SAP Access Control


What is SAP Access Control?

Improper access is a major security threat to SAP and other enterprise systems. The issue only gets worse as employees increasingly access their relevant applications remotely and on varying, often personal, devices. The goal of SAP Access Control is to ensure the right people are using the right software from the right device. It also helps track access information in case it needs to be reported later for compliance purposes or assessed for risk.

SAP Access Control’s key functions include:

  • Risk analysis
  • User provisioning
  • Monitoring privileges
  • Certifying authorizations
  • Integration with enterprise systems
  • Role definition and maintenance

Key SAP Access Control Considerations for SAPinsiders

What is SAP Access Control?

Improper access is a major security threat to SAP and other enterprise systems. The issue only gets worse as employees increasingly access their relevant applications remotely and on varying, often personal, devices. The goal of SAP Access Control is to ensure the right people are using the right software from the right device. It also helps track access information in case it needs to be reported later for compliance purposes or assessed for risk.

SAP Access Control’s key functions include:

  • Risk analysis
  • User provisioning
  • Monitoring privileges
  • Certifying authorizations
  • Integration with enterprise systems
  • Role definition and maintenance

Key SAP Access Control Considerations for SAPinsiders

  • Quantify how improving user access and identity management impacts the bottom line. Most governance, risk, and compliance (GRC) organizations surveyed for our recent User Access and Identity Management for SAP S/4HANA report are facing budget constraints. That can make it hard to invest in software like SAP Access Control, but you can build the business case by finding those areas where unauthorized access can be costly. Added costs can come from cyberattacks, fraud, compliance-related fines, and rework to address audit issues. The cybersecurity threats are real — over a quarter of respondents noted having an access-related security breach in our April 2021 Securing the SAP Landscape Against Cyber Threats report.
  • Audit your user access landscape. First, gain an understanding of which users are accessing which systems and why. Then, survey your users and identify which roles need which systems. These steps can help you be more efficient in integrating your access across your technology footprint.
  • Integrate user access and identity management across your technology stack as part of your migration. Respondents to our latest User Access and Identity Management survey who worked for leading organizations were much more likely to integrate user access and identity management as part of digital transformation and integrate identity management across their heterogeneous application landscapes. These actions can help you optimize investment in software like SAP Access Control and create a holistic user access and identity management strategy.
  • Centralize user access and identity processes to maximize your next technology investment. Centralizing user access and identity management can provide benefits that reduce risk, enable compliance, and make securing your systems easier. However, you must first unify the process by which you identify users and grant access to systems, no matter the business area or solution. That will make any technological investment more valuable when implemented.

70 results

  1. Drinking Water Company Vitens Connects HR and GRC Business Roles to Achieve an 80% Automated Provisioning Rate

    Published: 19/February/2020

    Reading time: 9 mins

    For global organizations that serve millions of customers who depend on on-time delivery of products and services, having efficient processes to onboard new employees is critical. One such SAP customer is Vitens — a drinking water company with 1,400 internal employees that serves 5.6 million customers across five provinces in The Netherlands and maintains 49,000…

  2. Cooper Standard Accelerates Cross-Platform Access Management

    Published: 06/November/2019

    Reading time: 8 mins

    When Cooper Standard — systems and components provider for the automotive and industrial industries — saw the need to automate access management, the company undertook a project would affect over 11,000 desktop users, require defining common processes to meet compliance requirements, and improve control over its heterogenous SAP and non-SAP application landscape. Learn how the company came…

  3. Access Controls: Protect Your Company From Fraud With The 5 W’s

    Published: 01/October/2019

    Reading time: 1 min

    Access Controls: Protect Your Company from Fraud with the 5 W’s

  4. GRC: Case study: How Mars successfully completed a global SAP security redesign with SAP Access Control and built a security “playbook” to guide the project

    Published: 10/March/2019

    Reading time: 1 mins

    Learn how Mars revamped its SAP security, minimized segregation of duties (SoD) risk, and increased efficiencies around access provisioning. Click this link to view the slides from this session — GRC2017_Kowalick_Casestudyhowmarssuccessfully.   Donna Kowalick If you have comments about this article or publication, or would like to submit an article idea, please contact the editor....…

  5. GRC: Case study: How Newport News Shipbuilding analyzed over 2,000 custom transactions in order to assess their impact on its control framework

    Published: 10/March/2019

    Reading time: 1 mins

    Learn how Newport News Shipbuilding leveraged SAP access risk analysis to review over 2,000 custom transactions across 6,000 programs created with 15 million lines of custom code to assess their impact on its control framework. Click this link to view the slides from this session — GRC2017_Rogers_Casestudyhownewportnews. Deborah Rogers If you have comments about this article...…

  6. GRC: Case study: How Stanley Black & Decker implemented and manages SAP Access Control for multiple SAP instances

    Published: 10/March/2019

    Reading time: 1 mins

    Learn how Stanley Black & Decker implemented SAP Access Control to manage and mitigate security risks, improve SoD reporting capabilities, and automate its security provisioning processes. Click this link to view the slides from this session — GRC2017_Hodge_Casestudyhowstanley_V2.   Rebecca Hodge If you have comments about this article or publication, or would like to submit...…

  7. GRC: Case study: How Johnson & Johnson deployed SAP Access Control to advance its corporate risk and compliance imperatives

    Published: 10/March/2019

    Reading time: 1 mins

    Learn how Johnson & Johnson deployed a global SAP Access Control blueprint for a highly decentralized environment. Click this link to view the slides from this session — GRC2017_Paradkar_Nash_Casestudyhowjohnsonjohnsondeployed.   Alka Paradkar If you have comments about this article or publication, or would like to submit an article idea, please contact the editor. Neena Nash...…

  8. HR: Case study: Insights into Valero Energy’s HCM security processes

    Published: 05/March/2019

    Reading time: 1 mins

    Since implementing on-premise security 10 years ago, Valero Energy has gone through numerous reorganizations as a result of acquisitions, divestitures, integration of its Canadian employee base, and an implementation of ESS/MSS functionality. Its security processes also evolved to keep up with the new or changed roles. Find out lessons learned and gain insights into vulnerabilities...…

  9. GRC: Case study: Transforming access security through a role rebuild at Armstrong Flooring

    Published: 01/March/2019

    Reading time: 1 mins

    Learn how Armstrong Flooring undertook a full role rebuild, leveraging usage reports from SAP Access Control and implementing a task-based architecture here Richard Batchelor If you have comments about this article or publication, or would like to submit an article idea, please contact the editor.... Membership Required You must be a member to access this…

  10. GRC: Case study: How ConocoPhillips conducts user access reviews and monitors transaction usage in SAP Access Control

    Published: 01/March/2019

    Reading time: 1 mins

    Learn how ConocoPhillips uses SAP Access Control tools to conduct periodic reviews, gather transaction usage statistics, and determine who is accessing its SAP systems. here Trevor Wyatt If you have comments about this article or publication, or would like to submit an article idea, please contact the editor.... Membership Required You must be a member…