📞 91132 45779
in W
📚 FREE DETAILED NOTES & DIAGRAMS — NO LOGIN NEEDED

Cuesys Learning Hub

Detailed study notes with flowcharts & diagrams — AI, SAP Security & GRC, Soft Skills & Leadership.
Written by Hari Krishna Maddineni — 16+ years industry expert & Silicon India Award Winner.

🧠 AI & ChatGPT 🔒 SAP Security & GRC 👑 Soft Skills & Leadership
NEW & FREE 🔥 Explore our Learning Portal — Daily articles, industry news, subscription plans & more!
🔥 Visit Learning Portal →

🔒 SAP Security — The Complete Foundation

SAP Security is the discipline of controlling who can access what data and functions within an SAP system. In large enterprises running SAP, improper security can lead to fraud, data breaches, audit failures and regulatory penalties. Understanding SAP Security is therefore critical for every SAP professional.

SAP SECURITY ARCHITECTURE — 3 LAYERS

LAYER 1 — NETWORK SECURITY Firewalls, VPN, Network Access Controls, SSL/TLS encryption LAYER 2 — OS & DATABASE SECURITY OS user accounts, database access controls, SAP profile parameters, password policies LAYER 3 — SAP APPLICATION SECURITY (Main Focus) User management • Role design • Authorization objects • GRC controls Users SU01 Roles PFCG Auth Objects SU24 GRC ARM/ARA Audit SM19

Essential SAP Security Terminology

Authorization Object
A container of related fields that control access to a specific SAP function. Example: S_TCODE controls which transactions a user can run. Over 1000 authorization objects exist in standard SAP.
Authorization Field
A field within an authorization object that holds specific values. Example: ACTVT (Activity) field in most objects uses values like 01=Create, 02=Change, 03=Display, 06=Delete.
Authorization Check
The runtime verification that happens every time a user tries to perform an action in SAP. If the check fails, the user gets an "authorization error" and transaction SM19 logs it.
Profile
The technical representation of roles. Profiles are generated automatically when you save a role in PFCG. Users should be assigned roles, not profiles directly.
User Buffer
The in-memory store of all authorization values for a logged-in user. Rebuilt every time the user logs in. Changes to roles only take effect after the user logs out and back in.
SU53
Transaction that shows the LAST failed authorization check for a user. First tool to use when debugging missing access. Shows exact authorization object, field and value that failed.
SU24
Transaction to maintain the authorization objects checked by each transaction code. Used to customise which auth checks are relevant for custom transactions.
SUIM
SAP User Information System — a powerful reporting tool. Run reports like: Who has access to SU01? Which users have SAP_ALL? Where is authorization object X used?

🔐 SAP Authorization Concept — How Access Works

The SAP authorization concept defines exactly how the system decides whether to allow or deny a user's action. Understanding this is the foundation of all SAP security work.

SAP AUTHORIZATION CHECK — COMPLETE FLOW

USER RUNS TRANSACTION (e.g. FB01) User double-clicks or types T-code and presses Enter SAP CHECKS S_TCODE Is this T-code assigned in user's roles/profiles? S_TCODE FOUND? NO ACCESS DENIED YES SAP CHECKS OBJECT AUTH VALUES Checks all authorization objects for this T-code (e.g. F_BKPF_BUK) ALL CHECKS PASS? NO → SU53 ACCESS DENIED YES ACCESS GRANTED

🛠️ Role Design in PFCG — Step by Step

PFCG (Profile Generator) is the main transaction for creating and managing SAP roles. Proper role design is the foundation of good SAP security. Here is the complete process:

ROLE DESIGN PROCESS IN PFCG

1 Requirement Analysis What does the business need? 2 Create Role in PFCG Name role using naming convention 3 Add T-codes (Menu Tab) Add relevant transaction codes 4 Maintain Auth (Auth Tab) Set field values for each object 5 Generate Profile System creates the profile automatically

Role Naming Conventions — Best Practice

Pattern Example Explanation
Z_[MODULE]_[FUNCTION]_[TYPE] Z_FI_GL_ACCOUNTANT_SR Custom (Z) | Module (FI) | Function (GL Accountant) | Type (Single Role)
Z_[COUNTRY]_[MODULE]_[JOB] Z_IN_MM_BUYER_SR Country (IN=India) | Module (MM) | Job title (Buyer) | Single Role
ZC_[NAME] ZC_FI_ALL_ACCOUNTANTS Composite role combining multiple single roles
Y_ prefix Y_HR_PAYROLL_ADMIN_SR Alternative to Z — same concept, some companies prefer Y prefix

⚖️ SAP GRC Access Control — Complete Overview

SAP GRC (Governance, Risk and Compliance) Access Control is a suite of applications that helps organisations manage user access risks, streamline access provisioning, and comply with regulations like SOX, GDPR and ISO 27001. It has 4 core components:

SAP GRC ACCESS CONTROL — 4 COMPONENTS

SAP GRC Access Control v12.0 ARA Access Risk Analysis Detects SOD conflicts and risky access ARM Access Request Management Workflow for requesting and approving access EAM Emergency Access Management Firefighter — temporary emergency access + logs BRM Business Role Management Manage business role lifecycle end-to-end

⚖️ SOD Analysis — Segregation of Duties Complete Guide

Segregation of Duties (SOD) is the principle that no single person should control all steps of a critical business process — because that creates opportunities for fraud or error that go undetected. SOD is a fundamental requirement of SOX compliance, ISO 27001 and most regulatory frameworks.

