SAP ECC Audit Guidelines: Applies To
SAP ECC Audit Guidelines: Applies To
Applies to:
Applies to SAP R/3 and ECC systems. For more information, visit the Security homepage.
Summary
The Purpose of this document is to provide the Security Administrator with guidance on preparing for
the SAP System Audit. This will also help the Security Administrator in keeping the system complaint
and secure.
Author Bio
Nishant Sourabh is SAP Certified Security Consultant and is working in the area of SAP
Security for more than 4 years. He is presently with IBM India and has worked on SAP
R/3, ECC, BW, CRM and APO modules.
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 1
SAP ECC Audit
Guidelines
Table of Contents
Scope… .............................................................................................................................................................. 3
Audience ............................................................................................................................................................. 3
Guidelines ........................................................................................................................................................... 3
Checking Profile Parameters .......................................................................................................................... 5
Audit and Table Logs ...................................................................................................................................... 6
System and Client Settings ............................................................................................................................. 8
Maintaining User Groups ................................................................................................................................ 8
User Creation, Modification and Deactivation Process................................................................................... 9
Process for Super User ids and System ids ................................................................................................... 9
Critical Transactions and Authorization objects ............................................................................................10
Change Control Process ...............................................................................................................................14
Common Audit Observations which should not occur in productive systems ..............................................14
Related Content ............................................................................................................................................... .15
Disclaimer and Liability Notice ..........................................................................................................................16
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 2
SAP ECC Audit
Guidelines
Scope
The Scope of this document is to help SAP Security Administrators in understanding the SAP Security
system audit requirement. This document is not intended for SAP Financial Audit and can only serve
as guideline in preparing and planning for the SAP System Audit.
Audience
SAP Security User and Role Administrators and any Audit facing Compliance or Security Manager.
Guidelines
In the following sub-sections we will look at the general activities, processes and security objects and
elements that Auditors look for, search for and ask for. As a general observation, a polite demeanor
towards the Auditors instead of aggressive or defensive one will always help in cordial relationship between
you and the Auditor. This ensures constructive approach towards the same goal of keeping your SAP
System clean and secure.
These guidelines are based on the security guides of SAP which you can find
at http://service.sap.com/securityguide.
In addition you may want to have a look at the Run SAP and E2E Solution Standards
from https://service.sap.com/RunSAP. (See transaction RMMAIN in the Solution Manager,
too.)
E2E Solution OperationsSAP Standard for Security
https://service.sap.com/~sapdownload/011000358700000666462009E/STD_Security_V10.pdf
Implementation Methodology: Security Design
https://service.sap.com/~sapidb/011000358700000685892009T/Accelerators/46DA314A27B3B758E10000000A4218
A8/IM_SECURITY_DESIGN.PDF
Implementation Methodology: Security Setup
https://service.sap.com/~sapidb/011000358700000685892009T/Accelerators/C1DA314A27B3B758E10000000A4218
A8/IM_SECURITY_SETUP.PDF
Implementation Methodology: Security Operations
https://service.sap.com/~sapidb/011000358700000685892009T/Accelerators/ 01DB314A27B3B758E10000000A4218A
8/IM_SECURITY_OPERATIONS.PDF SAP Standard User ids
Report RSUSR003 (or transaction RSUSR003) can be used to run a report on SAP Standard user ids.
© 2010 SAP AG 3
SAP COMMUNITY NETWORK SAP ECC
SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UACAudit
- uac.sap.com
Guidelines
© 2010 SAP AG 4
SAP ECC Audit
Guidelines
1. There should be a policy to change DDIC password or any Dialog user id’s password
after a regular interval of time. You can set password expiration time through a
profile parameter that will be discussed below in item 4.2. The policy should be
stated in the Standard Operating Procedure and work instruction document for SAP
Security.
2. Security Administrator should at least quarterly check Report RSUSR003 for the
status of SAP Standard user ids and remediate incase of any discrepancies.
3. The following Authorization will be needed by Security Administrator to execute this
RSUSR003 report.
