{"id":2198,"date":"2026-02-18T14:19:24","date_gmt":"2026-02-18T14:19:24","guid":{"rendered":"https:\/\/swawe.fr\/?p=2198"},"modified":"2026-02-24T13:53:54","modified_gmt":"2026-02-24T13:53:54","slug":"prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod","status":"publish","type":"post","link":"https:\/\/swawe.fr\/en\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/","title":{"rendered":"S\u00e9paration des T\u00e2ches (SoD) sur SAP : Pr\u00e9venir efficacement la fraude interne"},"content":{"rendered":"\n[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#f2f2fa\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb border_color_all=\u00a0\u00bb#004899&Prime; box_shadow_style=\u00a0\u00bbpreset4&Prime; box_shadow_horizontal=\u00a0\u00bb6px\u00a0\u00bb box_shadow_vertical=\u00a0\u00bb6px\u00a0\u00bb box_shadow_color=\u00a0\u00bb#EF7E26&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<p><strong>L&rsquo;essentiel :<\/strong><\/p>\n<p><strong>La fraude interne<\/strong> sur SAP provient souvent de droits cumul\u00e9s permettant d&rsquo;ex\u00e9cuter un processus de bout en bout sans contr\u00f4le.<\/p>\n<p><strong>La SoD (S\u00e9paration des T\u00e2ches)<\/strong> est le levier majeur pour fragmenter ces pouvoirs et s\u00e9curiser les flux financiers et logistiques.<\/p>\n<p><strong>L&rsquo;analyse technique<\/strong> doit descendre jusqu&rsquo;aux objets d&rsquo;autorisation pour \u00eatre fiable et \u00e9viter les angles morts.<\/p>\n<p><strong>SWAWE automatise cette surveillance<\/strong>, r\u00e9duit les faux positifs et simplifie la mise en conformit\u00e9 (audit\/SOX).<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<h1>Ma\u00eetriser la S\u00e9paration des T\u00e2ches (SoD) sur SAP : Guide expert pour pr\u00e9venir la fraude interne<\/h1>\n<p>Dans les environnements SAP, la fraude interne ne r\u00e9sulte que rarement d\u2019un acte isol\u00e9 ou d\u2019une faille technique. Elle est le plus souvent rendue possible par une combinaison inappropri\u00e9e de droits d\u2019acc\u00e8s, donnant \u00e0 un m\u00eame utilisateur la capacit\u00e9 d\u2019initier, de contr\u00f4ler et de valider une op\u00e9ration sensible.<\/p>\n<p>C\u2019est pr\u00e9cis\u00e9ment l\u2019objectif de la <strong>s\u00e9paration des t\u00e2ches (Segregation of Duties \u2013 SoD)<\/strong> : emp\u00eacher qu\u2019un m\u00eame utilisateur ne dispose de pouvoirs incompatibles pouvant conduire \u00e0 des abus, des erreurs ou des fraudes.<\/p>\n<p>Dans cet article, nous analysons l&rsquo;int\u00e9r\u00eat de la pr\u00e9vention, les combinaisons critiques \u00e0 surveiller et comment SWAWE industrialise cette d\u00e9marche.<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<h2>Pourquoi pr\u00e9venir la fraude interne dans SAP est indispensable<\/h2>\n<h3><em>Un risque syst\u00e9mique souvent sous-estim\u00e9<\/em><\/h3>\n<p>SAP centralise les flux vitaux de l\u2019entreprise. Un acc\u00e8s mal contr\u00f4l\u00e9 n&rsquo;est pas qu&rsquo;une faille informatique, c&rsquo;est une faille m\u00e9tier qui permet :<\/p>\n<ul>\n<li><strong>Des paiements frauduleux<\/strong> via la cr\u00e9ation de fournisseurs fictifs coupl\u00e9e au lancement de cycles de paiement.<\/li>\n<li><strong>Des d\u00e9tournements de stocks<\/strong> par la manipulation des mouvements de marchandises (MIGO) et des inventaires physiques.<\/li>\n<li><strong>L&rsquo;alt\u00e9ration du bilan<\/strong> via des \u00e9critures manuelles en comptabilit\u00e9 sans validation hi\u00e9rarchique.<\/li>\n<\/ul>\n<h3><em>Un enjeu de conformit\u00e9 et de \u00ab\u00a0Clean ERP\u00a0\u00bb<\/em><\/h3>\n<p>Au-del\u00e0 de la fraude, la ma\u00eetrise des acc\u00e8s est un pilier des <strong>IT General Controls (ITGC)<\/strong>. Pour les entreprises soumises \u00e0 SOX ou aux audits l\u00e9gaux, la preuve d&rsquo;une revue SoD r\u00e9guli\u00e8re est obligatoire. Maintenir un syst\u00e8me \u00ab\u00a0propre\u00a0\u00bb r\u00e9duit \u00e9galement la dette technique li\u00e9e \u00e0 des r\u00f4les trop complexes et inutilisables.<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<h2>Comprendre les conflits de s\u00e9paration des t\u00e2ches (SoD)<\/h2>\n<h3><em>Qu\u2019est-ce qu\u2019un conflit SoD ?<\/em><\/h3>\n<p>Un conflit appara\u00eet lorsqu&rsquo;un utilisateur cumule des droits lui permettant de couvrir l&rsquo;int\u00e9gralit\u00e9 d&rsquo;un cycle transactionnel. En expertise SAP, on distingue deux niveaux d&rsquo;analyse :<\/p>\n<ul>\n<li><strong>Le niveau Transactionnel :<\/strong> Poss\u00e9der les codes transactions (T-Codes) comme FB60 (Saisie de facture) et F110 (Paiement).