Enterprise Resource Planning Blogs by Members
Gain new perspectives and knowledge about enterprise resource planning in blog posts from community members. Share your own comments and ERP insights today!
cancel
Showing results for 
Search instead for 
Did you mean: 
Former Member
1,392

When most people think of archiving, they usually think of transactional business data such as
FI/CO, SD data or technical data (archiving objects; i.e., workitems or idocs). Yet there are also objects for SAP security which take up valuable system space in all SAP systems but are not frequently used. These archive objects will allow the data within the SAP security change history tables to be archived. Once data is archived, it can be move from the main database storage (tier one storage), to lower level storage media.

 

Though the space relegated to these objects, taken individually, might seem low in your ECC or other SAP system, the logs are created wherever SAP security is used. Looking at the number of systems, the effect of the change and change history for data that is seldom accessed can have impact for technical groups and storage cost and system performance.

Chart: Examples of forgotten archive objects (change history docs)

Archiv ObjectArchive Object DescriptionTable Table Description

US_AUTH

User Master Change Documents: AuthorizationsUSH12Change history for authorization values
US_PASSChange Documents: User (Other Data)USH02Change history for logon data
US_PROFUser Master Change Documents: Authorize ProfilesUSH10Change history for authorization profiles
US_USERUser Master Change Documents: User AuthorizationsUSH04Change history for authorizations

Archiving
these security change history logs cannot only free up additional space in your SAP system, but still meet compliance governance requirements.  Also, once you archive data, it is static and cannot be changed or deleted thus supporting the company’s purge strategy and protecting the data for audit/governance.

Other advantages to archiving change logs:

  • Once data has been archived, the change logs cannot be accidently deleted from the SAP system
  • Allows for storage of change logs to reside on lower cost media while maintaining accessibility to the log data supporting teams, such as:
    • Security
      team
    • Governance
      and Audit
    • Others
  • Opens space in system(s) for the critical business operations
  • Allows for the development of a purge strategy for change logs
  • Does not have impact on business because the security archiving objects fits with technical archiving
  • Cannot accidently be purged from the SAP system

It helps to have an understanding of the security areas and how they are tied to governance and audit. Dolphin has worked with many customers on archiving and creating an archiving strategy that streamlines the infrastructure and secures access. This encompasses when to archive, how to retrieve the archived data and documentation for governance and audit.

1 Comment
Labels in this area