SAP Security Audit Log: Configuration, Analysis & Best Practices
Configure and analyse the SAP Security Audit Log systematically.
Read more →
The SAP Transport Management System (TMS) is the central infrastructure for controlled transfer of changes between development, quality and production systems. At the same time, it is a frequently underestimated attack vector: anyone who can import transports into the production system without controls can inject code, change configurations and bypass security mechanisms.
Transports can contain virtually any change in the SAP system – from harmless customising settings to ABAP code with backdoor functionality. A manipulated transport can deactivate authorisation checks, alter data or create additional users with extensive privileges. The challenge: in the standard system, transport contents are not automatically checked for security risks during import.
Security starts with authorisations. Three objects are central:
A common mistake: developers receive import authorisations for the production system. This violates the dual control principle and is a typical audit finding.
The dual control principle means: whoever creates and releases a transport must not import it into the production system themselves. This separation is a fundamental requirement in SOX, ISO 27001 and BSI IT-Grundschutz. Implement this technically by granting import authorisations only to a dedicated Basis team and giving developers release rights in the development system only.
Every transport operation is documented in the transport logs (transaction STMS, transport logs). Additionally, configure the Security Audit Log for transport-relevant activities. For complete traceability, link transport requests with change tickets from the ITSM system.
Document for every transport: Who created it? Who released it? Who imported it? Which change ticket is the basis? This information is essential for audit evidence.
TMS communicates via RFC connections between systems. These connections must be configured with minimal authorisations. Use dedicated technical users (type CPIC or System) with restricted roles. Activate SNC (Secure Network Communications) for TMS RFC connections to encrypt communication.
The shared transport directory (/usr/sap/trans) contains the transport files for all systems. Protect this directory at operating system level: only the SAP system users (SIDadm) should have write access. Monitor changes to the directory with file integrity monitoring. Unauthorised access to the transport directory enables direct injection of manipulated transport files.
In emergencies, transports sometimes need to be imported outside the normal process. Define a documented emergency process: Who may approve emergency transports? What additional checks are required? How are emergency transports documented and reviewed retrospectively? An uncontrolled emergency process is a common gateway for security issues.
Securing the transport system requires a combination of technical controls (authorisations, RFC hardening, directory protection) and organisational measures (dual control principle, emergency processes, documentation). Invest in these fundamentals – a compromised transport system can endanger the entire SAP landscape.
Configure and analyse the SAP Security Audit Log systematically.
Read more →Plan and execute system copies: data masking, post-copy automation and security.
Read more →10 concrete measures to protect your SAP systems against current threats.
Read more →We help you with implementation – from analysis to go-live.
Get in touch