Why is it a strategic move to have a document that describes how the SAP security was addressed in the company?
When is it needed? What is it needed for? Why do it? How do you maintain it?
It is the document that describes which decisions were taken by the company on SAP Security matters. It can be written during the project or later.
Usually it is divided in various sections that document all things security, for example:
It doesn't need to be an ad hoc document called SAP Security Guideline or similar names. It can also be inserted in a general company security document.
Often there are many SAP specifics and it's generally better to create a specific document that describes its aspects in detail.
Under many aspects yes, but sometimes it may not be possible. What do I mean with this?
Some SAP Security Configuration aspects can activated and managed at any time. Meanwhile, for example, the naming convention for user IDs or the authorization roles might not be as "documentable".
If in my system there is no single rule for the naming convention of roles or users (but there is one for custom authorization objects and transactions), it might be very hard or even useless to document what is present in the system.
Having a document that describes the authorization model defined and its rules becomes a point of importance in this area (also called SAP Security Baseline)
It can be useful also for what concerns the GDPR in terms of accountability of the system.
Think about the following situations:
For it tu be usable, the document needs to be updated often. Normally, however, few changes are needed after the first definition of the document.
Blog post originally translated from: https://www.aglea.com/blog/sap-security-guidelines