Authorization object S_USER_ADM with the value CHKSTDPWD for the
field S_ADM_AREA. If the administrator does not own this authorization
the following authorizations are checked instead which require strong
change authorizations (see notes 717123 and 704307 for details):
S_TABU_DIS – Activity – 02 and Authorization Group – SS
S_TABU_CLI – X Client Maintenance Allowed
S_USER_GRP – Activity – 02 and User Group – SUPER
© 2010 SAP AG 5
SAP ECC Audit
Guidelines
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 6
SAP ECC Audit
Guidelines
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 7
SAP ECC Audit
Guidelines
2. Table Logging for Critical tables: This is another item that Auditors scrutinize carefully as there
are certain tables that should be logged for changes in Production or should be set as Non
Modifiable.
Please make sure Rec/Client is set to “ALL” to ensure table logging is activated in all the clients as
previously discussed in item 4.2.
Please check in transaction SE13 that Log Data Changes box is checked or in table DD09L for Field
name LOG value should be X for the following tables as best practice. (You can use report
RDDTDDAT_BCE or RDDPRCHK, too.)
T000 Clients
T001 Company Codes
TACTZ Valid activities for each authorization
object
TNRO Definition of number range objects
TOBJ Authorization Objects Definition
TSTC Transaction Code Definition
TSTCA Values for transaction code authorizations
OBJH Object Headers Used
© 2010 SAP AG 8
SAP ECC Audit
Guidelines
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 9
SAP ECC Audit
Guidelines
This list can in no way be considered complete but something that has been seen in the projects that
I have worked on.
Below is the list of tables that the Auditors might check for Modifiable or Non Modifiable settings. It
can be checked via t-code SE11 -> Tab Delivery and Maintenance -> Field Data Browser/Table
view Maintenance or in table DD02L -> Field name Table Maintenance. (You can use report
RDDTDDAT_BCE or RDDPRCHK, too.)
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 10
SAP ECC Audit
Guidelines
Also it will help if you have the same user group configured in Quality system. Auditors like to see your
Quality system matches your Production system as much as possible.
Access to maintain user group Super should be tried to be restricted using Authorization object
S_USER_GRP. For example if you have four Security Administrator in your team and not all need
to maintain Super user ids then restrict it from them.
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 11
SAP ECC Audit
Guidelines
Note: Auditors might take a sample of the number of times your Super user ids were activated and ask for the
various documents on them.
Tip: Do not use SAP* as your Super user id. Remove SAP_ALL and SAP_NEW Authorization profiles from it and lock
it. Create your own Super user id and activate it on the need and approval and then lock it again after the job
is completed.
Auditors also might like to see how passwords are maintained for System user ids and how they are kept
Secured. Make sure there is process around the System user ids as well.
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 12
SAP ECC Audit
Guidelines
Critica Role
l T-
code
SU01D This is the display-only variant of transaction SU01 which can be added to other roles,
too.
PFCG Only Display in Security only (restrict object S_USER_AGR, allow activity 03 only)
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 13
SAP ECC Audit
Guidelines
SM59 Basis only (Use the new authorization object S_RFC_ADM if you have to grant display
authorizations. See
http://help.sap.com/saphelp_nw70/helpdata/en/84/d3eb4190966024e10000000a1550
b0/frameset.htm for details.
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 14
SAP ECC Audit
Guidelines
2. Critical Authorization objects: As a general thumb rule, be aware of all Authorization objects that
start with S_ like S_TABU_DIS, S_DEVELOP etc. Whenever you have to maintain them make sure
that you read the documentation on them and understand them before maintaining it. Be careful
with wildcarding * any field. Below we will look at few critical ones that should be added to roles with
wise discretion.
S_ARCHIVE: Create and Change activity should be in your Archive Admin role only and
given on your Super user id with proper approvals.
S_BDC_MONI: Normally needed by Basis Team but can be needed by functional team if
they are using LSMW to upload legacy data.
S_BTCH_JOB: Depending on the policy if you want your end user to have access to release
their jobs, you can give this access with RELE. If they should have only access to schedule
it then this authorization object is not needed.
S_BTCH_NAM: Only needed if you want a user to have access to run something in a
background using a user id for which user himself does not have access.
