Global SAP Access and Operations Workplan v7-2017 ERP
Global SAP Access and Operations Workplan v7-2017 ERP
Global SAP Access and Operations Workplan v7-2017 ERP
SAP001 SAP.15
SAP016 SAP.27
SAP002 SAP.16
SAP003 SAP.06
SAP005 SAP.07
SAP006 SAP.17
SAP007 SAP.18
SAP008 SAP.19
SAP010 SAP.01
SAP009a SAP.11
SAP011 SAP.02
SAP012 SAP.04
SAP013 SAP.03
SAP015 SAP.20
OPTIONAL
New
SAP.28
SAP004 SAP.09
SAP009 SAP.05
Evaluation of Competence and Authority
Note: If the client uses SAP GRC or similar tools for provision of access, consider testing, Admin access to the approval workflow, Security over the ID used to provision access, Approval hierarchy within the workflow,
Configuration settings for e.g. user cannot approve a role for themselves or once role is rejected it will not be provisioned to the user etc.
Inquire with management to understand the process in which new access and modifications to access is requested and approved. Specifically, consider obtaining an understanding of the following attributes, as
appropriate:
• Policies and procedures related to user access provisioning;
• Individuals or groups responsible for approving access;
• Individuals or groups responsible for administering access;
• How user access requests are submitted, approved and documented;
• Whether a tool is used to provision new access and how that tool is controlled;
• Determine whether there is a segregation of duties between the approver and the person granting the access in the system
• Whether there is a different processes for access provisioning of non-employees (such as vendors, contractors, etc.) and if there are differences, understand what those differences are
Review evidence to corroborate the design of the control, such as approval documentation for a newly added user.
Design Factor 1: Appropriateness of the Purpose of the Document considerations of the appropriateness of the purpose of the control and correlation to the IT risk identified.
Control and its Correlation to the Risk
Design Factor 2: Competence and Authority of the Person(s) Control Owner(s) - Document considerations of the appropriateness of authority and competence of the process owner(s) to perform the control, Refer to the Summary worksheet for the evaluation of the competence and authority for individuals or groups performing the control.
Performing the Control including consideration of segregation of duties (as applicable)
Design Factor 3: Frequency and Consistency with Which the Frequency of Control Operation
Control is Performed
Design Factor 4: Level of Aggregation and Predictability Document considerations of the appropriateness of the levels of aggregation and/or predictability given the risk addressed
Design Factor 5: Criteria for Investigation and Process for Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the process for follow-up
Follow-up
Evaluation of Design Conclusion
Dependency on Other Control(s) or Information Is the control dependent upon other controls or information?
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the IUC is tested and the
conclusions reached as a result of that testing. Consider source data, parameters and report logic.
Information used as Audit Evidence Is the information used as audit evidence to test the control?
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was generated). Describe
procedures performed to address completeness and accuracy. Consider source data, parameters and report logic.
Test Procedure Number Operating Effectiveness Test Procedure (including Implementation) Operating Effectiveness Test Results (including Implementation)
1 a. Obtain the population of users created during the audit period by using transaction SUIM --> change document for users. Apply audit period as the
date range and check the selection box "User created". Alternatively, use ACTT Populations report rule "ITGC 112".
b. Obtain the population of users with roles assignment changes during the audit period (Ad Hoc Changes) by using transaction SUIM --> change
document for users. Apply audit period as the date range and check selection boxes "Roles" and "Profiles", and "User created". Download the report and
flag any role assignments that did not occur on the same date as user creation date because roles are usually assigned at the same time when users are
created and the population of new users is already covered in step a. Alternatively, use ACTT Populations report "ITGC 111 and 114"
2 Make a selection of new and modified users and test the following attributes:
3 ROLES CHANGES
Note 1: If the ability to change roles is not granted to users in production as tested in control SAP.06, do not execute this step #3 as role changes will be
part of the change management process (tested in SAP.10).
Note 2: If there is a distinct process for role changes, perform the test steps below to ensure the changes are authorized through an established change
process. Note that role changes should typically not be performed directly in production.
Obtain a listing of changes made to roles during the testing period, select a sample of changed roles based on the sampling guidance based on
population and assess whether changes made were documented and properly approved.
Utilize ACTT Populations report, rule "ITCG 113 and ITGC 110" or
a. Execute SUIM - Change Documents - For Roles
i. Enter the appropriate date range
ii. Enter * in Change By Field
iii. Select All Change Documents Technical View -- Enter CD1251
4. Preventive SOD Check Note: If the client uses GRC for access provisioning and has preventive SOD check is configured, consider testing the below configuration parameters
within GRC. Configuration parameters are not tested via ACTT, engagement teams will have to generate these independently from the GRC system.
Assess whether an SOD check is performed prior to granting new user access or changing user access.
Execute Transaction SPRO-> GRC -> Access Control -> Maintain Configuration Settings or table GRACV_CONFIGSET:
Ascertain whether the value for parameter 1072: Mitigation of critical risk required before approving the request is set to 'YES' to ensure that new users
or changes with unmitigated SOD conflicts are not added to the system.
2. For all other risk types, SOD check requirement is configured within the workflow. Assess whether the automated SOD check has been implemented
through observation with the client of the error message when approving the user's access with unmitigated risks. Additionally, the configuration can be
reviewed (GRFNMW_CONFIGURE_WD --> Step 5: maintain paths->, last step in the path --> Task setting "Approve Despite Risk" - should be
unchecked).
Mitigating Procedures
Interim Operating Effectiveness Conclusion
RF IPE Procedures Identify and describe test procedures performed over IPE at RF.
RF Test Procedure 2
RF Mitigating Procedures If applicable, perform mitigating procedures for any deviations/deficiencies identified during RF testing or for open interim deficiencies.
Final Operating Effectiveness Conclusion
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over internal
control (e.g., form 2342(S))
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number
RF Basis
RF Test Procedure 1
RF IPE Procedures
RF Test Procedure 2
RF Mitigating Procedures
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over internal control
(e.g., form 2342(S))
SAP.02
Access for terminated and/or transferred users is removed or modified in a timely manner.
ols related to removing access to the application for terminated users. Specifically, consider obtaining an understanding of the following
ng;
ers;
ation and if the same process is used for employees and non-employees (such as vendors, contractors, etc.);
nual or automated
ntrol
Document considerations of the appropriateness of the purpose of the control and correlation to the IT risk identified.
Control Owner(s) - Document considerations of the appropriateness of authority and competence of the process owner(s) to
perform the control, including consideration of segregation of duties (as applicable)
Frequency of Control Operation
Document considerations of the appropriateness of the levels of aggregation and/or predictability given the risk addressed
Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the process for follow-
up
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the
IUC is tested and the conclusions reached as a result of that testing. Consider source data, parameters and report logic.
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was
generated). Describe procedures performed to address completeness and accuracy. Consider source data, parameters and
report logic.
ACTT
• Access privileges for the terminated user are no longer active in the system. Such access was removed, deleted or disabled
in a timely manner (based on the effective date of the termination).
Note 1: If a common key or field can be used to compare the termination listing to the listing of users, teams may consider
performing a 100% test of all terminated users.
Note 2: Where tools (such as Tivoli Identity Management or others) are utilized to automatically remove access upon
termination, teams may consider testing the termination control as an automated control. Additionally, if SAP authentication is
integrated with the network operating system, this procedure may be covered as part of testing at the OS layer (Active
Directory).
Note 3: Listing of active users can be obtained through table USR02 or SUIM report or from ACTT raw output tables USR02,
USR02CC, ADRP.
Obtain a listing of transfers for employees and contractors for the period of intended reliance from Human Resources. Make a
selection of users that were transferred or changed roles. For each user selected, test the following attributes:
• Access privileges that were no longer required, as a result of the employee transfer, were removed in a timely manner.
Note: Listing of active users and their associated roles can be obtained through tables USR02 and AGR_USERS or SUIM
report or from ACTT tables USR02, USR02CC, ADRP, AGR_USERS.
If applicable, perform mitigating procedures for any deviations/deficiencies identified during RF testing or for open interim
deficiencies.
Evaluation of Design Testing Results
Refer to the Summary worksheet for the evaluation of the competence and authority for individuals or groups
performing the control.
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number
RF Basis
RF Test Procedure 1
RF IPE Procedures
RF Test Procedure 2
RF Mitigating Procedures
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over internal control
(e.g., form 2342(S))
SAP.03
User access is periodically reviewed.
would identify preventative or detective access controls to address the IT risk. If we have tested the
trols that encompasses end-users (Controls 01 & 02) and such controls are operating effectively, then we
ew control.
ss to review user access to the application. Specifically, consider obtaining an understanding of the following
ntrol
Document considerations of the appropriateness of the purpose of the control and correlation to
the IT risk identified.
Control Owner(s) - Document considerations of the appropriateness of authority and competence
of the process owner(s) to perform the control, including consideration of segregation of duties (as
applicable)
Frequency of Control Operation
Include a description of the IUC and identify the controls that address the accuracy and
completeness of the IUC, where the IUC is tested and the conclusions reached as a result of that
testing. Consider source data, parameters and report logic.
Include a description of the IPE and details regarding how it was generated (i.e., who provided the
IPE and the date it was generated). Describe procedures performed to address completeness
and accuracy. Consider source data, parameters and report logic.
ACTT
Refer to the Summary worksheet for the evaluation of the competence and authority for individuals or groups
performing the control.
Operating Effectiveness Test Results (including Implementation)
Description
Note: The relevance of this control depends on the functionality within SAP that the entity is utilizing and if there are any relevant SOD conflicts
on preventive role-based access to segregate access, as control SAP.01 may be sufficient to address end-user SOD for lower risk IT environmen
Note: IF SAP GRC V10 OR GREATER IS USED, REFER TO TAB SAP.04-GRC 10x (INSTEAD OF THIS TAB)
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number
RF Basis
RF Test Procedure 1
RF IPE Procedures
RF Test Procedure 2
RF Mitigating Procedures
Final Operating Effectiveness Conclusion
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over internal control
(e.g., form 2342(S))
SAP.04
Segregation of duties is monitored and conflicting access is either removed or mapped to mitigating controls, which are documented and tested.
n the functionality within SAP that the entity is utilizing and if there are any relevant SOD conflicts within system. Also consider whether the entity relies
access, as control SAP.01 may be sufficient to address end-user SOD for lower risk IT environments.
ols related to segregation of duties within the application. Specifically, consider obtaining an understanding of the following attributes, as appropriate:
or the segregation of duties;
identify conflicting access combinations within the system that should not be granted;
ted to financial reporting are appropriately identified and if allowed, are mapped to mitigating controls, which are documented and performed by management;
duties and how that tool is controlled;
tion of duties conflicts, including the frequency of review, that are disallowed per the matrix or policy;
and the performance of mitigating controls.
control, such as communications on the SOD monitoring control and examples of resolution of conflicts (if applicable).
ntrol
Document considerations of the appropriateness of the purpose of the control and correlation to the IT risk identified.
Control Owner(s) - Document considerations of the appropriateness of authority and competence of the process owner(s) to perform the control,
including consideration of segregation of duties (as applicable)
Frequency of Control Operation
Document considerations of the appropriateness of the levels of aggregation and/or predictability given the risk addressed
Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the process for follow-up
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the IUC is tested and the
conclusions reached as a result of that testing. Consider source data, parameters and report logic.
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was generated). Describe
procedures performed to address completeness and accuracy. Consider source data, parameters and report logic.
ACTT
Note 2: if a tool is used for performance of the control, assess relevant controls over the tool such as authentication, administrative access and change
management for the ruleset.
Make a selection of SOD reviews and obtain evidence that management sufficiently performed the control. This may include reperformance and/or
inspection of documentation to ascertain the following:
• The monitoring process was properly documented and performed at the appropriate level of detail to ascertain whether segregation of duties conflicts
exist;
• Monitoring was performed by appropriate management personnel;
• Corrective action was taken in a timely manner to resolve conflicts identified through the monitoring process;
• Management has documented, tested and determined the effectiveness of mitigating controls.
If applicable, perform mitigating procedures for any deviations/deficiencies identified during RF testing or for open interim deficiencies.
Evaluation of Design Testing Results
Include in inquiry and corroboration whether custom transactions are being used and included in the SOD analysis
Refer to the Summary worksheet for the evaluation of the competence and authority for individuals or groups performing the control.
Design Factor 2: Competence and Authority of the Control Owner(s) - Document considerations of the appropriateness of authority and competence of the process owner(s) to perform the control, Refer to the Summary worksheet for the evaluation of the competence and authority for individuals or groups performing the
Person(s) Performing the Control including consideration of segregation of duties (as applicable) control.
Design Factor 3: Frequency and Consistency with Frequency of Control Operation
Which the Control is Performed
Design Factor 4: Level of Aggregation and Document considerations of the appropriateness of the levels of aggregation and/or predictability given the risk addressed
Predictability
Design Factor 5: Criteria for Investigation and Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the process for follow-up
Process for Follow-up
Evaluation of Design Conclusion
Dependency on Other Control(s) or Information Is the control dependent upon other controls or information?
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the IUC is tested and the
conclusions reached as a result of that testing. Consider source data, parameters and report logic.
Information used as Audit Evidence Is the information used as audit evidence to test the control?
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was generated). Describe
procedures performed to address completeness and accuracy. Consider source data, parameters and report logic.
Test Procedure Number Operating Effectiveness Test Procedure (including Implementation) Operating Effectiveness Test Results (including Implementation)
Note: If the client uses Single Sign-On determine how SSO is configured, if users log into the SAP system using SNC then generate the output of
table USRACL to determine if can use SAP GUI for password logon.
1 Assess whether password settings are configured to a value consistent with company and/or professional policies and standards.