<\/li>\n<li><strong>Le niveau Autorisation (Critique) :<\/strong> C&rsquo;est ici que se cachent les vrais risques. Un utilisateur peut ne pas avoir la transaction, mais poss\u00e9der l&rsquo;objet d&rsquo;autorisation F_REGU_KO lui permettant d&rsquo;intervenir sur les comptes bancaires via une autre interface.<\/li>\n<\/ul>\n<h3><em>Exemples de combinaisons \u00e0 haut risque<\/em><\/h3>\n<table border=\"1\" style=\"border-collapse: collapse; width: 100%; height: 144px;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\"><strong>Cycle \/ Domaine<\/strong><\/td>\n<td style=\"width: 33.3333%; height: 24px;\"><strong>Risque SoD (Transactions)<\/strong><\/td>\n<td style=\"width: 33.3333%; height: 24px;\"><strong>Impact Potentiel &amp; Fraude<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Finance \/ P2P<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">FK01 + FB60 (Fournisseur + Facture)<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Cr\u00e9ation d&rsquo;un fournisseur fictif et auto-validation de factures associ\u00e9es.<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Achats \/ Stocks<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">ME21N + MIGO (Commande + R\u00e9ception)<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Commande de mat\u00e9riel personnel avec validation de r\u00e9ception fictive.<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Tr\u00e9sorerie<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">XK02 + F110 (RIB + Paiement)<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">D\u00e9tournement de fonds en changeant le RIB juste avant un cycle de paiement.<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Ventes \/ O2C<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">VA01 + VA01-RE (Commande + Avoirs)<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Application de remises injustifi\u00e9es a posteriori pour d\u00e9tournement de valeur.<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Administration<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">PFCG + Droits M\u00e9tiers (R\u00f4les + Ex\u00e9cution)<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Auto-attribution de droits critiques pour frauder sans laisser de trace d&rsquo;approbation.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><em>Les piliers d&rsquo;une pr\u00e9vention efficace<\/em><\/h3>\n<p>Une strat\u00e9gie robuste repose sur :<\/p>\n<p><strong>1\/ La Matrice de Risques :<\/strong> D\u00e9finir quelles combinaisons sont \u00ab\u00a0Critiques\u00a0\u00bb, \u00ab\u00a0Hautes\u00a0\u00bb ou \u00ab\u00a0Moyennes\u00a0\u00bb selon votre mod\u00e8le m\u00e9tier.<\/p>\n<p><strong>2\/ L&rsquo;analyse des \u00ab\u00a0Faux Positifs\u00a0\u00bb :<\/strong> Il faut descendre au niveau des champs et des valeurs d&rsquo;objets d&rsquo;autorisation pour ne pas alerter inutilement.<\/p>\n<p><strong>3\/ Les Contr\u00f4les Compensatoires :<\/strong> Si la s\u00e9paration est impossible, un contr\u00f4le a posteriori (revue mensuelle des logs) doit \u00eatre document\u00e9.<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<h2>Comment SWAWE industrialise votre s\u00e9curit\u00e9 SAP<\/h2>\n<p>L\u2019application SWAWE a \u00e9t\u00e9 con\u00e7ue pour transformer une contrainte d&rsquo;audit complexe en un levier de gestion quotidien.<\/p>\n<ul>\n<li><strong>D\u00e9tection granulaire :<\/strong> L&rsquo;outil scanne en profondeur les objets d&rsquo;autorisation, \u00e9vitant les angles morts des analyses manuelles.<\/li>\n<li><strong>Vision \u00ab\u00a0Risque M\u00e9tier\u00a0\u00bb :<\/strong> SWAWE traduit le jargon technique en risques compr\u00e9hensibles pour les directions financi\u00e8res.<\/li>\n<li><strong>Gestion des exceptions :<\/strong> Documentez les justifications et associez des contr\u00f4les compensatoires directement dans l&rsquo;outil.<\/li>\n<li><strong>Mode pr\u00e9ventif :<\/strong> Identifiez les d\u00e9rives d\u00e8s qu&rsquo;un nouveau r\u00f4le est assign\u00e9, avant m\u00eame l&rsquo;exploitation d&rsquo;une faille.<\/li>\n<\/ul>\n<p>La <strong>fraude interne dans SAP<\/strong> n\u2019est pas un risque th\u00e9orique ; elle exploite les interstices laiss\u00e9s par des r\u00f4les h\u00e9rit\u00e9s. Ma\u00eetriser la S\u00e9paration des T\u00e2ches est un gage de maturit\u00e9 organisationnelle. Avec SWAWE, cette ma\u00eetrise devient accessible, structur\u00e9e et surtout durable.