Financial Management Blog Posts by SAP
Get financial management insights from blog posts by SAP experts. Find and share tips on how to increase efficiency, reduce risk, and optimize working capital.
cancel
Showing results for 
Search instead for 
Did you mean: 
ElyasAhmed
Product and Topic Expert
Product and Topic Expert
1,135

Introduction: Segregation of Duties (SoD) is a critical control mechanism to prevent fraud and errors in business processes. However, as organizations operate across multiple systems, managing SoD risks becomes more complex. This blog explores best practices for defining, mitigating, and monitoring SoD risks across interconnected systems.

Understanding Cross-System SoD Risks: Cross-system SoD risks arise when users have access to conflicting functions across multiple applications. For example, if an organization uses SAP S/4HANA for finance and SAP Ariba for procurement, a cross-application risk could occur if a user has both "Invoice Approval" in S/4HANA and "Purchase Order Approval" in Ariba.

Managing Cross-System Risks: To manage cross-system segregation of duties across various applications, the following activities should be undertaken:

1. Cross-System Risk Definition:

IAG seamlessly integrates with a variety of on-premise and cloud applications, each with its own unique authorization model. To enable effective SoD analysis, IAG standardizes these diverse authorization concepts into a unified framework for access evaluation.

Here is a list of actions that can be considered when defining rulesets and extracting authorizations from different IAG-monitored applications:

Application TypeAction TypeType
ARIBAAriba GroupARIBA
AZUREMicrosoft AzureAZURE
BTP_ABAPSAP BTP ABAP EnvironmentBABAP
C4CSAP Sales Cloud and SAP Service CloudC4C
CLOUDFOUNDRYSAP Cloud Foundry RoleCFRL
 SAP Cloud FoundryCF
CONCURSAP Concur RoleCONCR
 SAP Concur EntitlementCONCE
FIELDGLASSSAP Field GlassFGLAS
IAS2SAP Identity Authentication ServiceIAS
LDAPLightweight Directory Access Protocol GroupLDAP
SAPERP / S4HANATransaction CodeTCD
 WebDynPro ApplicationWDY
 OData ServiceSVC
S4HANACLOUD / SAPIBP / SAPMKTFiori Catalog GroupFGRP
 Fiori CatalogFCAT
 Fiori ApplicationFAPP
 OData ServiceSVC
SACSAP Analytics CloudSAC
SCPSAP Cloud PlatformSCP
SFECSAP SuccessFactorsSFEC

Additionally, you can integrate with any application that supports the SCIM protocol, allowing you to map its authorization structure to SAP Cloud Identity Access Governance and assess access risks effectively.

2. Mitigation Control Assignments:

Mitigation control assignments involve identifying, documenting, and managing compensating mitigating controls for users who have conflicting access rights that could pose a risk of fraud or error. These assignments are typically necessary when a user requires access to conflicting roles or transactions due to business needs.

Control assignments can be applied either directly to the user with the SoD violation or to the specific access (roles or business role) that led to the violation.

3. Control Monitoring:

Regularly check the effectiveness of implemented controls and ensure they are functioning as intended. Every control is defined with test plan which can be executed by control monitor in a specified frequency and confirm the effectiveness of control. 

4. Risk Remediation:

Risk remediation involves resolving identified Segregation of Duties (SoD) conflicts by adjusting or eliminating the access that creates the conflict. This may include refining the user access, revoking excess permissions, or restructuring access rights to eliminate the risk.

Refining user access involves generating proposals that either eliminate conflicting access or suggest alternative access options. These proposals are based on actual usage patterns and aim to maintain necessary functionality while ensuring risk-free access.

The sample below illustrates the cross-system risk between Concur and S/4HANA Cloud applications:

Risk IDConcur FunctionS/4HANA Cloud FunctionDescription of RiskRisk Level
CONXS405

CONEXP02: Concur - Create and submit expense reports and cash advances

S4CPS01: Project Master DataCreate and submit expense reports on a project and maintain project master dataHigh
CONXS406CONINV07: Concur - Create and submit invoicesS4CPS01: Project Master DataCreate and submit expense invoice on a project and maintain project master dataHigh

 

Function IDDescription of FunctionActionType
CONEXP02CONEXP02: Concur - Create and submit expense reports and cash advancesEXP_USERCONCR
CONINV07CONINV07: Concur - Create and submit invoicesINV_PMT_USERCONCR
S4CPS01S4CPS01: Project Master DataSAP_PSM_BC_MD_BDGTRESP_PCFCAT
S4CPS01S4CPS01: Project Master DataSAP_PSM_BC_MD_BDGTSP_PCFCAT

 

Tips for Managing Cross-System SoD Risks in SAP Cloud IAG

  1. To help customers streamline their implementation, SAP delivers industry standard ruleset for specific applications that can be customized to meet specific requirements.   SAP Note 2782388: IAG - How to load default standard ruleset explains how you can request that standard rulesets be loaded into SAP Cloud Identity Access Governance.
  2. When defining cross-system risks, the recommendation is to first define the application-specific ruleset for each involved application and then define or load the cross-system ruleset.
  3. To account for the combination of applications in cross-system risk analysis, you need to create a business function group with the 'Cross Application' type for those applications. While you can group all relevant applications into a single business function group that may pose cross-application business risks, each identified risk must involve at least two applications as a subset of the group.
  4. In a bridge scenario where SAP Access Control is connected, you can perform the Risk Definition Synchronization as a one-time job. Any further updates should be managed within SAP Cloud Identity Access Governance including cloud application and cross system ruleset.
  5. When mitigating cross-system risks, you can either apply mitigation to a specific application or across all applications for a particular user. Additionally, mitigation can be applied indirectly when a user causes a violation due to specific access or business role assignment.

Conclusion: Effective cross-system SoD management is not a one-time task but a continuous process requiring proactive governance, real-time monitoring, and periodic risk reviews. By leveraging automated controls and best practices, organizations can stay compliant and secure in an evolving IT landscape.

 

Author

  • Senthil Chinnathambi – Product Manager
1 Comment