Identify active servers relevant to the assessment. Utilize ACTT SAP Basis Report or execute Transaction code SM51 or SE16N->Table
SAPWLSERV to identify active servers
b. Execute Transaction code SE16 or SE16N to extract table PAHI with filtering criteria on State (PARSTATE) with value "A" and Host Name
(Hostname) including active servers as identified in step a above.
For each of the parameters listed below, test for the following attributes:
• Password parameters are configured in accordance with the company policy.
• login/failed_user_auto_unlock (0)
• login/fails_to_user_lock (<=6)
• login/min_password_diff (>=1)
• login/min_password_digits (>=1)
• login/min_password_letters (>=1)
• login/min_password_lng (>=8)
• login/min_password_specials (1) (Optional; if required per company policy)
• login/password_expiration_time (<=90)
• login/password_history_size (>=12) only available in SAP NetWeaver 7.0
• rdisp/gui_auto_logout 1800 (Optional; this could be enforced by Active Directory)
• rsau/enable = 1 (Optional; if this is set to 1, SM20 audit log could be enabled for performing mitigating procedures)
2 SAP NetWeaver 7 Enhancement Pack 3 (SAP_BASIS 7.03) introduced a concept of making user-specific settings for password rules, password
changes, the password change requirement, and logon restrictions. If your client has implemented this functionality:.
Utilize ACTT SAP Basis Report or execute steps below:
A. Execute SE16N-> table SEC_POLICY_RT and identify if any security policies are configured.
B. To identify which security policies are assigned to which user, SE16N-> table USR02, see column "Security Policy" (SECURITY_POLICY).
C. If new policies exists per step A and are assigned to any users per step B, evaluate whether the parameters of security policy are appropriate.
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number Roll-Forward Test Procedure Roll-Forward Testing Results
RF Basis Additional procedures required
RF Test Procedure 1 Inquire with the process owners and/or control owners on the following:
- The status of deficiencies identified at interim, including new or modified controls to respond to the deficiencies
- Significant changes to control performers, existing processes, or IT systems supporting the control.
RF IPE Procedures Identify and describe test procedures performed over IPE at RF.
RF Test Procedure 2
RF Mitigating Procedures If applicable, perform mitigating procedures for any deviations/deficiencies identified during RF testing or for open interim deficiencies.
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over
internal control (e.g., form 2342(S))
Design Factor 2: Competence and Authority of Control Owner(s) - Document considerations of the appropriateness Refer to the Summary worksheet for the evaluation of the competence and authority for
the Person(s) Performing the Control of authority and competence of the process owner(s) to perform the individuals or groups performing the control.
control, including consideration of segregation of duties (as
applicable)
Design Factor 4: Level of Aggregation and Document considerations of the appropriateness of the levels of
Predictability aggregation and/or predictability given the risk addressed
Design Factor 5: Criteria for Investigation and Document considerations of the appropriateness of the criteria used
Process for Follow-up for investigation (i.e., threshold) and the process for follow-up
Dependency on Other Control(s) or Is the control dependent upon other controls or information?
Information
Include a description of the IUC and identify the controls that
address the accuracy and completeness of the IUC, where the IUC
is tested and the conclusions reached as a result of that testing.
Consider source data, parameters and report logic.
Information used as Audit Evidence Is the information used as audit evidence to test the control?
Test Procedure Number Operating Effectiveness Test Procedure (including Implementation) Operating Effectiveness Test Results (including Implementation)
Note If Central User Administration is used, refer to SAP.06_CUA Practice Aid for customized test steps 3, 4, 5, 6, 7.
For each account identified as having the access below, assess the following attributes:
• Access privileges are authorized and appropriate for user’s assigned duties based on inquiries with management (indicate the persons we inquired with)
• Access privileges are authorized and appropriate for user’s assigned duties based on inspection of their job function (include reference to corroborating source, such as an organizational chart)
b. Access to create / maintain profiles that are created outside the Profile Generator via OVZ6 OR SU02:
3 Access to create and change user master records (not including role / profile assignments)
i. Authorization object: S_TCODE
Transaction Code: SU01 or SU01_NAV or SU10 or SU12 or OY27 or OY30 or OY28 or OY29 or OOUS or OTZ1 or OMDL or OMEH or OMWF or OPF0 or GCE1 (note some of these transactions could be locked,
which can be viewed in report RSAUDITC)
AND
ii. Authorization object: S_USER_GRP
Activity: 01 or 02
Note related to steps 4, 5, 6 Queries in steps 4, 5 and 6 depend upon the configuration values in the PRGN_CUST table described below. Depending on the results of steps below, queries in steps 4,5, and 6 are required to be customized.
Note: ACTT Basis report already includes this analysis, therefore, if using ACTT, procedures listed below are not required.
Execute SE16N and enter table PRGN_CUST and obtain the value of the parameters ASSIGN_ROLE_AUTH and CHECK_S_USER_SAS and identify the values of the parameters.
If any of the parameters do not exist or have the value "BLANK" in table PRGN_CUST, execute SE16N and enter table SSM_CIDT, execute (hit F8) using following filters and values:
1. Language: EN
2. Table Name: PRGN_CUST
3. Name: ASSIGN_ROLE_AUTH or CHECK_S_USER_SAS depending on which parameter does not exist or has the value "BLANK"
Based on field (TEXT), identify the default value for the parameters. Possible scenarios are listed below:
1. If default value of parameter ASSIGN_ROLE_AUTH is ASSIGN and if the parameter does not exist or has the value "BLANK" in table PRGN_CUST, the parameter value is inherently ASSIGN.
2. If default value of parameter ASSIGN_ROLE_AUTH is CHANGE and if the parameter does not exist or has the value "BLANK", the parameter value is inherently CHANGE.
3. If default value of parameter CHECK_S_USER_SAS is YES and if the parameter does not exist or has the value "BLANK" in table PRGN_CUST, the parameter value is inherently YES.
4. If default value of parameter CHECK_S_USER_SAS is NO and if the parameter does not exist or has the value "BLANK", the parameter value is inherently NO.
7 Access to lock / unlock users, change passwords by executing transaction SUIM => Users By Complex Selection Criteria (report RSUSR002) with the following authorizations:
Authorization object: S_TCODE
Transaction Code: SU01 or SU01_NAV or SU10 or SU12 or OY27 or OY30 or OY28 or OY29 or OOUS or OTZ1 or OMDL or OMEH or OMWF or OPF0 or GCE1 (note some of these transactions could be locked, which
can be viewed in report RSAUDITC)
AND
Auth. Object: S_USER_GRP
Field Values: 05
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number Roll-Forward Test Procedure Roll-Forward Testing Results
RF Basis Additional procedures required
RF Test Procedure 1 Inquire with the process owners and/or control owners on the
following:
- The status of deficiencies identified at interim, including new or
modified controls to respond to the deficiencies
- Significant changes to control performers, existing processes, or
IT systems supporting the control.
RF IPE Procedures Identify and describe test procedures performed over IPE at RF.
RF Test Procedure 2
RF Mitigating Procedures If applicable, perform mitigating procedures for any
deviations/deficiencies identified during RF testing or for open
interim deficiencies.
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Note: This control is not typically tested for lower risk environments, as a majority of the standard tables require the client to be open for changes which reduces the risk of
inappropriate table updates if such controls are operating effectively (refer to SAP.23). Consider table maintenance transaction codes specific to the entity in determining
the related dependencies and applicability of this control. This includes consideration of the following:
Automated controls: Each configured control will be dependent on the table in which configuration is stored. Configurations can either be stored in standard tables or
custom tables based on client implementation.
Data in System Generated Reports: A majority of transactions are based on source data held in tables. Data is either stored in standard tables or custom tables based on
client implementation.
BASIS Controls: SAP Basis controls may be reliant on table data. If the client is using the standard SAP transaction codes / process, none of the tables are modifiable in
current versions of SAP for GITCs reliant on table data.
Review evidence to corroborate the design of the control, such as reviewing one user that has been granted table maintenance access and determine whether the access is
commensurate with the user's job responsibilities.
Dependency on Other Control(s) or Is the control dependent upon other controls or information?
Information
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the IUC is tested and
the conclusions reached as a result of that testing. Consider source data, parameters and report logic.
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was generated).
Describe procedures performed to address completeness and accuracy. Consider source data, parameters and report logic.
Test Approach
ACTT
Recommended Tools to obtain data
Completeness and Accuracy of Information Produced by the Entity (IPE) used as audit evidence
Reference Number IPE Description IPE Test Procedures
Test Procedure Number Operating Effectiveness Test Procedure (including Implementation) Operating Effectiveness Test Results (including Implementation)
For each account identified as having the access below, assess the following attributes:
• Access privileges are authorized and appropriate for user’s assigned duties based on inquiries with management (indicate the persons we
inquired with)
• Access privileges are authorized and appropriate for user’s assigned duties based on inspection of their job function (include reference to
corroborating source, such as an organizational chart)
NOTE: Note: Tables in SAP are typically assigned to authorization groups. While granting direct update access to tables is not recommended, the
engagement team could consider limiting the testing to particular critical tables / table authorization groups if the client has a process in place to
identify the critical tables / table authorization groups. For example, if the client's control consists of granting access to update particular
Finance-related tables to select Finance team members, the testing of specific tables / table authorization groups may be appropriate.
In order to identify what table authorization groups or tables if S_TABU_NAM is used are granted to users, utilize ACTT SOD Keystone report,
filtered view. Finally, use table "TDDAT" to identify the tables assigned to the table authorization groups.
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number Roll-Forward Test Procedure Roll-Forward Testing Results
RF Basis Additional procedures required
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of
deficiencies over internal control (e.g.,
form 2342(S))
Design Factor 2: Competence and Authority of the Control Owner(s) - Document considerations of the appropriateness of authority and competence of the process owner(s) to Refer to the Summary worksheet for the evaluation of the competence and authority for individuals or groups
Person(s) Performing the Control perform the control, including consideration of segregation of duties (as applicable) performing the control.
Design Factor 3: Frequency and Consistency with Frequency of Control Operation
Which the Control is Performed
Design Factor 4: Level of Aggregation and Document considerations of the appropriateness of the levels of aggregation and/or predictability given the risk addressed
Predictability
Design Factor 5: Criteria for Investigation and Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the process for follow-
Process for Follow-up up
Evaluation of Design Conclusion
Dependency on Other Control(s) or Information Is the control dependent upon other controls or information?
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the IUC
is tested and the conclusions reached as a result of that testing. Consider source data, parameters and report logic.
Information used as Audit Evidence Is the information used as audit evidence to test the control?
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was
generated). Describe procedures performed to address completeness and accuracy. Consider source data, parameters and
report logic.
Test Approach
Test Procedure Number Operating Effectiveness Test Procedure (including Implementation) Operating Effectiveness Test Results (including Implementation)
1 Utilize ACTT SAP Basis Report or Execute the following:
a. Transaction Code: S_ALR_87101194 or SA38 to run report RSUSR003
b. Assess whether passwords had been changed from the default, and are not trivial for all clients on the production instance.
Review the following:
i. SAP*
ii. DDIC
iii. SAPCPIC
iv. EARLYWATCH
v. TMSADM (note, this ID will be displayed in RSUSR003 report only if note 1552894 is applied. To check whether this ID
exists otherwise and has the default password, use table USR02, or transaction SUIM)
2 (PRODUCTION CLIENT ONLY) If any of the default IDs mentioned above are user types ‘S’ (Service) or ‘A’ (Dialog), which
indicates they can be used to log into the system, identify whether IDs have been used during the audit period and obtain
evidence of approvals and supporting documentation.
Note: if client has a preventive or detective monitoring control over use these IDs, test client's control leveraging steps a-d
instead. User DDIC should either be set as type 'B' or Locked. DDIC is needed for certain tasks in installation and upgrade,
software logistics, and for the ABAP Dictionary.
Mitigating Procedures
Roll-Forward Testing
Test Procedure Number Roll-Forward Test Procedure Roll-Forward Testing Results
RF Basis Additional procedures required
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over
internal control (e.g., form 2342(S))
Review evidence to corroborate the design of the control, such as reviewing one user that has been granted access and determine whether access is commensurate with the user's job responsibilities.
Dependency on Other Control(s) or Information Is the control dependent upon other controls or information?
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the IUC is tested and the conclusions reached as a
result of that testing. Consider source data, parameters and report logic.
Information used as Audit Evidence Is the information used as audit evidence to test the control?
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was generated). Describe procedures performed to
address completeness and accuracy. Consider source data, parameters and report logic.
Test Procedure Number Operating Effectiveness Test Procedure (including Implementation) Operating Effectiveness Test Results (including Implementation)
For each account identified as having the access below, assess the following attributes:
• Access privileges are authorized and appropriate for user’s assigned duties based on inquiries with management (indicate the persons we inquired with)
• Access privileges are authorized and appropriate for user’s assigned duties based on inspection of their job function (include reference to corroborating source, such as an
organizational chart)
2 TEST STEPS 2 AND 3 ONLY IF INDIVIDUAL SECURITY POLICIES HAVE BEEN IMPLEMENTED AS TESTED AT CONTROL SAP.05, STEP 2.
Assess whether access to Create/Maintain security policy is restricted appropriately by using ACTT SAP Basis Report or execute transaction SUIM => Users By Complex
Selection Criteria (report RSUSR002) with the following authorizations:
3 Assess whether access to Assign security policy to users is restricted appropriately by using ACTT SAP Basis Report or execute transaction SUIM => Users By Complex
Selection Criteria (report RSUSR002) with the following authorizations:
Transaction code: SU01 or SU01_NAV or SU10 or SU12 or OY27 or OY30 or OY28 or OY29 or OOUS or OTZ1 or OMDL or OMEH or OMWF or OPF0 or GCE1 (note
some of these transactions could be locked, which can be viewed in report RSAUDITC)
AND
Authorization Object: S_USER_GRP
ACTVT:02
AND
Authorization Object: S_SECPOL
ACTVT:22
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number Roll-Forward Test Procedure Roll-Forward Testing Results
RF Basis Additional procedures required
RF Test Procedure 1 Inquire with the process owners and/or control owners on the following:
- The status of deficiencies identified at interim, including new or modified controls to respond to the deficiencies
- Significant changes to control performers, existing processes, or IT systems supporting the control.
