SOD Document
SOD Document
Duties Project
Applies to:
SAP Security, SAP GRC Access Control Suite
For more information, visit the Security homepage.
Summary
As Companies today are struggling to meet the Compliancy and regulatory requirements of their SAP
Systems, Segregation of Duties plays a key role in the SAP Security design and implementation.
Segregation of Duties means that no single user will have the authorizations to all key steps in a business
process. This article will explain some of the important details that need to be understood while implementing
the SoD project in a typical SAP landscape.
Author:
Kiran Kandepalli
Author Bio
Kiran Kandepalli is working with Intelligroup Inc as a Principal Consultant in SAP Security/SAP GRC related
projects in USA.
Table of Contents
1. Introduction .....................................................................................................................................................3
2. Segregation of Duties Concept.......................................................................................................................3
2.1 Incompatible Job Functions ......................................................................................................................3
2.2 What is an SOD Risk? ..............................................................................................................................4
3. Implementation Details of an SoD Project......................................................................................................4
3.1 Creation of an SoD rule set.......................................................................................................................4
3.1.1 Functions ............................................................................................................................................................4
3.1.2 SoD Conflicts ......................................................................................................................................................5
3.1.3 Critical Transactions............................................................................................................................................5
3.1.4 Critical Authorizations .........................................................................................................................................5
3.1.5 Critical Roles.......................................................................................................................................................5
3.1.6 Critical Profiles ....................................................................................................................................................5
1. Introduction
Segregation of Duties (SoD) has become an important prerequisite in the implementation of every
compliance related project all over the world. As the name suggests that no single user can have access to
all authorizations of a process end to end. It is required that job duties in each business process are
completely segregated and adequate controls need to be placed. The role of a SAP Security consultant is
vital in the design of SAP Security Roles and Authorizations and appropriate SoD remediation and
Mitigation Controls are put in place.
Record Keeping
Asset Custody
Authorization
Reviewing and approving
transactions
Reconciliation
Assurance that transactions
are proper
Segregation-of-Duties risks are opportunities for one individual to control a process from beginning to
end without the involvement of others.
When an individual exploits the condition, data integrity, productivity loss, and physical losses can
result without being detected.
For example, one person may be able to set up a vendor and process payments
SOD RISK Access to both FB60 (Enter Vendor Invoice) and F-07 (Post Payments) transactions
Critical SAP Profiles like SAP_ALL and SAP_NEW must be deleted from the Background user
ids and it will minus most of the SoD Conflicts.
All the business jobs that will be run under this background id must be documented.
New Security Role must be created and authorizations must be tailored to suit the requirements
of the background jobs run by the Background user id.
If complete remediation of SoD Conflicts is not possible, as sometimes is the case, then
appropriate Mitigation Controls need to be framed and documented.
Related Content
www.sdn.sap.com
help.sap.com
www.sapsecurityonline.com
www.service.sap.com
For more information, visit the Security homepage.