SAP Concur Hardening Guide
Travel and expense management platform hardening for SAP Concur including SAML SSO, expense policies, and audit controls
Overview
SAP Concur is a leading travel, expense, and invoice management platform serving millions of users worldwide. As a platform handling financial transactions and travel data, Concur security configurations directly impact expense integrity and compliance.
Intended Audience
- Security engineers managing expense systems
- IT administrators configuring Concur
- Finance administrators managing travel and expense
- GRC professionals assessing financial platform security
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers SAP Concur security including SAML SSO, expense policies, approval workflows, and audit controls.
Table of Contents
- Authentication & SSO
- Access Controls
- Expense Policies
- Monitoring & Compliance
- Compliance Quick Reference
1. Authentication & SSO
1.1 Configure SAML Single Sign-On
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 12.5 |
| NIST 800-53 | IA-2, IA-8 |
Description
Configure SAML SSO to centralize authentication for Concur users.
Prerequisites
- SAP Concur admin access
- SAP Cloud Identity Services or external IdP
- SAML 2.0 configuration details
ClickOps Implementation
Step 1: Access SSO Configuration
- Navigate to: Administration → Company → Authentication Admin
- Select SSO configuration
Step 2: Configure Identity Provider
- Upload IdP metadata
- Configure Entity ID
- Configure SSO URL
- Upload IdP certificate
Step 3: Configure Attribute Mapping
- Map SAML attributes to Concur fields
- Configure user identifier
- Configure company assignment
Step 4: Test and Enable
- Test SSO authentication
- Verify user provisioning
- Enable for all users
Time to Complete: ~2 hours
1.2 Enforce Multi-Factor Authentication
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(1) |
Description
Require MFA for all Concur users.
ClickOps Implementation
Step 1: Configure via IdP
- Enable MFA in identity provider
- All SSO users subject to IdP MFA
- Use phishing-resistant methods for approvers
Step 2: Mobile Device Security
- Configure SAP Concur mobile app security
- Require device PIN/biometric
- Enable remote wipe capability
1.3 Configure Session Security
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.2 |
| NIST 800-53 | AC-12 |
Description
Configure session timeout settings.
ClickOps Implementation
Step 1: Configure Timeout
- Navigate to: Administration → Company → Company Admin
- Configure session timeout
- Balance security with usability
2. Access Controls
2.1 Configure Role-Based Access Control
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Implement least privilege using Concur’s role model.
ClickOps Implementation
Step 1: Review Roles
- Navigate to: Administration → Company → Company Admin
- Review roles:
- Employee
- Expense Approver
- Invoice Approver
- Administrator
- Understand role capabilities
Step 2: Assign Minimum Necessary Access
- Apply least-privilege principle
- Separate employee and approver roles
- Limit admin access
2.2 Limit Admin Access
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Minimize and protect administrator accounts.
ClickOps Implementation
Step 1: Inventory Admin Users
- Review admin accounts
- Document admin privileges
- Identify unnecessary access
Step 2: Apply Restrictions
- Limit admin to 2-3 users
- Require MFA for admins
- Monitor admin activity
2.3 Configure Delegate Access
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Control delegate access for expense management.
ClickOps Implementation
Step 1: Configure Delegate Policies
- Define who can have delegates
- Limit delegate permissions
- Require approval for delegate setup
Step 2: Monitor Delegate Usage
- Audit delegate actions
- Review delegate assignments
- Regular access reviews
3. Expense Policies
3.1 Configure Expense Policy Rules
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-5 |
Description
Configure expense policies for compliance.
ClickOps Implementation
Step 1: Define Expense Types
- Configure expense categories
- Set spending limits
- Define receipt requirements
Step 2: Configure Policy Rules
- Set per diem rates
- Configure mileage rates
- Define approval thresholds
Step 3: Enable Policy Enforcement
- Configure policy violations
- Set up notifications
- Enable automated checks
3.2 Configure Approval Workflows
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-5 |
Description
Configure expense approval workflows.
ClickOps Implementation
Step 1: Configure Approval Chains
- Define approval hierarchy
- Configure approval limits
- Set escalation rules
Step 2: Enforce Separation of Duties
- Submitters cannot approve own expenses
- Configure multi-level approval
- Enable audit trail
3.3 Configure Receipt Requirements
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Require receipts for expense documentation.
ClickOps Implementation
Step 1: Configure Receipt Policies
- Set receipt threshold
- Define required receipt types
- Configure itemization requirements
Step 2: Enable Receipt Verification
- Enable receipt imaging
- Configure OCR validation
- Flag missing receipts
4. Monitoring & Compliance
4.1 Configure Audit Logging
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Enable and monitor audit logs.
ClickOps Implementation
Step 1: Enable Auditing
- Configure audit trail
- Set retention period
- Enable monitoring
Step 2: Monitor Events
- Expense submissions
- Approval actions
- Policy violations
- Admin changes
4.2 Configure Expense Reports
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 8.11 |
| NIST 800-53 | AU-6 |
Description
Configure compliance reports.
ClickOps Implementation
Step 1: Configure Reports
- Enable policy violation reports
- Configure spend analytics
- Set up audit reports
Step 2: Schedule Reviews
- Weekly policy violation review
- Monthly spend analysis
- Quarterly audits
5. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | Concur Control | Guide Section |
|---|---|---|
| CC6.1 | SSO/MFA | 1.1 |
| CC6.2 | RBAC | 2.1 |
| CC6.3 | Approval workflows | 3.2 |
| CC7.2 | Audit logging | 4.1 |
NIST 800-53 Rev 5 Mapping
| Control | Concur Control | Guide Section |
|---|---|---|
| IA-2 | SSO | 1.1 |
| IA-2(1) | MFA | 1.2 |
| AC-5 | Separation of duties | 3.2 |
| AC-6 | RBAC | 2.1 |
| AU-2 | Audit logging | 4.1 |
Appendix A: References
Official SAP Concur Documentation:
API Documentation:
Compliance Frameworks:
- SOC 2 Type II (semi-annual audits since 2017; Security, Availability, Confidentiality, Privacy), SOC 1, ISO 27001 (certified since 2004 as BS 7799) — via SAP Trust Center Compliance Finder
Security Incidents:
- 2020 — SAP cloud product security standards gap. SAP disclosed that some cloud products, including SAP Concur, did not meet certain contractually agreed IT security standards. Approximately 40,000 customers were potentially impacted. No customer data was believed compromised, and remediation patches were applied in Q2 2020.
- No major public data breaches specific to SAP Concur have been identified. The platform is a common target for credential phishing impersonation campaigns.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with SSO, RBAC, and expense policies | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide