v0.1.0-draft AI Drafted

SAP Concur Hardening Guide

HR/Finance Last updated: 2025-02-05

Travel and expense management platform hardening for SAP Concur including SAML SSO, expense policies, and audit controls

Overview

SAP Concur is a leading travel, expense, and invoice management platform serving millions of users worldwide. As a platform handling financial transactions and travel data, Concur security configurations directly impact expense integrity and compliance.

Intended Audience

  • Security engineers managing expense systems
  • IT administrators configuring Concur
  • Finance administrators managing travel and expense
  • GRC professionals assessing financial platform security

How to Use This Guide

  • L1 (Baseline): Essential controls for all organizations
  • L2 (Hardened): Enhanced controls for security-sensitive environments
  • L3 (Maximum Security): Strictest controls for regulated industries

Scope

This guide covers SAP Concur security including SAML SSO, expense policies, approval workflows, and audit controls.


Table of Contents

  1. Authentication & SSO
  2. Access Controls
  3. Expense Policies
  4. Monitoring & Compliance
  5. Compliance Quick Reference

1. Authentication & SSO

1.1 Configure SAML Single Sign-On

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 6.3, 12.5
NIST 800-53 IA-2, IA-8

Description

Configure SAML SSO to centralize authentication for Concur users.

Prerequisites

  • SAP Concur admin access
  • SAP Cloud Identity Services or external IdP
  • SAML 2.0 configuration details

ClickOps Implementation

Step 1: Access SSO Configuration

  1. Navigate to: AdministrationCompanyAuthentication Admin
  2. Select SSO configuration

Step 2: Configure Identity Provider

  1. Upload IdP metadata
  2. Configure Entity ID
  3. Configure SSO URL
  4. Upload IdP certificate

Step 3: Configure Attribute Mapping

  1. Map SAML attributes to Concur fields
  2. Configure user identifier
  3. Configure company assignment

Step 4: Test and Enable

  1. Test SSO authentication
  2. Verify user provisioning
  3. Enable for all users

Time to Complete: ~2 hours


1.2 Enforce Multi-Factor Authentication

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 6.5
NIST 800-53 IA-2(1)

Description

Require MFA for all Concur users.

ClickOps Implementation

Step 1: Configure via IdP

  1. Enable MFA in identity provider
  2. All SSO users subject to IdP MFA
  3. Use phishing-resistant methods for approvers

Step 2: Mobile Device Security

  1. Configure SAP Concur mobile app security
  2. Require device PIN/biometric
  3. Enable remote wipe capability

1.3 Configure Session Security

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 6.2
NIST 800-53 AC-12

Description

Configure session timeout settings.

ClickOps Implementation

Step 1: Configure Timeout

  1. Navigate to: AdministrationCompanyCompany Admin
  2. Configure session timeout
  3. Balance security with usability

2. Access Controls

2.1 Configure Role-Based Access Control

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 5.4
NIST 800-53 AC-6

Description

Implement least privilege using Concur’s role model.

ClickOps Implementation

Step 1: Review Roles

  1. Navigate to: AdministrationCompanyCompany Admin
  2. Review roles:
    • Employee
    • Expense Approver
    • Invoice Approver
    • Administrator
  3. Understand role capabilities

Step 2: Assign Minimum Necessary Access

  1. Apply least-privilege principle
  2. Separate employee and approver roles
  3. Limit admin access

2.2 Limit Admin Access

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 5.4
NIST 800-53 AC-6(1)

Description

Minimize and protect administrator accounts.

ClickOps Implementation

Step 1: Inventory Admin Users

  1. Review admin accounts
  2. Document admin privileges
  3. Identify unnecessary access

Step 2: Apply Restrictions

  1. Limit admin to 2-3 users
  2. Require MFA for admins
  3. Monitor admin activity

2.3 Configure Delegate Access

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 5.4
NIST 800-53 AC-6

Description

Control delegate access for expense management.

