{"id":62041,"date":"2015-06-22T14:51:39","date_gmt":"2015-06-22T12:51:39","guid":{"rendered":"http:\/\/e3mag.com\/?p=62041"},"modified":"2019-08-22T14:55:18","modified_gmt":"2019-08-22T12:55:18","slug":"sap-permissions-security-needs-overview","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/sap-berechtigungen-sicherheit-braucht-ueberblick\/","title":{"rendered":"SAP authorizations - security needs an overview"},"content":{"rendered":"<p>The trainee passes through all departments in the company, receives ever new SAP authorizations and ultimately has far-reaching rights. This exaggerated example is not so far removed from reality in some companies.<\/p>\n<p>This is often due to SAP structures that have grown historically and become increasingly complex. Security risks that arise usually remain undetected for years. Nordwest Handel, a trading company in the production connection trade with 950 affiliated medium-sized trading companies, wanted to prevent such a situation.<\/p><div id=\"great-3524439803\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>In addition to goods procurement and warehousing\/logistics, Nordwest Handel also offers services for finance, logistics, IT and sales. The SAP system, which was introduced in the mid-1990s and has been steadily expanded, contains business-critical data for accounting, controlling, and customer and supplier master data.<\/p>\n<p>Nordwest Handel decided to modernize its SAP authorization management from the ground up. The administrative effort for management was to be reduced. Transparency across processes was to be increased through improved documentation.<\/p>\n<p>Stefan Lendzian, division manager of information technology\/systems support at Nordwest Handel, says:<\/p>\n<p><em>\"SAP offers only very limited options in the standard for conveniently managing and documenting roles and risks.\"<\/em><\/p>\n<p>In his view, there are basically three ways for a company to modernize:<\/p>\n<p>1. make the best possible use of the SAP standard, bringing in an external specialist if necessary, 2. use a solution developed outside SAP, or 3. use a solution fully integrated in SAP.<\/p>\n<p>Nordwest Handel opted for the third way to be sure that the selected application is always up to date with the latest SAP system status. After three months of market research, those responsible selected the Sast GRC Suite from Hamburg-based Akquinet.<\/p>\n<p>The abbreviation Sast stands for \"System Audit and Security Toolkit\". Steffen Maltig, project manager and senior consultant at Akquinet, explains:<\/p>\n<p><em>\"At the beginning, we usually find that the SAP authorizations are too generously designed and therefore hard to keep track of. Our goal is to permanently assign them as precisely as possible without restricting the company's ability to act.\"<\/em><\/p>\n<p>The company's wishes were ascertained by means of questionnaires. Key questions were: Which data is particularly worth protecting? Who is given access? By evaluating this data and the usage statistics, new roles were determined for each workstation with the help of a \"role construction kit\" consisting of 700 templates.<\/p>\n<p>The goal was an overarching workstation authorization model that was applicable in all organizational units and took data ownership into account.<\/p>\n<p>With the help of Sast, the work roles were directly subjected to a risk check. The system checks whether all external guidelines are adhered to when assigning authorizations and whether functions are separated properly.<\/p>\n<p>Different purchasing and sales organizations of Nordwest Handel should also be completely separated from each other in terms of their data accesses, so that overlapping read and write accesses are no longer possible.<\/p>\n<p>During the remodeling process, workstation-specific composite roles were also introduced. After a final test phase with pilot users, in which the last authorization gaps were closed, Nordwest Handel introduced the new authorization concept company-wide according to time and budget planning.<\/p>\n<p>Ongoing SAP operation is safeguarded by an automated risk management process within authorization management. Potential threats in real time can be detected and reported. Following the project, an external auditor confirmed to Nordwest Handel that the security of SAP authorization management meets the requirements without restriction.<\/p>\n<p><em>\"We offer our customers, suppliers and employees maximum data protection and confidentiality in the long term. In everyday life, we nevertheless have a low maintenance and documentation effort\".<\/em><\/p>\n<p>says Lendzian.<\/p>","protected":false},"excerpt":{"rendered":"<p>German companies have been increasing their spending on IT security for years. But many companies do not notice attacks on their SAP system. Cases of embezzlement and data theft are becoming more frequent. Only the tip of the iceberg reaches the public. One key to greater SAP security is the clean assignment and permanent checking of user authorizations.<\/p>","protected":false},"author":38,"featured_media":61274,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,1551],"tags":[35885,369,531,4462],"coauthors":[19920],"class_list":["post-62041","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-1551","tag-finanzen","tag-it","tag-logistik","tag-vertrieb","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",400,155,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-768x297.jpg",768,297,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-100x39.jpg",100,39,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-480x186.jpg",480,186,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-640x248.jpg",640,248,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-720x279.jpg",720,279,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-960x372.jpg",960,372,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",18,7,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",600,232,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",600,232,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Deutsche Unternehmen erh\u00f6hen seit Jahren ihre Ausgaben f\u00fcr die IT-Sicherheit. Doch Angriffe auf ihr SAP-System bemerken viele Unternehmen nicht. Es kommt immer h\u00e4ufiger zu Unterschlagungsf\u00e4llen und Datenraub. Nur die Spitze des Eisbergs gelangt an die \u00d6ffentlichkeit. Ein Schl\u00fcssel f\u00fcr mehr SAP-Sicherheit ist die saubere Vergabe und dauerhafte Pr\u00fcfung der Benutzerberechtigungen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/szene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/1506\/\" rel=\"category tag\">MAG 15-06<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/62041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=62041"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/62041\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/61274"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=62041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=62041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=62041"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=62041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}