R/3 audit review questions.
Here is a list of items most commonly reviewed by internal/external auditors when reviewing your R/3 system.
It is always a good idea to review this list a couple times a year and to take the appropriate steps to tighten your security.
Review the following :-
* System security file parameters (TU02) (e.g. password length/format, forced password sessions, user failures to end
session etc.) have been set to ensure confidentiality and integrity of password.
Security-Parameter-Settings-Documentation
* Setup and modification of user master records follows a specific procedure and is properly approved by management.
* Setup and modification of authorizations and profiles follows a specific procedure and is performed by someone
independent of the person responsible for user master record maintenance.
* An appropriate naming convention for profiles, authorizations and authorization objects has been developed to help
security maintenance and to comply with required SAP R/3 naming conventions.
* A user master record is created for each user defining a user ID and password. Each user is assigned to a user group, in
the user master record, commensurate with their job responsibilities.
* Check objects (SU24) have been assigned to key transactions) to restrict access to those transaction.
* Authorization objects and authorizations have been assigned to users based on their job responsibilities.
* Authorization objects and authorizations have been assigned to users ensuring segregation of duties.
* Users can maintain only system tables commensurate with their job responsibilities.
* Validity periods are set for user master records assigned to temporary staff.
* All in-house developed programs contain authority check statements to ensure that access to the programs are properly
secure.
Select a sample of :-
* Changes to user master records, profiles and authorizations and ensure the changes were properly approved.
(The changes can be viewed with transaction (SECR).
* Ensure that security administration is properly segregated. At a minimum there should be separate administrators
responsible for:
- User master maintenance. (This process can be further segregated by user group.)
- User profile development and profile activation. (These processes can be further segregated.)
* Verify that a naming convention has been developed for profiles, authorizations and in-house developed authorization
objects to ensure:
- They can be easily managed.
- They will not be overwritten by a subsequent release upgrade (for Release 2.2 should begin with Y_ or Z_ and for
Release 3.0 by Z_ only.)
* Assess through audit information system (SECR) or through a review of table USR02, whether user master records have
been properly established and in particular:
- The SAP_ALL profile is not assigned to any user master records.
- The SAP_NEW profile is not signed to any user master records. Verify that procedures exist for assigning new
authorization objects from this profile to users following installation of new SAP releases.
* Assess and review of the use of the authorization object S_TABU_DIS and review of table authorization classes
(TDDAT) whether :-
- All system tables are assigned an appropriate authorization class.
- Users are assigned system table maintenance access (Through S_TABU_DIS) based on authorization classes
commensurate with their job responsibilities.
* Assess and review of the use of the authorization objects S_Program and S_Editor and the review of program classes
(TRDIR) whether:
- All programs are assigned the appropriate program class.
- Users are assigned program classes commensurate with their job responsibilities.
* Ensure through a review of a sample of :-
- In-house developed programs that the program, code either:
- Contains an Authority-Check statement referring to an appropriate authorization object and valid set of values;
or
- Contains a program Include statement, where the referred program contains an Authority-Check statement referring to
an appropriate authorization object and valid set of values.
I think an auditor would want to know what methods you are using to approve who gets what profile and what method you are using to document it so that if you review your documentation you could compare it with what authorization the user currently has and determine if the user has more authorizations (roles) than he has been approved for by the approval system in place.
How to Earn Rs.25000 every month in internet without Investment?
SAP Security and Authorization Concepts
Labels:
System Audit
Subscribe to:
Post Comments (Atom)
topics
-
▼
2007
(1406)
-
▼
November
(1359)
- Free Download SAP FI Certification study pdf books
- Implementing SAP R/3 on OS/400
- Update SAP Kernel in UNIX based
- Security Audit Log (BC-SEC).pdf
- Security Audit Log.pdf
- Securities,pdf
- Secure Store & Forward / Digital Signatures (BC-SE...
- Secure Network Communications (BC-SEC-SNC)
- Free download use ful T-codes
- I did not find any OSS notes appropriate for my pr...
- How to apply OSS notes number?
