Sod-Analyze Using MS Excel
Sod-Analyze Using MS Excel
Layer 1
Authorization Object, Field and Value Check: Authorization
✓ Transaction code (e.g., FK01) assigned? Check
Run “transaction”:
FK01: Create New Fail Pass
Vendor
Layer 2
STOP Authorization Object, Field and Value Check: Authorization
✓ Access Level (Add) OK? Check
✓ Company allowed?
✓…
Fail Pass
STOP Go
USR02:
User Logon Data USOBT_C:
Transactions -> TSTCT:
BNAME: User
Required Authorization Transaction Text
USTYP: User type
UFLAG: User status NAME: Transaction TCODE: Transaction
USER_ADDR:
OBJECT: Authorization object TTEXT: Description
GLTGB: User expiry date User Address
FIELD: Authorization field
BNAME: User
LOW: Authorization value FROM
NAME_FIRST: First name
Reference HIGH: Authorization value TO
Tables NAME_LAST: Last name
DEPARTMENT
Generate “Transaction
by Authorization Level Analyze SOD
by User” Table Level 2
(Optional)
assigned. This may allow the auditor to quickly focus on risky “transactions by user” table from the level 1 SoD analysis and
SoD areas. At the individual user level, the more numbers other related tables, should be used to generate the required
a user has corresponding to different transactions, the more data for the level 2 SoD analysis.
SoD conflict risk the user’s access may pose. Once the auditor generates the authorization data
Once again, the auditor should not forget to evaluate SoD necessary to perform the level 2 SoD analysis, the actual
conflicts from users’ access to other upstream or downstream analysis is identical to the level 1 SoD analysis, using the
systems or activities. Pivot Table feature in Microsoft Access or Excel. The
additional information available for the analysis is the actual
Level 2: SoD Analysis Based on Precise User Authorizations authorization level (e.g., add, modify, delete). The auditor
This level of SoD analysis in SAP R/3 is more reliable, but will be able to differentiate when a user is assigned a critical
requires more time and effort, especially for auditors not transaction with read-only access, which is less risky.
familiar with the usage of multiple table-related queries in Within the level 2 SoD analysis, the auditor can evaluate
Microsoft Access. users’ ability to access different companies’ records within
The design to generate data for the level 2 SoD analysis is SAP R/3. This is important, for example, in a shared service
depicted in figure 8. The key concept is to find the required model in which several companies share one single SAP R/3
authorization values for SAP R/3 transactions and match “instance” or system. It is certainly a risk for users from other
them with actual authorizations to determine whether users companies to be able to perform activities in the concerned
actually have the authorizations to run specific transactions. company. From an SoD perspective, what a user can see is
The aforementioned USOBT_C table, together with the also important, in addition to what a user can do. Evaluating
users’ access capabilities to different company codes in include the exceptional situations in the data tables before the
SAP R/3 measures what users can see. In some large level 1 or level 2 SoD analysis.
organizations, users may even be assigned to different vendor, It is also possible to automate both level 1 and level 2 SoD
customer or general ledger groups so that the users can data generation steps, as described here, as long as the auditor
only perform related transactions on their assigned vendor, makes sure the authorization tables and fields obtained use
customer or general ledger accounts. The level 2 analysis is standard SAP R/3 names. This makes sense if the auditor
able to reveal situations in which users can access only their needs to regularly evaluate SoD for identical business systems
assigned vendor, customer or general ledger account groups, such as SAP R/3. Automating time-consuming steps increases
similar to company code access, as described previously. efficiency and lowers manual mistakes.
Figure 9 depicts a simplified SoD level 2 analysis based on
an Access or Excel Pivot Table, including all the required and CONCLUSION
actual authorization levels by transaction code, for the auditor Evaluating SoD in a business application system is an integral
to determine whether a user can perform a transaction before part of evaluating SoD in interrelated business processes.
SoD evaluation is performed. The auditor should follow the same risk-based approach in
the evaluation process. The auditor must evaluate major SoD
Other Considerations conflicts both within the business system and across other
While the steps for level 1 and level 2 SoD analyses will connected systems or manual activities, based on well-defined
not change in practice, the auditor should always watch out and risk-justified SoD conflict rules.
for the exceptional situations (e.g., the use of “wildcard” Given the complicated nature of many business systems,
transactions and composite profiles) that may affect the especially ERP solutions, the auditor should use computer
SoD analysis. By using standard functionalities in tools such tools starting with those that are inexpensive and readily
as Microsoft Access or Excel, the auditor should be able to available, for example, those in the Microsoft Office suite, to
01 – Add 01 – Add
02 – Change 02 – Change
03 – Display 03 – Display
* – All * – All User_1 User_2 User_3 … Grand Total Auditor Comments
AUTHORIZATION OBJECT
TRANSACTION DESCRIPTION FIELD REQUIRED VALUE ACTUAL VALUE
VON:
FIELD: Authorization
AUTHORIZATION OBJECT Authorization LOW: Authorization Value
Text DESCRIPTION field Value FROM-Actual FROM-Actual Count Count Count Count Count
FB60: Enter Accounting Document: ACTVT 01 * 1 1 4 ‘All’ (*) access granted to User_1, User_3…
Incoming Authorization for Account
Invoices Types 03 * 1 1 1 4 Read-only access granted to User_2
Vendor: Account Group ACTVT 01 01 1 1 1 6 ‘Add’ access granted to User_1, User_2, User_3…
Authorization
KTOKK (Blank) * 1 1 1 6 All account groups granted to User_1, User_2, User_3
Vendor: Authorization for ACTVT 01 * 1 1 4 ‘All’ (*) access granted to User_1, User_3…
Company Codes
01 1 2 ‘Add’ access granted to User_2…
Vendor: Central Data ACTVT 01 01 1 1 1 6 ‘Add’ access granted to User_1, User_2, User_3…
aid the efficient and effective SoD evaluation. Once auditors become more comfortable and skillful with the methods
master the concept, design and steps in evaluating SoD in and tools, they can further improve and automate the SoD
complicated systems such as SAP R/3, they should be able to evaluation process, especially if the same types of business
apply the same approach to other ERP or business systems as systems are evaluated regularly. However, auditors must use
long as they take the time to understand the similarities and their judgment and knowledge in determining SoD risks based
differences in authorizations in different systems. As auditors on good understanding of the risks in the specific business.
The ISACA Journal is published by ISACA®. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual
subscription to the ISACA Journal.
Opinions expressed in the ISACA Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance
Institute® and their committees, and from opinions endorsed by authors’ employers, or the editors of this Journal. ISACA Journal does not attest to the originality of authors’ content.
Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in
writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St.,
Salem, MA 01970, to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date,
volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without
express permission of the association or the copyright owner is expressly prohibited.
www.isaca.org