Monitoring Security With Standard SAP Tools Session Code 805 Sandi McKinney.

Slides:



Advertisements
Similar presentations
Welcome! Were Glad Youre Here!. Whats New In Version 5.1b-100 Welcome to The Annual Information & Records Associates, Inc. User Conference May 20, 2009.
Advertisements

Micro Control Solutions Stability System II rev. 6.4
ValvKeep® via VK-Viewer
Take the ‘dread’ out of your XA Security Audit Belinda Daub, Senior Consultant Technical Services
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Enhanced Security Management, Separation of Duties and Audit Support for XA Belinda Daub, Senior Consultant Technical Services
Users & Authorization Users must be setup and roles assigned to user master records before you can use the SAP System. A user can only log on to the system.
Welcome to QuadraNet Systems.
1 Authority on Demand Flexible Access Control Solution.
Visit : Call Us: US: , India:
Visit : Call Us: US: , India:
0 UMN 2011 ERP Terapan SAP BASIS General Concept Session # 3.
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
Automated Payment System. Benefits There is minimal training needed No expensive equipment necessary You can maintain your existing banking relationship.
HORIZONT 1 ProcMan ® The Handover Process Manager Product Presentation HORIZONT Software for Datacenters Garmischer Str. 8 D München Tel ++49(0)89.
Get Detailed with SAP Expense Planning Wayne Kirkendall Session Code 1610 GB Enterprises.
Copyright © 2003 Americas’ SAP Users’ Group Authorizations in the Finance & Controlling Modules Ranvir Singh, Sherman Wright Business Analysts, LSI LOGIC.
Chapter 9 Auditing Database Activities
SAP Basics for Auditing Change Management and Security September 8, 2014 Presenter: Linda Yates Consultant, Risk Advisory Services.
 SAP AG CSU Chico 102/14/981SAP Security Lecture MINS 298C SAP Configuration & Use: Security Copyright 1996, 1997, James R. Mensching, Gail Corbitt.
Use of Role Based AIS for Technical System Auditing at DuPont Chris Leeder DuPont Chris Carr SAP Session: 509.
Simfund Filing Training Introduction First Look Step by Step Training.
1 General Reporting HRMS Reports There are two types of HRMS reports: Standard and Customized. Standard reports came with the SAP Software and relate to.
ECM Base Compliance Input Messaging & Alert Compliance dashboard Compliance Monitoring Internal & External Audit Tracking Access Control Compliance & Financial.
Complete Weekly Timesheets Select work. Add hours and comments Tell Mgr if ETC=0 and need more time. Tell Mgr if using someone else’s ETC. End week, change.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Overview SAP Basis Functions. SAP Technical Overview Learning Objectives What the Basis system is How does SAP handle a transaction request Differentiating.
Chapter 7 Database Auditing Models
State of Connecticut Core-CT Project Query 4 hrs Updated 1/21/2011.
Front Page …..is an Asset Management tool designed to record and aid the analysis of activities affecting Production capability and costs. …..promotes.
Texas Assessment Management System Basics 2011 TSNAP Fall Academy for New District Testing Coordinators.
Introduction to Comcare’s Customer Information System Presentation.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
0 UMN 2011 ERP Terapan ABAP Introduction Session # 8.
Find these slides in the HRMS Basics course located at: Department of.
AQS Web Quick Reference Guide Changing Raw Data Values Using Maintenance 1. From Main Menu, click Maintenance, Sample Values, Raw Data 2. Enter monitor.
R7 Integrator and Enterprise Integrator: Look at everything you can do with XA!!! Denise Luther, Senior Consultant Technical Services.
Springerlink.com Introduction to SpringerLink springerlink.com.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Instructors begin using McGraw-Hill’s Homework Manager by creating a unique class Web site in the system. The Class Homepage becomes the entry point for.
The 1:1 meeting scheduler that runs itself The 1:1 meeting scheduler that runs itself.
Module 3: Administrator Set-Up Intuit Financial Services University Internet Banking Certification Training.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Student Attendance System Requirement Analysis Presentation.
] COREY PEARSON [ ASUG INSTALLATION MEMBER MEMBER SINCE: 2008 CHAVONE JACOBS [ ASUG INSTALLATION MEMBER MEMBER SINCE: 2003 ALLAN FISHER [ ASUG INSTALLATION.
2016 TELPAS Online Testing. TELPAS Assessment Management System Accessed at
FHA Training Module 1 This document reflects current policy related to this topic. Its content is approved for use in all external and internal FHA-related.
3M Partners and Suppliers Click to edit Master title style USER GUIDE Supplier eInvoicing USER GUIDE The 3M beX environment: Day-to-day use.
TEA Student Assessment Division 2  These slides have been prepared by the Student Assessment Division of the Texas Education Agency.  If any slide is.
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
American Diploma Project Administrative Site Training.
Career Oriented SAP BASIS training in India,uk,usa Online | classroom| Corporate Training | certifications | placements| support CONTACT US: MAGNIFIC TRAINING.
2016 TELPAS Online Testing & Data Collection. Disclaimer  These slides have been prepared by the Student Assessment Division of the Texas Education Agency.
How to Guide: Performance Feedbacks Learn how to complete, upload and publish Performance Feedback forms.
American Diploma Project Administrative Site Training.
SAP GRC(Governance Risk and Compliance)/SECURITY ONLINE TRAINING  Magnific Name : SAP GRC/SECURITY 24*7 Technical support  faculty : Real time Experience.
SAP Security Online Training Online | classroom| Corporate Training | certifications | placements| support CONTACT US: MAGNIFIC TRAINING INDIA
American Diploma Project Administrative Site Training New Jersey.
SAP security online training CONTACT US: MAGNIFIC TRAINING INDIA USA : CONTACT US: MAGNIFIC TRAINING INDIA
Dept. of Information Systems St. Francis Xavier University
Review of IT General Controls
Software Application Overview
Best Practices for Dynamics NAV Administration and Security
SAP GRC(Governance Risk and Compliance)/SECURITY ONLINE TRAINING UK
Critical Warnings and Alerts
Students Welcome to “Students” training module..
Cover page.
atEvent + HubSpot Integtration Instructions
IBM SCPM Basic Navigation
Presentation transcript:

Monitoring Security With Standard SAP Tools Session Code 805 Sandi McKinney

Introduction TELUS Enterprise Solutions, a division of TELUS Second largest Telecommunications provider in Canada Approximately 20,000 employees $7 Billion in Revenues in 2002 Senior SAP Consultant specializing in SAP Authorizations

 Why Audit? AIS – Audit Information System Security Audit Log RBE – Reverse Business Engineering (as applied to Security) Outline

Why Audit ? Risk Compliance Configuration

Why Audit ? Availability, Integrity and Confidentiality

Outline Why Audit  AIS – Audit Information System Security Audit Log RBE – Reverse Business Engineering (as applied to Security)

AIS – Audit Information System Review Analysis Monitor

Transactions SECR – Audit Information System PFCG - Role Maintenance

Transaction - SECR SECR is still available Possible error message: ‘AIS Structure AUDIT_ALL does not exist’ OSS Note

Reports and Queries Import from Client 000 Different Types of Reports OSS Note

Set-Up Roles Roles for: Security Team Internal Audit External Audit

Set-Up Roles Administration Work Excellent On-Line Help Defaults Queries

Testing Roles OSS Note OSS Note

User Assignment Security Team Staff Employee Measurement Data setting – 01 Audit Team External Audit Employee Measurement Data setting – 02 Internal Audit Staff Employee Measurement Data setting – 02

Customization At your discretion Use Variants

Favorites Top Ten Security Reports, notably SM20 Security Audit Log Assessment SUIM User Information System RSUSR200 List of Users Per Login Date S_ALR_ Check Passwords of Special Users Documentation Flexibility in assigning roles

Additional Information AIS SAP Course BC940 – Security and Auditing Resource SAP Service Marketplace Quick Links – AIS

Additional Information AIS OSS Notes – Audit Info. System (AIS): Roles for System Auditors – Audit Information System (AIS), role concept – Audit Information System (AIS) – AIS Structure AUDIT_ALL does not exist – Audit Information System (AIS) 4.6C – collect. note – Audit Information System (AIS): Download of Query

Next: Security Audit Log Questions ?

Outline Why Audit? AIS – Audit Information System  Security Audit Log RBE – Reverse Business Engineering (as applied to Security)

Audit Log What is Audited?  Dialog logon  Monitor Special IDs for Log on  RFC/CPIC logon  Monitor specific logons  RFC function call  Monitor remote function calls

What is Audited?  Transaction start  Monitor the transactions that are being started for specific IDs  Report start  Monitor the reports that are being started for specific IDs  User master change  Monitor for User Master Changes  Other  Monitor changes to the Audit Log configuration

System Parameters  RSAU/MAX_DISKSPACE/LOCAL =  used to size the audit file  RSAU/ENABLE = 1  enabling the audit log

Configuration  RSAU/LOCAL/FILE = /usr/sap/PRD111/audit_  naming and directory location  RSAU/SELECTION_SLOTS = 10  number of audit filters (max 10)

Transactions  SM19 – Security Audit Configuration  SM20 – Security Audit Log Assessment  SM18 – Reorganize Security Audit Log

SM19 – Security Audit Configuration Define Filters

SM19 – Security Audit Configuration Create your profile Enter the profile name The client number Enter the user Id

SM19 – Security Audit Configuration Select Audit Classes Select Weight of Events Activate Filter Re-cycle the system

SM20 – Security Audit Log Assessment Select Audit Log Read Audit Log Refine Search By Audit Class and/or Weight of Event

SM20 – Security Audit Log Assessment Sample Report

SM20 – Security Audit Log Assessment Sample Statistics

SM18 – Reorganize Security Audit Log Simulate Archive Delete Cannot Delete or archive files that are less than 3 days old

Alert Monitor Computer Center Management System (CCMS) Events triggered in Audit Log will trigger event in CCMS Alerts are logged by Application Server No system configuration required to use CCMS

Computer Center Management System Transaction RZ20

Computer Center Management System

Favorites Audit Log Easy to set-up. Quicker to review results of the audit log Entries are highlighted in Red for Critical and Yellow for Important, based on your definitions in the Audit Log filter(s). Assists with tracking if an alert has been analyzed and resolved. Contains a history

Additonal Information Audit Log SAP Course WNA210 – R/3 for Auditors Resource SAP R/3 Audit Guide

Additional Information Audit Log OSS Notes – Data Protection and security in SAP Systems – SecAudit: SM20 selection documentation is missing – SecAudit: Transactions are not recorded – Logging User Actions – SecAudit: SM18 composite note – FAQ – SecAudit; Changing Parameters – Logging user actions

Questions ? Next: Reverse Business Engineering

Outline Why Audit? AIS – Audit Information System Security Audit Log  RBE – Reverse Business Engineering (as applied to Security)

What is RBE? RBE is a tool to support CBI (Continual Business Improvement) Data Extraction Data Analysis Reporting

ABAP SAP Supplied Program is in text format must download and generate into the ABAP Workbench

Transaction Monitor Transaction ST03 after Menu path Workload->Reorganization->Parameters_Performance Database Use a minimum of 3 months Cannot use a Time-line of days or weeks

What can be extracted? Transactional Data Configuration Data Master Data

How to Extract Logon to your R/3 system Execute Extract Program

How to Extract Time Line Type of Data Output to Spool Execute

How to Extract Sample Spool File

How to Extract Select Spool File Select Drive Path Download Extract

Preparing for Analysis Set-Up Company Import the data that has just be exported Rename the imported file when prompted Successful completion message will be displayed

Preparing for Analysis My Company Name Extract File

Preparing for Analysis

Analysis

Sample Report

Analysis Select Plant Placeholder Add User(s) to Analysis

Favorites Many reports to work with Can create customized reports Well documented Easy to use

Additional Information RBE SAP Course VSAP50 – Reverse Business Engineering Resource RBE White Paper OSS Notes – How to get the Reverse Business Engineer

Questions ? Next: Summary

Summary Availability, Integrity and Confidentiality AIS – Audit Information System assists with the ongoing audit requirements Audit Log assists with the monitoring of system activities RBE – Reverse Business Engineering assists with the maintenance of roles

Thank you for attending! Please remember to complete and return your evaluation form following this session. Session Code: 805