⚠️ Classic SOD Conflict Example — Procure to Pay (P2P)

Create Vendor FK01 Create PO ME21N Goods Receipt MIGO Enter Invoice MIRO Run Payment F110 ⚠ IF ONE PERSON HAS ALL 5 STEPS = HIGH FRAUD RISK! They can create a fake vendor, raise a PO, fake goods receipt, enter invoice, and approve payment — fraud complete!

SOD Remediation Options — What to Do When a Conflict is Found

Remediation (Best)

Remove the conflicting access from the user. Assign only what is needed for their job. This is the cleanest solution and preferred by auditors.

Mitigation (Alternative)

When remediation is not possible (e.g. small company, few staff), document a compensating control. Example: Manager reviews all vendor creations monthly. Must be signed off by risk owner.

Role Redesign

Redesign roles so that conflicting access cannot exist in a single role. This is a longer-term structural fix but prevents future conflicts from recurring.

Process Redesign

Change the business process itself so that two people are always required for a critical transaction. Example: Two-person rule for payment approvals above Rs 1 lakh.

🔥 Firefighter (EAM) — Emergency Access Management

Firefighter provides a controlled way to give temporary elevated access to SAP during emergencies — while maintaining a complete audit trail. It is called "Firefighter" because it is for emergency "fire-fighting" situations that cannot wait for normal access provisioning.

FIREFIGHTER PROCESS — HOW IT WORKS

1 Emergency Occurs Prod system issue at 2AM 2 User Requests FF Access Via GRC workflow or phone 3 Controller Approves FF Owner grants temporary ID 4 User Logs In as FF ID Performs emergency work in SAP 5 Auto Log Sent to Controller Every action logged reviewed within 24h KEY ROLES IN EAM FF Owner (Role Owner) Assigns FF IDs to users FF Controller Reviews FF usage logs within 24 hours FF User (Firefighter) Person who uses FF ID for emergency

🏘️ SAP S/4HANA Security — What Changed from ECC

SAP ECC goes End of Life in 2027. Every company running SAP ECC must migrate to S/4HANA. S/4HANA has significant security architecture changes that every SAP Security consultant must understand NOW — before it is too late!

Area SAP ECC SAP S/4HANA Impact on Security
User Interface SAP GUI (T-codes) Fiori Launchpad (Apps) Need 3-layer security: Backend + OData + Fiori Catalog
Data Model Separate Vendor/Customer Business Partner (BP) New authorization objects for BP — must rebuild roles
Financials Tables Many (BKPF, BSEG etc.) Universal Journal (ACDOCA) Some authorization objects changed — retest all FI roles
Authorization Objects ECC standard set New S/4HANA specific objects Must identify and add new objects to roles before migration
Role Concept T-code based roles Business role / App-based Redesign roles around business functions, not T-codes
Reporting Classic SAP reports Embedded Analytics / Fiori Analytics authorization objects needed for new reports

📋 SAP Security Audit Checklist — 20 Critical Checks

This checklist covers the most commonly audited SAP security controls. Use this before any external or internal audit to identify and fix issues proactively.

CRITICAL No users with SAP_ALL in production — this gives unrestricted access to everything.
CRITICAL No users with SAP_NEW — removes authorization checks for new functionalities.
CRITICAL Debug access (S_DEVELOP with ACTVT=02) limited to basis team only in production.
HIGH Emergency users (Firefighter) usage logs reviewed by controller within 24 hours.
HIGH No shared user IDs — each person must have their own unique SAP login.
HIGH Dormant users (no login in 90+ days) locked or deleted after review.
HIGH SU01 access (user admin) limited — who can create and change users must be controlled.
HIGH Password policy active: min 8 chars, complexity, 90-day expiry, 5 wrong attempts = lock.
MEDIUM Batch job ownership: automated jobs should run under system users, not dialog users.
MEDIUM Security Audit Log (SM19) activated and monitored for critical events.
MEDIUM All SOD conflicts either remediated or mitigated with signed-off controls.
MEDIUM User access recertification done at least annually — business approves access.
MEDIUM Segregation of Duties in security team itself — different people create vs approve roles.
MEDIUM Transport requests for security changes go through proper change management.
MEDIUM No generic or shared passwords — each user sets their own password on first login.
LOW Role naming convention is consistent and documented.
LOW Unused roles (no users assigned) cleaned up to avoid confusion.
LOW Authorization documentation is up to date for each custom role.
LOW Test users and training system users are separated from production.
LOW Compliance reports from GRC scheduled and reviewed monthly by risk owners.

❓ SAP Security Interview Questions & Detailed Answers

Q1: Explain the SAP authorization concept end to end. +
Q2: What is Segregation of Duties and give 3 examples of SOD conflicts? +
Q3: What is the difference between ARA, ARM, EAM and BRM in SAP GRC? +
Q4: A user calls saying they cannot run transaction FB01. How do you resolve this? +
Q5: What are the key security changes from SAP ECC to S/4HANA? +
1

Ready to go deeper with expert training?

These notes are a preview. Our full training programs include live practice sessions, real-world case studies, system access and personal mentoring by Hari Krishna — 16+ years expert.

Get Free Consultation → View All Courses

📞 95355 55779  |  🌐 www.cuesysinfotech.com  |  ✉ info@cuesysinfotech.com

📚 Explore More Learning Hub Topics

🧠
AI & ChatGPT
🔒
SAP Security & GRC
CURRENT
👑
Soft Skills & Leadership
💬