You should not immediately implement the result of a trace or of transaction SU53 as new roles or profiles. First, analyze the system for existing settings. The Information System and the Audit Info System (which is used by auditors) are available to the administrator for this purpose.
You can use the User Information System to obtain an overview of the authorizations and users in your SAP system at any time using search criteria that you specify. In particular, you can display lists of users to which authorizations classified as critical are assigned. You can also use the User Information System to do the following.
Examples from the User Information System
We recommend that you regularly check the various list that are important for you. Define a monitoring procedure and corresponding checklists to make sure that you continually review your authorization plan. We especially recommend that you determine which authorizations you consider critical and regularly review which users have these authorizations in their profiles.
You can start the Information System from the SAP Menu by choosing Tools → Administration → User Maintenance → Information System. You can also branch to the Information System authorizations from the User Maintenance transaction (SU01) by choosing the menu path Information → Information System.
You can find elements of the authorization system using different selection criteria.
The Information System (RSUSR998) and parts of the Information System can be called as executable reports using transaction SA38. Here are a few examples:
RSUSR002; Users by complex selection criteria
RSUSR008; By critical combinations of authorizations at transaction start
RSUSR008_009_NEW; List of users with critical authorizations
RSUSR020; Profiles by complex selection criteria
RSUSR030; Authorizations by complex selection criteria
RSUSR040; Authorization objects by complex selection criteria
RSUSR070; Roles by complex selection criteria
RSUSR100; Change Documents for Users
RSUSR101; Change Documents for Profiles
More detailed analyses can also be started using Reports:
Another way to read information from the system is a special role concept for auditing (previously done using Audit Information System).
The content of the concept has been revised by the auditing and risk management working group of the German-Speaking SAP User Group e.V. (DSAG), in cooperation with customers and partners. This group has considered a wide range of information from external and internal auditors, IT specialists, and consultants who examine SAP applications or whose companies implement SAP software. For more information, see http://www.sap.com/germany/discsap/revis/index.htm.
The Audit Information System (AIS) is a checking tool for:
System checks
Audit (business audit)
Tax audits
Internal auditing
External auditing
The AIS role concept improves the flow and quality of the check.
The Audit Information System is a tool used by auditors to optimize a system and examine any weak points. The old menu-based version (AUDIT area menu) was replaced by a role-based environment. The role concept used now includes the same collections, structuring, and defaults for standard SAP programs, but is easier to scale. The content is defined using the transaction PFCG ( → Tools → Administration → User Maintenance → Role Administration); the old transaction SECR is no longer used.
Hint
For more information about the technology behind the program, see SAP Note 451960. 451960.
The roles are constructed to match the flow of the check for different check fields with default control data/evaluation programs for the area "Business" and "System Audit". The roles can be found in PFCG with the ID "SAP*AUDITOR*".
The delivered single roles are split into two groups:
Authorization roles
Transaction roles
The authorization roles are easy to identify. The role names always end with the suffix "*_A". This means that all roles that do not end with a simple "A" are the corresponding menu roles.
Accordingly, the following condition applies:
The authorization roles contain (manual) authorization values, but do not have a menu (such as SAP_AUDITOR_BA_SD_A).
The transaction roles contain a menu, but do not have any authorization values (such as SAP_AUDITOR_BA_SD).
If you are now asking yourself "Why not use a single role with menu and authorizations?", there is a simple explanation.
What happens when you enter a transaction code in the role menu and then display the authorization data? Correct. Default authorization values are displayed for objects and fields. In many cases, however, there are too many defaults for auditing purposes, since the authorization goes far beyond just "Display Authorization". If you were to modify these defaults for your own requirements, the time and effort needed to make changes to the content would be much too high (note: maintenance status "Changed").
Hint
Finally, note again the following: As an administrator, remain focused on your authorization concept every time you receive a new request from the user departments.
Avoid an unnecessarily large number of roles or profiles.
Not every error that is displayed is connected to authorizations.
When you receive requests, first search for authorizations to see if they have already been created.
Clarify whether these can be reused.
Only create something new in response to a requested authorization if nothing suitable already exists.