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb3_5,2_5&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; background_color=\u00a0\u00bb#f2f2fa\u00a0\u00bb border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb border_color_all=\u00a0\u00bb#004899&Prime; box_shadow_style=\u00a0\u00bbpreset4&Prime; box_shadow_horizontal=\u00a0\u00bb5px\u00a0\u00bb box_shadow_vertical=\u00a0\u00bb5px\u00a0\u00bb box_shadow_color=\u00a0\u00bb#EF7E26&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_5&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; custom_padding=\u00a0\u00bb||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb text_line_height=\u00a0\u00bb1.8em\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_2_font=\u00a0\u00bb||||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#004899&Prime; header_2_font_size=\u00a0\u00bb28px\u00a0\u00bb header_2_line_height=\u00a0\u00bb1.4em\u00a0\u00bb header_3_font=\u00a0\u00bb|600|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#004899&Prime; background_layout=\u00a0\u00bbdark\u00a0\u00bb max_width=\u00a0\u00bb700px\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb|20px||20px|false|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<h3>Une expertise d\u00e9di\u00e9e \u00e0 votre environnement SAP<\/h3>\n<p>D\u00e9couvrez comment notre solution SWAWE peut s\u00e9curiser vos acc\u00e8s et acc\u00e9l\u00e9rer vos interventions.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_5&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb\/demande-de-demo\/\u00a0\u00bb button_text=\u00a0\u00bbDemander une d\u00e9monstration\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#004899&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_color=\u00a0\u00bbrgba(0,0,0,0)\u00a0\u00bb button_border_radius=\u00a0\u00bb4px\u00a0\u00bb button_letter_spacing=\u00a0\u00bb2px\u00a0\u00bb button_font=\u00a0\u00bbRoboto|700||on|||||\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_margin=\u00a0\u00bb30px|20px||20px|false|true\u00a0\u00bb custom_padding=\u00a0\u00bb10px|20px|10px|20px|true|true\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset3&Prime; box_shadow_vertical=\u00a0\u00bb20px\u00a0\u00bb box_shadow_blur=\u00a0\u00bb30px\u00a0\u00bb box_shadow_spread=\u00a0\u00bb-10px\u00a0\u00bb box_shadow_color=\u00a0\u00bbrgba(246,166,21,0.38)\u00a0\u00bb button_letter_spacing_hover=\u00a0\u00bb5.5px\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb button_text_size__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_text_size__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_text_size__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_text_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_text_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_text_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_border_width__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_border_width__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_border_width__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_border_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_border_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_border_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_border_radius__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_border_radius__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_border_radius__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_letter_spacing__hover_enabled=\u00a0\u00bbon\u00a0\u00bb button_letter_spacing__hover=\u00a0\u00bb5.5px\u00a0\u00bb button_one_letter_spacing__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_letter_spacing__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_bg_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_bg_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_bg_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<h3>Questions fr\u00e9quentes sur la SoD SAP<\/h3>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb closed_toggle_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb closed_toggle_background_color=\u00a0\u00bb#f2f2fa\u00a0\u00bb icon_color=\u00a0\u00bb#EF7E26&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb toggle_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb border_width_all=\u00a0\u00bb2px\u00a0\u00bb border_color_all=\u00a0\u00bb#004899&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][et_pb_accordion_item title=\u00a0\u00bb1. Quelle est la diff\u00e9rence entre un conflit transactionnel et un conflit d&rsquo;autorisation ?\u00a0\u00bb open=\u00a0\u00bbon\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]La diff\u00e9rence majeure entre un conflit transactionnel et un conflit d&rsquo;autorisation r\u00e9side dans la profondeur de l&rsquo;analyse : alors que le conflit transactionnel se base uniquement sur les codes transactions (ex: PFCG), le conflit d&rsquo;autorisation descend au niveau des valeurs d&rsquo;objets (ex: pouvoir modifier le RIB mais pas l&rsquo;adresse du fournisseur). SWAWE analyse ces deux niveaux pour \u00e9liminer les faux positifs.