Designing SAP Application Security – Leveraging SAP Access Monitoring Solutions During SAP Implementations, Upgrades or Security Redesign Projects


The results of a poorly executed SAP security design process are many: unauthorized access, increased potential for fraud, inefficient access provisioning for end users, and numerous audit issues. All too frequently, companies that have not proactively identified and addressed potential security issues face expensive and challenging redesign projects within one to two years of the initial SAP rollout.
This white paper provides six steps organizations should take when implementing SAP application security using a top-down approach.