Application Development and Automation Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 
Read only

Redesign Security

Former Member
0 Likes
733

Hi,

I am working on a project plan to re-design R/3 security for my company. We have SAP implemented globally. Currently security is a mess and they are using piece by piece methodology. I am suggesting them to use Role based security concept. Can someone guide me where I can find documentation that would show me how other companies have implement security within their organizations or what is the SAP Best Practice when it comes to implementing SAP security. Any kind of information in regards to project plan will also be helpful. Thanks in advance

1 ACCEPTED SOLUTION
Read only

Former Member
3 REPLIES 3
Read only

Former Member
Read only

0 Likes
511

Hi,

A better understanding of Segregation of Duties (SOD) and inputs of SOX at this link as well.

http://sapecc.com/sox_sod/sod_matrix.htm

(The web site has no relation to SAP or its affiliates ).

hopefully it helps in ur quest.

Thanks for the points./

Br,

Sri

Read only

morten_nielsen
Active Contributor
0 Likes
511

Hi

You should try to have a look at this book from SAP-Press:

<a href="http://www.sap-press.com/product.cfm?account=&product=H963">SAP Authorization System</a>

Please notice the described methodology isn't the only methodology

In a landscape where your already running SAP - it will also be a god idea to activate the secure audit log (over a short period of time - and preferably over a month end)to record all user and which transactions they call, hereby obtain some data about which transactions they are using - You can use this, combined with the methodology described to do some reverse engineering as well.

Regards

Morten Nielsen