SAP Security Solutions: Is Your Business Protected?
SAP Security Solutions: Is Your Business Protected?
SAP Security Solutions: Is Your Business Protected?
com
Background
SAP Security is becoming more difficult to control due to a constantly evolving compliance
landscape and increasingly complex business environments.
The increasing complexity of SAP’s software applications, adds to the risk of security threats,
with evolving technology, new functionality, and web-based solutions.
Ultimately how can you ensure that your users have the information they need in a timely
manner yet comply with the challenges above in an efficient and optimal manner?
Task Project Preparation Design Build Test Final Preparation Go-Live & Support
The project is initiated and supporting Business Risks Security requirements Deployment
SOD Compliance Deployed Security
Objective infrastructure is established are Identified are translated Package
Finalized Initial Cross-Application
Project Plan Business Risks Rule set(s) Built End User Mapping
Rule set(s) SOD Reports
Systems, Business Processes, Updated Policies Security Admin SOD Review and
Deliverables Action Groupings Rule set(s) Signoff
and Actions Analyses and Procedures Process Action Plan
Provisioning
Roles and Responsibilities Risk Rankings Tool Configured Reports Material Mitigated Conflicts
Process
Interfaces
Infrastructure
ERP
Assess and review Design an optimal Remediate issues or build Integrate your security
your access controls security model new technical solution design with GRC tools
and align with other
organizational controls
1 2 3 4
Assess and review Design an optimal security
1 access controls 2 operating model
During the assessment of the Security and SOD Building on the assessment work, we can assist in your effort to
“as is” position we focus on the following areas: transition to an optimized security design:
• Assess and compare how your individual • Provide the strategy and approach to deliver a security model,
business units are adopting existing controls. where compliance objectives are embedded into the design.
• Benchmark how your security issues measure • Develop a design that is flexible enough to accommodate
against industry standards. likely changes to the organizational structure while
integrating existing business controls.
• Implement PwC’s User Activity Analysis tool
to analyze your actual transactional usage. • Devise a security blueprint that maximizes the sustainability
of the future security model.
• Map activity analysis output back to existing
security design and pinpoint areas for design • Address root causes of specific control and access issues at
remediation. the design phase to ensure a consistent and efficient “clean
up” effort.
• Map the Security Access controls design back
to SAP Security governance design. • Design and develop a process for using accelerators
like SAP GRC in security build and maintenance phases
to maximize efficiency.
The work focuses on ensuring your strategy design and build • Following a best practice iterative design/build/
are aligned to the long-term organizational requirements. re-analyze process to ensure that technical solution
is fit for purpose and SoD compliant
• Utilize GRC technology for structured, compliant, and accelerated role design and build.
• Integrate with GRC tools for SoD compliance at a technical role and user provisioning level.
• Integrate the SAP security model with IDM tools to provide single sign-on capabilities and controls.
• Provide assistance to design an operating model that fully utilizes the controls potential available in GRC tools.
Background
This client was struggling to meet
service level agreements related to
SAP provisioning and user maintenance.
Although the initial implementation
of SAP GRC Access Controls suite was
complete, the organization was using
only a small subset of the suite’s The PwC solution
capabilities.
The first phase of this project focused on assessing the current state and
designing of the future state. In our design of the future state, we included the
full deployment of the SAP GRC Access Controls suite to simplify and automate
the user provisioning processes, while remaining compliant. We worked with
the client to design and implement a new SAP security design following our tier
4 methodology. The implementation of the new SAP security design helped this
client reduce the number of roles in the SAP environment, which, combined
with the SAP GRC Access Controls application, facilitated the overall user
provisioning processes.