61
Introduction to SAP Security Kyle Balcerzak SAP Security Consultant Wednesday March 31, 2010

Introduction to SAP Security

  • Upload
    symmetry

  • View
    74.035

  • Download
    3

Embed Size (px)

DESCRIPTION

Is a lack of SAP security knowledge putting your organization at risk?For many SAP professionals the complex world of SAP application security is frustrating, and sometimes overwhelming. Unfortunately, after the initial go-live the rush of day-to-day activities means that SAP security is often just an after thought. However this puts organizations at increased risk from fraud, excessive access to confidential information, and even unintentional errors.In this archived presentation Symmetry security expert Kyle Balcerzak gives an overview of SAP application security basics:•Not publicly traded or regulated? Why you still need security.•SOX, HIPAA, ITAR – how are controls implemented in SAP?•Security architecture concepts and definitions you need to know – authorization objects, roles, derived roles, composite roles, profiles, and many other security concepts. •How you should manage your security environment - role matrix, role owners, task based vs. position based roles.•Who should be involved in security management?•What tools are available?

Citation preview

Page 1: Introduction to SAP Security

Introduction to SAP Security

Kyle BalcerzakSAP Security Consultant

Wednesday March 31, 2010

Page 2: Introduction to SAP Security

Download the presentation recording with audio from the Symmetry Knowledge Center

www.sym-corp.com/knowledge-center

Page 3: Introduction to SAP Security

Upgrade & Project Support

Security Design & Administration

SAP NetWeaver / Basis administration

SAP Certified Hosting

Implementation Support

Lifecycle Support for any SAP application on any platform combination

Symmetry Corporation

Page 4: Introduction to SAP Security

QualityProactive support delivered by US-based experts

Accessibility24x7 direct access to your support team

AffordabilityHighly competitive fixed-price contracts

Symmetry’s 21st Century Approach to Managed Services

Page 5: Introduction to SAP Security

Introducing

Kyle BalcerzakSAP Security Consultant

Page 6: Introduction to SAP Security

What We’ll CoverIntroduction – Why is Security Important?Legal Requirements

SOX, HIPAA, ITARRisks & ControlsWhy Unregulated Companies Should Care

Security ArchitectureUser Master RecordRoles ProfilesAuthorization ObjectsUser Buffer4 Doors to SAP Security

Managing SecuritySecurity TeamRole owners and the approval processPeriodic Access ValidationTroubleshooting and informationSecurity Tools

Presenter
Presentation Notes
Here are the topics we are going to address today. What is security and why we should care about it, a few regulations that impact SAP security. The nuts and bolts of SAP security Some tools available to assist with managing security – tools that come with the system and third party tools for managing and troubleshooting. This is less of a how-to and more of a conceptual view of sap security. More information is readily available on all of the topics we are going to cover today.
Page 7: Introduction to SAP Security

Why is Security Important?Security is the doorway to the SAP system.Security is a way of protecting information from unauthorized use.Security can unlock the flexibility of the system and customize it for each user.Information stored in SAP is one of your company’s most valuable business assets.

Presenter
Presentation Notes
Security is the doorway to the SAP system. It’s how we protect against unauthorized use. We can use security not only to protect the data in the system, but also to customize the user experience. Security is important because often the data in your SAP system is one of your company’s most valuable assets.
Page 8: Introduction to SAP Security

What is SAP Security?SAP application security controls who can do what in SAP.

Examples:Who can approve purchase requisitions over $10,000 (ME54N)?

Who can view other employees’ social security numbers in the system (PA20)?

Who can update vendor bank information (XK02)?

Who can create or modify users (SU01)?

Presenter
Presentation Notes
What do we mean in the context of today’s webinar when we say “SAP Security?” Well, we are focused on who can do what in the system. The focus of this webinar is not on operating system, database or network security. Some examples of what we mean by who can do what in sap are….
Page 9: Introduction to SAP Security

Security ObjectivesConfidentiality - prevent users from viewing and disclosing confidential information.Integrity - ensure the accuracy of the information in your company’s system.Availability - prevent the accidental or deliberate loss or damage of your company’s information resources.

