The following risks are often present but go undetected by security administrators and auditors because they are typically “unusual” cases.
This doesn’t mean they aren’t present; they aren’t immediately apparent.
Let’s look at some of these!
1. User accounts with critical profiles (SAP ALL and similar) that are inactive or locked but still used in batch processes and dialogue sessions.
2. Roles with generic transaction assignments (e.g., Object S_TCODE, Field: TCD, value ME) and users who are assigned these roles and use transactions that start with ME).
3. Roles with descriptions indicating they are only for inquiry or display purposes but internally grant broad creation and update privileges.
4. Zombie profiles, with active or inactive roles, with or without associated roles.
The common risk in all these cases is that those with these authorisations can execute transactions they are not authorised for without scrutiny of why or for what purpose.
Detecting these issues without specialised software tools is impractical.
This is why CentinelBox is continuously evolving, with its primary goal being to exceed our clients’ expectations.
WANT TO LEARN MORE ABOUT CENTINELBOX AND HOW WE CAN HELP YOU TAKE CONTROL OF YOUR SAP SECURITY?
Schedule a personalized demo directly with me so you can see how our platform enables assertive and successful internal control.