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over internal control
(e.g., form 2342(S))
Design Factor 5: Criteria for Investigation and Process for Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the process for follow-up
Follow-up
Evaluation of Design Conclusion
Dependency on Other Control(s) or Information Is the control dependent upon other controls or information?
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the IUC is tested and the conclusions reached as a result of that
testing. Consider source data, parameters and report logic.
Information used as Audit Evidence Is the information used as audit evidence to test the control?
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was generated). Describe procedures performed to address
completeness and accuracy. Consider source data, parameters and report logic.
Test Procedure Number Operating Effectiveness Test Procedure (including Implementation) Operating Effectiveness Test Results (including Implementation)
1 For each account identified as having the access below, assess the following attributes:
• Access privileges are authorized and appropriate for user’s assigned duties based on inquiries with management (indicate the persons we inquired with)
• Access privileges are authorized and appropriate for user’s assigned duties based on inspection of their job function (include reference to corroborating source, such as an organizational
chart)
Utilize ACTT SAP Basis Report or Execute transaction SUIM => Users By Complex Selection Criteria (report RSUSR002) with the following authorizations:
Note: If the client is on SAP Netweaver Release 7.4, and above, S_BTCH_ADM is a required object, query a and query c will not be relevant for testing the control.
b.
T_CODE SM36
AND
S_BTCH_NAM BTCUNAME *
AND
S_BTCH_ADM BTCADMIN Y
d.
T_CODE SM36
AND
S_BTCH_NAM BTCUNAME "*"
AND
S_BTCH_ADM BTCADMIN Y
2 For each account identified as having the access below, assess the following attributes:
• Access privileges are authorized and appropriate for user’s assigned duties based on inquiries with management (indicate the persons we inquired with)
• Access privileges are authorized and appropriate for user’s assigned duties based on inspection of their job function (include reference to corroborating source, such as an organizational
chart)
Utilize ACTT SAP Basis Report or Execute transaction SUIM => Users By Complex Selection Criteria (report RSUSR002) with the following authorizations:
b.
S_TCODE SM37
AND
S_BTCH_NAM BTCUNAME *
AND
Change Job Schedules under ALL IDs
S_BTCH_ADM BTCADMIN Y
c.
S_TCODE SM37
AND
S_BTCH_NAM BTCUNAME "*"
AND
S_BTCH_JOB JOBACTION RELE AND MODI
d.
S_TCODE SM37
AND
S_BTCH_NAM BTCUNAME "*"
AND
S_BTCH_ADM BTCADMIN Y
Note: in SAP Netweaver Release 7.4, additional values were introduced for S_BTCH_ADM object (such as A, B, C, P). If your client has updated security model to take advantage of the new
functionality, the test above may require further modification.
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number Roll-Forward Test Procedure Roll-Forward Testing Results
RF Basis Additional procedures required
RF Test Procedure 1 Inquire with the process owners and/or control owners on the following:
- The status of deficiencies identified at interim, including new or modified controls to respond to the deficiencies
- Significant changes to control performers, existing processes, or IT systems supporting the control.
RF IPE Procedures Identify and describe test procedures performed over IPE at RF.
RF Test Procedure 2
RF Mitigating Procedures If applicable, perform mitigating procedures for any deviations/deficiencies identified during RF testing or for open interim deficiencies.
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Mitigating Procedures
Roll-Forward Testing
Test Procedure Number
RF Basis
RF Test Procedure 1
RF IPE Procedures
RF Test Procedure 2
RF Mitigating Procedures
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over internal control
(e.g., form 2342(S))
SAP.16
Critical jobs are monitored, and processing errors are corrected to ensure successful completion.
cheduling relevant jobs or if other third party software is utilized when making a determination as to whether this control is
pically tested for lower risk environments (such as when there are a small number of financial related jobs, and the relevant
trols).
al systems, programs, and/or jobs are monitored, and processing errors are corrected to ensure successful completion. Specifically, consider
tes, as appropriate:
ling and monitoring;
(including expectations for timeliness of resolution);
esolution for failed jobs;
d;
stigation.
control, such as evidence of resolution of a recent job failure.
ntrol
Document considerations of the appropriateness of the purpose of the control and correlation to the IT risk identified.
Control Owner(s) - Document considerations of the appropriateness of authority and competence of the process owner(s) to
perform the control, including consideration of segregation of duties (as applicable)
Frequency of Control Operation
Document considerations of the appropriateness of the levels of aggregation and/or predictability given the risk addressed
Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the process for follow-
up
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the
IUC is tested and the conclusions reached as a result of that testing. Consider source data, parameters and report logic.
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was
generated). Describe procedures performed to address completeness and accuracy. Consider source data, parameters and
report logic.
ACTT
Job Monitoring - Option 1: (This option applies when we make a sample of days and test the job status for those days)
• Job ran successfully without errors;
• In case of error, an alert was generated, appropriate personnel notified, and corrective action taken to resolve the error.
Job Monitoring - Option 2: (This option applies when we make a sample of tickets/cases from a population of job errors/abends)
• Corrective action was taken to resolve the error in a timely manner
Job Monitoring - Automated Control: (This test attribute may or may not be applicable, depending upon the client's
technologies. Likely need to combine with another test attribute that pertains to resolution of the error.)
• The system automatically creates a ticket and alerts management when a job fails/abends
For SAP, list of job abends can be generated through ACTT Populations Report or transaction SM37 (cancelled jobs) or Table
TBTCO. Note: Typically, the job logs are retained in the system for a short period of time. Additionally, 3rd party tools may
be used to schedule and monitor jobs and should be considered in this test.
OR
Based on the frequency and risk of management's job monitoring reviews, select a sample of reviews and obtain evidence to
test for the following attributes:
• The job monitoring information used in performance of the control was complete and accurate;
• The review was performed per the frequency required by management;
• The individuals performing the job monitoring control were appropriate based on their defined roles within the organization;
• The review was performed completely and evidence existed that demonstrated appropriate follow-up actions were taken.
If applicable, perform mitigating procedures for any deviations/deficiencies identified during RF testing or for open interim
deficiencies.
Evaluation of Design Testing Results
Refer to the Summary worksheet for the evaluation of the competence and authority for individuals or groups
performing the control.
Users are authorized to execute programs based on their job responsibilities and restricted to specific programs. Access to all transaction codes is not granted
Description
to users.
