SlideShare une entreprise Scribd logo
1  sur  27
Security Mapping  Overview
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Control Techniques Business Process Controls Umbrella Non-SAP Business Processes SAP standard SAP configured Authorization Monitoring Manual SAP Risks Risks Risks Risks Risks
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Have Security? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What defines a Security Role? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Design Approach Observation 3 SAP Position “ Customer  Service” SAP transaction(s) are assigned to roles but a transaction should only be assigned to one role. Roles are mapped to SAP positions which are then mapped to users. Role(s) “ Change Sales Order” SAP Transaction(s) VA01
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Global One Security Template Wave One Wave Two Wave Three Wave Four North America security design as the baseline Final Global  Template Localize Global  Template North American security foundation 80% 20% change from North America Minor changes to Global Template Security can be  accommodated within reason.  (e.g. new transaction codes and new SAP Positions) Design security for Global One
Security Design Approach Observation 3 SAP Position “ Customer  Service” SAP transaction(s) are assigned to roles Roles are mapped to SAP positions which are then mapped to users. Role(s) “ Change Sales Order” SAP Transaction(s) VA01
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Enterprise Structure (Hierarchy) Drives...
Organizational Structure Options and Localization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scope of Organizational Hierarchy for Global One ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Role Example Display Purchasing GM_XXX_FTS_DIS_PURCHASNG Role Transaction Create Purchase Req (ME51) SAP Position Change Purchase Req (ME52) Display Purchase Req (ME53) Display Materials (MM03) Create Purchase  Order (ME21N) Change Purchase  Order (ME22N) Jian Min Carlos Jorge Françoise Strategic  Purchasing  Plant Buyer Create/Change Purch Req GM_XXX_FTS_CHG_PUR_REQ Display Master Data GM_XXX_MDT_GEN_DISPLAY User Create/Change Purchase Order GM_XXX_FTS_CHG_PO
Transactions by roles
Master and Derived roles
List of SAP Positions
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who Are The Data Owners? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AR UY CL CA US Southern Cluster North America Global EXAMPLE 1 -  A Finance User works in Argentina; has access to view or modify Argentina data in SAP: - The Finance User wants access to view and update US information.  The User needs to request approval from the US Data Owner.  This should be the US Finance Data Owner. - Request should also be approved by the Finance Data Owner of the country the person works for, prior to being issued access.  i.e. two approvals, one from Argentina and one from the US PY Security Access Approvers – Data Owners
Security Access Approvers – Data Owners PY CL AR Southern Cluster Global ,[object Object],[object Object],[object Object],[object Object],UY
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Segregation of Duties – Security Team Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Are The Objectives of the Security Role Mapping Workshop? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Next Steps ,[object Object],[object Object],[object Object],[object Object]
[object Object]

Contenu connexe

Tendances

Sap security-administration
Sap security-administrationSap security-administration
Sap security-administrationnanda nanda
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online traininggrconlinetraining
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRCAnil Kumar
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...akquinet enterprise solutions GmbH
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infosapdocs. info
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsRohan Andrews
 
sap security interview_questions
sap security interview_questionssap security interview_questions
sap security interview_questionssumitmsn2
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation hkodali
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 trainingsuresh
 
SU01 - Background and Instruction
SU01  - Background and InstructionSU01  - Background and Instruction
SU01 - Background and InstructionMart Leepin
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap securityyektek
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0Latha Kamal
 

Tendances (20)

Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
SAP Security interview questions
SAP Security interview questionsSAP Security interview questions
SAP Security interview questions
 
Sap security tasks
Sap security tasksSap security tasks
Sap security tasks
 
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
 
Sap Security
Sap SecuritySap Security
Sap Security
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security
 
165373293 sap-security-q
165373293 sap-security-q165373293 sap-security-q
165373293 sap-security-q
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.info
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
 
sap security interview_questions
sap security interview_questionssap security interview_questions
sap security interview_questions
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
 
SU01 - Background and Instruction
SU01  - Background and InstructionSU01  - Background and Instruction
SU01 - Background and Instruction
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
 
Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 

Similaire à Security Mapping Overview

Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleSalesforce Developers
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...NextLabs, Inc.
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIINextLabs, Inc.
 
Best Practices for Integrating with Your ERP
Best Practices for Integrating with Your ERPBest Practices for Integrating with Your ERP
Best Practices for Integrating with Your ERPdreamforce2006
 
Aen004 Thorpe 091807
Aen004 Thorpe 091807Aen004 Thorpe 091807
Aen004 Thorpe 091807Dreamforce07
 
Business analyst 101 program Mumbai India
Business analyst 101 program Mumbai IndiaBusiness analyst 101 program Mumbai India
Business analyst 101 program Mumbai IndiaDeepak Kadam
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentIBM Analytics
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 Englishguest5bd7a1
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIINextLabs, Inc.
 
