‎2006 Sep 29 10:14 PM
Hi,
I am working on a project plan to re-design R/3 security for my company. We have SAP implemented globally. Currently security is a mess and they are using piece by piece methodology. I am suggesting them to use Role based security concept. Can someone guide me where I can find documentation that would show me how other companies have implement security within their organizations or what is the SAP Best Practice when it comes to implementing SAP security. Any kind of information in regards to project plan will also be helpful. Thanks in advance
‎2006 Sep 30 6:18 AM
hi
hope these links will help u.
http://easymarketplace.de/online-pdfs.php
http://help.sap.com/printdocu/core/Print46c/en/data/pdf/BCCSTADM/BCCSTSAL.pdf
http://help.sap.com/printdocu/core/Print46c/en/data/pdf/BCSECAUDLOG/BCSECSAL.pdf
reward points if it is helpful
Regards
Alfred
‎2006 Sep 30 6:18 AM
hi
hope these links will help u.
http://easymarketplace.de/online-pdfs.php
http://help.sap.com/printdocu/core/Print46c/en/data/pdf/BCCSTADM/BCCSTSAL.pdf
http://help.sap.com/printdocu/core/Print46c/en/data/pdf/BCSECAUDLOG/BCSECSAL.pdf
reward points if it is helpful
Regards
Alfred
‎2006 Sep 30 6:42 AM
Hi,
A better understanding of Segregation of Duties (SOD) and inputs of SOX at this link as well.
http://sapecc.com/sox_sod/sod_matrix.htm
(The web site has no relation to SAP or its affiliates ).
hopefully it helps in ur quest.
Thanks for the points./
Br,
Sri
‎2006 Oct 03 10:27 AM
Hi
You should try to have a look at this book from SAP-Press:
<a href="http://www.sap-press.com/product.cfm?account=&product=H963">SAP Authorization System</a>
Please notice the described methodology isn't the only methodology
In a landscape where your already running SAP - it will also be a god idea to activate the secure audit log (over a short period of time - and preferably over a month end)to record all user and which transactions they call, hereby obtain some data about which transactions they are using - You can use this, combined with the methodology described to do some reverse engineering as well.
Regards
Morten Nielsen