[\/et_pb_accordion_item][et_pb_accordion_item title=\u00a0\u00bb2. Peut-on supprimer 100% des conflits SoD dans SAP ?\u00a0\u00bb open=\u00a0\u00bboff\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]Il n&rsquo;est pas toujours possible de supprimer 100% des conflits SoD dans SAP, notamment dans les petites structures ou pour certains services sp\u00e9cifiques. Dans ce cas, on met en place des contr\u00f4les compensatoires, comme la revue syst\u00e9matique des logs de modification, que SWAWE permet de documenter officiellement.[\/et_pb_accordion_item][et_pb_accordion_item title=\u00a0\u00bb3. Pourquoi ne pas simplement utiliser les rapports standards SAP (SUIM) ?\u00a0\u00bb open=\u00a0\u00bboff\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]Utiliser les seuls rapports standards SAP (SUIM) pr\u00e9sente des limites car ils sont complexes \u00e0 croiser et ne permettent pas de g\u00e9rer une matrice de risques transversale de mani\u00e8re ergonomique. SWAWE offre une vision consolid\u00e9e et m\u00e9tier que les outils standards ne proposent pas nativement.[\/et_pb_accordion_item][et_pb_accordion_item title=\u00a0\u00bb4. \u00c0 quelle fr\u00e9quence faut-il r\u00e9aliser une revue SoD ?\u00a0\u00bb open=\u00a0\u00bboff\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]Pour d\u00e9terminer \u00e0 quelle fr\u00e9quence il faut r\u00e9aliser une revue SoD, l&rsquo;id\u00e9al est de viser une surveillance continue gr\u00e2ce \u00e0 une approche pr\u00e9ventive. \u00c0 d\u00e9faut, une revue trimestrielle constitue le standard recommand\u00e9 pour garantir la conformit\u00e9 aux exigences d&rsquo;audit et limiter l&rsquo;exposition au risque de fraude.[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;essentiel : La fraude interne sur SAP provient souvent de droits cumul\u00e9s permettant d&rsquo;ex\u00e9cuter un processus de bout en bout sans contr\u00f4le. La SoD (S\u00e9paration des T\u00e2ches) est le levier majeur pour fragmenter ces pouvoirs et s\u00e9curiser les flux financiers et logistiques. L&rsquo;analyse technique doit descendre jusqu&rsquo;aux objets d&rsquo;autorisation pour \u00eatre fiable et \u00e9viter les [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[14],"tags":[],"class_list":["post-2198","post","type-post","status-publish","format-standard","hentry","category-separation-des-taches-sod-analyse-de-risque"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pr\u00e9vention de la fraude interne sur SAP<\/title>\n<meta name=\"description\" content=\"Ma\u00eetriser la S\u00e9paration des T\u00e2ches (SoD) sur SAP : Guide expert pour pr\u00e9venir la fraude interne avec logiciel Swawe\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swawe.fr\/en\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pr\u00e9vention de la fraude interne sur SAP\" \/>\n<meta property=\"og:description\" content=\"Ma\u00eetriser la S\u00e9paration des T\u00e2ches (SoD) sur SAP : Guide expert pour pr\u00e9venir la fraude interne avec logiciel Swawe\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swawe.fr\/en\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/\" \/>\n<meta property=\"og:site_name\" content=\"Swawe\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-18T14:19:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-24T13:53:54+00:00\" \/>\n<meta name=\"author\" content=\"Christophe Bizot\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christophe Bizot\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/\"},\"author\":{\"name\":\"Christophe Bizot\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4\"},\"headline\":\"S\u00e9paration des T\u00e2ches (SoD) sur SAP : Pr\u00e9venir efficacement la fraude interne\",\"datePublished\":\"2026-02-18T14:19:24+00:00\",\"dateModified\":\"2026-02-24T13:53:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/\"},\"wordCount\":1982,\"articleSection\":[\"S\u00e9paration des T\u00e2ches (SoD) &amp; Analyse de Risque\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/\",\"url\":\"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/\",\"name\":\"Pr\u00e9vention de la fraude interne sur SAP\",\"isPartOf\":{\"@id\":\"https:\/\/swawe.fr\/#website\"},\"datePublished\":\"2026-02-18T14:19:24+00:00\",\"dateModified\":\"2026-02-24T13:53:54+00:00\",\"author\":{\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4\"},\"description\":\"Ma\u00eetriser la S\u00e9paration des T\u00e2ches (SoD) sur SAP : Guide expert pour pr\u00e9venir la fraude interne avec logiciel Swawe\",\"breadcrumb\":{\"@id\":\"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/swawe.