The global and independent platform for the SAP community.

Work organization

The definition and assignment of roles and authorizations is crucial for ERP systems. This allows access authorizations not only to be formally assigned, but also to be firmly implemented in the company's processes and workflow.
Philipp Latini, Sivis
May 3, 2021
Content:
[shutterstock: 1813934876, VideoFlow]
avatar
This text has been automatically translated from German to English.

For organizations and employees, this means a high degree of clarity and security - at least in theory. In practice, it is clear that authorization management in many companies tends to be handled in an unstructured manner and can thus become the cause of serious security problems.

The fact that nothing is often done despite such dangers is simply due to the fact that a careful check of all roles and authorizations would hardly be possible in the conventional way due to the high amount of work involved.

New intelligent software tools now address this problem and open up a realistic opportunity for companies to sustainably optimize their authorization management with manageable effort.

Old and new roles

In SAP alone, there are approximately 150,000 transactions that can be assigned to individual users, user groups, roles, or even composite roles. Practice shows that while new users, roles and authorizations are regularly added, the existing ones are rarely reviewed and at best reduced when an employee leaves the company.

This is not surprising, because in systems that have grown for ten or fifteen years in some cases, checking all authorizations in the conventional way would be a Herculean task that would be almost impossible to master, especially since many companies do not even use tracing to track which user uses which authorizations and how often.

At the same time, however, the security problems that can arise from inadequate authorization concepts can hardly be overestimated. The purchasing employee who switches to the accounting department, registers himself as a supplier and then pays his own invoices, so to speak, is still a minor case.

The problem is also becoming more explosive due to the pandemic-related acceleration of work in the home office. When internal systems are opened up for remote access, all authorizations must be correct and consistent.

This is the only way to exclude unauthorized access to critical information and avoid errors due to the lack of transparency of an inadequately maintained authorization concept.

In addition, the authorization chaos can also lead to increased costs if, for example, licenses are paid for users who neither need nor use the corresponding programs. And finally, the topic of authorization concepts is also becoming more and more important in auditing.

So it's high time to thoroughly clean up your own authorization concept. The good news is that there are new, intelligent solutions for getting even confusing authorization situations back under control.

The basis is tracing

In order to determine which users use which authorizations, roles and content and how often, access tracing should first be implemented. Here, all actions and accesses are recorded. After this tracing has been active for about half a year or a year, it provides a good database for checking the authorizations and roles that are actually required.

Intelligent new software solutions, such as the Sivis Reduction Manager, automatically check all actions based on the tracing data. All roles or content that were not used during the tracing period are then displayed to the responsible employees for review.

The same applies to role constellations that appear inconsistent, such as parallel rights for purchasing and accounting. These are also suggested for checking. The great advantage is that not all existing authorizations have to be checked, but only those that give reason to believe that they are not up to date.

At the same time, the personal check and decision rule out the possibility of permissions being withdrawn by mistake. After all, there may be good reasons why certain access rights were not used during a period of time.

Automatic suggestions

Quality, transparency and consistency of the authorization concept are indispensable for both security and cost reasons. Nevertheless, redesigning existing systems has hardly been feasible up to now due to the high amount of work involved.

Innovative software solutions offer the possibility of automatically scanning all authorizations and checking their consistency. Conspicuous constellations are then displayed and can be checked by the responsible employees in individual cases.

This significantly reduces the workload. Some providers, such as Sivis GmbH, also offer a combination of software solution and service, so that the audit effort for companies is once again significantly reduced.

https://e3magpmp.greatsolution.dev/partners/sivis-gmbh/

Download as PDF only for members. Please create an account Here

avatar
Philipp Latini, Sivis

Philipp Latini is Managing Director at Sivis. The company specializes in software for authorization management, user administration and compliance. Before Philipp Latini took over the position as CEO in 2020, the IT systems businessman initially worked as Sales Manager and Head of Consulting at Sivis.


Write a comment

Work on SAP Basis is crucial for successful S/4 conversion. This gives the so-called Competence Center strategic importance among SAP's existing customers. Regardless of the operating model of an S/4 Hana, topics such as automation, monitoring, security, application lifecycle management, and data management are the basis for the operative S/4 operation. For the second time already, E3 Magazine is hosting a summit in Salzburg for the SAP community to get comprehensive information on all aspects of S/4 Hana groundwork. With an exhibition, expert presentations, and plenty to talk about, we again expect numerous existing customers, partners, and experts in Salzburg. E3 Magazine invites you to Salzburg for learning and exchange of ideas on June 5 and 6, 2024.

Venue

Event Room, FourSide Hotel Salzburg,
At the exhibition center 2,
A-5020 Salzburg

Event date

June 5 and 6, 2024

Tickets

Early Bird Ticket - Available until 29.03.2024
EUR 440 excl. VAT
Regular ticket
EUR 590 excl. VAT

Secure your Early Bird ticket now!

Venue

Event Room, Hotel Hilton Heidelberg,
KurfĆ¼rstenanlage 1,
69115 Heidelberg

Event date

28 and 29 February 2024

Tickets

Regular ticket
EUR 590 excl. VAT
The organizer is the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes the attendance of all lectures of the Steampunk and BTP Summit 2024, the visit of the exhibition area, the participation in the evening event as well as the catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due time.