SAP S/4HANA MigrationSAP Custom Code Analysis​

Know which SAP custom apps are still business-critical — before S/4HANA migration.

SAP Custom Code Analysis creates a transparent, usage-based view of Y/Z transactions, programs and custom objects — including who uses them, which roles grant access and where unused code or authorization risks should be removed before migration.

For SAP Security, SAP Basis, Internal Audit and Compliance teams.

Used vs. unused custom apps

Separate business-critical custom apps from rarely used and obsolete Y/Z objects.

Role-based usage evidence

Understand which users and roles actually execute each custom transaction or program.

S/4HANA migration focus

Decide which custom apps must move forward — and which should not enter the target landscape.

SoD and access risk view

Identify critical authorizations, rulebook deviations and possible SoD bypass paths in custom apps.

Custom code becomes migration risk when nobody knows what is still used.

Most SAP landscapes contain years of customer-specific Y/Z transactions, reports, function modules, classes and tables. Without reliable usage and access evidence, teams either migrate too much legacy code or remove applications that the business still depends on.

The product answer: one focused analysis that connects custom object inventory, real usage data, role assignment, authorization coverage, SoD exposure and cleanup recommendations.

Custom object inventory

Capture relevant Y/Z transactions, reports, tables, function modules, classes, domains, structures and search helps.

Usage-based decisions

Classify custom apps as used, rarely used or unused based on real usage monitoring.

Authorization fit

Check whether existing roles cover access properly — or create critical access and SoD conflicts.

Housekeeping candidates

Produce a defensible candidate list for retirement, deletion or business sign-off before S/4HANA.

One analysis view. Four migration decisions.

Designed to help teams decide what to keep, what to redesign, what to restrict and what to retire before the target authorization concept is built.

Three high-value scenarios.

Brownfield migration readiness

Identify which custom apps are truly required in the S/4HANA target system and prevent obsolete code from being migrated by default.

Authorization concept redesign

Use real usage and role evidence to transfer only justified custom-app access into the future authorization model.

Custom code housekeeping

Reduce technical debt and security exposure by creating a reviewed list of unused, rarely used and obsolete Y/Z applications.

From Y/Z inventory to migration-ready decisions.

A structured workflow that connects SAP Security, Basis, Internal Audit and migration stakeholders around usage facts — not assumptions.

01. Inventory

Capture relevant Y/Z custom objects and applications.

02. Analyze usage

Evaluate real execution data by users and roles.

03. Assess risk

Identify critical permissions, rule deviations and SoD bypasses.

04. Recommend

Deliver keep, restrict, redesign or retire recommendations.

Frequently asked questions.

No. The page focuses on business usage, role coverage, access risk and migration decisions for SAP custom apps and Y/Z objects — not only syntax or remediation of code findings.
The analysis can cover Y/Z transactions, reports, tables, function modules, classes, domains, structures and search helps, depending on the agreed scope.
A management-ready package with custom app overview, usage by users and roles, risk assessment, housekeeping candidates and recommendations for the S/4HANA authorization concept.

Ready to clean up SAP custom apps before S/4HANA?

Request a demo and see how SAP Custom Code Analysis turns Y/Z objects, usage data and role evidence into a defensible migration and access decision base.