Independent SAP advisory. Not an SAP partner, reseller, or affiliate.
SAP Security Consulting

SAP RFC Security: Protecting Remote Calls

Remote Function Call is the SAP integration backbone that connects systems across the SAP landscape and to external endpoints. The destination inventory, the trust relationship design, the secinfo and reginfo control, and the audit defensible RFC security posture that bounds lateral movement and supports external audit walkthrough.

SAPAudits Research May 18, 2026 10 minute read
SAP integration architect and security engineer reviewing RFC destination inventory and trust relationship configuration on terminal
In this article
  1. Why RFC security matters
  2. Destination inventory
  3. Trust relationship design
  4. Gateway secinfo and reginfo
  5. Audit defensible RFC posture

Why RFC security matters

Remote Function Call is the SAP integration backbone. RFC carries traffic between ABAP systems, between SAP and non SAP endpoints, and between the gateway and external programs. Every RFC destination is a potential lateral movement path. Without disciplined RFC security the customer accumulates destinations with broad service users, trust relationships that bypass authentication, and gateway rules that permit any program to register.

This article documents the destination inventory, the trust relationship design, the secinfo and reginfo control, and the audit defensible RFC security posture. Reference the SAP security audit pillar, the basis security analysis, and the security hardening expertise.

Destination inventory

The destination inventory captures every RFC destination defined in transaction SM59. The inventory record names the destination, the target system, the service user, the authorization assigned to the service user, the business owner, and the last review date. The customer position is to maintain the inventory continuously rather than to discover destinations through external audit. Destinations without business owner are decommissioned through the quarterly review cycle.

Reference the user access review process, the privileged access analysis, and the basis security analysis.

Trust relationship design

Trust relationships allow one SAP system to call another without re authentication. The trust relationship rests on the calling user, the called user, and the authority check the called system applies. The customer position is to define trust relationships with explicit authority check on the called side, never to grant blanket trust between systems. The audit defensible posture documents each trust relationship with business purpose, calling user mapping, and authority check evidence.

Reference the authorization concepts analysis, the critical authorizations analysis, and the cybersecurity analysis.

Trust relationships without explicit authority check on the called side are the single most common lateral movement vector in compromised SAP landscapes. Explicit authority check at the destination closes the path without breaking the integration.

Gateway secinfo and reginfo

The gateway is the SAP component that handles RFC traffic from external programs. The secinfo file controls which programs may execute through the gateway. The reginfo file controls which programs may register with the gateway. Both files require explicit allow lists. The customer position is to operate both files with documented rules, the rules reviewed quarterly, and any deviation from the recommended baseline approved by the security owner.

The detail is in our license audit pillar (cross cluster reference for the named user implication of RFC service users), the basis security analysis, and the transport security analysis.

Audit defensible RFC posture

The audit defensible RFC security posture has four components. First, the destination inventory continuously maintained with business owner. Second, the trust relationship design with explicit authority check on the called side. Third, the gateway secinfo and reginfo allow lists with quarterly review. Fourth, the RFC service user discipline that scopes authorization to the integration purpose. The four components together survive external auditor walkthrough and SoX testing.

The implementation detail is in our security baseline analysis, the privileged access analysis, the cybersecurity analysis, and the compliance framework pillar. The security hardening expertise documents the full senior advisor methodology.

Key takeaway

RFC posture that bounds lateral movement

Related white paper

SAP Authorization Audit Guide

The reference guide to SAP RFC security, the destination inventory framework, the trust relationship design, and the audit defensible remote call posture that bounds lateral movement.

Access the paper
SR
SAPAudits Research
Senior practitioners, sap integration security and rfc

The SAPAudits research team includes senior advisors with combined experience supporting more than 500 enterprise SAP engagements. We do not hold any commercial relationship with SAP.

Independent SAP advisory

Facing a similar SAP situation?

Talk to a senior advisor. We respond within 24 hours. No fee, no obligation, no SAP commercial relationship.

Schedule a confidential consultation