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 15
SAP ECC Audit
Guidelines
© 2010 SAP AG 16
SAP ECC Audit
Guidelines
© 2010 SAP AG 17
SAP ECC Audit
Guidelines
© 2010 SAP AG 18
SAP ECC Audit
Guidelines
© 2010 SAP AG 19
SAP ECC Audit
Guidelines
© 2010 SAP AG 20
SAP ECC Audit
Guidelines
© 2010 SAP AG 21
SAP ECC Audit
Guidelines
© 2010 SAP AG 22
SAP ECC Audit
Guidelines
© 2010 SAP AG 23
SAP ECC Audit
Guidelines
© 2010 SAP AG 24
SAP ECC Audit
Guidelines
© 2010 SAP AG 25
SAP ECC Audit
Guidelines
© 2010 SAP AG 26
SAP ECC Audit
Guidelines
© 2010 SAP AG 27
SAP ECC Audit
Guidelines
© 2010 SAP AG 28
SAP ECC Audit
Guidelines
© 2010 SAP AG 29
SAP ECC Audit
Guidelines
© 2010 SAP AG 30
SAP ECC Audit
Guidelines
© 2010 SAP AG 31
SAP ECC Audit
Guidelines
© 2010 SAP AG 32
SAP ECC Audit
Guidelines
© 2010 SAP AG 33
SAP ECC Audit
Guidelines
© 2010 SAP AG 34
SAP ECC Audit
Guidelines
© 2010 SAP AG 35
SAP ECC Audit
Guidelines
© 2010 SAP AG 36
SAP ECC Audit
Guidelines
© 2010 SAP AG 37
SAP ECC Audit
Guidelines
© 2010 SAP AG 38
SAP ECC Audit
Guidelines
© 2010 SAP AG 39
SAP ECC Audit
Guidelines
S_QUERY: Important to maintain or deactivate depending on if user need full access to
just execute access to SQ01.
S_RFC and S_RFCACL: Needed on the roles given to System id and wherever there is check
for RFC.
S_ICF can be used to grant authorization about who is allowed to use which RFC destination .
You assign authorizations for this authorization object in the calling system of an RFC
connection.
S_SPO_ACT and S_SPO_DEV: Should be maintained carefully. Normally only Spool Admin
or Basis Admin should need them. End users can have SP02 for which they do not need these
objects.
S_TCODE: Should be always checked for range or wildcard * on the TCD field.
S_USER_*: Should not be needed in any role except Security. Use the display activities 03 and
08 if required.)
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 40
SAP ECC Audit
Guidelines
© 2010 SAP AG 41
SAP ECC Audit
Guidelines
© 2010 SAP AG 42
SAP ECC
1. End users or Business users have DEBUG access in Production. Sometimes even the Audit
Guidelines
DEBUG- replace activity 01 is assigned.
2. Security has access to delete Security Audit log files.
3. Users other than Basis have access to modify Cross Client tables.
4. Users other than Basis have access to schedule and release any jobs under any user id.
5. Using &SAP_EDIT functionality users can update tables even with SE16N (SAP has removed
this function with note 1420281.)
6. SAP Standard user ids are not maintained properly.
7. Profile parameters are not set properly.
8. Security Audit log is not implemented.
9. Critical tables are not logged.
10. No formal process for User Maintenance.
11. No formal process for assigning Super user ids.
12. IT users having Business functionality and vice versa.
13. System and Client settings are not secure.
14. Termination process not properly followed.
15. No Formal Change Control process.
16. The authorization profile SAP_ALL is used. (see
http://help.sap.com/saphelp_nw70/helpdata/en/78/7a553efd234644e10000000a114084/frameset.h
t m for details.)
17. The authorization profile SAP_NEW is not resolved and deleted. (see
http://help.sap.com/saphelp_nw70/helpdata/de/8a/7b553efd234644e10000000a114084/frameset.h
t m for details.)
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 43
SAP ECC Audit
Guidelines
© 2010 SAP AG 44
SAP ECC Audit
Guidelines
© 2010 SAP AG 45
SAP ECC Audit
Guidelines
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 46
SAP ECC Audit
Guidelines
© 2010 SAP AG 47
SAP ECC Audit
Guidelines
© 2010 SAP AG 48
SAP ECC Audit
Guidelines
© 2010 SAP AG 49
SAP ECC Audit
Guidelines
SAP COMMUNITY NETWORK SDN - sdn.sap.com | BPX - bpx.sap.com | BOC - boc.sap.com | UAC - uac.sap.com
© 2010 SAP AG 50