Review evidence to corroborate the design of the control, such as reviewing one user that has been granted program execution access and determine whether access is commensurate with the user's job
responsibilities.
Design Factor 2: Competence and Authority of the Control Owner(s) - Document considerations of the appropriateness of authority and competence of the process owner(s) to perform the control, including Refer to the Summary worksheet for the evaluation of the competence and authority for individuals or groups
Person(s) Performing the Control consideration of segregation of duties (as applicable) performing the control.
Design Factor 3: Frequency and Consistency with Frequency of Control Operation
Which the Control is Performed
Design Factor 4: Level of Aggregation and Document considerations of the appropriateness of the levels of aggregation and/or predictability given the risk addressed
Predictability
Design Factor 5: Criteria for Investigation and Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the process for follow-up
Process for Follow-up
Evaluation of Design Conclusion
Dependency on Other Control(s) or Information Is the control dependent upon other controls or information?
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the IUC is tested and the conclusions
reached as a result of that testing. Consider source data, parameters and report logic.
Information used as Audit Evidence Is the information used as audit evidence to test the control?
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was generated). Describe procedures
performed to address completeness and accuracy. Consider source data, parameters and report logic.
For each account identified as having the access below, assess the following attributes:
• Access privileges are authorized and appropriate for user’s assigned duties based on inquiries with management (indicate the persons we inquired with)
• Access privileges are authorized and appropriate for user’s assigned duties based on inspection of their job function (include reference to corroborating source,
such as an organizational chart)
Note that access to execute ALL programs is typically not appropriate.
a. Access to execute programs without authorization group or certain programs with authorization groups via SA38:
Authorization Object: S_PROGRAM
P_ACTION: SUBMIT or BTCSUBMIT
P_GROUP = *
Authorization Object: S_TCODE
Transaction Code: SA38
b. Access to execute ALL programs regardless the programs are assigned authorization groups or not via SA38:
Authorization Object: S_PROGRAM
P_ACTION: SUBMIT or BTCSUBMIT
P_GROUP = "*"
Authorization Object: S_TCODE
Transaction Code: SA38
Additional transactions that can be utilized to execute programs if used by the client:
c. Access to execute programs without authorization group or certain programs with authorization groups via EWFM OR EWFZ OR OODR:
Authorization Object: S_PROGRAM
P_ACTION: SUBMIT or BTCSUBMIT
P_GROUP = *
Authorization Object: S_TCODE
Transaction Code: EWFM OR EWFZ OR OODR
d. Access to execute ALL programs regardless the programs are assigned authorization groups or not via EWFM OR EWFZ OR OODR:
Authorization Object: S_PROGRAM
P_ACTION: SUBMIT or BTCSUBMIT
P_GROUP = "*"
Authorization Object: S_TCODE
Transaction Code: EWFM OR EWFZ OR OODR
e. Additional transactions that can be utilized to Execute Programs if used by the client:
Note related to Steps 2-5 Utilize ACTT SAP Basis Report or execute the following to determine which step is applicable for testing in client's environment.
Testing of access to execute programs with SE38 and SE80 will be customized if the client implemented SAP note 1596907.
SAP Note 1596907 was delivered in several SAP_BASIS support packages listed below.
Look up the matching release number for correct support package name.
To check the release number, System-> Status-> Component version.
Support Packages| Release| Package Name
SAP_BASIS| 46C| SAPKB46C63
SAP_BASIS| 620| SAPKB62071
SAP_BASIS| 640| SAPKB64029
SAP_BASIS| 700| SAPKB70025
SAP_BASIS| 701| SAPKB70110
SAP_BASIS| 702| SAPKB70209
b.Access to execute “ALL” programs without authorization groups via SE38 or SE80:
Authorization Object: S_DEVELOP
ACTVT = 16 and 03
OBJTYPE =PROG
OBJNAME = “*”
DEVCLASS = "*"
Authorization Object: S_TCODE
Transaction Code: SE38 OR SE80
c. Access to execute certain programs with assigned authorization groups via SAT:
Authorization Object: S_TCODE
Transaction Code: SAT
Authorization Object: S_DEVELOP
ACTVT = 16 and 03
OBJTYPE = PROG AND SYST
OBJNAME = *
P_GROUP = *
DEVCLASS = *
d. Access to execute “ALL” programs with assigned authorization groups via SAT:
Authorization Object: S_TCODE
Transaction Code: SAT
Authorization Object: S_DEVELOP
ACTVT = 16 and 03
OBJTYPE = PROG AND SYST
OBJNAME = “*”
P_GROUP = “*”
DEVCLASS = “*”
4 IF NOTE IS NOT APPLIED AND WHEN PROGRAMS ARE NOT ASSIGNED AUTHORIZATION GROUPS:
- N/A for certain program access, as authorization check will not be performed by SAP, users are allowed to execute ALL programs not assigned authorization
groups.
5 IF NOTE IS NOT APPLIED AND WHEN PROGRAMS ARE ASSIGNED AUTHORIZATION GROUPS:
a. Access to execute certain programs with assigned authorization groups via SE38 or SE80:
Authorization Object: S_DEVELOP
ACTVT = 03
OBJTYPE = PROG
AND
Authorization Object: S_TCODE
Transaction Code: SE38 OR SE80
AND
Authorization Object: S_PROGRAM
P_ACTION: SUBMIT
P_GROUP = *
b. Access to execute "ALL" programs with assigned authorization groups via SE38 or SE80:
Authorization Object: S_DEVELOP
ACTVT = 03
OBJTYPE = PROG
AND
Authorization Object: S_TCODE
Transaction Code: SE38 OR SE80
AND
Authorization Object: S_PROGRAM
P_ACTION: SUBMIT
P_GROUP = "*"
In order to identify what program authorization groups are granted to users, utilize ACTT SOD Keystone report, filtered view. Use system table "TRDIR" to
identify the programs assigned to the program authorization groups.
6 Identify users with access to all transactions by utilizing ACTT SAP Basis Report or executing transaction SUIM => Users By Complex Selection Criteria (report
RSUSR002) with the following authorizations:
a. Populate “*” in S_TCODE. (Access to all SAP transaction codes) . Execute.
Note: S_TCODE * standing access should not be granted to dialog and service users.
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number Roll-Forward Test Procedure Roll-Forward Testing Results
RF Basis Additional procedures required
RF Test Procedure 1 Inquire with the process owners and/or control owners on the following:
- The status of deficiencies identified at interim, including new or modified controls to respond to the deficiencies
- Significant changes to control performers, existing processes, or IT systems supporting the control.
RF IPE Procedures Identify and describe test procedures performed over IPE at RF.
RF Test Procedure 2
RF Mitigating Procedures If applicable, perform mitigating procedures for any deviations/deficiencies identified during RF testing or for open interim deficiencies.
Final Operating Effectiveness Conclusion
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over
internal control (e.g., form 2342(S))
Review evidence to corroborate the design of the control, such as reviewing users granted access to SAP_ALL/SAP_NEW.
