Category Archives: Security

Five steps to implementing an effective SAP cyber security program

Establishing an effective SAP cyber security program ties key activities to clearly defined business risks specific to your organization. The high level steps to do this are: 1.Evaluate the organization’s capabilities and identify gaps 2.Understand the SAP landscape and the … Continue reading

Posted in Security | Tagged , , , , , , , , , , , | Leave a comment

What is Segregation of Duties?

Segregation of Duties (SoD) is a control activity where an activity or set of activities are divided among several people in order to reduce the risk of fraud. Segregation of Duties is built around the idea that a critical or … Continue reading

Posted in Security | Tagged , , , , , , , , , | Leave a comment

ST01 Authorization Trace Reason Codes

In April 2013, through SAP Note 1373111, SAP offered enhancements to the popular ST01 authorization trace. These enhancements improve SAP security administrator’s ability to troubleshoot authorization errors using ST01 and help analyze what really is going on with the authorization … Continue reading

Posted in Security, Troubleshooting | Tagged , , , , , | Leave a comment