Presenter
Presentation Notes
What are the goals of SAP security? Protect confidential information. Ensure the data in SAP is accurate Make sure the data is accessible to the right users when they need it, and prevent accidental or deliberate loss or damage to your data
Page 10: Introduction to SAP Security

Security Against Whom?When people think about system security, they usually think about people outside the company

business espionagepolitical rivals

In reality, you need to protect against your own people CuriosityAccidental accessIntentional access

Presenter
Presentation Notes
Often we think about protecting our data from people outside our company. This is very important, but… The point I am trying to make in this slide is that we should also be concerned about protecting our data from our own people. Your employees are often in the system daily and we want to prevent curious users from snooping around, protect against users accidentally accessing unauthorized information and also intentional misuse of data.
Page 11: Introduction to SAP Security

Factors to ConsiderHow important is your SAP system and the data stored in it to your business?

Do you have a policy requiring certain levels of security?

Do your internal or external auditors require a certain level of security for the information stored in your system?

Will you need some degree of security in the foreseeable future?

Presenter
Presentation Notes
When you think about how tight access needs to be in your system, here are a few things to consider.
Page 12: Introduction to SAP Security

Legal RequirementsSOX, HIPAA, ITARSegregation of Duties vs. Excessive AccessControls – Preventive vs. DetectiveWhy Smaller Companies Should Care

Page 13: Introduction to SAP Security

Sarbanes-Oxley (SOX) Act

Executives are ultimately responsible for confirming the design and effectiveness of internal controls

Excessive access and Segregation of Duties issues are key points

Ultimately – data integrity is key

Presenter
Presentation Notes
Section 404 of the Sarbanes-Oxley Act (SOX) says that publicly traded companies must establish, document, and maintain internal controls and procedures for financial reporting. It also requires companies to check the effectiveness of internal controls and procedures for financial reporting. In order to do this, companies must Document existing controls and procedures that relate to financial reporting. Test their effectiveness. Report on any gaps or poorly documented areas.
Page 14: Introduction to SAP Security

SOX Continued

Segregation of DutiesOne user can perform two or more conflicting actions that causes a risk.Example:

Activities: Someone can create vendor master records and then process accounts payable paymentsRisk: Gives someone the access to create a fictitious vendor and generate fraudulent payments to that vendor

Excessive AccessOne action that a user can perform that is outside their area of expertise, jurisdiction, or allows critical accessExample:

Activity: End user can use SP01 to see the spool request for all usersRisk: Users may view sensitive financial documents or payroll information for example.

Page 15: Introduction to SAP Security

HIPAA and ITARHealth Insurance Portability and Accountability Act

Personal health information can be shared with appropriate people for patient care.Typically comes into play in SAP HR systems.Data privacy concerns

If an employee has a potentially embarrassing injury at work, these details are stored in the system and should only be viewed by authorized personnel.

International Traffic in Arms RegulationsControls the import/export of defense related articles and information.Data privacy concerns

Information and material specifically about defense and military technologies must only be shared with US Persons or those who are approved.

Shipping concernsUnauthorized users should not have access to change shipping information of customer.

Presenter
Presentation Notes
Talk about examples of each 1. Control who has access to report of an on the job, embarrassing injury – details are stored in the system. Someone lost job due to failing drug test. 2. Unauthorized users should not have access to change shipping information of customer.
Page 16: Introduction to SAP Security

Controls – Preventive vs. DetectiveIn order to prevent fraud, accidental errors, and protect sensitive information we must have controls.

There are two main categories of controls:

Preventive controls: prohibit inappropriate access Authorizations, configuration, User-Exits, and so on

Detective controls: rely on other processes to identify inconsistenciesAlerts, periodic reporting, system monitoring

Presenter
Presentation Notes
Roles prevent unauthorized access. Monthly review of vendor master changes.
Page 17: Introduction to SAP Security

Why Unregulated Companies Should CareWhy should we care about segregating duties, excessive access or documenting our business processes if we are not publicly traded or subject to legal requirements?

