SAP Security Concepts wiTh Security Architect

Security Architect delivers ready-to-use security concepts for SAP that are based on best practices, SAP security guidelines, and Xiting’s decades of experience in the field.

With Security Architect, you can generate and publish a best-practice security concept and continuously monitor your SAP systems for compliance issues. When combined with Solution Manager, you can manage your global SAP security concepts and compare them against connected systems.


SAP constantly delivers new functions and extends existing functionality. But understanding the settings for these functions, as well as how your SAP security concepts must be adapted accordingly, requires extensive knowledge and a lot of time. Often, security concepts are not up-to-date – or are not available at all. 

All of these factors make it difficult for security administrators to prepare for external security audits and to efficiently mitigate potential findings.


Concept Generation

With the help of Security Architect, it is possible to generate an SAP security concept based on best practice for your SAP system environment, either per system or centrally in the Solution Manager. The creation of the security concept is either based on the delivered Xiting best practice template or on a company-owned template, which can be easily integrated into Security Architect via an upload function.

This security concept helps you to implement a secure administration of your systems and supports you in, among other things, planning a redesign. The created concept can also be consulted at any time for future IT audits or revisions.

ICS Test Functions (Check MOode)

The check mode allows you to check the current state of your systems against the target state defined in the document. This process can be done locally for one system, as well as from a central system (e.g. Solution Manager) for several systems. Thus, it is possible to test and monitor your system security configuration at any time and to save your test results. Compliance with the requirements can then be compared over time and tracked accordingly.

Compared to a manual procedure for creating and maintaining a security concept and checking systems, the use of Security Architect saves you an enormous amount of time. In addition, you always have an up-to-date and audit-compliant concept that can be easily implemented in the systems.

Learn more about the modules of the XAMS!

Arrange a free consultation!

More Information

Use Case
Security Architect in action: Streamline security audits.

On-Demand Webinars
Attend our webinars and learn more about the XAMS and SAP security.

SAP Security Blog
Learn more about the innovative modules of the XAMS in our blog posts.

Other XAMS Modules

Role Profiler

Optimize SU24, identify issues in your existing roles and authorizations, and prevent issues in new roles from entering your production landscape.

Free Tools

Learn more about the Xiting User Locking Tool and the Xiting RFC Stocktake Tool.


Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now