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9paration des T\u00e2ches (SoD) sur SAP : Pr\u00e9venir efficacement la fraude interne\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swawe.fr\/#website\",\"url\":\"https:\/\/swawe.fr\/\",\"name\":\"Swawe\",\"description\":\"Your Compliance Companion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swawe.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4\",\"name\":\"Christophe Bizot\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/36b893283538a191d5f109e0963a0a9dcdc8d16e1603c81c06d9fe77fde3b422?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/36b893283538a191d5f109e0963a0a9dcdc8d16e1603c81c06d9fe77fde3b422?s=96&d=mm&r=g\",\"caption\":\"Christophe Bizot\"},\"url\":\"https:\/\/swawe.fr\/en\/author\/christophe\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pr\u00e9vention de la fraude interne sur SAP","description":"Ma\u00eetriser la S\u00e9paration des T\u00e2ches (SoD) sur SAP : Guide expert pour pr\u00e9venir la fraude interne avec logiciel Swawe","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swawe.fr\/en\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/","og_locale":"en_US","og_type":"article","og_title":"Pr\u00e9vention de la fraude interne sur SAP","og_description":"Ma\u00eetriser la S\u00e9paration des T\u00e2ches (SoD) sur SAP : Guide expert pour pr\u00e9venir la fraude interne avec logiciel Swawe","og_url":"https:\/\/swawe.fr\/en\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/","og_site_name":"Swawe","article_published_time":"2026-02-18T14:19:24+00:00","article_modified_time":"2026-02-24T13:53:54+00:00","author":"Christophe Bizot","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christophe Bizot","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/#article","isPartOf":{"@id":"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/"},"author":{"name":"Christophe Bizot","@id":"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4"},"headline":"S\u00e9paration des T\u00e2ches (SoD) sur SAP : Pr\u00e9venir efficacement la fraude interne","datePublished":"2026-02-18T14:19:24+00:00","dateModified":"2026-02-24T13:53:54+00:00","mainEntityOfPage":{"@id":"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/"},"wordCount":1982,"articleSection":["S\u00e9paration des T\u00e2ches (SoD) &amp; Analyse de Risque"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/","url":"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/","name":"Pr\u00e9vention de la fraude interne sur SAP","isPartOf":{"@id":"https:\/\/swawe.fr\/#website"},"datePublished":"2026-02-18T14:19:24+00:00","dateModified":"2026-02-24T13:53:54+00:00","author":{"@id":"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4"},"description":"Ma\u00eetriser la S\u00e9paration des T\u00e2ches (SoD) sur SAP : Guide expert pour pr\u00e9venir la fraude interne avec logiciel Swawe","breadcrumb":{"@id":"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/swawe.fr\/separation-des-taches-sod-analyse-de-risque\/prevention-de-la-fraude-interne-sur-sap-identifier-les-combinaisons-de-droits-a-risque-sod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/swawe.fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9paration des T\u00e2ches (SoD) sur SAP : Pr\u00e9venir efficacement la fraude interne"}]},{"@type":"WebSite","@id":"https:\/\/swawe.fr\/#website","url":"https:\/\/swawe.fr\/","name":"Swawe","description":"Your Compliance Companion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swawe.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4","name":"Christophe Bizot","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swawe.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/36b893283538a191d5f109e0963a0a9dcdc8d16e1603c81c06d9fe77fde3b422?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36b893283538a191d5f109e0963a0a9dcdc8d16e1603c81c06d9fe77fde3b422?s=96&d=mm&r=g","caption":"Christophe Bizot"},"url":"https:\/\/swawe.fr\/en\/author\/christophe\/"}]}},"_links":{"self":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/2198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/comments?post=2198"}],"version-history":[{"count":7,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/2198\/revisions"}],"predecessor-version":[{"id":2207,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/2198\/revisions\/2207"}],"wp:attachment":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/media?parent=2198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/categories?post=2198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/tags?post=2198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}