As an SAP Authorization consultant, year on year we go through Internal/External Audit trials and provide evidence/clarifications for the samples requested.
We need to justify if there a slippage in Process/Access assignments and leading to Audit Deficiencies failed to provide evidence.
Auditors will leave no chance to find a process gap like an eagle catching a fish which is just above the river 🙂
To avoid Audit deficiencies, we need to have a detailed SOP (Standard Operating Process), religiously follow the process and document exceptions, if any.
The most important aspect is to monitor Critical authorization assignments on monthly(suggested) or quarterly to assess unwanted assignments and remediate even before noticed by Audit team.
I have outlined most of the Critical Authorization monitoring controls as follows
Below table provides generic Audit Parameters to be configured in Production systems, which are most important with regards to Audit controls. Below values specified are with respect to SAP best practices and may differ from individual organizations as well.
Password Parameters | Value |
login/min_password_lng | 12 |
login/min_password_digits | 1 |
login/min_password_lowercase | 1 |
login/min_password_uppercase | 1 |
login/min_password_specials | 1 |
login/password_history_size | 4 |
Login and Session |
|
login/failed_user_auto_unlock | 1 |
login/fails_to_session_end | 3 |
login/fails_to_user_lock | 6 |
login/no_automatic_user_sapstar | 1 |
rdisp/gui_auto_logout | 1800 |
auth/object_disabling_active | N |
Sap Standard users such as SAP*, DDIC, TMSADM, SAPCPIC etc should have their initial password changed and keep locked these users in clients such as 000,001,066 & Prod client and in some cases TMSADM and DDIC will be kept unlocked in master clients.
To validate Execute Tcode RSUSR003.
SAP standard critical authorization profiles SAP_ALL or SAP_NEW must not be assigned
to any users in any of the clients.
To check Go to SUIM-->Users by Complex Selection Criteria-->Roles/Profiles-->Profile Name SAP_ALL and SAP_NEW.
Any users in Production client must not be assigned with SAP standard roles i.e Roles starting with SAP* or /*. To check go to SUIM-->Users by Complex Selection Criteria-->Roles/Profile--> SAP* or /*.
Access to create User master in Production should be restricted to Authorization team, since they need to create Service/System users. Dialog user creation should be via GRC system.
To Check SUIM >User by Complex Selection Criteria >S_USER_GRP ACTVT = 01
This access is restricted to Authorization team and any other user should not be assigned with.
SUIM report >User by Complex Selection Criteria >S_USER_GRP ACTVT = 02 or 06
In ideal scenario, IT/Business user login to Production system via SSO (Single Sign On). There are exceptions for password login such as IT Admin Users (Security & Basis) and few Business users, who need to connect to third party tools (example RF Gun) via Production user credentials. All the exceptions should be documented in SOP.
SUIM report > User by Complex Selection Criteria > S_USER_GRP ACTVT = 05
Debug change access must be restricted from any Dialog users in Production and it should be part of an FF user only.
To check SUIM report > User by Complex Selection Criteria > S_DEVELOP ACTVT = 02
and OBJTYPE = DEBUG
Only Basis/Release team should have access to import access in Production system.
SUIM>User by Complex Selection Criteria >S_CTS_ADM > Value= IMPA or IMPS
SUIM report > User by Complex Selection Criteria > S_TRANSPRT ACTVT = 60
No Users in Production should be assigned with all Program execute access.
SUIM >User by Complex Selection Criteria >S_PROGRAM P_ACTION = SUBMIT & P_GROUP = #*
All authorization objects in the roles should be in Standard or Maintained status. Any exceptions should be documented. As per SAP best practice no objects should be added manually and there will be adverse effect during upgrades, since tcodes will fail which are dependent on manually added objects, but not linked via SU24.
12. Custom Tcodes Without Authorization Object Linkage in SU24
Custom Tcode must be associated with authorizations objects maintained in SU24.
To check, extract all custom tcodes from SE16-->TSTC-->Z*
Next copy tcodes from TSTC into table USOBT_C to check tcodes with SU24 object mappings and if tcodes not available in the report, then such custom tcodes must be added with suitable auth object into SU24.
Batch admin access with Administrator i.e Y access should be restricted to Basis team.
SUIM report > User by Complex Selection Criteria > S_BTCH_ADM BTCADMIN = Y
SUIM report >User by Complex Selection Criteria >S_BTCH_JOB JOBACTION = DELE
SUIM report > User by Complex Selection Criteria > S_BDC_MONI BDCAKTI = REOG or DELE
SUIM report > User by Complex Selection Criteria > S_BDC_MONI BDCGROUPID = #*
This acccess should be restricted to either basis team or Batch Monitroing teams.
SUIM report > User by Complex Selection Criteria > S_TCODE = SM59 and S_ADMI_FCD = NADM
This access should not be assigned to any Dialog users in Production system. For Batch job users also assign only required RFC authorization based on trace results, rather assigning full access.
SUIM report > User by Complex Selection Criteria > S_RFC = #* (or S_RFC = "*")
SUIM report >User by Complex Selection Criteria >S_TABU_DIS ACTVT = 02 and DICBERCLS = #*
SUIM report >User by Complex Selection Criteria >S_TABU_NAM ACTVT = 02 and TABLE = #*
You may be wondering why display access is critical, this is because a business user with display access on all tables can view Business critical information and leading to Business loss/audit deficiency.
SUIM report >User by Complex Selection Criteria >S_TABU_DIS ACTVT = 03 and DICBERCLS = #*
SUIM report >User by Complex Selection Criteria > S_TABU_NAM ACTVT = 03 and TABLE = #*
SUIM report User by Complex Selection Criteria >S_TABU_DIS ACTVT = 02 and DICBERCLS = SS
SUIM report >User by Complex Selection Criteria >S_TABU_NAM ACTVT = 02 and TABLE = T000
Note: Auth Group SS contains Security relevant tables and hence should be assigned to IT team only.
Tables i.e Both Standard and Custom, that are not mapped to specific authorization groups, will be automatically assigned to &NC& group. We need to make sure no users should have change access to group &NC& in Production.
SUIM report > User by Complex Selection Criteria > S_TABU_CLI CLIIDMAINT = X
Conclusion:
Frequent monitoring of above critical access assignments will help to be prepared for Audit at any day and IT HPA (High Privilege Access) review as well, to make sure only relevant IT users assigned with privileged access.
Regards
Shivkumar
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
12 | |
9 | |
9 | |
7 | |
7 | |
6 | |
6 | |
6 | |
5 | |
5 |