DocumentationReduction in errorsCost of errorsLoss of customersFraud happensProtection of trade secretsPreserve confidential information

Presenter
Presentation Notes
Here are a few reasons that smaller companies who are not subject to some of the regulations we just mentioned might want to think about implementing some of the key points. So, here are a few of the benefits. Documentaions – documented business process work better, training material Fewer errors Fewer costs associated with those errors Protect against fraud Protect your trade secrets Protect your confidential information such as cost of materials, financial documents, salary information
Page 18: Introduction to SAP Security

Security ArchitectureAuthorization Objects IntroUser Master RecordRoles – Single, Derived, CompositeTask-based vs. Job-based RolesProfilesAuthorization ObjectsUser Buffer4 Doors to SAP Security

Page 19: Introduction to SAP Security

Authorization Concept

UserUser Master

Record

Roles

Profiles

Authorization Objects

SAP Functionality

Presenter
Presentation Notes
Graphical representation of what we are covering in this section Typically, users will be using the Sap GUI to access SAP (there are other ways to access it such as the BEX tools, web portal) but ultimately they will be logging in with a user.
Page 20: Introduction to SAP Security

Authorization ObjectsAuthorization Objects are the keys to SAP security When you attempt actions in SAP the system checks to see whether you have the appropriate AuthorizationsThe same Authorization Objects can be used by different Transactions

Example – in order to display a table, a user must have the Authorization Object S_TABU_DIS with the appropriate values

Presenter
Presentation Notes
The system is constantly checking a user’s User Buffer to determine if that user has the appropriate Authorization Object to do a particular activity
Page 21: Introduction to SAP Security

User Master RecordsRequired to establish access for Users.

Created when a User is created.

User Master Records are client-dependent!

Page 22: Introduction to SAP Security

User Master RecordsUser Master Record information includes:

Name, Password, Address, Company informationUser Group (used for security administration or searching capabilities)Reference to Roles and Profiles (access capabilities are not stored directly in user master records)User type

Dialog – typical for most usersSystem – cannot be used for dialog login, can communicate between systems and start background jobsCommunications Data – cannot be used for dialog login, can communicate between systems but cannot start background jobsReference – cannot log in, used to assign additional Authorizations to UsersService – can log in but is excluded from password rules, etc. Used for Support users and Internet services

Validity dates (from/to)User defaults (logon language, default printer, date/decimal formats)

Page 23: Introduction to SAP Security

User Master Record

Page 24: Introduction to SAP Security

Roles and Profiles

Profiles contain Authorization Objects

Roles contain Profiles

Profiles that come delivered with the system or were created from scratch can be assigned directly to users

Profiles that were created for a Role are attached to that Role cannot be assigned directly. You must assign the Role and the system will then assign the user the correct Profile

UserUser Master

Record

Roles

Profiles

Authorization Objects

SAP Functionality

Users are assigned Roles and Profiles which contain Authorization Objects

Presenter
Presentation Notes
We will go into more detail in the following slides, but keep these concepts in mind.
Page 25: Introduction to SAP Security

RolesRoles are ‘built on top’ of Profiles and include additional components such as:

User menusPersonalizationWorkflow

In modern SAP systems, users are typically assigned the appropriate Roles by the security teamThe system will automatically add the appropriate Profile(s) for each Role assigned

****Authorization Objects only exist in Profiles (either on their own or when “nested” in roles)

A Role has several parts, including:

Description Documentation

Menu Profile

Page 26: Introduction to SAP Security

Tips for Managing Roles Roles typically do not change often It is strongly recommended that they be created in a Development client, then transported to Quality (tested, hopefully) and finally promoted to Production.Roles should originate from the same client (pick one to be your “security development” client).It is much easier to assign an existing Role to a User than to create or modify a Role.SAP’s template Roles are intended only for example.

Best practice is to have Users tell you the exact Transactions they require and build Roles from scratch.At the very least, copy them into your own namespaceBe aware that many of them contain too much access so be careful!

