<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Critical Tcodes and Security Objects in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181697#M757533</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All transaction codes in SAP are more or less critical, when executed by incompetent users or people with malicious intents... there is no exhaustive list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition, limitations on t-codes need to be related to the underlying authorization objects in order to provide a fairly safe operating environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for creating a foolproof system, there's only one method: lock all users. &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Jan 2008 09:15:25 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2008-01-11T09:15:25Z</dc:date>
    <item>
      <title>Critical Tcodes and Security Objects</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181693#M757529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please provide a list of Critical Tcodes(all Modules) and Critical Authorization Objects.&lt;/P&gt;&lt;P&gt;How to determine whether a certain a Tcode id Critical fro a Project?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Dec 2007 06:29:00 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181693#M757529</guid>
      <dc:creator>former_member759680</dc:creator>
      <dc:date>2007-12-26T06:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: Critical Tcodes and Security Objects</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181694#M757530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gautam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this link helps you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://sapnetweavernotes.blogspot.com/search/label/SoD-%20Matrix" target="test_blank"&gt;http://sapnetweavernotes.blogspot.com/search/label/SoD-%20Matrix&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;kishore&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Dec 2007 06:57:32 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181694#M757530</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-12-26T06:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: Critical Tcodes and Security Objects</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181695#M757531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     Critacal  T.CODES  SA38,SE38,STMS,SE01.   Like we have some tcodes which should not not have access to every one, specially sa38 and se38 in production server. if you want briefe go through with this link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw70/helpdata/en/0e/4f8f40f3b19920e10000000a1550b0/frameset.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw70/helpdata/en/0e/4f8f40f3b19920e10000000a1550b0/frameset.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;lt;removed_by_moderator&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Dec 2007 18:10:13 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181695#M757531</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-12-26T18:10:13Z</dc:date>
    </item>
    <item>
      <title>Re: Critical Tcodes and Security Objects</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181696#M757532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;for database administration you have &lt;/P&gt;&lt;P&gt;DB01	Analyze exclusive lock waits&lt;/P&gt;&lt;P&gt;DB02	Analyze tables and indexes&lt;/P&gt;&lt;P&gt;DB03	Parameter changes in database&lt;/P&gt;&lt;P&gt;DB11	Early Watch Profile Maintenance&lt;/P&gt;&lt;P&gt;DB12	Overview of Backup Logs&lt;/P&gt;&lt;P&gt;DB13	Database administration calendar&lt;/P&gt;&lt;P&gt;DB14	Show SAPDBA Action Logs&lt;/P&gt;&lt;P&gt;DB15	Data Archiving: Database Tables&lt;/P&gt;&lt;P&gt;DB16	DB System Check: Monitor&lt;/P&gt;&lt;P&gt;DB17	DB System Check: Configuration&lt;/P&gt;&lt;P&gt;DMIG	Start Transaction for Data Migration&lt;/P&gt;&lt;P&gt;DB2	Select Database Activities&lt;/P&gt;&lt;P&gt;DB20	DB Cost-Based Optimizer: Tab. Stats&lt;/P&gt;&lt;P&gt;DB21	DB Cost-Based Optimizer: Config.&lt;/P&gt;&lt;P&gt;DB24	Database Operations Monitor&lt;/P&gt;&lt;P&gt;DB26	DB Profile:Monitor and Configuration&lt;/P&gt;&lt;P&gt;DB2J	Manage JCL jobs for OS/390&lt;/P&gt;&lt;P&gt;DBCO	Database Connection Maintenance&lt;/P&gt;&lt;P&gt;AL02	Database alert monitor&lt;/P&gt;&lt;P&gt;AL09	Data for database expertise&lt;/P&gt;&lt;P&gt;ST04	Select activity of the databases&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for system administration you have,&lt;/P&gt;&lt;P&gt;OSS1	Logon to Online ServiceSystem&lt;/P&gt;&lt;P&gt;SAINT	 Plug-in Installation&lt;/P&gt;&lt;P&gt;SICK	Installation Check&lt;/P&gt;&lt;P&gt;SM01	Lock Transactions&lt;/P&gt;&lt;P&gt;SM02	System Messages&lt;/P&gt;&lt;P&gt;SM12	Display and Delete Locks&lt;/P&gt;&lt;P&gt;SM13	Display Update Records&lt;/P&gt;&lt;P&gt;SM14	Update Program Administration&lt;/P&gt;&lt;P&gt;SM21	System log&lt;/P&gt;&lt;P&gt;SM23	System Log