<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need help with security tasks in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/need-help-with-security-tasks/m-p/2075759#M430253</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;lt;b&amp;gt;Hi Jay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this would answer all your queries regarding security tasks :&amp;lt;/b&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SAP Security&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.	Security Administration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	Determine how security administration is organized &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.	Help Desk&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	Determine if the help desk is effective&lt;/P&gt;&lt;P&gt;&amp;#149;	Records incidents reports&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.	Determine if proper system monitoring is performed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.	Determine if training is properly administrated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5.	Determine if key system interfaces are properly controlled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6.	Obtain a list of all system users&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7.	Obtain a list of custom transactions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List off all transactions within the TSTC table beginning with the letters Y or Z&lt;/P&gt;&lt;P&gt;&amp;#149;	 Tables&amp;gt;Data Display&amp;gt;Y&lt;STRONG&gt;, and then Z&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8.	Obtain a listing of all Clients&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;9.	Obtain a listing of all group companies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T042G&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.	Obtain a listing of all business areas &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table TGSB and TGSBT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;11.	Obtain a listing of all credit control areas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T014 and T014T&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;12.	Obtain a list of all charts of accounts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T004 and T004T&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;13.	Obtain a listing of all plants&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List tables T001W and TVKWZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;14.	Obtain a listing of storage locations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T001L&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;15.	Obtain a listing of all purchasing organizations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T024W&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;16.	Obtain a listing of all purchasing groups&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T024&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;17.	Obtain a listing of all sales organizations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table TVKO and TVKOT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;18.	Obtain a listing of distribution channels&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table TVTW, TVTWT, and TVKOV&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;19.	Obtain a listing of all divisions &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List tables TSPA, TSPAT, and TVKOS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;20.	Obtain a listing of sales areas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table TVTA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;21.	Obtain a listing of sales offices&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List tables TVBUR, TVKBT, and TVKBZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;22.	Obtain a listing of sales groups&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List tables TVKGR, TVBVK, and TVGRT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;23.	ABAP programs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Review ABAP programs to ensure that all system function calls are authorized.  System function calls allow are Unix commands that are passed to the operating system to perform a task at the operating system level such as using Oracle SQL commands to query the database during the execution of an ABAP program.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;24.	Review all SAP userids at the Unix operating system level.  (etc/passwd and etc/group files)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SIDADM	system administration&lt;/P&gt;&lt;P&gt;ORASID	Oracle administration&lt;/P&gt;&lt;P&gt;PCTEMU	Terminal administration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;25.	Review all relevant SAP change control directories under Unix&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/usr/sap/trans&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;26.	Ensure that all default passwords have been changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;27.	Determine that only authorized users have direct access to the Oracle database management system.  And determine that all default system passwords have been changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;28.	Correction and Transport (CTS)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Control types&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default	Changes are allowed in corrections. Changes to SAP-provided objects require a repair correction&lt;/P&gt;&lt;P&gt;No Change	Changes are not allowed&lt;/P&gt;&lt;P&gt;Repairs	Repairs are allowed but all must have corrections and all corrections are flagged as repairs.  Other types of changes are allowed with or without corrections.&lt;/P&gt;&lt;P&gt;Unlimited	Any changes are allowed with or without corrections. No corrections are flagged as repairs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CTS Type		CTS Changes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Development		Default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Integration		No Change&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Consolidation		No Change&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recipient 		No Change&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Determine if change control procedures are formally documented.