Page 27: Introduction to SAP Security

Roles

Page 28: Introduction to SAP Security

RolesProfile for a Role:

Page 29: Introduction to SAP Security

Roles – TypesThere are 3 types of Roles:

Single – an independent RoleDerived – has a parent and differs only in Organization Levels. Maintain Transactions, Menu, Authorizations only at the parent levelComposite – container that contains one or more Single or Derived Roles

Derived Role example:Purchaser Parent

ME21N, ME22N for all or no Purchasing Organizations

Purchaser Child 1ME21N, ME22N for Purchasing Organization 0001

Purchaser Child 2ME21N, ME22N for Purchasing Organization 0002

Presenter
Presentation Notes
Picture of composite
Page 30: Introduction to SAP Security

Roles – TypesComposite Role example:

Presenter
Presentation Notes
Picture of composite
Page 31: Introduction to SAP Security

Task-based vs. Job-based RolesTask-based

Each Role can performs one function (usually one or only a few Transactions)

Vendor master creationCreate sales order

Job-basedEach Role contains most functions that a user will need for their job in the organization

A/P ClerkBuyerWarehouse Manager

Hybrid approach

Presenter
Presentation Notes
Could add pros and jons Example - create banks
Page 32: Introduction to SAP Security

ProfilesAuthorization Objects are stored in ProfilesProfiles are the original SAP Authorization infrastructureUltimately – a user’s Authorization comes from the Profile/s that they have assignedProfiles are different from Roles.

UserUser Master

Record

Roles

Profiles

Authorization Objects

SAP Functionality

Page 33: Introduction to SAP Security

Examples of Delivered ProfilesSAP_ALL

Delivered with the systemContains almost all Authorization Objects

SAP_NEWContains the new objects in the current release that are required to keep old transactions functioning.It does NOT contain all new Authorization Objects for that release

S_A.xxxxxxxStandard BASIS Profiles for various job functions (i.e. customizing, development, administration, etc.)

Presenter
Presentation Notes
Intro about difference between create profiles and roles….then here is example of builtins.
Page 34: Introduction to SAP Security

Authorization ObjectsAuthorization Objects are the keys to SAP Security When you attempt actions in SAP, the system checks to see whether you have the appropriate AuthorizationsThe same Authorization Objects can be used by different Transactions

Example – in order to display a table, a user must have the Authorization Object S_TABU_DIS with the appropriate values

Presenter
Presentation Notes
The system is constantly checking a user’s User Buffer to determine if that user has the appropriate Authorization Object to do a particular activity
Page 35: Introduction to SAP Security

User BufferWhen a User logs into the system, all of the Authorizations that the User has are loaded into a special place in memory called the User Buffer As the User attempts to perform activities, the system checks whether the user has the appropriate Authorization Objects in the User Buffer.

You can see the buffer in Transaction SU56

Page 36: Introduction to SAP Security

Example of Authorization CheckWhen attempting to execute a Transaction, each instance of a required Authorization Object that a user has is checked by the system until the system finds a match.

Example: User would like to create a Sales Order of the Document Type “Standard Order” (OR). One of the Authorization Objects that the system looks for is:

V_VBAK_AATThere are two fields – Activity and Order TypeTo create a sales order for this type, the user will need:

V_VBAK_AAT with:Activity – 01 (Create)Order Type – OR (Standard Order)

Page 37: Introduction to SAP Security

Example of Authorization CheckTo create a sales order for the Standard Order type, the user will need:

V_VBAK_AAT with:Activity – 01 (Create)Order Type – OR (Standard Order)

The user might have this Object several times from several Roles. The system keeps checking until it finds a match:

Role 1V_VBAK_AAT

Activity – 03 (Display)Order Type – * (All Order Types)

V_VBAK_AATActivity – 01 (Create)Order Type – B1, B2, CS

Role 2V_VBAK_AAT

Activity – 01 (Create)Order Type – OR, RE

Page 38: Introduction to SAP Security

Authorization ChecksHow does SAP test whether the user has Authorization to execute functions? What happens when I try to start and run a Transaction?