Analysis&lt;/P&gt;&lt;P&gt;SM28	Installation Check&lt;/P&gt;&lt;P&gt;SM29	Model Transfer for Tables&lt;/P&gt;&lt;P&gt;SM30	Call Up View Maintenance&lt;/P&gt;&lt;P&gt;SM34	Viewcluster maintenancecall&lt;/P&gt;&lt;P&gt;SM35	Batch Input Monitoring&lt;/P&gt;&lt;P&gt;SM36	Batch request&lt;/P&gt;&lt;P&gt;SM37	Background job overview&lt;/P&gt;&lt;P&gt;SM38	Queue Maintenance Transaction&lt;/P&gt;&lt;P&gt;SM39	Job analysis&lt;/P&gt;&lt;P&gt;SM49	Execute Logical Commands&lt;/P&gt;&lt;P&gt;SM50	Work Process Overview&lt;/P&gt;&lt;P&gt;SM51	List of SAP Servers&lt;/P&gt;&lt;P&gt;SM54	TXCOM maintenance&lt;/P&gt;&lt;P&gt;SM55	THOST maintenance&lt;/P&gt;&lt;P&gt;SM56	Number Range Buffer&lt;/P&gt;&lt;P&gt;SM58	Asynchronous RFC Error Log&lt;/P&gt;&lt;P&gt;SM59	RFC Destinations (Display/Maintain)&lt;/P&gt;&lt;P&gt;SM60	Borrow/Return Objects&lt;/P&gt;&lt;P&gt;SM61	&lt;/P&gt;&lt;P&gt;SM62	&lt;/P&gt;&lt;P&gt;SM63	Display/Maintain Operating Mode Sets&lt;/P&gt;&lt;P&gt;SM64	Release of an event&lt;/P&gt;&lt;P&gt;SM65	Background Processing Analysis Tool&lt;/P&gt;&lt;P&gt;SM66	System-wide Work Process Overview&lt;/P&gt;&lt;P&gt;SM67	Job scheduling&lt;/P&gt;&lt;P&gt;SM68	Job administration&lt;/P&gt;&lt;P&gt;SM69	Display/Maintain Logical Commands&lt;/P&gt;&lt;P&gt;SMEN	Dynamic menu&lt;/P&gt;&lt;P&gt;SMGW	Gateway Monitor&lt;/P&gt;&lt;P&gt;SMLG	Maintain Logon Group&lt;/P&gt;&lt;P&gt;SMLI	Language import utility&lt;/P&gt;&lt;P&gt;SMLT	Language transport utility&lt;/P&gt;&lt;P&gt;SMOD	SAP Enhancement Management&lt;/P&gt;&lt;P&gt;SMT1	Trusted Systems (Display &amp;lt;-&amp;gt; Maint.)&lt;/P&gt;&lt;P&gt;SMT2	Trusting systems (Display &amp;lt;-&amp;gt;Maint.)&lt;/P&gt;&lt;P&gt;ST06	Operating System Monitor&lt;/P&gt;&lt;P&gt;RZ20	CCMS Monitoring&lt;/P&gt;&lt;P&gt;SSAA	System Administration Assistant&lt;/P&gt;&lt;P&gt;SSCA	Appointment Diary: Administration&lt;/P&gt;&lt;P&gt;SRZL	CCMS&lt;/P&gt;&lt;P&gt;SSM1	Session Manager generation call&lt;/P&gt;&lt;P&gt;ST01	System Trace&lt;/P&gt;&lt;P&gt;ST02	Setups/Tune Buffers&lt;/P&gt;&lt;P&gt;ST03	Performance, SAP Statistics, Workload&lt;/P&gt;&lt;P&gt;ST05	SQL Trace&lt;/P&gt;&lt;P&gt;ST07	Application monitor&lt;/P&gt;&lt;P&gt;ST08	Network Monitor&lt;/P&gt;&lt;P&gt;ST11	Display Developer Traces&lt;/P&gt;&lt;P&gt;ST12	Application Monitor&lt;/P&gt;&lt;P&gt;ST14	Application Analysis&lt;/P&gt;&lt;P&gt;ST22	ABAP Runtime Error Analysis&lt;/P&gt;&lt;P&gt;ST22	ABAP/4 Runtime Error Analysis&lt;/P&gt;&lt;P&gt;ST62	Create industry short texts&lt;/P&gt;&lt;P&gt;STAT	Local transaction statistics&lt;/P&gt;&lt;P&gt;STUN	Performance Monitoring&lt;/P&gt;&lt;P&gt;SQ01	SAP Query: Maintain queries&lt;/P&gt;&lt;P&gt;SQ02	SAP Query: Maintain funct. areas&lt;/P&gt;&lt;P&gt;SQ03	SAP Query: Maintain user groups&lt;/P&gt;&lt;P&gt;SQ07	SAP Query: Language comparison&lt;/P&gt;&lt;P&gt;SQVI	QuickViewer&lt;/P&gt;&lt;P&gt;SPHA	Telephony administration&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2007 10:09:21 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181696#M757532</guid>
      <dc:creator>hiralsoni</dc:creator>
      <dc:date>2007-12-27T10:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: Critical Tcodes and Security Objects</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181697#M757533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All transaction codes in SAP are more or less critical, when executed by incompetent users or people with malicious intents... there is no exhaustive list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition, limitations on t-codes need to be related to the underlying authorization objects in order to provide a fairly safe operating environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for creating a foolproof system, there's only one method: lock all users. &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 09:15:25 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181697#M757533</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-01-11T09:15:25Z</dc:date>
    </item>
    <item>
      <title>Re: Critical Tcodes and Security Objects</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181698#M757534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Simple answer, as long as you are in project mode In a DEV or QAS system, noting is really critical.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is really critical after go-live needs to be determined by your company, normally this is done by the department of the controller or something alike. Anyway it should be under the finance manager as he is personnally reponsible when something goes wrong!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for examples of critical TRX see other answers, although these are probably far from a complete list!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 18:16:23 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/critical-tcodes-and-security-objects/m-p/3181698#M757534</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-01-11T18:16:23Z</dc:date>
    </item>
  </channel>
</rss>

