This demo outlines how Security Administrators use CERPASS to proactively manage role design, simulate access changes, and reduce risk exposure—all while supporting continuous compliance improvement.
Security Admins have full access to CERPASS. In addition to risk dashboards and reports, they gain access to powerful configuration tools such as:
Simulations for access change previews
Role Repository and Import functions
One of CERPASS's most valuable features for Security Admins is the Simulate Access Changes workflow:
Import existing roles and authorizations
Propose composite role modifications (e.g., adding or removing single roles)
Change or remove authorizations within individual roles
Propose multiple simultaneous changes
🧪 No impact to SAP until you're ready: CERPASS does not write changes back to SAP. All simulations are safe, contained, and fully transparent.
Security Admins also benefit from tools supporting end-to-end SAP access lifecycle management:
CERPASS gives SAP Security Administrators the tools they need to:
Proactively simulate changes and assess risk
Make informed design decisions
Maintain continuous SoD compliance
Support safe, auditable access changes within SAP