Page 39: Introduction to SAP Security

Authorization Checks – Executing a Transaction

1. Does the Transaction Exist?

Page 40: Introduction to SAP Security

Authorization Checks – Executing a Transaction

1. Does the Transaction Exist?

2. Is the Transaction locked?

Page 41: Introduction to SAP Security

Authorization Checks – Executing a Transaction

1. Does the Transaction Exist?

2. Is the Transaction locked?

3. Can the User start the Transaction?

Page 42: Introduction to SAP Security

Authorization Checks – Executing a Transaction4. What can the User do in the Transaction?

1. Does the Transaction Exist?

2. Is the Transaction locked?

3. Can the User start the Transaction?

Page 43: Introduction to SAP Security

Authorization Checks – Executing a Transaction1) Does the Transaction exist?

All Transactions have an entry in table TSTC2) Is the Transaction locked?

Transactions are locked using Transaction SM01Once locked, they cannot be used in any client

3) Can the User start the Transaction?Every Transaction requires that the user have the Object S_TCODE=Transaction NameSome Transactions also require another Authorization Object to start (varies depending on the Transaction)

4) What can the User do in the Transaction?The system will check to see if the user has additional Authorization Objects as necessary

Page 44: Introduction to SAP Security

Managing SecuritySecurity TeamRole Owners and the Approval ProcessPeriodic Access ValidationTroubleshooting and Information

User Information System (SUIM)SU53Authorization Trace (ST01)Security Audit log (SM19/SM20)

Security ToolsCentral User AdministrationSAP NetWeaver Identity ManagementSAP GRC Access Control SuiteSymsoft ControlPanelGRC

Page 45: Introduction to SAP Security

SAP is a Complex EcosystemThere are many different SAP applications with different areas of expertise requiredSome of these require specialized security knowledge, e.g. HCM and BI/BWExamples:

ECC (Sales and Distribution (SD), Materials Management (MM), Financial and Cost Accounting (FICO), Warehouse Management (WM), Quality Management (QM), Plant Maintenance (PM), Human Capital Management (HCM))Business Information Warehouse (BI/BW)Customer Relationship Management (CRM)Supplier Relationship Management (SRM)Advanced Planner and Optimizer/Supply Chain Management (SCM/APO)Portal…And whatever else SAP dreams up!

Page 46: Introduction to SAP Security

Security TeamImportant to select an appropriate security team.Size consideration based on your organization

Auditing requirementsAmount of changesSecurity staff knowledge

Role changes should be done by the security teamUser assignments can be processed by the security team or the basis teamUnlocking Users/resetting passwords of Users can be done by the helpdesk

Presenter
Presentation Notes
Examples of how symmetry can assist with roles
Page 47: Introduction to SAP Security

Security TeamOutsourcing is a good option for many companies.

Key reasons to outsourceExpert help available – it’s hard for part-time security staff to understand all of the complexities of SAP SecurityInternal staff may get overloaded and need extra help.Project workProvide coverage during vacations/sick days

Key considerations in choosing an outsourcing providerOngoing access to a team vs. consultant randomly assigned by a help desk24x7 access to supportFixed rate support vs. charge by the hour

Presenter
Presentation Notes
Examples of how symmetry can assist Project work – implementations, upgrades, installing CUA, Remediation of SoDs and excessive access.
Page 48: Introduction to SAP Security

Role Owners and the Approval ProcessThe security team may know how to make changes to access, but will need to work with the business to determine what changes should be made.Changes include making changes to Roles (modifying Authorizations, adding/removing Transactions) and assigning those Roles to users.

Have Role changes approved by the Role owner

Have User assignment changes approved by both a manager and the Role owner.

The business is often not aware of the implications of changes that are requested. Your security team should be able to point out potential risks when access is requested.