Design Factor 3: Frequency and Consistency with Which the Frequency of Control Operation
Control is Performed
Design Factor 4: Level of Aggregation and Predictability Document considerations of the appropriateness of the levels of aggregation and/or predictability given the risk
addressed
Design Factor 5: Criteria for Investigation and Process for Follow- Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the
up process for follow-up
Evaluation of Design Conclusion
Dependency on Other Control(s) or Information Is the control dependent upon other controls or information?
Include a description of the IUC and identify the controls that address the accuracy and completeness of the
IUC, where the IUC is tested and the conclusions reached as a result of that testing. Consider source data,
parameters and report logic.
Information used as Audit Evidence Is the information used as audit evidence to test the control?
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the
date it was generated). Describe procedures performed to address completeness and accuracy. Consider
source data, parameters and report logic.
Test Procedure Number Operating Effectiveness Test Procedure (including Implementation) Operating Effectiveness Test Results (including Implementation)
1 a. Current Profile Assignment - Identify dialog and service users assigned to profiles SAP_ALL and
SAP_NEW by utilizing ACTT SAP Basis Report or executing transaction SUIM => Users By Complex
Selection Criteria (report RSUSR002) with the following authorizations.
In the portion of the screen noted as “Profile name”, click on the yellow arrow icon and enter the following:
i. SAP_ALL
ii. SAP_NEW
Note: a custom SAP_ALL profile (e.g. Z_SAP_ALL can be created with similar authorities and should also be
considered in testing of this control.)
2 Profile Assignment history - Obtain change history for profile assignments and assess whether SAP_ALL
and/or SAP_NEW have been assigned to any users during the testing period. If any occurrences are found,
In lower risk IT environments, this procedure is not typically test whether change has been authorized by management, documented, monitored and access was removed
performed if there is additional testing of the user provisioning once no longer required.
(SAP.01), as the provisioning control would cover users assigned
SAP_ALL and SAP_NEW.
NOTE NOTE: Standing Access with profile SAP_ALL and SAP_NEW should not be granted to dialog (User type: 'A')
or service users (User Type: 'S'). If granted, access should be authorized for a short period of time, logged
and monitored and removed once no longer required. If service accounts have dialog access due to system
requirements, determine if the elevated SAP_ALL/SAP_NEW profile is necessary for the service account and if
the password to the service account is appropriately controlled.
If client has a monitoring control over this access, test the monitoring control leveraging testing steps above for
IUC evaluation.
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number Roll-Forward Test Procedure Roll-Forward Testing Results
RF Basis Additional procedures required
RF Test Procedure 1 Inquire with the process owners and/or control owners on the following:
- The status of deficiencies identified at interim, including new or modified controls to respond to the
deficiencies
- Significant changes to control performers, existing processes, or IT systems supporting the control.
RF IPE Procedures Identify and describe test procedures performed over IPE at RF.
RF Test Procedure 2
RF Mitigating Procedures If applicable, perform mitigating procedures for any deviations/deficiencies identified during RF testing or for
open interim deficiencies.
Final Operating Effectiveness Conclusion
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over internal control
(e.g., form 2342(S))
Review evidence to corroborate the design of the control, such as reviewing one instance of use of SAP vendor support accounts and determine whether access is commensurate with the user's job
responsibilities.
Design Factor 5: Criteria for Investigation and Process for Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the process for follow-up
Follow-up
Evaluation of Design Conclusion
Dependency on Other Control(s) or Information Is the control dependent upon other controls or information?
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the IUC is tested and
the conclusions reached as a result of that testing. Consider source data, parameters and report logic.
Information used as Audit Evidence Is the information used as audit evidence to test the control?
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was generated). Describe
procedures performed to address completeness and accuracy. Consider source data, parameters and report logic.
Test Procedure Number Operating Effectiveness Test Procedure (including Implementation) Operating Effectiveness Test Results (including Implementation)
1 Determine if any remote access for Generic Vendor accounts (SAP Technical Support) was granted within the testing period and verify correct
process was followed as outlined in client's policy.
a. Obtain change history for the IDs used as Generic Vendor accounts (i.e., naming conventions used for Generic Vendor accounts and
passwords are activated when SAP Consultants are needed...the accounts may be named as "OSS*", *SAPSUPPORT* or others).
b. For the testing period, select a sample of instances of Generic Vendor accounts activations based on sampling guidance. (Obtain SAP
SUPPORT ID activations through SUIM -> Change Documents -> User -> "ID" Dates: Testing period).
d. Ascertain that the password to user accounts associated with Generic Vendor accounts (e.g. Technical Support or other) are reset in a timely
manner after the fix is completed per client's policy.
NOTE Note 1: Other generic vendor accounts could be used in addition to OSS* or SAPSUPPORT*. Inquire management to understand whether
additional generic vendor accounts are used and include in testing above if these accounts are not already covered in other controls.
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number Roll-Forward Test Procedure Roll-Forward Testing Results
RF Basis Additional procedures required
RF Test Procedure 1 Inquire with the process owners and/or control owners on the following:
- The status of deficiencies identified at interim, including new or modified controls to respond to the deficiencies
- Significant changes to control performers, existing processes, or IT systems supporting the control.
RF IPE Procedures Identify and describe test procedures performed over IPE at RF.
RF Test Procedure 2
RF Mitigating Procedures If applicable, perform mitigating procedures for any deviations/deficiencies identified during RF testing or for open interim deficiencies.
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over internal
control (e.g., form 2342(S))
Description
Note: IF SAP GRC V10 OR GREATER IS USED, REFER TO TAB SAP.20 GRC 10.x (INSTEAD OF THIS TAB)
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number
RF Basis
RF Test Procedure 1
RF IPE Procedures
RF Test Procedure 2
RF Mitigating Procedures
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over internal control
(e.g., form 2342(S))
SAP.20
Emergency access to SAP is permitted only with prior approval, logged, monitored by someone
other than users who administer the access and removed in a timely manner.
, REFER TO TAB SAP.20 GRC 10.x (INSTEAD OF THIS TAB)
ols over Emergency Access. Specifically, consider obtaining an understanding of the following attributes, as
ntrol
Document considerations of the appropriateness of the purpose of the control and correlation to
the IT risk identified.
Control Owner(s) - Document considerations of the appropriateness of authority and competence
of the process owner(s) to perform the control, including consideration of segregation of duties (as
applicable)
Frequency of Control Operation
Include a description of the IUC and identify the controls that address the accuracy and
completeness of the IUC, where the IUC is tested and the conclusions reached as a result of that
testing. Consider source data, parameters and report logic.
Include a description of the IPE and details regarding how it was generated (i.e., who provided the
IPE and the date it was generated). Describe procedures performed to address completeness
and accuracy. Consider source data, parameters and report logic.
Assess whether access to administer emergency access or firefighters is appropriate; note this
maybe already covered by control SAP.06.
Obtain change history for the IDs used as emergency user accounts or firefighter activity logs and
select a sample of instances of emergency user activations based on sampling guidance.
Perform inquiries with management responsible for performing the review of activities performed
by emergency IDs and obtain evidence that management sufficiently reviewed the information.
This may include performance and/or inspection of documentation to ascertain the following:
• Review included a complete and accurate population of activities performed by emergency
users;
• Review was properly documented and performed at the appropriate level of detail to ascertain
whether activities were consistent with each request of usage of emergency user;
• Review was performed by appropriate management personnel with proper segregation of duties
enforced;
• Appropriate follow up were made for exceptions noted during the reviews and remediated on a
timely basis
Note: If emergency roles are assigned to users, obtain change history for emergency roles
assignments assess whether roles have been assigned to any users during the testing period.
If the emergency access is assigned using an automated tool, obtain the configuration or change
history of configurations to assess whether configurations are set up correctly or have not been
inappropriately changed for the audit year.
Refer to the Summary worksheet for the evaluation of the competence and authority for individuals or groups
performing the control.
Operating Effectiveness Test Results (including Implementation)
Description
Note: Consider if the entity is using IDOCS (and if IDOCS may be covered in SAP.16) when making a determination as to whether this control is
is not typically tested for lower risk environments (such as when there are a small number of financial related jobs, and the relevant interfaces a
controls).
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number
RF Basis
RF Test Procedure 1
RF IPE Procedures
RF Test Procedure 2
RF Mitigating Procedures
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over internal control
(e.g., form 2342(S))
SAP.27
IDOCS are monitored and identified issues are resolved timely. Access to make changes to the IDOCs is granted appropriately
based on job responsibilities.
nd if IDOCS may be covered in SAP.16) when making a determination as to whether this control is applicable. Furthermore, this control
nts (such as when there are a small number of financial related jobs, and the relevant interfaces are already addressed by direct
ols related to IDOCs. Specifically, consider obtaining an understanding of the following attributes, as appropriate:
elated to IDOCS management;
d if a listing of critical IDOC types is maintained;
nitoring IDOCs for successful postings;
ntrol
Document considerations of the appropriateness of the purpose of the control and correlation to the IT risk identified.
Control Owner(s) - Document considerations of the appropriateness of authority and competence of the process owner(s) to
perform the control, including consideration of segregation of duties (as applicable)
Frequency of Control Operation
Document considerations of the appropriateness of the levels of aggregation and/or predictability given the risk addressed
Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the process for follow-up
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the IUC
is tested and the conclusions reached as a result of that testing. Consider source data, parameters and report logic.
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was
generated). Describe procedures performed to address completeness and accuracy. Consider source data, parameters and
report logic.
ACTT
Select a sample of IDOCS with errors and obtain evidence that the failure was identified and resolved appropriately.
Message Type and Basic Type of IDOCs should be considered for scoping purposes. Message Type and Basic Type describe
the nature and content of the IDOC document. For example, Message Type "FI*" stands for entire FI document (i.e., accounting
documents); Message Type "INVOIC* stands for "Invoice/Billing document". The list of Message Types and Basic Types can be
found in tables EDMSG and EDBAS. For the IDOC population, Table EDIDC lists the current status of IDOCs and the Message
Types and Basic Types information, whereas table EDIDS lists the change history of IDOCs.
Identify users with access to maintain IDOCS by utilizing ACTT SAP Basis Report or execute transaction SUIM => Users By
Complex Selection Criteria (report RSUSR002) with the following authorizations:
For each account identified as having the access below, assess the following attributes:
• Access privileges are authorized and appropriate for user’s assigned duties based on inquiries with management (indicate the
persons we inquired with)
• Access privileges are authorized and appropriate for user’s assigned duties based on inspection of their job function (include
reference to corroborating source, such as an organizational chart)
a. Access to create a copy of an existing IDOC and edit and process the copy of the IDOC:
Authorization Object: S_TCODE
Transaction Code: WE19
AND
Authorization Object: S_IDOCCTRL
Transaction Code (EDI_TCD): WE19
Activity: 16
AND
Authorization Object: S_IDOCMONI
Transaction Code (EDI_TCD): WE19
Activity: 02 AND 03
Refer to the Summary worksheet for the evaluation of the competence and authority for individuals or groups
performing the control.
Operating Effectiveness Test Results (including Implementation)
Control Activity
Description
• Policies and procedures round the purpose of generic IDs and how they are used
• Users with access to the generic IDs
• Procedures for managing, communicating, storing and changing the passwords of the IDs
• Monitoring usage of the IDs
Review evidence to corroborate the design of the control, such as procedures related to generic ID monitoring
Mitigating Procedures
Interim Operating Effectiveness Conclusion
Roll-Forward Testing
Test Procedure Number
RF Basis
RF Test Procedure 1
RF IPE Procedures
RF Test Procedure 2
RF Mitigating Procedures
Evaluation of Deficiencies
Deficiencies noted:
Deficiency Description (if applicable)
Reference to evaluation of deficiencies over internal
control (e.g., form 2342(S))
OPT - Generic User Control. This control can be tested for efficiency purposes rather than testing the same generic IDs throughout
separate controls in the framework. It only covers generic IDs with privileged access, specifically, those identified as a result of
testing access in the various controls in this framework.
SAP.28
Access granted to privileged-level shared and/or generic accounts is appropriately secured, and passwords to such accounts are modified on a
periodic basis (such as when employees with knowledge of the password leave the company).
controls related to access granted to privileged-level shared and/or generic accounts to the SAP . Specifically, consider obtaining an understanding of the
e control
Document considerations of the appropriateness of the purpose of the control and correlation to the IT risk identified.
Control Owner(s) - Document considerations of the appropriateness of authority and competence of the process owner(s) to perform the control,
including consideration of segregation of duties (as applicable)
Frequency of Control Operation
Document considerations of the appropriateness of the levels of aggregation and/or predictability given the risk addressed
Document considerations of the appropriateness of the criteria used for investigation (i.e., threshold) and the process for follow-up
Include a description of the IUC and identify the controls that address the accuracy and completeness of the IUC, where the IUC is tested and
the conclusions reached as a result of that testing. Consider source data, parameters and report logic.
Include a description of the IPE and details regarding how it was generated (i.e., who provided the IPE and the date it was generated). Describe
procedures performed to address completeness and accuracy. Consider source data, parameters and report logic.
ACTT
b. Determine whether the password to the generic accounts are restricted to individuals who require access which is commensurate with their
job responsibilities. Additionally determine whether passwords are appropriately managed and stored for these accounts.
Note: in SAP, generic accounts should typically be configured as type B (Batch) or type C (Communication), rather than A (Dialog) or S
(Service)
If applicable, perform mitigating procedures for any deviations/deficiencies identified during RF testing or for open interim deficiencies.
Evaluation of Design Testing Results
Refer to the Summary worksheet for the evaluation of the competence and authority for individuals or groups
performing the control.
Operating Effectiveness Test Results (including Implementation)