Overview
SAP Access Control is an enterprise software solution that enables an organization to control access, identify risk, and document compliance. SAP Access Control is composed of five major tools:
- Risk Analysis and Remediation–find and remediate segregation of duties and critical access violations
- Access Request Management–automate access administration for enterprise applications
- Business Role Management–define and maintain roles in business terms
- Emergency Access Management–monitor emergency access and transaction usage
- User and SoD Access Review–certify that access assignments are still warranted
These key processes work together to provide organizations with advanced analytic and reporting capabilities to identify where risk is present across critical business processes.
Risk and control catalogs allow for the central definition of risk and the documentation of mitigating controls that can be applied to specific users, user groups, security roles, and so on, to support compliance and audit-related activities.
The risk analysis engine is integrated with a workflow provisioning process and a role management process to allow customers to identify risk early before provisioning access to production environments.
Standard-delivered reporting functions include ad-hoc risk analysis capability, batch risk analysis, analytic dashboards, and alert reporting for monitoring and mitigating control execution and transaction usage.
Risk Analysis and Remediation
The solution identifies and assesses potential access risks and violations and provides tools to remediate these risks through segregation of duties (SoD) analysis, critical access analysis, and remediation workflows.
The solution enables organizations to define and enforce access control policies across all SAP and non-SAP applications, reducing the complexity and effort required to manage access controls. SAP Access Control comes with several risk catalogs, or rule sets, that define access risks for standard SAP solutions such as SAP S/4HANA, SAP ERP, and SAP CRM, as well as several non-SAP solutions, including Oracle, JD Edwards, and Peoplesoft.
The implementation process for SAP Access Control involves evaluating the standard risk definitions delivered by the SAP rule set and tailoring that rule set to the customers' environment. Risk definitions are organized by business process defined and classified as either a segregation of duty risk, a critical action risk, or a critical permission risk.
The delivered rule set content includes a function catalog organized by business process. This catalog contains the actions and permissions required to perform all or part of a business function, such as Processing vendor invoices.
Risks are further classified as single or cross-system, depending on whether they include functions executed in one or multiple systems.
Once the required rule set has been implemented, SAP Access Control provides real-time, ad-hoc risk analysis or offline batch risk analysis. Risk analysis can be performed at the user level, the role level, or using any number of reporting attributes, including, for example:
- User Group
- Risk by Process
- Access Risk ID
- Risk Level
- Rule Set
- User Type
- System
- Include Role Assignment
Using the standard Risk Simulation analysis, auditors can develop the appropriate Remediation Strategy by simulating changes to user access and/or role design to eliminate conflict. Simulation is possible at the user, role, and permission levels. If a suitable control has been defined in the Mitigating Control catalog, mitigation controls can be selected and applied during the risk analysis.
SAP Access Control also provides Access Control Dashboards to give management and internal auditors a graphical representation of the status of Risk and Remediation activities across each connected system. These dashboards are updated regularly using a series of periodic batch jobs, including batch risk analysis.