The comprehensive measurement framework building your audit case
SAP doesn't measure your licensing exposure with a single tool. Instead, it deploys three coordinated measurement frameworks—USMM, LAW, and STAR—that work together to build a comprehensive, layered case for license expansion.
Understanding how each tool works independently, and critically, how they collaborate to create an airtight licensing audit case, is essential for effective defense. This comparison breaks down each framework's function, where they overlap, and how to challenge findings across all three.
The Three-Tool Measurement Framework
SAP's audit teams deploy USMM, LAW, and STAR in a coordinated sequence:
- STAR — Detects all access pathways (direct, indirect, API, database queries)
- USMM — Measures usage frequency and user activity against access detection
- LAW — Provides historical trending to show patterns and prove sustained non-compliance
Each layer serves a specific purpose in the audit narrative. STAR says "you have indirect access." USMM says "here's how much it's being used." LAW says "and you've been using it this way for months."
📬 SAP Licensing Intelligence
Get Independent SAP Licensing Insights
Expert analysis on SAP audits, contracts, and cost reduction — direct to your inbox. Corporate email required.
Detailed Comparison: USMM vs LAW vs STAR
| Dimension | STAR (System Tracking & Reporting) | USMM (Universal SAP Metric Monitoring) | LAW (License Analytics Workbench) |
|---|---|---|---|
| Primary Function | Detects all system access pathways (direct, indirect, API, RFC, database) | Measures usage frequency and Named User activity | Provides historical trending and capacity analysis |
| Data Source | System logs, integration points, database queries | User login records, transaction logs, module usage | USMM data aggregated over time (30-90+ days) |
| Measurement Basis | Access event detection (binary: access exists or not) | User activity per named user, pool license utilization | Peak usage periods, baseline vs. spike analysis |
| Time Scope | Point-in-time snapshot (audit week/month) | Recent period (30-90 days before audit) | Extended period (6-12 months trending) |
| Key Audit Use | Identifies licensing exposures and indirect access | Quantifies usage against assigned licenses | Proves sustained pattern of non-compliance |
| Primary Weakness | No volume/frequency distinction; counts all access equally | Assumes all login = full license consumption (doesn't account for pooling) | Historical data may not reflect current optimizations or contractual changes |
STAR: Detection and Access Identification
STAR's role is pure detection. It answers: "What systems and access paths exist?"
STAR's Function in Audits
- Identifies indirect access routes (which external systems touch SAP)
- Maps integration points (APIs, RFCs, database connections)
- Detects Named User transactions and module usage
- Provides raw access event counts (volume of API calls, database queries, etc.)
For deep technical breakdown of STAR's methodology, see: SAP STAR Tool: How It Measures Indirect Access.
STAR's Audit Weakness: No Context
STAR reports access without context. It will say "API calls to SAP: 847,000 per month." But it won't say whether those calls are:
- Real-time operational integrations (critical to business)
- Nightly batch exports (non-critical reporting)
- Read-only data queries (minimal licensing impact)
- Duplicate accesses (architecture redundancy)
This is where you challenge STAR findings. Convert STAR's access counts into business impact metrics.
USMM: Usage Frequency and Quantification
USMM answers: "How much is being used, and by whom?"
USMM's Measurement Approach
- Named User Tracking — Records every login, what modules each user accessed, frequency
- Module-Level Consumption — Quantifies usage by module (how many SD users, FI users, etc.)
- Pool License Analysis — Measures concurrent vs. total user activity for pool licenses
- Peak Period Identification — Identifies usage spikes and baseline consumption periods
USMM's Audit Presentation
USMM gives SAP auditors quantitative ammunition. Example findings:
- "USMM shows 450 active Named Users over the past 90 days. Your license agreement covers 300 Named Users. You are under-licensed by 150 users."
- "Peak concurrent usage of the Sales & Distribution module is 85 named users. Your module license covers 60. Exposure: 25 additional licenses required."
- "Pool license for finance users shows peak utilization of 42 concurrent users from a pool of 35. Non-compliance confirmed."