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Determine if separate instances have been defined for development and testing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Determine who is responsible for transport administration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ensure that control tables are properly established&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TSYST	defines all systems to be used in CTS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TASYS 	defines all recipient systems&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TDEVC	defines all development classes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use transaction code SE06 for CTS verification&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use Transaction code SE38 to review the placement of programs in authorization groups&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-	SE38 select attributes and select display&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;29.	Determine who has the capability to add user master records.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_USER_GRP and S_USER_ALL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;30.	Determine who can maintain profiles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_USER_PRO&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;31.	Determine who can maintain autorizations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_USER_AUT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;32.	List all SAP supplied profiles and  authorizations that have been modified and review for completeness.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;33.	List off the system parameter file (RSPARAM) and review the authentication controls&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-	login/min_password_lng&lt;/P&gt;&lt;P&gt;-	login/password_expiration_time&lt;/P&gt;&lt;P&gt;-	login/fails_to_session_end&lt;/P&gt;&lt;P&gt;-	login/fails_to_user_lock&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;34.	Determine how the profile SAP_NEW is being used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;35.	Review SAP for any new objects/values that have been defined&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Review changes to table AUTH for new fields and table TOBJ for new objects&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;36.	Determine if all users have been assigned to a group. (Table USR02)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;37.	Determine that the SAP* profile has a user master record and that SAP* has had its password changed and added to the SUPER group.  Also determine if the password has been stored in a secured location in case of an emergency.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;38.	Determine who are the members of the SUPER group and ensure that their membership is required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;39.	Determine how many users have SAP_ALL access in the production environment. List all users with the following standard system profiles:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SAP_ALL  	All R/3 privileges&lt;/P&gt;&lt;P&gt;S_A.SYSTEM	All SAP system functions&lt;/P&gt;&lt;P&gt;S_A.ADMIN	System administration&lt;/P&gt;&lt;P&gt;S_A.CUSTOMIZ  SAP customizing system&lt;/P&gt;&lt;P&gt;S_A.DEVELOP	SAP development environment&lt;/P&gt;&lt;P&gt;S_ABAP_ALL	All authorizations for ABAPs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TOOLS&amp;gt;ADMINISTRATION&amp;gt;USER MAINTENANCE&amp;gt;USERS&amp;gt;MAINTAIN USERS&amp;gt;INFORMATION&amp;gt;OVERVIEW&amp;gt;USERS&amp;gt; profile name &amp;gt;LIST&amp;gt;PRINT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;40.	List all users with special SAP system administration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_ADMI_FCD		Access to ABAP/4 Data Dictionary&lt;/P&gt;&lt;P&gt;S_BDC_ALL		Batch Input&lt;/P&gt;&lt;P&gt;S_DDIC_ALL		DYNPRO and ABAP/4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_EDI_BUK	Creating and modifying ABAP/4 programs and use of screen painter &lt;/P&gt;&lt;P&gt;	S_EDITOR		Ability to edit and modify ABAP&amp;#146;s programs &lt;/P&gt;&lt;P&gt;S_PROG_ADM	Running ABAP/4 programs and submitting background processing&lt;/P&gt;&lt;P&gt;S_PROGRAM	Ability to run ABAPs&lt;/P&gt;&lt;P&gt;      &lt;/P&gt;&lt;P&gt;       S_TABU_ADM		System Table &amp;#150; table maintenance&lt;/P&gt;&lt;P&gt;       S_BTCH_ADMS_ENQ_ALL   Background Processing&lt;/P&gt;&lt;P&gt;       S_TSKH_ADMS_ENQ_ALL   Transactions &amp;#150; lock management for processing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;41.	Determine who has access to the ABAP/4 Data Dictionary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_ADMI_FCD  	For this object list users that have the following values:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;REPL, SE01 (CTS requests) and/or DDIC in the System Administration Function field&lt;/P&gt;&lt;P&gt;SM21 in the Field Administration Function field (allows access to the system log)&lt;/P&gt;&lt;P&gt;TCOD which allows the user to change additional authorization checks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Versions for a particular object are maintained as:  Utilities&amp;gt;Version Management Menu.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;		Temp&lt;/P&gt;&lt;P&gt;		Historical&lt;/P&gt;&lt;P&gt;		Active&lt;/P&gt;&lt;P&gt;		Revised &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use Transactions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;		SE16		Data Browser&lt;/P&gt;&lt;P&gt;		SE12		Dictionary Display&lt;/P&gt;&lt;P&gt;		SE80		Object Browser&lt;/P&gt;&lt;P&gt;		SCU3		Table history transaction&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;42.	Determine who has batch access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_BDC_MONI&lt;/P&gt;&lt;P&gt;S_BDC_ALL&lt;/P&gt;&lt;P&gt;S_BTCH_ADM&lt;/P&gt;&lt;P&gt;S_BTCH_ALL&lt;/P&gt;&lt;P&gt;S_BTCH_USR&lt;/P&gt;&lt;P&gt;Batch log files (bdc/logfile) should be reviewed and any deletions, modifications, or abended sessions subject to investigation and should be secured through the correct use of the operating system security.