Wednesday, 8 April 2015

Steps Required for SAP Security Implementation

According to our research there are 10 steps that are required for implementation of SAP Security in any organization of the world that are given below


1. Working with security password Length


While implementing security parameters, length of the passwords should be adjusted according to the approved policy for that organization. Account lock after password failure must be adjusted according to the organization approved policy. While working with SAP system parameters are adjusted.


2. Allow to Access the user accounts


Specified number of generic accounts is allocated in SAP applications. These accounts are the basic need for initial installation and to complete the set up process. The passwords are always in knowledge. It is obvious that all the ID’s are secured when the installation process is complete.


3. Access Profile must be Allocated Wide


Along with specified number of IDs, SAP also delivered some profiles that dish up access to system. The allocated privileges have ability to use at initial setups and emergencies. Later on access team is restricted to limited access to system


4. Support and Project Team Access


SAP does not provide the facility to access specific profiles for support or projects. That is why it is necessary to define the access the of these uses for limited time.


5. Access according to Role


SAP is integrated system and there is probability of fraud in this system. A user that has authority to deal with payments can shift company payment to his account. This is controlled by the management and monitoring of duties in SAP environment.


6. Emergency Access Procedure


All roles must be defined according to the access type and team project. This assignment must be on the daily basis.


7. Users Access


For security purposes ongoing monitoring is very mandatory to run a successful system. Duplicate IDs, password parameters and generic accounts must be reviewed periodically


8. Modify Management Function


There is a complete system of change and transport system that has generic ability to modify management functions


9. Access to delicate Procedures


As Sap is integrated environment therefore sensitive information are accessed in the same environment. For security only restricted access is allowed.


10. Business Ownership and Security Process


Because of integrated facility of SAP system only payment clerk can handle secure payment functions. It is very essential which staff member has access to all SAP functions


You can’t apply security steps until you have complete understanding of the SAP security system and how it works. For this you have to go for SAP security training at Tekvdo website. You can also get SAP grc training course at discount.


This entry passed through the Full-Text RSS service - if this is your content and you're reading it on someone else's site, please read the FAQ at http://ift.tt/jcXqJW.





No comments:

Post a Comment