Page 49: Introduction to SAP Security

Periodic Access ValidationIt’s a good idea to have Role matrix reports generated and reviewed periodically by Role ownersEnsures that inappropriate changes were not madeAccountabilityConsider doing this quarterly or at least yearly

Presenter
Presentation Notes
Tip! CPGRC can help with this!!
Page 50: Introduction to SAP Security

Periodic Access ValidationExample output of a report that was generated by ControlPanelGRC:

Page 51: Introduction to SAP Security

User Information SystemTransaction SUIMGreat place to get information about Users/Roles

TIP – has had bugs over the years. If something seems incorrect, query the appropriate table directly.

Page 52: Introduction to SAP Security

SU53Last Authorization check that failed.May or may not be the Authorization that the User actually needs. Look at context clues to determine if it is appropriate.User may need more Authorization Objects after this one is added.

Presenter
Presentation Notes
Who is doing what
Page 53: Introduction to SAP Security

Authorization TraceTransaction ST01Records all Authorization Checks performed while a User is in the system.Does not include Structural Authorizations in HR Security.

ControlPanelGRC Security Troubleshooter makes this process easier by recording the steps to recreate the issue, the Authorization Trace, and sending the output the Security Team.

Page 54: Introduction to SAP Security

Security Audit LogRecords information about what Users are doing

Logon/logoffTransactions/reports started or attempted to startPassword changesWorkstation name of UserIs not on by default.

Transactions SM19/SM20.Does not record what data was changed by the User.

Page 55: Introduction to SAP Security

Central User Administration (CUA)Manage Users from one SAP clientSimplifies User administration and can save a lot of time – especially for large environmentsIf you own SAP, you already own this. All you need is someone to configure itThere are several “gotchas” that frequently come up when installing. We recommend contacting a consultant who is CUA savvyAsynchronous! Ultimately, the Users and Roles exist in each client. CUA is only the place you log in to make changes!

SOL-100CUA Central

System

DEV-100

PRD-100

QAS-100

Page 56: Introduction to SAP Security

SAP Netweaver Identity ManagementSAP’s Identity Management SolutionCross system/cross vendor integrationSeparate landscape/installationHighly configurable, contact someone who specializes in this product.

Page 57: Introduction to SAP Security

SAP GRC Access ControlsRisk Analysis and Remediation

Find SoDs, excessive access for both Roles and UsersAlert Monitoring

Compliant User ProvisioningWorkflow for User creations/modificationsIncorporates SoD checks

Superuser Privilege ManagementEmergency, temporary accessLogs some of the user’s actions, notifies managers when used

Enterprise Role ManagementWorkflow for Role creations/modificationsIncorporates SoD checks

Page 58: Introduction to SAP Security

SymSoft ControlPanelGRC2nd generation compliance automation solution

User & Role ManagerAccelerates User and Role change management

Risk AnalyzerReal time risk analysis and mitigation of Segregation of Duties and Sensitive Authorization risks

Usage AnalyzerMonitors Transaction executions to provide

Notification of executed risksReverse Business Engineering (RBE) toolLicense Optimization tool

Transport ManagerAutomates processing of change requests with auditable workflow

Batch ManagerCross system infrastructure for compliant scheduling, monitoring and tracking of batch jobs

Emergency Access ManagerManages temporary access – access is tracked by User and reports are routed for review

AutoAuditorAllows compliance reports to be scheduled and sent to Users for documented review

Presenter
Presentation Notes
It’s about reducing the total cost of compliance through task automation and one major benefits over access controls are That it takes compliance far beyond sods
Page 59: Introduction to SAP Security

Key PointsSecurity is the doorway to the SAP system

Security is a way of protecting information from unauthorized use

Security can unlock the flexibility of the system and customize it for each user

Information stored in SAP is one of your company’s most valuable business

assets.

SAP Security is complex and often difficult to manage and understand

There are legal requirements that influence SAP Security

Not all companies are required to comply with these regulations

All businesses benefit from having well defined processes

There are tools available to help manage security – but ultimately a good

security team is key

Page 60: Introduction to SAP Security

Download the presentation recording with audio from the Symmetry Knowledge Center

www.sym-corp.com/knowledge-center

Page 61: Introduction to SAP Security

Kyle [email protected]