Having invested time and effort in removing segregation of duties (Sod) conflicts from SAP systems, organisations need to ensure they don’t return. Turnkey Consulting will help you re-define your access provisioning processes to entrench SoD compliance into your approval processes.


At Turnkey Consulting we have significant experience in designing and deployingAccess Controls solutions for Enterprise Systems.

Our SAP Security and GRC specialists bring the benefits of their wealth of experience in both auditing Enterprise systems and operating access management solutions throughout a number of industry sectors. Our consultants understand both the operational challenges of access provisioning and tools available to solve them.

Working with your in-house teams, we leverage our experience and deployment accelerators for your industry sector and specific solution landscape, as well as our understanding of common requirements for User Access Management processes. We then help you to configure the tools available to monitor and manage these risks in your systems.

The end-result is an access provisioning solution that:

  • Reduces the operational costs of SAP user administration
  • Supports business ownership of security and risk
  • Incorporates SoD compliance checks
  • Enforces SAP access approval procedures
  • Integrates with emergency access procedures
  • Supports your corporate risk management objectives
  • Meets the requirements of both internal and external audit


We recognise that in order to keep your solution free of SoDs it is important to embed business ownership of security into your organisation. Our approach focuses on business engagement throughout to ensure that your business develops both the tools and the mindset required to keep your systems clean of SoDs.

Our approach to implementing the various tools available reflects our technical expertise in SAP GRC, SAP Security and SAP Auditing. We combine this with a strong understanding of business process controls for access provisioning and the operational challenges in managing the assignment of access to users in across the business. We can help your company to find the right balance between giving staff the access they need to do their jobs and closing the real security gaps that put your business at risk.