This curriculum is derived from authorβs overall experience as an Enterprise Architect in SAP Security into a practical, modular course framework. Each theme covers a focused area of SAP Security β from user administration to compliance auditing. Itβs a Foundational level curriculum
π― Course Overview
# | Theme | Focus Area |
1 | User Master Record Fundamentals & Management | Identity & Access Foundation |
2 | Authorization Design & The Profile Generator (PFCG) | Role Architecture & Security Design |
3 | Development & Transactional Security | Code Security & Access Control |
4 | Segregation of Duties (SoD) & Governance | Compliance & Risk Management |
5 | Handling Upgrades & Conversions | Security Continuity |
6 | Auditing & Continuous Compliance | Monitoring & Governance |
π Theme 1: User Master Record Fundamentals & Management
Focus: Foundational tasks for user administrators β accurate identification and efficient daily maintenance.
Learning Topics
π Identification & Naming
- Establishing sustainable SAP User ID naming conventions (e.g., using personnel numbers)
- Simplifying long-term user management
π Data Accuracy
- Improving user record accuracy using hidden fields in Transaction SU01
- Practical application for companies without SAP HCM
π Efficient Maintenance
- Using BAPIs (e.g.,
BAPI_USER_CHANGE) for programmatic updates
- Transaction SU10 for mass maintenance of user master records and address data
π Authentication Control
- Customizing rules for automatically generated passwords
- Balancing complexity requirements with user-friendliness
π οΈ Key Transactions
SU01β User Maintenance
SU10β Mass User Maintenance
π Theme 2: Authorization Design & The Profile Generator (PFCG)
Focus: Technical side of creating and maintaining roles to ensure a sustainable security concept.
Learning Topics
π Sustainable Naming
- Implementing a "pattern language" for role names
- Identifying module, role type (template, derived, composite), and access mode (management, edit, view)
π Role Architecture
- Job role template concept
- Maintaining alignment between template job roles and localized (derived) job roles
π Technical Optimization
- Permanently enabling technical name views in Transaction PFCG
- Simplifying troubleshooting and understanding of authorization trees
π Mass Adjustments
- Using standard programs (e.g.,
SUPRN_REGENERATE_DEPENDENT)
- Mass-adjusting derived roles to keep them aligned with parent roles
π οΈ Key Transactions
PFCGβ Profile Generator / Role Maintenance
π Theme 3: Development & Transactional Security
Focus: Securing custom ABAP code and managing how users access various system functionalities.
Learning Topics
π Code Validation
- Using the Code Inspector (Transaction SE38) to scan ABAP code for backdoors or security holes
- Pre-production security scanning practices
π Restricting Access
- Using Transaction SHD0 to create transaction variants
- Hiding buttons or setting static values when standard authorizations are insufficient
π Managing Called Transactions
- Using Transaction SE97 to control and block transactions called indirectly
- Managing the
CALL TRANSACTIONstatement
π Parameter Transactions
- Avoiding direct access to critical transactions (like SE16 or SE38)
- Defining parameter transactions for specific programs or tables
π οΈ Key Transactions
SE38β Code Inspector
SHD0β Transaction Variants
SE97β Transaction Call Authorization
π Theme 4: Segregation of Duties (SoD) & Governance
Focus: Using SAP GRC Access Control to manage risks and ensure compliance with internal and external policies.
Learning Topics
π Risk Analysis
- Tailoring ad-hoc analysis using custom groups
- New selection criteria available in SAP GRC 10.0
π Emergency Access
- Defining a structured firefighter user ID naming method
- Identifying emergency users and improving log collection performance
π Role Management
- Organizational-Level Mapping in GRC 10.0
- Using the new "Business Role" type to simplify role derivation and abstraction
π Clean Systems
- Using standard reports to identify and remove invalid mitigation controls
- Keeping mitigation tables accurate
π οΈ Key Tools
- SAP GRC Access Control 10.0
- Firefighter / Emergency Access Management
π Theme 5: Handling Upgrades & Conversions
Focus: Strategies for maintaining authorizations during release upgrades and transitioning from older security models.
Learning Topics
π Transaction SU25 Mastery
- Understanding critical steps of SU25 (e.g., step 2c for authorization merging)
- Preparing roles in advance to avoid errors during upgrades
π Conversion Strategies
- Using Transaction SU25 step 6 to convert obsolete manual profiles
- Transitioning to modern, role-based authorizations
π Transaction Mapping
- Identifying and managing new transaction codes introduced in upgrades
- Browsing Table
PRGN_CORR2for delta transactions
π Change Communication
- Alerting end users to new password rules (e.g., case sensitivity)
- Using static logon screen messages via Transaction SE61
π οΈ Key Transactions
SU25β Authorization Profile Upgrade
SE61β Document Maintenance (Logon Screens)
- Table
PRGN_CORR2
π Theme 6: Auditing & Continuous Compliance
Focus: Monitoring system activity and preparing documentation for periodic reviews.
Learning Topics
π Audit Logging
- Configuring the Security Audit Log (Transactions SM19/SM20N)
- Monitoring superuser activity and customizing event classifications
π Table & Change Tracing
- Activating table logging to track changes to critical custom tables
- Configuring change documents for security organization structures
π Usage Statistics
- Using Transaction ST03N workload statistics
- Identifying unused roles and ensuring users have minimum authorizations
π Revalidation Documentation
- Using pivot tables and specialized queries (e.g., via Transaction SQVI)
- Delivering understandable data to business owners for annual revalidation
π οΈ Key Transactions
SM19/SM20Nβ Security Audit Log
ST03Nβ Workload Monitor
SQVIβ QuickViewer
π Course Design Notes
This curriculum follows an activity-based, emergent learning approach β bridging theoretical SAP security concepts with real-world application scenarios.
Design Element | Detail |
Format | Workshop / Bootcamp / Self-Paced |
Duration | 6 modules Γ 2β4 hours each |
Delivery Mode | Virtual / Blended |
Target Audience | SAP Basis Admins, Security Consultants, GRC Specialists, Auditors |
Assessment | Kahoot-based quizzes per theme |
Certification Track | Track 09 : Certification aligned |
Curriculum derived from SAP Security Architecture book content β converted to a 6-theme course structure.