CERPASS for Security Admins: Role Risk, Simulations & Controls

Use Case Summary

This demo outlines how Security Administrators use CERPASS to proactively manage role design, simulate access changes, and reduce risk exposure—all while supporting continuous compliance improvement.

 

 

Access Profile

Security Admins have full access to CERPASS. In addition to risk dashboards and reports, they gain access to powerful configuration tools such as:

  • Simulations for access change previews

  • Role Repository and Import functions

  • Control Execution and Workflow Tracking

Simulations: Test Before You Transport

One of CERPASS's most valuable features for Security Admins is the Simulate Access Changes workflow:

  • Import existing roles and authorizations

  • Propose composite role modifications (e.g., adding or removing single roles)

  • Change or remove authorizations within individual roles

  • Propose multiple simultaneous changes

🧪 No impact to SAP until you're ready: CERPASS does not write changes back to SAP. All simulations are safe, contained, and fully transparent.

👉BACK TO THE DEMO

Additional Capabilities for Security Teams

Security Admins also benefit from tools supporting end-to-end SAP access lifecycle management:

Features Summary

Outcome

CERPASS gives SAP Security Administrators the tools they need to:

  • Proactively simulate changes and assess risk

  • Make informed design decisions

  • Maintain continuous SoD compliance

  • Support safe, auditable access changes within SAP

👉BACK TO THE DEMO

 

 

 

RELATED ARTICLE

May Be You Like