
Blog Post
Mar 12, 2026


Many companies invest heavily in securing system access.
Firewalls. Monitoring. Access concepts.
All important measures.
However, a large portion of the risks arise not outside the system – but within the system itself.
Mature SAP landscapes often contain thousands of extensions
In many systems, countless custom developments have existed over the years, for example:
• Reports
• User Exits
• Classes, methods, and includes
• Project programs
• old helper programs
Many of these developments were created for a single project –
and then simply remain in the system.
Often for many years.
And often users can still execute these programs.
When such programs are used, real risks arise
If such a program is started – intentionally or accidentally –
it can have significant consequences.
Typical examples:
1️⃣ Programs with direct table access
Data can be changed or deleted – without the usual validation mechanisms.
2️⃣ Extensions in booking logics
Controls or booking rules can be technically bypassed.
3️⃣ Technical circumvention of approvals
Clearances are automatically set or process steps are skipped.
4️⃣ Changes to documents or master data
Manipulations often remain difficult to trace later.
5️⃣ Programs for mass changes
A wrong run can change thousands of records.
The real problem: lack of transparency
Many companies know very well,
who has access to their SAP system.
What is often less clear is:
Which programs in the system actually provide such possibilities.
This is precisely where our analyses come into play
🔎 Spotcheck shows the actual reality in the system.
🛡 Security Pathfinder identifies areas where system logic can create risks.
Currently, we also offer both analyses combined as a Governance and Risk Check.
A candid question in conclusion
If you cannot say for sure today,
which custom developments in your SAP system bypass controls or can change data,
it is worth taking a closer look.





