- Indirect access detection is methodical, not opportunistic
- Detection method one: integration discovery
- Detection method two: document volume analysis
- Detection method three: network and transaction analysis
- Detection method four: customer disclosed information
- The customer defense posture against each method
Indirect access detection is methodical, not opportunistic
Indirect access remains one of the highest impact audit findings across the Fortune 500 SAP portfolio. The magnitude of the finding depends on detection. Customers who understand the detection methods SAP applies can assess their own exposure, address the highest probability detection paths, and approach the audit with a posture rather than a defense.
This article maps the four detection methods SAP commonly applies, the customer artifacts that each method targets, and the defense posture that addresses the method. The framework supports the broader indirect access defense covered in our indirect access expertise page and the complete audit guide.
Detection method one: integration discovery
Integration discovery is the first detection method. SAP requests an inventory of integrations that connect to SAP systems, including the surrounding application name, the integration technology, the data exchanged, and the user volume on the surrounding system. The request typically arrives early in the audit and frames the indirect access investigation.
Customers who answer the request without preparation typically disclose integrations that were not material to their license posture and create indirect access exposure during the disclosure itself. Customers who prepare a documented integration inventory before the request typically disclose accurately and avoid creating exposure. The indirect access explainer covers the integration taxonomy.
Detection method two: document volume analysis
Digital access is measured by document volume. SAP requests, or runs through the LAW measurement, the count of documents created in the SAP system from each integration source. The document count converts to a digital access license requirement under the digital access model. Customers with high integration document volumes have the highest exposure.
Defense against this method requires measuring the document volume internally before SAP measures it externally, evaluating whether the digital access conversion is appropriate, and where appropriate, contractually narrowing the document categories that count. See our digital access conversion guide and the LAW measurement guide.
Indirect access exposure is most material when SAP measures it first. The customer who measures it first, who documents the measurement, and who establishes the interpretation, typically defines the discussion that follows.
Detection method three: network and transaction analysis
SAP can analyze RFC traffic, IDoc volumes, and similar transaction patterns to identify integrations that the customer did not disclose. The analysis is technical, uses standard SAP tools, and produces a defensible finding even when the customer disagrees with the categorization.
Defense against this method requires the customer to know what its own RFC, IDoc, and similar transaction patterns reveal. The customer should run the same analysis internally, before SAP does, and prepare an interpretation that supports the customer position. Cross reference our audit data collection guide and the indirect access expertise.