typical application / environment split Many traditional environment functions are provided within the application including: development environment change control system administration and job scheduling These functions are collectively known as SAP Basis Combined with SAP integration, this serves to complicate access security

Risk based approach in a SAP environment SAP allows more comprehensive functionality and control, however, the following needs to be considered: Financial transactions are executed throughout the business making segregation of duties control key The SAP access mechanism is complex making security and segregation of duties a key risk Configuration has a large impact to the overall business process and controls

Key IT General Control Domains Consider tests for controls around: Access to programs and data Changes made to the system (Change management) Computer operations Weaknesses identified within the IT general controls can potentially undermine confirmed and tested automated controls and access controls at the business process level

Key Areas within the SAP environment Access to Programs and Data Key areas to consider include: SAP system settings including password parameters Access to user administration functions including defining and assigning profiles to users (Profile Generator) Access to run programs/ transaction codes Assignment of SAP_ALL, SAP_NEW, other sensitive profiles Default passwords of SAP supplied accounts (SAP*, DDIC, Earlywatch, SAPCPIC etc.) Management and review of User IDs and generic User IDs Use of audit logs (SAP Table Logging)

Key Areas within the SAP environment Change Management Key areas to consider include: Customised programs and tables should be assigned to appropriate authorisation groups. Ability to unlock production environment to make direct changes to production is restricted and monitored Segregation of duties within the change management process including developer, customizer and approver of the program change/transport Changes to SAP tables and data dictionary in the production environment is minimized

Key Areas within the SAP environment Computer Operations Key areas to consider include: Batch jobs and interface processing should be regularly monitored, with access to amend them restricted Batch jobs run under ANOTHER user should be restricted to appropriate personnel Batch jobs run under ANY user should be completely restricted Operating and database system administrator access should be restricted

Auditing SAP Segregation of Duties Example Talk through the agenda and sessions at a high level.

SOD – Framework – Overview Date SOD – Framework – Overview

SOD – Framework – SOD/SA Rule Date SOD – Framework – SOD/SA Rule

SOD – Framework – SOD Rule Date SOD – Framework – SOD Rule

SOD – Framework – SOD Rule Date SOD – Framework – SOD Rule

SOD – Framework – Object Level

SOD – Framework – Object Level

Relationships Between Layers

SAP SOD Example Ability A Ability B Create Maintain Purchase Order t-code: ME21 Auth Object: M_BEST_BSA ACTVT: 01 Create Maintain Vendor Master Records t-code: FK01 Auth Object: F_LFA1_APP

Questions? False © 2012 PricewaterhouseCoopers LLP. All rights reserved. In this document, “PwC” refers to PricewaterhouseCoopers LLP, which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity.