Download presentation
Presentation is loading. Please wait.
1
Monitoring Security With Standard SAP Tools Session Code 805 Sandi McKinney
2
Introduction TELUS Enterprise Solutions, a division of TELUS Second largest Telecommunications provider in Canada Approximately 20,000 employees $7 Billion in Revenues in 2002 Senior SAP Consultant specializing in SAP Authorizations Sandi.mckinney@telus.com
3
Why Audit? AIS – Audit Information System Security Audit Log RBE – Reverse Business Engineering (as applied to Security) Outline
4
Why Audit ? Risk Compliance Configuration
5
Why Audit ? Availability, Integrity and Confidentiality
6
Outline Why Audit AIS – Audit Information System Security Audit Log RBE – Reverse Business Engineering (as applied to Security)
7
AIS – Audit Information System Review Analysis Monitor
8
Transactions SECR – Audit Information System PFCG - Role Maintenance
9
Transaction - SECR SECR is still available Possible error message: ‘AIS Structure AUDIT_ALL does not exist’ OSS Note 328019
10
Reports and Queries Import from Client 000 Different Types of Reports OSS Note 100609
11
Set-Up Roles Roles for: Security Team Internal Audit External Audit
12
Set-Up Roles Administration Work Excellent On-Line Help Defaults Queries
13
Testing Roles OSS Note 92124 OSS Note 100609
14
User Assignment Security Team Staff Employee Measurement Data setting – 01 Audit Team External Audit Employee Measurement Data setting – 02 Internal Audit Staff Employee Measurement Data setting – 02
15
Customization At your discretion Use Variants
16
Favorites Top Ten Security Reports, notably SM20 Security Audit Log Assessment SUIM User Information System RSUSR200 List of Users Per Login Date S_ALR_87101194 - Check Passwords of Special Users Documentation Flexibility in assigning roles
17
Additional Information AIS SAP Course BC940 – Security and Auditing Resource SAP Service Marketplace Quick Links – AIS
18
Additional Information AIS OSS Notes 375609 – Audit Info. System (AIS): Roles for System Auditors 451960 – Audit Information System (AIS), role concept 77503 – Audit Information System (AIS) 328019 – AIS Structure AUDIT_ALL does not exist 202504 – Audit Information System (AIS) 4.6C – collect. note 182699 – Audit Information System (AIS): Download of Query
19
Next: Security Audit Log Questions ?
20
Outline Why Audit? AIS – Audit Information System Security Audit Log RBE – Reverse Business Engineering (as applied to Security)
21
Audit Log What is Audited? Dialog logon Monitor Special IDs for Log on RFC/CPIC logon Monitor specific logons RFC function call Monitor remote function calls
22
What is Audited? Transaction start Monitor the transactions that are being started for specific IDs Report start Monitor the reports that are being started for specific IDs User master change Monitor for User Master Changes Other Monitor changes to the Audit Log configuration
23
System Parameters RSAU/MAX_DISKSPACE/LOCAL = 5000000 used to size the audit file RSAU/ENABLE = 1 enabling the audit log
24
Configuration RSAU/LOCAL/FILE = /usr/sap/PRD111/audit_++++++++ naming and directory location RSAU/SELECTION_SLOTS = 10 number of audit filters (max 10)
25
Transactions SM19 – Security Audit Configuration SM20 – Security Audit Log Assessment SM18 – Reorganize Security Audit Log
26
SM19 – Security Audit Configuration Define Filters
27
SM19 – Security Audit Configuration Create your profile Enter the profile name The client number Enter the user Id
28
SM19 – Security Audit Configuration Select Audit Classes Select Weight of Events Activate Filter Re-cycle the system
29
SM20 – Security Audit Log Assessment Select Audit Log Read Audit Log Refine Search By Audit Class and/or Weight of Event
30
SM20 – Security Audit Log Assessment Sample Report
31
SM20 – Security Audit Log Assessment Sample Statistics
32
SM18 – Reorganize Security Audit Log Simulate Archive Delete Cannot Delete or archive files that are less than 3 days old
33
Alert Monitor Computer Center Management System (CCMS) Events triggered in Audit Log will trigger event in CCMS Alerts are logged by Application Server No system configuration required to use CCMS
34
Computer Center Management System Transaction RZ20
35
Computer Center Management System
36
Favorites Audit Log Easy to set-up. Quicker to review results of the audit log Entries are highlighted in Red for Critical and Yellow for Important, based on your definitions in the Audit Log filter(s). Assists with tracking if an alert has been analyzed and resolved. Contains a history
37
Additonal Information Audit Log SAP Course WNA210 – R/3 for Auditors Resource SAP R/3 Audit Guide
38
Additional Information Audit Log OSS Notes 30724 – Data Protection and security in SAP Systems 486717 – SecAudit: SM20 selection documentation is missing 317883 – SecAudit: Transactions are not recorded 139418 – Logging User Actions 198646 – SecAudit: SM18 composite note 539404 – FAQ 173743 – SecAudit; Changing Parameters 139418 – Logging user actions
39
Questions ? Next: Reverse Business Engineering
40
Outline Why Audit? AIS – Audit Information System Security Audit Log RBE – Reverse Business Engineering (as applied to Security)
41
What is RBE? RBE is a tool to support CBI (Continual Business Improvement) Data Extraction Data Analysis Reporting
42
ABAP SAP Supplied Program is in text format must download and generate into the ABAP Workbench
43
Transaction Monitor Transaction ST03 after Menu path Workload->Reorganization->Parameters_Performance Database Use a minimum of 3 months Cannot use a Time-line of days or weeks
44
What can be extracted? Transactional Data Configuration Data Master Data
45
How to Extract Logon to your R/3 system Execute Extract Program
46
How to Extract Time Line Type of Data Output to Spool Execute
47
How to Extract Sample Spool File
48
How to Extract Select Spool File Select Drive Path Download Extract
49
Preparing for Analysis Set-Up Company Import the data that has just be exported Rename the imported file when prompted Successful completion message will be displayed
50
Preparing for Analysis My Company Name Extract File
51
Preparing for Analysis
52
Analysis
53
Sample Report
54
Analysis Select Plant Placeholder Add User(s) to Analysis
58
Favorites Many reports to work with Can create customized reports Well documented Easy to use
59
Additional Information RBE SAP Course VSAP50 – Reverse Business Engineering Resource RBE White Paper OSS Notes 367378 – How to get the Reverse Business Engineer
60
Questions ? Next: Summary
61
Summary Availability, Integrity and Confidentiality AIS – Audit Information System assists with the ongoing audit requirements Audit Log assists with the monitoring of system activities RBE – Reverse Business Engineering assists with the maintenance of roles
62
Thank you for attending! Please remember to complete and return your evaluation form following this session. Session Code: 805
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.