+353 1 279 0020 and +353 86 2471404sales@olas.ie Olas: Professional, Direct, Clever & Helpful

ADM950: Secure SAP System Management


Participants of this course will gain knowledge on how to secure an SAP system. Data protection, Security monitoring, SAP GRC Access Control, SAP role maintenance, and change management mechanisms are covered in this course.

This course will prepare participants to:

  • Identify and protect sensitive data and mechanisms in live solutions based on SAP NetWeaver Application Server
  • Use the SAP Audit Information System to structure and conduct thorough security checks and configure important security monitoring mechanisms
  • Explain the features of SAP GRC Access Control
  • Configure standard SAP role maintenance tools to produce secure company-specific roles and authorization profiles
  • Implement und use the SAP Security Optimization Service (SOS)
  • Secure change management mechanisms in production system landscapes and protect system administration tools from misuse


Price per Person: Click Here


Click Here



  • System Administrator
  • Technology Consultant



  • ADM100: System Administration I for SAP S/4HANA and SAP Business Suite
  • ADM900: SAP System Security Fundamentals


  • Knowledge of security issues, technical background (Web technologies, SAP ITS, fundamental knowledge of SAP systems)
  • ADM940: AS ABAP – Authorization Concept
Software Release Information and Notes

Course based on software release

  • SAP ECC 6.07 / SAP NetWeaver AS 7.5


  • This course assumes that you are familiar with many SAP system administration and system architecture functions.
Course Outline
  • Introduction to Internal Security Auditing
    • Describing Security Auditing
  • Audit Information System (AIS) and the Audit Information System Cockpi
    • Configuring and Using the AIS
    • Performing a System Audit Using the Audit Cockpit
  • User and Authorization Audit
    • Customizing the Role Maintenance Tool
    • Securing User and Group Administration
    • Describing Segregation of Duties and Critical Authorization
    • Securing the System with Login-Related Parameters
  • System Audit
    • Configuring and Using the Security Audit Log
    • Securing System Administration Services
  • Repository and Table Audit
    • Monitoring AS ABAP Using Logs
  • Security in Change Management
    • Securing Change Management
  • Security Assessment
    • Optimizing Security Using SAP Security Optimization Self-Service
    • Consulting SAP Security Notes
    • Implementing and Checking Technical Security Recommendations
Contact Us

Drop us a line, include your contact details and we will get back to you as soon as possible.