Take Control of Your
SAP Security Baseline

Image

Maintaining a strong SAP Security Baseline is essential for your systems‘ security and compliance. Whether you are a RISE with SAP customer or an on-premise customer, it remains your responsibility.

We simplify this complex task and make it more collaborative by providing clear explanations of risks and mitigation strategies, combined with effective visualizations and role model.

You can choose our solution as an independent offering or as an extension to your existing GRC application.

Security & Operations

Image 1

Within the RISE with SAP model, customers remain in charge of general parametrization, which drives security, change management, logging, authentication, connectivity, encryption, and much more.

COVERAGE: significant

Compliance Impact

Image 2

It affects many key IT General Controls (ITGC) as part of financial compliance and is a core component of the technical and organizational measures (TOM) required by recent cybersecurity and data protection regulations.

COVERAGE: significant

Riscomp DNA Icon

Best Practice Content

Our solution comes with pre-defined baseline values for a complete technology stack. The pre-delivered content also includes descriptions of risks, dependencies, and the impact of parameters, known reasons for deviations, and mitigation strategies based on our experience from numerous penetration tests and audits. Ongoing free content updates are provided.


Complex Logic Made Easy

SAP SBT is a complex topic. To avoid false positives, you need to establish groupings and logical dependencies between profile parameters and their values in an intuitive way. Defining rules for exceptions to the main baseline, along with documenting the reasons, is also essential and can be easily done.

Riscomp DNA Icon

Riscomp DNA Icon

Analytics

The pre-delivered Fiori Dashboard provides several aggregation levels, as well as additional risk- and compliance-related dimensions. It helps to coordinate fixes with SAP Basis, effectively interpret and communicate risks to management levels, and offers real-time insights into the state of compliance with the SAP Security Baseline. The authorization model and role-based access to results support collaboration.


GRC Integration

SAP GRC or SAP Risk and Assurance Management (RAM) customers can benefit from additional content and flexibility, enhancing the handling of IT General Controls. Integration is achieved by consuming CDS views or OData services and linking results through Business Rules or Automated Procedures to Controls. The powerful Continuous Controls Monitoring (CCM) framework in SAP GRC can be extended: existing connectors can be reused (GRC plug-ins are not required for our solution!), and the Business Rules Parameters (BRP) functionality within CCM can be leveraged more efficiently.

Riscomp DNA Icon

Riscomp DNA Icon

Mitigation

Not every profile parameter setting can be checked and fixed right away. In some cases, a review process is required, and sufficient mitigations can be implemented in other areas and processes. Our solution accommodates this and helps to coordinate mitigations with your SAP Basis and Security responsibilities.


AI Assistant for Cybersecurity and Compliance

Our unique NL to SQL-based solution enables faster insights into the state of the Security Baseline, especially when monitoring a large number of systems, and helps democratize access to database information.

Riscomp DNA Icon

What our customers say

“The new process, rolled out with the help of our partner Riscomp, has paved the way to transform our SAP Security baseline monitoring for over 60 SAP systems from a fragmented manual operation into an automated, integrated, user-friendly, and engaging process. Earlier efforts to gather information, analyze, and report on more than 130 parameters per system have been eliminated.”
– Coordinator SAP Security Monitoring, Large DAX Company

“Thanks to the automation and improved link between operations and compliance, our Application Managers and Service Owners have developed a sense of confidence that everyone wants their systems to remain clean. Experiences are being proactively shared, and ongoing collaboration on tricky topics helps improve our Security and Compliance policy.”

– Cyber Security VP, DAX Company