Combat Chaos with a Lock-Down Security Policy in 12 Key Areas of Your SAP Environment

  • by Kehinde Eseyin, Security Architect
  • June 11, 2009
Security policies and procedures should be a central concern of all employees of an organization. Review important areas of the SAP ERP system that has to be driven by effective security policies.
Key Concept

A security policy is a formal statement of principles, rules, goals, and objectives of an organization aimed at securing the assets of the company and reducing process variation via effective procedures that define best practices for achieving specific tasks.

To establish internal controls, you need to define and document security policies and procedures that clearly state what should be done, how it should be done, when it should be done, and by whom it should be done.In an integrated system such as an SAP ERP system, processes are closely related, if not totally interwoven, and information is centrally processed. A security flaw at any stage is capable of undermining the integrity of the system.

SAP security policies are made up of a set of standards and procedures that are required for implementing security and control in an SAP environment. The essence of SAP security policies and procedures is to keep users abreast of their obligations, especially as they relate to transaction processing, access control, management, and system administration in SAP systems.

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.

See more by this author


No comments have been submitted on this article. 

Please log in to post a comment.

To learn more about subscription access to premium content, click here.