SAP Career Guide - A beginner’s manual on SAP careers for students and professionals

Informative and an excellent book. Well written with lots of detail and examples

E. Collins

Access Risk Management in SAP

Do you need expert guidance on how to plan, implement, and run access analyses? This book takes a practical approach to creating customer-specific SAP rulesets for compliance managers, GRC teams, identity and access management teams, as well as administra...

Table of content

  • Introduction
  • 1 Access risk analysis
  • 2 Risk catalog
  • 3 Customer-specific access risk catalog
  • 4 The process of risk handling
  • 5 Conclusion
  • A About the Authors
  • B Disclaimer

More Information

Author:

Adam Edwards, Bianca Folkerts, Tobias Sieg

Category:

Security & Identity Management

Language:

Englisch

Reading sample

2.1   Why the term “access risk catalog”?

An access risk catalog is the object that contains all the rules defined for analyzing authorizations via any tool. However, let us explain why we like to use this exact term.

2.1.1   Why “access”?

Access because we are talking about rules that can analyze authorizations. In other words: Who has access to certain data or functionalities? To use the term risk catalog only is misleading, as we are talking about risks in a specific sense, rather than in a general sense, such as a fire in a plant/office building, currency fluctuation, energy crisis, etc.

2.1.2   Why “risk”?

Risk because the key purpose of the catalog is to identify risky access to an IT system.

Alternative terms are sometimes used. For example, the goal of analyzing access within an SAP system is not always to evaluate regulatory risks. We often recommend analyzing authorizations for information with the goal of obtaining a certain level of transparency for data or role owners (see also Section 1.1.3). An analysis may also be used to support the execution of internal controls for example, to comply with an audit requirement regarding the listing of persons who have posting authorization to a specific account. In these instances, you may have seen the term rule or even analysis used instead of risk.

However, as the term risk is much more common when talking about GRC tools and analysis of access, we regard this as the best term to use for common understanding.

2.1.3   Why “catalog”?

Catalog since it is the complete list of defined risks.

Again, alternative terms are sometimes used. The term ruleset is often used in software tools for grouping risks to structure them or for a specific purpose (e.g., GDPR, external audit). A risk can usually be assigned to more than one ruleset, so in our view, the term is more useful as an attribute of a risk (see also Section 2.2.2) but not as a term for the whole content of the risk database.

Therefore, database would also fit. However, this is a very technical term and we decided against it because when communicating with business users, it just does not feel right.

Another alternative term used is matrix. For us, this implies a combination of functionalities that results in a violation of segregation of duties (SoD), even more so the terms SoD matrix or SoD ruleset. As there are many single functionalities that we should monitor, we do not regard the term as appropriate for the complete content of a risk database, only for those SoD risks.

This is why we use the term catalog within our projects. It is neutral with regard to content, use cases, and the goal of the analysis.

All content - Learn for 7 days now, free of charge and with no obligation.

7 days of free and unlimited access to all learning content1 und den Espresso Tutorials SAP-Copiloten Espressi.

1
Enter mail
2
Confirm mail
3
Learn 7 days

1. You can unsubscribe from the Espresso Tutorials newsletter at any time by clicking on Unsubscribe in an email from the newsletter.

Already have an account? Log in now.

1 You will have access to all learning content included in the Silver subscription. Certificates are part of the Gold subscription. Online training courses are NOT part of the Digital subscription.