Use Case Summary
This demo outlines how Security Administrators use CERPASS to proactively manage role design, simulate access changes, and reduce risk exposure—all while supporting continuous compliance improvement.
✅ Access Profile
Security Admins have full access to CERPASS. In addition to risk dashboards and reports, they gain access to powerful configuration tools such as:
-
Simulations for access change previews
-
Role Repository and Import functions
✅ Simulations: Test Before You Transport
One of CERPASS's most valuable features for Security Admins is the Simulate Access Changes workflow:
-
Import existing roles and authorizations
-
Propose composite role modifications (e.g., adding or removing single roles)
-
Change or remove authorizations within individual roles
-
Propose multiple simultaneous changes
🧪 No impact to SAP until you're ready: CERPASS does not write changes back to SAP. All simulations are safe, contained, and fully transparent.
✅ Additional Capabilities for Security Teams
Security Admins also benefit from tools supporting end-to-end SAP access lifecycle management:
CERPASS gives SAP Security Administrators the tools they need to:
-
Proactively simulate changes and assess risk
-
Make informed design decisions
-
Maintain continuous SoD compliance
-
Support safe, auditable access changes within SAP