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;43.	List users with authorization for SM04, SM50 (S_TSKH_ADM) which grants access to the transaction locking function.  Determine which transactions are locked on the production system by viewing additional authority checks in table TSTC (Tools&amp;gt;Administration&amp;gt;Tcode Administration).  Ensure that at a minimum the following transactions are locked:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SE01	Correction and transports&lt;/P&gt;&lt;P&gt;SE38	Ability to execute ABAP programs&lt;/P&gt;&lt;P&gt;SE11	Maintain data dictionary objects&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;44.	Determine if the parameters for the trace and log files are adequate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the RSPARAM report, review the rstr/* and rslg/* parameters&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a transaction cannot finish correctly, the system rolls it back.  The dialog program first generates a log record in the VBLOG table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Transaction SM21 or Tools&amp;gt;Administration&amp;gt;Monitoring&amp;gt;System Log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;		Selection Criteria:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;			Date/Time &amp;#150; To &amp;#150; Date/Time&lt;/P&gt;&lt;P&gt;			By User, Trans Code, SAP Process, Problem Classes (Messages)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;45.	Determine if Spool access is properly restricted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Verify who has the authorization object S_ADMI_FCD, S_SPO_ACT, and S_SPO_DEV&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;46.	Determine if backup procedures are appropriate for data and programs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On-line and off-line backups of all the file servers can be controlled through the CCMS.  Access to these transactions should be restricted, because these transactions can causes all file servers to shut down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is access to the SAP archiving function restricted. (Verify which profiles have access to transaction F040).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;47.	Determine who has access to the SAP customizing system (IMG, menu customizing) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_A.CUSTOMIZ	The profile gives all authorizations required for the Basis activities in the customizing menu.  (Table USR10 gives an overview of all authorization objects in a profile.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Puneet Gupta.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Apr 2007 05:23:28 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2007-04-09T05:23:28Z</dc:date>
    <item>
      <title>Need help with security tasks</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/need-help-with-security-tasks/m-p/2075758#M430252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need help with security tasks....Please help me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;b&amp;gt;&amp;lt;email removed by moderator&amp;gt;&amp;lt;/b&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2007 01:33:56 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/need-help-with-security-tasks/m-p/2075758#M430252</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-04-09T01:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with security tasks</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/need-help-with-security-tasks/m-p/2075759#M430253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;lt;b&amp;gt;Hi Jay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this would answer all your queries regarding security tasks :&amp;lt;/b&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SAP Security&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.	Security Administration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	Determine how security administration is organized &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.	Help Desk&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	Determine if the help desk is effective&lt;/P&gt;&lt;P&gt;&amp;#149;	Records incidents reports&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.	Determine if proper system monitoring is performed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.	Determine if training is properly administrated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5.	Determine if key system interfaces are properly controlled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6.	Obtain a list of all system users&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7.	Obtain a list of custom transactions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List off all transactions within the TSTC table beginning with the letters Y or Z&lt;/P&gt;&lt;P&gt;&amp;#149;	 Tables&amp;gt;Data Display&amp;gt;Y&lt;STRONG&gt;, and then Z&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8.	Obtain a listing of all Clients&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;9.	Obtain a listing of all group companies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T042G&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.	Obtain a listing of all business areas &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table TGSB and TGSBT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;11.	Obtain a listing of all credit control areas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T014 and T014T&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;12.	Obtain a list of all charts of accounts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T004 and T004T&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;13.	Obtain a listing of all plants&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List tables T001W and TVKWZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;14.	Obtain a listing of storage locations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T001L&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;15.	Obtain a listing of all purchasing organizations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T024W&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;16.	