Though the space relegated to these objects, taken individually, might seem low in your ECC or other SAP system, the logs are created wherever SAP security is used. Looking at the number of systems, the effect of the change and change history for data that is seldom accessed can have impact for technical groups and storage cost and system performance.
Chart: Examples of forgotten archive objects (change history docs)
Archiv Object | Archive Object Description | Table | Table Description |
---|---|---|---|
US_AUTH | User Master Change Documents: Authorizations | USH12 | Change history for authorization values |
US_PASS | Change Documents: User (Other Data) | USH02 | Change history for logon data |
US_PROF | User Master Change Documents: Authorize Profiles | USH10 | Change history for authorization profiles |
US_USER | User Master Change Documents: User Authorizations | USH04 | Change history for authorizations |
Archiving
these security change history logs cannot only free up additional space in your SAP system, but still meet compliance governance requirements. Also, once you archive data, it is static and cannot be changed or deleted thus supporting the company’s purge strategy and protecting the data for audit/governance.
Other advantages to archiving change logs:
It helps to have an understanding of the security areas and how they are tied to governance and audit. Dolphin has worked with many customers on archiving and creating an archiving strategy that streamlines the infrastructure and secures access. This encompasses when to archive, how to retrieve the archived data and documentation for governance and audit.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
3 | |
3 | |
2 | |
2 | |
2 | |
2 | |
1 | |
1 | |
1 | |
1 |