ClickOps Implementation

Step 1: Configure Delegate Policies

  1. Define who can have delegates
  2. Limit delegate permissions
  3. Require approval for delegate setup

Step 2: Monitor Delegate Usage

  1. Audit delegate actions
  2. Review delegate assignments
  3. Regular access reviews

3. Expense Policies

3.1 Configure Expense Policy Rules

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 5.4
NIST 800-53 AC-5

Description

Configure expense policies for compliance.

ClickOps Implementation

Step 1: Define Expense Types

  1. Configure expense categories
  2. Set spending limits
  3. Define receipt requirements

Step 2: Configure Policy Rules

  1. Set per diem rates
  2. Configure mileage rates
  3. Define approval thresholds

Step 3: Enable Policy Enforcement

  1. Configure policy violations
  2. Set up notifications
  3. Enable automated checks

3.2 Configure Approval Workflows

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 5.4
NIST 800-53 AC-5

Description

Configure expense approval workflows.

ClickOps Implementation

Step 1: Configure Approval Chains

  1. Define approval hierarchy
  2. Configure approval limits
  3. Set escalation rules

Step 2: Enforce Separation of Duties

  1. Submitters cannot approve own expenses
  2. Configure multi-level approval
  3. Enable audit trail

3.3 Configure Receipt Requirements

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 8.2
NIST 800-53 AU-2

Description

Require receipts for expense documentation.

ClickOps Implementation

Step 1: Configure Receipt Policies

  1. Set receipt threshold
  2. Define required receipt types
  3. Configure itemization requirements

Step 2: Enable Receipt Verification

  1. Enable receipt imaging
  2. Configure OCR validation
  3. Flag missing receipts

4. Monitoring & Compliance

4.1 Configure Audit Logging

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 8.2
NIST 800-53 AU-2

Description

Enable and monitor audit logs.

ClickOps Implementation

Step 1: Enable Auditing

  1. Configure audit trail
  2. Set retention period
  3. Enable monitoring

Step 2: Monitor Events

  1. Expense submissions
  2. Approval actions
  3. Policy violations
  4. Admin changes

4.2 Configure Expense Reports

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 8.11
NIST 800-53 AU-6

Description

Configure compliance reports.

ClickOps Implementation

Step 1: Configure Reports

  1. Enable policy violation reports
  2. Configure spend analytics
  3. Set up audit reports

Step 2: Schedule Reviews

  1. Weekly policy violation review
  2. Monthly spend analysis
  3. Quarterly audits

5. Compliance Quick Reference

SOC 2 Trust Services Criteria Mapping

Control ID Concur Control Guide Section
CC6.1 SSO/MFA 1.1
CC6.2 RBAC 2.1
CC6.3 Approval workflows 3.2
CC7.2 Audit logging 4.1

NIST 800-53 Rev 5 Mapping

Control Concur Control Guide Section
IA-2 SSO 1.1
IA-2(1) MFA 1.2
AC-5 Separation of duties 3.2
AC-6 RBAC 2.1
AU-2 Audit logging 4.1

Appendix A: References

Official SAP Concur Documentation:

API Documentation:

Compliance Frameworks:

  • SOC 2 Type II (semi-annual audits since 2017; Security, Availability, Confidentiality, Privacy), SOC 1, ISO 27001 (certified since 2004 as BS 7799) — via SAP Trust Center Compliance Finder

Security Incidents:

  • 2020 — SAP cloud product security standards gap. SAP disclosed that some cloud products, including SAP Concur, did not meet certain contractually agreed IT security standards. Approximately 40,000 customers were potentially impacted. No customer data was believed compromised, and remediation patches were applied in Q2 2020.
  • No major public data breaches specific to SAP Concur have been identified. The platform is a common target for credential phishing impersonation campaigns.

Changelog

Date Version Maturity Changes Author
2025-02-05 0.1.0 draft Initial guide with SSO, RBAC, and expense policies Claude Code (Opus 4.5)

Contributing

Found an issue or want to improve this guide?