Obtain a listing of all purchasing groups&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table T024&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;17.	Obtain a listing of all sales organizations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table TVKO and TVKOT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;18.	Obtain a listing of distribution channels&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table TVTW, TVTWT, and TVKOV&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;19.	Obtain a listing of all divisions &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List tables TSPA, TSPAT, and TVKOS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;20.	Obtain a listing of sales areas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List table TVTA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;21.	Obtain a listing of sales offices&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List tables TVBUR, TVKBT, and TVKBZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;22.	Obtain a listing of sales groups&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;	List tables TVKGR, TVBVK, and TVGRT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;23.	ABAP programs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Review ABAP programs to ensure that all system function calls are authorized.  System function calls allow are Unix commands that are passed to the operating system to perform a task at the operating system level such as using Oracle SQL commands to query the database during the execution of an ABAP program.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;24.	Review all SAP userids at the Unix operating system level.  (etc/passwd and etc/group files)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SIDADM	system administration&lt;/P&gt;&lt;P&gt;ORASID	Oracle administration&lt;/P&gt;&lt;P&gt;PCTEMU	Terminal administration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;25.	Review all relevant SAP change control directories under Unix&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/usr/sap/trans&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;26.	Ensure that all default passwords have been changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;27.	Determine that only authorized users have direct access to the Oracle database management system.  And determine that all default system passwords have been changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;28.	Correction and Transport (CTS)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Control types&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default	Changes are allowed in corrections. Changes to SAP-provided objects require a repair correction&lt;/P&gt;&lt;P&gt;No Change	Changes are not allowed&lt;/P&gt;&lt;P&gt;Repairs	Repairs are allowed but all must have corrections and all corrections are flagged as repairs.  Other types of changes are allowed with or without corrections.&lt;/P&gt;&lt;P&gt;Unlimited	Any changes are allowed with or without corrections. No corrections are flagged as repairs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CTS Type		CTS Changes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Development		Default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Integration		No Change&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Consolidation		No Change&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recipient 		No Change&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Determine if change control procedures are formally documented.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Determine if separate instances have been defined for development and testing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Determine who is responsible for transport administration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ensure that control tables are properly established&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TSYST	defines all systems to be used in CTS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TASYS 	defines all recipient systems&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TDEVC	defines all development classes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use transaction code SE06 for CTS verification&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use Transaction code SE38 to review the placement of programs in authorization groups&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-	SE38 select attributes and select display&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;29.	Determine who has the capability to add user master records.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_USER_GRP and S_USER_ALL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;30.	Determine who can maintain profiles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_USER_PRO&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;31.	Determine who can maintain autorizations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_USER_AUT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;32.	List all SAP supplied profiles and  authorizations that have been modified and review for completeness.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;33.	List off the system parameter file (RSPARAM) and review the authentication controls&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-	login/min_password_lng&lt;/P&gt;&lt;P&gt;-	login/password_expiration_time&lt;/P&gt;&lt;P&gt;-	login/fails_to_session_end&lt;/P&gt;&lt;P&gt;-	login/fails_to_user_lock&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;34.	Determine how the profile SAP_NEW is being used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;35.	Review SAP for any new objects/values that have been defined&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Review changes to table AUTH for new fields and table TOBJ for new objects&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;36.	Determine if all users have been assigned to a group. (Table USR02)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;37.	Determine that the SAP* profile has a user master record and that SAP* has had its password changed and added to the SUPER group.  Also determine if the password has been stored in a secured location in case of an emergency.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;38.	