- What is OSS Notes number?
- Where can i access SAP OSS?
- WHAT IS OSS
- Disaster Recovery Plan to Restore Production System
- Steps to Install SAP Note in sap
- Difference Between SAP Notes and Support Package
- Question : Subject : Support packages testing
- Five Different "User Type"
- How to solve the Time Zone Definition Problems?
- Setting the User Decimals Format
- Schedule Manager
- Various Important SAP Basis T-Code
- Trace Functions in sap
- System Trace: Error Analysis in sap
- System Trace(ST01) in sap
- Roles and Authorizations Used in Background Proces...
- Deleting Multiple Spool Requests Simultaneously in...
- Logging and Tracing in spool
- Print and Output Management in spool
- Background Job Monitoring Monitor in CCMS
- Monitoring the Database Using the Alert Monitor
- Monitoring the Operating System Using the Alert Mo...
- Monitoring Memory Management Using the Alert Monitor
- Method Dispatching Monitor in CCMS
- Remote Application Server Status Monitor in CCMS
- GRMG Self-Monitoring Monitor in CCMS
- CCMS Selfmonitoring Monitor for System-Wide Data i...
- Logfile Monitoring Monitor in CCMS
- Logon Load Balancing Monitor in CCMS
- Transaction-Specific Dialog Monitor in CCMS
- Workload Collector Monitor in CCMS
- System Errors Monitor in CCMS
- System Configuration Monitor in CCMS
- Syslog Monitor in CCMS
- Spool System Monitor in CCMS
- Security Monitor in CCMS
- Performance Overview Monitor in CCMS
- Operating System Monitor in CCMS
- Filesystems Monitor in CCMS
- Entire System Monitor in CCMS
- Monitoring the Enqueue Service in CCMS
- Dialog per Application Server Monitor in CCMS
- Dialog Overview Monitor in CCMS
- Database Monitor in CCMS
- Transactional RFC and Queued RFC Monitor in CCMS
- Communications Monitor in CCMS
- Buffers Monitor in CCMS
- Background Job Monitoring Monitor(CCMS)
- Background Processing Monitor(CCMS)
- Availability and Performance Overview Monitor (CCMS)
- SAP CCMS Monitor Templates Monitor Set
- Creating and Changing a Monitoring Pause(CCMS)
- Creating and Changing Monitoring Rules(CCMS)
- Configuring Availability Monitoring(CCMS)
- Update Repositories(CCMS)
- Displaying Central Performance History Reports(CCMS)
- Displaying Report Properties
- Scheduling and Executing a Report
- Variables in Group Names
- Creating a Report Definition(CCMS)
- Maintaining Collection and Reorganization Schemata...
- Maintaining Collection and Reorganization Schemata...
- Creating and Editing a Calendar Schema(CCMS)
- Creating and Editing a Day Schema
- Customizing the Alert Monitor(CCMS)
- Resetting MTEs and Alerts(CCMS)
- Reorganizing Completed Alerts(CCMS)
- Display Completed Alerts(CCMS)
- Automatically Complete Alerts(CCMS)
- Completing Alerts(CCMS)
- Starting Methods (CCMS)
- Processing Alerts(CCMS_
- Displaying the Technical View: Central Performance...
- Displaying the Technical View: Threshold Values(CCMS)
- Displaying the Technical View: Status Autoreaction...
- Displaying the Technical View: Status Data Collector
- Displaying the Technical View: Method Allocation
- Displaying the Technical View: Info on MTE
- Display Types and Views of the Alert Monitor(CCMS)
- Properties of Status Attributes (CCMS)
- Properties of Performance Attributes(CCMS)
- Properties of Log Attributes (CCMS)
- General Properties of Monitoring Tree Elements(CCMS)
- Properties of Monitoring Objects and Attributes
- Elements of the Alert Monitoring Tree
- Alert Monitoring Tree(CCMS)
- Monitors(CCMS)
- Monitor Sets (CCMS)
- Elements of the Alert Monitor (CCMS)
-
▼
November
(1359)
No comments:
Post a Comment