SAP Role Design for Success: Best Practices and Tips

SAP Role Design for Success: Best Practices and Tips Is your SAP role design structure accurate and well-organized? Do they follow a systematic naming convention that is easy to understand? Before making any further changes to the roles, are you performing a Segregation of Duty analysis? Have you received recommendations from your auditor about a […]
SAP Business Integrity Screening? What should you know?

SAP Business Integrity Screening SAP Business Integrity Screening is a tool that helps organizations detect potential risks and compliance issues within their business processes. It is a key component of SAP’s Governance, Risk, and Compliance (GRC) suite, which provides a range of solutions to help organizations manage risk and ensure compliance with various regulations and […]
How vulnerable are you to insider attacks?

A recent study reveals that ERP systems, including SAP, are more vulnerable to insider attacks The recent Data breach report by IBM reveals that malicious insiders are equally liable for the data breaches. Many of us think that stolen or compromised credentials are the primary or the most common cause of a data breach. It […]
Securing Hana Database

Here is an interesting article that outlines various tips and recommendations to secure SAP HANA database.
Limit The No. Of Line Items In SAP GRC ARM Request

While creating Access requests in SAP GRC, users might select too many roles which might result in Timeout error message during the submission, or Risk Analysis. To overcome this issue, the no.of line items can be limited by this small tweak. Here is an interesting video that details the steps to implement to limit the […]
SAP HANA Mini Checks – How They Can Help Security Consultants?

With the introduction of SAP HANA’s future execution model, it is the responsibility of SAP Security consultants to manage the SAP HANA DB security as well. Activities such as User Management, Role Management, Auditing HANA DB, Managing Privileges, and other reporting activities have to be performed by the security consultants. However, report generation is not […]
A Right Approach For Building SAP HANA Privilege Based Roles

Designing, configuring, and implementing SAP Security is a complex and resource-intensive task. Hence, companies should identify the right approach before building authorizations. This is also important when it comes to SAP HANA privilege-based roles. I have personally experienced and helped a few organizations with the design of the role definition approach. With this, I can […]
SAP Licensing Optimization MYTHS

SAP licensing optimization is always a complicated activity for many organizations. The various issues and/or problems faced in managing the SAP licenses makes it hard to stay compliant with the SAP agreements. More than 80% of businesses are struggling to maintain numbers correctly – they are either over or underutilizing their licensing assets. To optimally […]
The New Sap Security Tools To Simplify Authorization Tracing

Most of you might know and also have already worked with the STAUTHTRACE transaction code. For those who are still not aware of this transaction code or never used it before, STAUTHTRACE is an enhanced and user-friendly transaction code when compare to ST01 AUTH TRACE and is meant only for the authorization trace. Further, SAP has introduced […]