Determine who are the members of the SUPER group and ensure that their membership is required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;39.	Determine how many users have SAP_ALL access in the production environment. List all users with the following standard system profiles:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SAP_ALL  	All R/3 privileges&lt;/P&gt;&lt;P&gt;S_A.SYSTEM	All SAP system functions&lt;/P&gt;&lt;P&gt;S_A.ADMIN	System administration&lt;/P&gt;&lt;P&gt;S_A.CUSTOMIZ  SAP customizing system&lt;/P&gt;&lt;P&gt;S_A.DEVELOP	SAP development environment&lt;/P&gt;&lt;P&gt;S_ABAP_ALL	All authorizations for ABAPs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TOOLS&amp;gt;ADMINISTRATION&amp;gt;USER MAINTENANCE&amp;gt;USERS&amp;gt;MAINTAIN USERS&amp;gt;INFORMATION&amp;gt;OVERVIEW&amp;gt;USERS&amp;gt; profile name &amp;gt;LIST&amp;gt;PRINT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;40.	List all users with special SAP system administration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_ADMI_FCD		Access to ABAP/4 Data Dictionary&lt;/P&gt;&lt;P&gt;S_BDC_ALL		Batch Input&lt;/P&gt;&lt;P&gt;S_DDIC_ALL		DYNPRO and ABAP/4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_EDI_BUK	Creating and modifying ABAP/4 programs and use of screen painter &lt;/P&gt;&lt;P&gt;	S_EDITOR		Ability to edit and modify ABAP&amp;#146;s programs &lt;/P&gt;&lt;P&gt;S_PROG_ADM	Running ABAP/4 programs and submitting background processing&lt;/P&gt;&lt;P&gt;S_PROGRAM	Ability to run ABAPs&lt;/P&gt;&lt;P&gt;      &lt;/P&gt;&lt;P&gt;       S_TABU_ADM		System Table &amp;#150; table maintenance&lt;/P&gt;&lt;P&gt;       S_BTCH_ADMS_ENQ_ALL   Background Processing&lt;/P&gt;&lt;P&gt;       S_TSKH_ADMS_ENQ_ALL   Transactions &amp;#150; lock management for processing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;41.	Determine who has access to the ABAP/4 Data Dictionary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_ADMI_FCD  	For this object list users that have the following values:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;REPL, SE01 (CTS requests) and/or DDIC in the System Administration Function field&lt;/P&gt;&lt;P&gt;SM21 in the Field Administration Function field (allows access to the system log)&lt;/P&gt;&lt;P&gt;TCOD which allows the user to change additional authorization checks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Versions for a particular object are maintained as:  Utilities&amp;gt;Version Management Menu.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;		Temp&lt;/P&gt;&lt;P&gt;		Historical&lt;/P&gt;&lt;P&gt;		Active&lt;/P&gt;&lt;P&gt;		Revised &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use Transactions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;		SE16		Data Browser&lt;/P&gt;&lt;P&gt;		SE12		Dictionary Display&lt;/P&gt;&lt;P&gt;		SE80		Object Browser&lt;/P&gt;&lt;P&gt;		SCU3		Table history transaction&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;42.	Determine who has batch access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_BDC_MONI&lt;/P&gt;&lt;P&gt;S_BDC_ALL&lt;/P&gt;&lt;P&gt;S_BTCH_ADM&lt;/P&gt;&lt;P&gt;S_BTCH_ALL&lt;/P&gt;&lt;P&gt;S_BTCH_USR&lt;/P&gt;&lt;P&gt;Batch log files (bdc/logfile) should be reviewed and any deletions, modifications, or abended sessions subject to investigation and should be secured through the correct use of the operating system security.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;43.	List users with authorization for SM04, SM50 (S_TSKH_ADM) which grants access to the transaction locking function.  Determine which transactions are locked on the production system by viewing additional authority checks in table TSTC (Tools&amp;gt;Administration&amp;gt;Tcode Administration).  Ensure that at a minimum the following transactions are locked:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SE01	Correction and transports&lt;/P&gt;&lt;P&gt;SE38	Ability to execute ABAP programs&lt;/P&gt;&lt;P&gt;SE11	Maintain data dictionary objects&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;44.	Determine if the parameters for the trace and log files are adequate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the RSPARAM report, review the rstr/* and rslg/* parameters&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a transaction cannot finish correctly, the system rolls it back.  The dialog program first generates a log record in the VBLOG table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Transaction SM21 or Tools&amp;gt;Administration&amp;gt;Monitoring&amp;gt;System Log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;		Selection Criteria:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;			Date/Time &amp;#150; To &amp;#150; Date/Time&lt;/P&gt;&lt;P&gt;			By User, Trans Code, SAP Process, Problem Classes (Messages)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;45.	Determine if Spool access is properly restricted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Verify who has the authorization object S_ADMI_FCD, S_SPO_ACT, and S_SPO_DEV&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;46.	Determine if backup procedures are appropriate for data and programs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On-line and off-line backups of all the file servers can be controlled through the CCMS.  Access to these transactions should be restricted, because these transactions can causes all file servers to shut down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is access to the SAP archiving function restricted. (Verify which profiles have access to transaction F040).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;47.	Determine who has access to the SAP customizing system (IMG, menu customizing) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_A.CUSTOMIZ	The profile gives all authorizations required for the Basis activities in the customizing menu.  (Table USR10 gives an overview of all authorization objects in a profile.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Puneet Gupta.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2007 05:23:28 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/need-help-with-security-tasks/m-p/2075759#M430253</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-04-09T05:23:28Z</dc:date>
    </item>
  </channel>
</rss>

