SAP authorization concepts are subject to constant change. This is precisely why authorizations such as "SAP_ALL" or the protection of SAP standard users, but also SoD risks (Segregation of Duties), are checked anew by auditors every year. The list of necessary measures is long, from applying security patches to controlling and reducing critical authorizations.
Often, security specialists such as Sast Solutions are then hired at short notice to ensure that the finding list from last year's auditor's audit is
has been thoroughly processed and that no serious risks have been added since the cleanup, whether debug and replace, deletion of change documents or start of all reports for individual critical authorizations. One reason for these ad hoc orders is that, due to a lack of resources in the meantime, there was no follow-up review of the cleanups after the previous audit.
If one restricts oneself to this reactive procedure, the annual cycle is programmed. If all old findings have just been eliminated or mitigated before the next audit, the auditor will not only test them, but of course also perform further audits, create a new finding list - and the game starts all over again.
To prevent damage in the short term, a point-in-time action is therefore necessary, but not promising. The compliance status of the system immediately deteriorates again due to the assignment of new authorizations, and creeping back in is not proactively prevented. New risks are often not identified during the course of the year, but only when the next audit is due. Thus, there is no continuous work on improving the situation, nor is there permanent risk control. This is because each audit is only a snapshot. A finding list always shows only a small section of the risks in an SAP system.
The solution to this problem is relatively simple: don't wait until the next audit, but become aware of your own vulnerabilities now. This is the only way to ensure the security of SAP systems throughout the year and maintain a rapid response capability in the event of anomalies. The easiest and most thorough way to do this is to use a tool-based, holistic solution for SAP threat detection and access governance such as Sast Suite. This not only takes care of comprehensive real-time monitoring, but also integrates cyclical checks up to the creation of an audit plan with its own policy for the auditor's finding list.