Case Study: AUDI AG
Optimization of RFC Interfaces at AUDI
AUDI AG used an automated tool from SAP partner Xiting to verify the authorizations of more than 500 interfaces within a complex SAP system landscape, thereby closing any potential security holes without disrupting operations.
SAP landscapes communicate using RFC interfaces. But which data may be transmitted via an interface? From where and to where does this interface have access? And why is such a simple question of such monumental importance? āComplex SAP landscapes in which multiple solutions are connected by many RFC interfaces contain hidden risks,ā says Patrick Bockel from SAP partner Xiting AG. And this is why: āRFC interfaces with authorizations that are set too high make abuse possible, for example, if ERP users gain access to the HR solution and can see their co-workersā salaries.ā
Minor Mistakes during Clean-Upā¦
Long-time SAP customer Audi is quite familiar with this problem. The automobile manufacturer operates multiple SAP system landscapes, for instance for ERP, human capital management, customer relationship management and business warehousing, and uses the SAP Solution Manager to manage its applications. āThese SAP systems and various other non-SAP solutions are connected to one another by more than 500 RFC interfaces, which until recently had authorizations that were too high,ā explains Dieter Krebs, IT project manager at Audi.
To check the complex network of RFC authorizations and correct them without disrupting operations, Xiting worked together with SAP Consulting and SAP Active Global Support to establish a unique service, which was announced in SAP Note 1682316. āCleaning up the authorizations of about 500 interfaces, as we did at Audi, can only be consistently accomplished without putting operations at risk by using an automated tool,ā explains Patrick Bockel.
ā¦Can Have Major Consequences
If even a single interface is missed, it could potentially be abused by a large number of usersāeven by external suppliers, which are common in the automotive industry. On the other hand, if an interface ceases to function because too many authorizations are removed, this can mean that subsequent operations cannot be carried out. In an automobile manufacturerās worst-case scenario, this can mean that just-in-time delivery processes no longer work properly, causing assembly lines in the production area to come to a halt.
āEven a small mistake made while cleaning up the interfaces can result in costs that run into the millions. We did not want to take that risk,ā says Dieter Krebs from Audi. And he, like many other customers, chose the service from Xiting for precisely this reason.
āFirst, we hold a one-day workshop to determine the status quo in the customerās interface landscape,ā says Patrick Bockel, in explaining the procedure. Next, the interface users are defined: Which interfaces from which feeder system can access the interface currently under examination? These users are then grouped by context: Are they accessing HR data or financial information?
āWe then use this information to create a matrix that tells us which interface needs which authorizations and what we need to clean up in terms of users.ā
Security through Automated Monitoring
āTo prevent errors of any kind, it is crucial to use an automated procedure to reassign authorizations to the interfaces,ā Bockel continues. At the beginning of the process, all interfaces continue to operate with their old authorizations. Parallel to this, the Xiting Authorizations Management Suite (XAMS) is installed, which runs an agent on each interface and monitors it for about three months.
āOur XAMS allows us to determine the incoming RFC requests as well as the context for each. We use this information to create a role that contains the necessary RFC authorizations. An agent then verifies that these authorizations are sufficient.ā The new authorizations go live only after the XAMS has automatically checked the authorizations and permissions of all interfaces while operations are running and corrected them if necessary.
The three-day workshop during the preliminary phase, the three-month agent monitoring, the final go-liveāeverything at Audi went precisely according to plan: āThe 500 connections had their new, cleaned-up authorizations assigned without disrupting operationsāa successful project from our point of view,ā reports Audi project manager Krebs. āWithout automated tools like the Xiting Authorizations Management Suite, a clean-up project like that could not be carried out without risks,ā concludes Patrick Bockel from Xiting. āThat is why all of our customers so far have decided to keep and fully license the suite after completion of the project.ā That gives the company the ability to continuously clean up not only the interfaces but also all background users (BTCH) and dialog users, thereby ensuring constant protection against abuse.
Are you interested in our references?
We would like to give you an insight into this project!