Why SAP Audits Are More Dangerous Than They Appear
SAP licence audits are not straightforward compliance checks. SAP uses the audit process as a commercial mechanism — findings are rarely just financial settlements, they are frequently leveraged to accelerate S/4HANA migration commitments, expand licence scope, and introduce Digital Access licensing that significantly increases long-term cost. Enterprises that treat an SAP audit notification as a routine administrative process consistently emerge with worse commercial outcomes than those that respond as they would to a major legal or commercial dispute: with preparation, independent expertise, and a clear negotiation strategy.
The most dangerous component of SAP audits in 2025 and 2026 is indirect access. Indirect access refers to situations where users or external systems interact with SAP data without logging in directly — through third-party applications, web portals, IoT devices, or integration middleware. SAP's User Measurement tool (USMM) cannot reliably detect indirect access: a third-party application connecting through a single technical SAP account will be counted as one user by USMM, regardless of how many humans or automated processes sit behind that account. This creates a measurement gap between what USMM reports and what SAP's auditors will claim — and that gap is where the largest audit exposure resides.
The Four Components of an Effective SAP Audit Defence
1. Proactive Licence Position Assessment
The most important step in SAP audit defence is conducting an independent licence position assessment before SAP requests one. Using USMM and LAW (Licence Administration Workbench) to simulate what SAP's auditors will examine allows you to identify compliance gaps, address them on your own timeline, and arrive at any audit interaction from a position of knowledge rather than uncertainty. Organisations that have conducted independent assessments before an audit notification consistently achieve better outcomes than those responding to SAP's findings without prior preparation.
2. Indirect Access Mapping and Exposure Documentation
Every third-party system, integration layer, IoT device, or external application that touches your SAP landscape creates potential indirect access exposure. The defence framework begins with a comprehensive inventory: identifying each integration point, documenting the data exchanged, quantifying the number of end-users or automated processes behind each technical connection, and assessing whether existing licence types cover the use case. This inventory is not primarily for SAP — it is for your own negotiating team, enabling a factual counter-narrative to SAP's audit findings rather than accepting SAP's measurement at face value.
3. Digital Access Adoption Programme (DAAP) Evaluation
SAP's Digital Access Adoption Programme is a time-limited, once-per-customer opportunity to transition to Digital Access licensing under favourable commercial terms, including amnesty for past unlicensed indirect use and steep discounts on Digital Access document pricing. DAAP is not right for every organisation — it locks you into document-based pricing that can escalate significantly as your business scales — but for enterprises with material indirect access exposure and no realistic path to eliminating it, DAAP represents a genuine commercial opportunity. The decision requires independent analysis of your current indirect access profile, projected Digital Access document volumes, and the long-term cost comparison against staying on named user licensing.
4. Audit Response Protocol and Negotiation Strategy
When an SAP audit notification arrives, the response protocol in the first 30 days determines the trajectory of the entire engagement. Accepting SAP's measurement tools unchallenged, providing unrestricted system access, or engaging in settlement discussions before understanding your full exposure are the most common and most costly mistakes. An effective audit response protocol includes: engaging independent SAP licensing expertise before responding to SAP; establishing the scope and timeline of the audit in writing; conducting your own measurement in parallel with SAP's; and treating any settlement discussion as a commercial negotiation, not an administrative process.
Download the SAP Audit Defence Framework
Proactive assessment methodology, indirect access mapping, DAAP evaluation guide, audit response protocol, and negotiation checklist. Free. Download the Framework →What This Framework Covers
The SAP Audit Defence Framework provides independent, buyer-side guidance on: proactive SAP licence position assessment using USMM and LAW; indirect access identification and exposure quantification; Digital Access Adoption Programme evaluation criteria; audit response protocol and timeline management; SAP audit settlement negotiation strategy; S/4HANA migration pressure recognition and counter-strategy; and an SAP audit defence checklist for CIOs, General Counsel, and IT procurement teams. It is drawn from our advisory work across 500+ enterprise software engagements, including SAP audit defence mandates across multiple sectors and geographies.