{"id":11372,"date":"2017-01-27T11:00:00","date_gmt":"2017-01-27T11:00:00","guid":{"rendered":"https:\/\/zapliance.com\/?p=11372"},"modified":"2022-08-26T14:14:42","modified_gmt":"2022-08-26T14:14:42","slug":"how-to-analyse-the-risk-of-super-users-in-sap-with-sql","status":"publish","type":"post","link":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/","title":{"rendered":"How to analyse the risk of super users in SAP with SQL"},"content":{"rendered":"\n<p>In today\u2019s blog post we won\u2019t analyse stamps for sure, but the risks of extensive administration rights on your SAP system. You will get to know, which kind of risks exist, how you can analyse them and which actions to take as a result.<\/p>\n\n\n\n<p>Part 2 of the series: \u201cOperations done by super users\u201d<\/p>\n\n\n\n<p>1.&nbsp;<a href=\"https:\/\/zapliance.com\/blog\/how-to-avoid-manipulations-done-by-super-users?lang=en\">How to avoid manipulations done by super users<\/a>&nbsp;<br><strong>2. How to analyse the risk of&nbsp;super users in SAP&nbsp;with SQL<\/strong><br>3.&nbsp;<a href=\"https:\/\/zapliance.com\/blog\/do-it-yourself-analytics-of-sap-super-users-in-excel?lang=en\">Do it yourself: Analytics of&nbsp;SAP super users in Excel<\/a>&nbsp;<br>4.&nbsp;<a href=\"https:\/\/zapliance.com\/blog\/advanced-analytics-what-you-should-also-know-about-sap-super-users?lang=en\">Advanced Analytics: What you definitely should know about SAP&nbsp;super users<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How do you recognize that a super user is posting&nbsp;in SAP?&nbsp;<\/h2>\n\n\n\n<p>Extensive SAP administration rights are usually given by assigning certain SAP profiles to a user. If you are trying to find out if users have posted with such profiles, you will get the postings you are looking for.&nbsp;In particular, the SAP profiles SAP_ALL and SAP_NEW are considered particularly far-reaching.&nbsp;One criterion for assessing the associated risk of super users in SAP is the number of accounting documents posted by a user with SAP_ALL or SAP_NEW. But notice: there can be other critical SAP authorization profiles as well.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>How to get data for a super user analysis?<\/h2>\n\n\n\n<p>If you want to analyse the postings of super users in your SAP system, you need the necessary data structures and data from your SAP system.&nbsp;You can perform a data download from your SAP system using zap Audit.&nbsp;The analytics of super users is part of&nbsp;<a href=\"https:\/\/zapliance.com\/zap-audit?lang=en\">zap Audit<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to get the data for the super user analytics?<\/h2>\n\n\n\n<p>I will show you technically how it works!&nbsp;This requires nothing other than standard SQL. You find a step-by-step instruction for super user analytics in my whitepaper. I am explaining how you can perform the analytics of super user postings in SAP by simply using SQL. If you are interested in the step-by-step instruction, just follow this link:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/2492072\/ad61d2d3-95ac-4bbe-8afe-1a22578e01a4\"><img decoding=\"async\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/2492072\/ad61d2d3-95ac-4bbe-8afe-1a22578e01a4.png\" alt=\"Download pdf\"\/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s blog post we won\u2019t analyse stamps for sure, but the risks of extensive administration rights on your SAP system. You will get to know, which kind of risks exist, how you can analyse them and which actions to take as a result. Part 2 of the series: \u201cOperations done by super users\u201d 1.&nbsp;How [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":10699,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[38,37,40],"tags":[],"class_list":["post-11372","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-en-audit","category-en-compliance","category-en-finance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to analyse the risk of super users in SAP with SQL - zapliance<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to analyse the risk of super users in SAP with SQL - zapliance\" \/>\n<meta property=\"og:description\" content=\"In today\u2019s blog post we won\u2019t analyse stamps for sure, but the risks of extensive administration rights on your SAP system. You will get to know, which kind of risks exist, how you can analyse them and which actions to take as a result. Part 2 of the series: \u201cOperations done by super users\u201d 1.&nbsp;How [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/\" \/>\n<meta property=\"og:site_name\" content=\"zapliance\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-27T11:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-26T14:14:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"962\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nick Gehrke\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nick Gehrke\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/\"},\"author\":{\"name\":\"Nick Gehrke\",\"@id\":\"https:\/\/zapliance.com\/en\/#\/schema\/person\/ef4d227360d4b66b84aa95cb72c12f5a\"},\"headline\":\"How to analyse the risk of super users in SAP with SQL\",\"datePublished\":\"2017-01-27T11:00:00+00:00\",\"dateModified\":\"2022-08-26T14:14:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/\"},\"wordCount\":355,\"publisher\":{\"@id\":\"https:\/\/zapliance.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png\",\"articleSection\":[\"Audit\",\"Compliance\",\"Finance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/\",\"url\":\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/\",\"name\":\"How to analyse the risk of super users in SAP with SQL - zapliance\",\"isPartOf\":{\"@id\":\"https:\/\/zapliance.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png\",\"datePublished\":\"2017-01-27T11:00:00+00:00\",\"dateModified\":\"2022-08-26T14:14:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#primaryimage\",\"url\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png\",\"contentUrl\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png\",\"width\":2400,\"height\":962},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/zapliance.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to analyse the risk of super users in SAP with SQL\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/zapliance.com\/en\/#website\",\"url\":\"https:\/\/zapliance.com\/en\/\",\"name\":\"zapliance\",\"description\":\"Be the agent of change\",\"publisher\":{\"@id\":\"https:\/\/zapliance.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/zapliance.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/zapliance.com\/en\/#organization\",\"name\":\"zapliance\",\"url\":\"https:\/\/zapliance.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/zapliance.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/06\/zap_logo.svg\",\"contentUrl\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/06\/zap_logo.svg\",\"width\":200,\"height\":45,\"caption\":\"zapliance\"},\"image\":{\"@id\":\"https:\/\/zapliance.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/zapliance.com\/en\/#\/schema\/person\/ef4d227360d4b66b84aa95cb72c12f5a\",\"name\":\"Nick Gehrke\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/zapliance.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/07\/avatar_user_4_1657803044-96x96.jpg\",\"contentUrl\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/07\/avatar_user_4_1657803044-96x96.jpg\",\"caption\":\"Nick Gehrke\"},\"description\":\"is Chief of Data &amp; Knowledge and Co-Founder at zapliance as well as Professor of Information Systems with a Big 4 background. He prefers to work as a business information scientist and tax consultant at the converging points of finance, accounting, taxation, audit and ERP systems, data science and information technology.\",\"url\":\"https:\/\/zapliance.com\/en\/blog\/author\/nick-gehrke\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to analyse the risk of super users in SAP with SQL - zapliance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/","og_locale":"en_US","og_type":"article","og_title":"How to analyse the risk of super users in SAP with SQL - zapliance","og_description":"In today\u2019s blog post we won\u2019t analyse stamps for sure, but the risks of extensive administration rights on your SAP system. You will get to know, which kind of risks exist, how you can analyse them and which actions to take as a result. Part 2 of the series: \u201cOperations done by super users\u201d 1.&nbsp;How [&hellip;]","og_url":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/","og_site_name":"zapliance","article_published_time":"2017-01-27T11:00:00+00:00","article_modified_time":"2022-08-26T14:14:42+00:00","og_image":[{"width":2400,"height":962,"url":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png","type":"image\/png"}],"author":"Nick Gehrke","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Nick Gehrke","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#article","isPartOf":{"@id":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/"},"author":{"name":"Nick Gehrke","@id":"https:\/\/zapliance.com\/en\/#\/schema\/person\/ef4d227360d4b66b84aa95cb72c12f5a"},"headline":"How to analyse the risk of super users in SAP with SQL","datePublished":"2017-01-27T11:00:00+00:00","dateModified":"2022-08-26T14:14:42+00:00","mainEntityOfPage":{"@id":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/"},"wordCount":355,"publisher":{"@id":"https:\/\/zapliance.com\/en\/#organization"},"image":{"@id":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#primaryimage"},"thumbnailUrl":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png","articleSection":["Audit","Compliance","Finance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/","url":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/","name":"How to analyse the risk of super users in SAP with SQL - zapliance","isPartOf":{"@id":"https:\/\/zapliance.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#primaryimage"},"image":{"@id":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#primaryimage"},"thumbnailUrl":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png","datePublished":"2017-01-27T11:00:00+00:00","dateModified":"2022-08-26T14:14:42+00:00","breadcrumb":{"@id":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#primaryimage","url":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png","contentUrl":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png","width":2400,"height":962},{"@type":"BreadcrumbList","@id":"https:\/\/zapliance.com\/en\/blog\/how-to-analyse-the-risk-of-super-users-in-sap-with-sql\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/zapliance.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to analyse the risk of super users in SAP with SQL"}]},{"@type":"WebSite","@id":"https:\/\/zapliance.com\/en\/#website","url":"https:\/\/zapliance.com\/en\/","name":"zapliance","description":"Be the agent of change","publisher":{"@id":"https:\/\/zapliance.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zapliance.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/zapliance.com\/en\/#organization","name":"zapliance","url":"https:\/\/zapliance.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zapliance.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/06\/zap_logo.svg","contentUrl":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/06\/zap_logo.svg","width":200,"height":45,"caption":"zapliance"},"image":{"@id":"https:\/\/zapliance.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/zapliance.com\/en\/#\/schema\/person\/ef4d227360d4b66b84aa95cb72c12f5a","name":"Nick Gehrke","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zapliance.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/07\/avatar_user_4_1657803044-96x96.jpg","contentUrl":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/07\/avatar_user_4_1657803044-96x96.jpg","caption":"Nick Gehrke"},"description":"is Chief of Data &amp; Knowledge and Co-Founder at zapliance as well as Professor of Information Systems with a Big 4 background. He prefers to work as a business information scientist and tax consultant at the converging points of finance, accounting, taxation, audit and ERP systems, data science and information technology.","url":"https:\/\/zapliance.com\/en\/blog\/author\/nick-gehrke\/"}]}},"views":895,"_links":{"self":[{"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/posts\/11372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/comments?post=11372"}],"version-history":[{"count":1,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/posts\/11372\/revisions"}],"predecessor-version":[{"id":11373,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/posts\/11372\/revisions\/11373"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/media\/10699"}],"wp:attachment":[{"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/media?parent=11372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/categories?post=11372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/tags?post=11372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}