SAP Security Audit
An SAP Security Audit is a structured evaluation of
SAP systems (such as ECC, S/4HANA, or SAP Business Suite) to identify
vulnerabilities, misconfigurations, excessive privileges, and compliance
issues. SAP systems are critical to enterprise operations and are frequent
targets due to their deep access to finance, HR, logistics, and customer data.
📋 SAP Security Audit
Checklist (in Table Format)
# |
Audit Area |
Control / Audit Focus |
Evidence / Method |
1 |
User Management |
Unused or default SAP users (e.g., SAP*, DDIC) are locked
and monitored |
SUIM reports, user listing |
2 |
Password Policies |
Enforce strong password rules (min length, complexity,
expiration) |
Profile parameter check: login/* |
3 |
User Authorization Review |
Role-based access control (RBAC); check for SoD
(Segregation of Duties) conflicts |
SUIM – Roles & Authorization analysis |
4 |
Sensitive Transactions |
Monitor use of critical T-codes (e.g., SE11, SE16, SU01, SM59,
SCC4) |
Audit logs, transaction usage reports |
5 |
Audit Logging |
Ensure logging is enabled for config changes, logins, user
actions |
SM19/SM20 (Security Audit Log) |
6 |
RFC Connections |
Validate secure configuration of RFC destinations and
restrict trusted systems |
SM59 config, RFC connection list |
7 |
Transport Management |
Controls on SAP transports to prevent unauthorized
code/config movement |
STMS logs, table TPALOG, change requests audit |
8 |
SAP_ALL / SAP_NEW Roles |
Users with powerful composite roles like SAP_ALL are
identified and reviewed |
SUIM – Users by Profile |
9 |
Basis Security Parameters |
Validate key parameters (e.g., rfc/call_check, auth/*, login/*,
etc.) |
RZ11 parameter dump |
10 |
Custom ABAP Code Review |
Scan custom programs for hardcoded credentials, insecure
logic, or SQL injections |
Code inspector (SCI), ATC checks |
11 |
Interface Security |
Secured integrations (IDOCs, PI/PO, Web Services) with
encryption and auth |
PI/PO logs, SM59, STRUST |
12 |
Table Access |
Check for direct access to sensitive tables (e.g., USR02, PA0001,
BUT000) |
ST03N, SUIM – Tables accessed |
13 |
Client Settings |
Verify SCC4 and client settings: no modifiable clients in
production |
SCC4 configuration snapshot |
14 |
Change Logging |
Enable and monitor change logs for config tables (e.g., T000,
USR*) |
SCU3 logs |
15 |
Patch Management |
SAP kernel and support packs up to date |
SPAM/SAINT version reports |
16 |
SSO & Authentication Integrations |
Integration with Active Directory, SAML, 2FA |
STRUST certificates, SSO log config |
17 |
Encryption & TLS |
Ensure TLS is used for SAP GUI, Web Dispatcher, PI, and
RFC |
STRUST, SMICM, ICM logs |
18 |
Segregation of Duties (SoD) |
Conflict matrix check (e.g., posting & approval in
finance, user creation & role assign) |
GRC AC, manual SoD matrix or third-party tool (e.g.,
ERPScan) |
19 |
Background Jobs Security |
Validate job ownership, authorization, and contents of
critical jobs |
SM37 job list, SM36 config |
20 |
SAProuter & External Access |
Secure saprouter config and avoid direct external access |
saprouter logs, port scan, firewall check |
🛠 Common SAP Security
Audit Tools
Tool |
Use |
SAP GRC (Access Control) |
SoD, Role simulation, User provisioning audits |
SUIM |
Role/user/authorization analysis |
SCI / ATC |
Static code analysis for ABAP |
SM20 / SM19 |
View and configure audit logs |
ERPScan / Onapsis |
Vulnerability scanning and compliance audits |
Solution Manager |
Change control, diagnostics |
📁 Deliverables of a SAP
Security Audit
Document |
Description |
SAP Security Audit Report |
Comprehensive overview of findings across modules and
systems |
Critical Users and Roles List |
List of users with high privileges and roles |
Risk Matrix (SoD) |
Overview of segregation of duties conflicts |
Transport/System Change Review |
Analysis of unauthorized changes or code movement |
ABAP Custom Code Issues |
List of security flaws in custom code (e.g., SQLi, auth
gaps) |
Remediation Plan |
Detailed technical and procedural fixes for each finding |
🛡 Related Standards
& Compliance
- SAP
Security Baseline (SAP Note 2253549)
- NIST
800-53 (mapping via GRC tools)
- ISO
27001: A.9, A.12, A.13 (access, logging, cryptography)
- SOX
(financial system controls)
- GDPR
(personal data handling in SAP HCM or CRM modules)
- DSAG
/ SAP Security Guidelines
Would you like a sample SAP security audit report, or
help automating the audit with tools like GRC AC or ERPScan?
Comments
Post a Comment