Status

  In Progress

OwnerTHAGARAJ-ext, Samuel Samuel thangaraj
Stakeholders

Purpose

The purpose of this document is to define the conversion approach to create in S/4 HANA.

In SAP S/4HANA, Supplier Risk is part of Supplier Lifecycle and Performance Management (SLPM) and plays a crucial role in evaluating, monitoring, and mitigating potential risks associated with suppliers.

Here’s a detailed overview of what “Supplier Risk” covers, especially in the context of Supplier Segmentation or Qualification and what you should include in your conversion or data integration specification.


1. Risk Categories


Risk TypeDescription
Operational RiskDisruptions in supplier operations, delivery, or production
Financial RiskSupplier’s credit rating, bankruptcy risk, financial instability
Compliance RiskViolations of laws, regulations, or standards (e.g., labor laws, corruption)
Geopolitical RiskCountry instability, sanctions, tariffs
Environmental/Sustainability RiskSupplier’s environmental impact, carbon footprint
Cybersecurity RiskRisk of data breaches or poor digital security practices
Reputational RiskNegative publicity, brand damage
Supply Chain RiskConcentration of supply, lack of alternatives


Conversion Scope

The scope of this document covers the approach for converting active from Legacy Source Systems into S/4HANA following the Master Data Design Standard.


The data from legacy system includes:

  1. ECC PF2
  2. ECCWP2

The data from legacy system excludes:


List of source systems and approximate number of records
SourceScope

Source Approx No. of Records

Target SystemTarget Approx

No. of Records

SAP ECC PF2( As Is)

SAP ECC Production (to be)
SAP ECC WP2 (As Is)

SAP ECC Production(to be)
Convergence(As Is)

Convergence Production(to be)





Additional Information

Multi-language Requirement

Document Management

Legal Requirement

Special Requirements




Target Design

The technical design of the target for this conversion approach.

TableFieldData ElementField DescriptionData TypeLengthRequirement
BUT000, LFA1, LFM1, LFB1
BUT000, LFA1, LFM1, LFB1Supplier IDBP_ID (Business Partner)Unique ID of supplier in SAP


/SRMSMC/RISK_ASSESS, /SRMSMC/RISK_CATEGORY

/SRMSMC/EVAL_RESULT, /SRMSMC/SUP_EVAL

Risk CategoryRISK_CATEGORY_IDFinancial, Operational


/SRMSMC/RISK_ASSESS, /SRMSMC/RISK_CATEGORY

/SRMSMC/EVAL_RESULT, /SRMSMC/SUP_EVAL

Risk ScoreRISK_SCORETypically 0–100 or A/B/C



ReviewerREVIEWER_IDUser or role that entered the risk data

/SRMSMC/RISK_ASSESS, /SRMSMC/RISK_CATEGORY

/SRMSMC/EVAL_RESULT, /SRMSMC/SUP_EVAL

Risk DescriptionRISK_DESCRIPTIONText explanation or reference

/SRMSMC/RISK_ASSESS, /SRMSMC/RISK_CATEGORY

/SRMSMC/EVAL_RESULT, /SRMSMC/SUP_EVAL

Risk SourceRISK_SOURCEManual, Ariba, External, Internal audit

/SRMSMC/RISK_ASSESS, /SRMSMC/RISK_CATEGORY

/SRMSMC/EVAL_RESULT, /SRMSMC/SUP_EVAL

Valid From / ToVALID_FROM, VALID_TODate fields

/SRMSMC/RISK_ASSESS, /SRMSMC/RISK_CATEGORY

/SRMSMC/EVAL_RESULT, /SRMSMC/SUP_EVAL

Mitigation PlanMITIGATION_PLANOptional; what actions are in place
/SRMSMC/EVAL_RESULT, /SRMSMC/SUP_EVALLast Reviewed DateREVIEW_DATEWhen was this risk last evaluated?

Data Cleansing

IDCriticalityError Message/Report DescriptionRuleOutputSource System


























Conversion Process

The high-level process is represented by the diagram below:


Data Privacy and Sensitivity


Extraction

Extract data from a source into . There are 2 possibilities:

  1. The data exists. connects to the source and loads the data into . There are 3 methods:
    1. Perform full data extraction from relevant tables in the source system(s).
    2. Perform extraction through the application layer.
    3. Only if ; cannot connect to the source, data is loaded to the repository from the provided source system extract/report.
  2. The data does not exist (or cannot be converted from its current state). The data is manually collected by the business directly in . This is to be conducted using DCT (Data Collection Template) in

The agreed Relevancy criteria is applied to the extracted records to identify the records that are applicable for the Target loads

Extraction Run Sheet

Req #Requirement DescriptionTeam Responsible













Selection Screen

Selection Ref ScreenParameter NameSelection TypeRequirementValue to be entered/set





















Data Collection Template (DCT)

Target Ready Data Collection Template will be created for data with exception of some fields which require transformation as mentioned in the transformation rule.

DCT Rules

Field NameField DescriptionRule












Extraction Dependencies

Item #Step DescriptionTeam Responsible













Transformation

The Target fields are mapped to the applicable Legacy field that will be its source, this is a 3-way activity involving the Business, Functional team and Data team. This identifies the transformation activity required to allow to make the data Target ready:

  1. Perform value mapping and data transformation rules.
    1. Legacy values are mapped to the to-be values (this could include a default value)
    2. Values are transformed according to the rules defined in
  2. Prepare target-ready data in the structure and format that is required for loading via prescribed Load Tool. This step also produces the load data ready for business to perform Pre-load Data Validation

Transformation Run Sheet

Item #Step DescriptionTeam Responsible













Transformation Rules

Rule #Source systemSource TableSource FieldSource DescriptionTarget SystemTarget TableTarget FieldTarget DescriptionTransformation Logic









































Transformation Mapping

Mapping Table NameMapping Table Description








Transformation Dependencies

List the steps that need to occur before transformation can commence
Item #Step DescriptionTeam Responsible













Pre-Load Validation

Project Team

Completeness

TaskAction





Accuracy

TaskAction





Business

Completeness

TaskAction





Accuracy

TaskAction





Load

The load process includes:

  1. Execute the automated data load into target system using load tool or product the load file if the load must be done manually
  2. Once the data is loaded to the target system, it will be extracted and prepared for Post Load Data Validation

Load Run Sheet

Item #Step DescriptionTeam Responsible













Load Phase and Dependencies

Configuration

Item #Configuration Item






Conversion Objects

Object #Preceding Object Conversion Approach

list the exact title of the conversion object of only the immediate predecessor – this will then confirm the DDD (Data Dependency Diagram)




Error Handling

Error TypeError DescriptionAction Taken










Post-Load Validation

Project Team

Completeness

TaskAction





Accuracy

TaskAction





Business

Completeness

TaskAction





Accuracy

TaskAction





Key Assumptions

  • Master Data Standard is up to date as on the date of documenting this conversion approach and data load.
  • is in scope based on data design and any exception requested by business.


See also

Change log

Version Published Changed By Comment
CURRENT (v. 3) Sept 04, 2025 14:08 THAGARAJ-ext, Samuel
v. 2 Sept 04, 2025 13:28 THAGARAJ-ext, Samuel
v. 1 Jul 22, 2025 09:40 THAGARAJ-ext, Samuel