Working with Profile Generator (Roles, Composite Roles, Derived Roles, Customizing Roles)
Access Control and User administration (password Rules, special users, Authorization Administration)
Analysis and monitoring functions.
Special Authorization Components (Express Profile Gen)
Transport of authorization components
Automation of initial Loads
Central User Administration
Configuring and Using Basis Security Audit Tools Configuration of the Audit Log Reading the Audit Log
Controlling Transaction Codes, Tables, Programs Auditing the protection of transaction code execution Auditing the protection of direct table access Auditing the protection of direct program execution Auditing the protection of developer access
Securing User and Group Administration User Information System for Audits Decentralized security approaches Trace tools for users that can be used to support audits Auditing standard SAP users Auditing user related security parameters
Change Management and Security SAP recommended system landscape Approval processes for change management Auditing system change options and client change options Roles and responsibilities for change management
Securing System Administration Services in Production Auditing security for background processing Auditing security for spool, operating system commands System authorizations required for end-users Auditing RFC destinations