Meradia investment performance_systems
Meradia investment performance_systemsMeradia investment performance_systems
Meradia investment performance_systemsMeradia Group
 
5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)randhirlpu
 
Aan008 Root 091907
Aan008 Root 091907Aan008 Root 091907
Aan008 Root 091907Dreamforce07
 
A comprehensive guide to Salesforce Org Strategy
A comprehensive guide to Salesforce Org StrategyA comprehensive guide to Salesforce Org Strategy
A comprehensive guide to Salesforce Org StrategyGaytri khandelwal
 
A Data Warehouse And Business Intelligence Application
A Data Warehouse And Business Intelligence ApplicationA Data Warehouse And Business Intelligence Application
A Data Warehouse And Business Intelligence ApplicationKate Subramanian
 
Understanding Multitenancy and the Architecture of the Salesforce Platform
Understanding Multitenancy and the Architecture of the Salesforce PlatformUnderstanding Multitenancy and the Architecture of the Salesforce Platform
Understanding Multitenancy and the Architecture of the Salesforce PlatformSalesforce Developers
 
Stay Two Steps Ahead of Your Auditor
 Stay Two Steps Ahead of Your Auditor Stay Two Steps Ahead of Your Auditor
Stay Two Steps Ahead of Your Auditoreprentise
 

Similaire à Security Mapping Overview (20)

Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of III
 
Beyond Custom Metadata Types
Beyond Custom Metadata TypesBeyond Custom Metadata Types
Beyond Custom Metadata Types
 
Best Practices for Integrating with Your ERP
Best Practices for Integrating with Your ERPBest Practices for Integrating with Your ERP
Best Practices for Integrating with Your ERP
 
Aen004 Thorpe 091807
Aen004 Thorpe 091807Aen004 Thorpe 091807
Aen004 Thorpe 091807
 
Business analyst 101 program Mumbai India
Business analyst 101 program Mumbai IndiaBusiness analyst 101 program Mumbai India
Business analyst 101 program Mumbai India
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
 
Bsa 400 preview full class
Bsa 400 preview full classBsa 400 preview full class
Bsa 400 preview full class
 
Meradia investment performance_systems
Meradia investment performance_systemsMeradia investment performance_systems
Meradia investment performance_systems
 
5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)
 
Soa To The Rescue
Soa To The RescueSoa To The Rescue
Soa To The Rescue
 
shravan
shravanshravan
shravan
 
Aan008 Root 091907
Aan008 Root 091907Aan008 Root 091907
Aan008 Root 091907
 
A comprehensive guide to Salesforce Org Strategy
A comprehensive guide to Salesforce Org StrategyA comprehensive guide to Salesforce Org Strategy
A comprehensive guide to Salesforce Org Strategy
 
A Data Warehouse And Business Intelligence Application
A Data Warehouse And Business Intelligence ApplicationA Data Warehouse And Business Intelligence Application
A Data Warehouse And Business Intelligence Application
 
Understanding Multitenancy and the Architecture of the Salesforce Platform
Understanding Multitenancy and the Architecture of the Salesforce PlatformUnderstanding Multitenancy and the Architecture of the Salesforce Platform
Understanding Multitenancy and the Architecture of the Salesforce Platform
 
Stay Two Steps Ahead of Your Auditor
 Stay Two Steps Ahead of Your Auditor Stay Two Steps Ahead of Your Auditor
Stay Two Steps Ahead of Your Auditor
 

Security Mapping Overview

  • 1. Security Mapping Overview
  • 2.
  • 3. Control Techniques Business Process Controls Umbrella Non-SAP Business Processes SAP standard SAP configured Authorization Monitoring Manual SAP Risks Risks Risks Risks Risks
  • 4.
  • 5.
  • 6.
  • 7. Security Design Approach Observation 3 SAP Position “ Customer Service” SAP transaction(s) are assigned to roles but a transaction should only be assigned to one role. Roles are mapped to SAP positions which are then mapped to users. Role(s) “ Change Sales Order” SAP Transaction(s) VA01
  • 8.
  • 9. Global One Security Template Wave One Wave Two Wave Three Wave Four North America security design as the baseline Final Global Template Localize Global Template North American security foundation 80% 20% change from North America Minor changes to Global Template Security can be accommodated within reason. (e.g. new transaction codes and new SAP Positions) Design security for Global One
  • 10. Security Design Approach Observation 3 SAP Position “ Customer Service” SAP transaction(s) are assigned to roles Roles are mapped to SAP positions which are then mapped to users. Role(s) “ Change Sales Order” SAP Transaction(s) VA01
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Role Example Display Purchasing GM_XXX_FTS_DIS_PURCHASNG Role Transaction Create Purchase Req (ME51) SAP Position Change Purchase Req (ME52) Display Purchase Req (ME53) Display Materials (MM03) Create Purchase Order (ME21N) Change Purchase Order (ME22N) Jian Min Carlos Jorge Françoise Strategic Purchasing Plant Buyer Create/Change Purch Req GM_XXX_FTS_CHG_PUR_REQ Display Master Data GM_XXX_MDT_GEN_DISPLAY User Create/Change Purchase Order GM_XXX_FTS_CHG_PO
  • 18. List of SAP Positions
  • 19.
  • 20.
  • 21. AR UY CL CA US Southern Cluster North America Global EXAMPLE 1 - A Finance User works in Argentina; has access to view or modify Argentina data in SAP: - The Finance User wants access to view and update US information. The User needs to request approval from the US Data Owner. This should be the US Finance Data Owner. - Request should also be approved by the Finance Data Owner of the country the person works for, prior to being issued access. i.e. two approvals, one from Argentina and one from the US PY Security Access Approvers – Data Owners
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.