USMM's Audit Weakness: Assumption of Full Consumption
USMM assumes every login consumes a full Named User license. This ignores:
- Contractual pooling provisions (4-to-1 or 5-to-1 user pools)
- Seasonal usage patterns (some users inactive certain times of year)
- Role-based access (some users may have transactional access only, not Named User licenses)
- Business process changes (you may have optimized processes to reduce concurrent users)
This is where you counter USMM. Your contract may permit exactly the usage pattern USMM flags as non-compliant.
LAW: Historical Trending and Proof of Pattern
LAW answers: "Is this a one-time spike or a sustained pattern of non-compliance?"
LAW's Role in Audits
- Historical Aggregation — Combines USMM data over 6-12 months
- Trend Analysis — Shows whether usage is increasing, stable, or variable
- Capacity Planning — Recommends license levels based on historical peak periods
- Proof of Knowledge — Demonstrates you should have known about the non-compliance (if patterns existed before)
LAW's Audit Weapon: "You Should Have Known"
LAW is SAP's most dangerous tool because it creates accountability. If LAW shows that your enterprise exceeded licensed Named User levels consistently for the past 8 months, SAP auditors will argue:
"The data proves sustained non-compliance. You should have detected this in your own monitoring and remediated it. Instead, you allowed the non-compliance to persist. This justifies back-licensing charges for the entire 8-month period."
LAW's Weakness: Business Justifications Not Captured
LAW shows data trends but not the business drivers behind those trends. Example:
- LAW shows User X was active for 4 months (April-July), then inactive for 8 months (Aug-March)
- LAW categorizes this as "sustained non-compliance during 4-month period"
- Reality: User X was a temporary contractor hired for a project
- Your contract may allow temporary contractor accounts without permanent Named User licensing
You combat LAW by overlaying business justifications onto the data trends.
How the Three Tools Work Together in Audits
The audit sequence using all three tools looks like:
Coordinated Audit Attack
- Step 1: STAR Exposure Mapping — "STAR detected 12 indirect access routes through your data warehouse, BI tool, and middleware system. These are all potential licensing exposures."
- Step 2: USMM Quantification — "USMM shows these 12 integrations are used by 450 concurrent users, resulting in 847,000 monthly API calls. Your contract covers 300 users. Under-licensed by 150 users minimum."
- Step 3: LAW Sustained Pattern — "LAW shows this usage pattern has been consistent for the past 9 months. You should have detected and remediated this. We recommend back-licensing retroactively plus forward licenses going forward."
- Step 4: Solution Manager Compliance Flagging — "Solution Manager compliance reports have been flagging this indirect access non-compliance for 6 months. This proves notice."
- Result — Auditors demand licensing expansion + back-licensing charges + potential penalties
Strategic Defense Across All Three Tools
Effective audit defense requires challenging all three measurement tools simultaneously:
Challenge 1: Attack STAR's Classification
"Yes, STAR detected these access pathways. But STAR doesn't distinguish between mission-critical operational integrations and optional reporting feeds. Request that SAP reclassify each integration by business necessity, not just technical access."
Challenge 2: Attack USMM's Consumption Assumption
"Yes, USMM shows 450 active users. But your contract permits Named User pooling at 4-to-1 ratio. This means 450 users can be serviced by 112.5 Named User licenses, not 450. You are fully compliant."
Challenge 3: Attack LAW's Sustained Pattern Narrative
"Yes, LAW shows 9 months of usage. But this period includes seasonal variation. During fiscal close (Oct-Nov), user activity spikes for 4 weeks, then returns to baseline. Peak licensing requirements don't justify year-round licensing increases."
Challenge 4: Request Independent Validation
"We dispute STAR, USMM, and LAW's findings. We've conducted independent analysis of our licensing position using [alternative measurement framework]. We're prepared to present this analysis to demonstrate compliance."
Integration with Solution Manager and for Me
The three measurement tools don't function in isolation. They integrate with:
- Solution Manager — Consolidates STAR, USMM, LAW findings into compliance reports
- SAP for Me — Provides the baseline system configuration that seeds all three measurement frameworks
This creates a complete audit ecosystem. See our deep-dives for more context:
Which Tool Gives You the Most Leverage?
Different measurement tools offer different defense opportunities:
STAR Vulnerability
Challenge classification methodology and lack of business context. STAR's access counts don't equal licensing exposure.
USMM Vulnerability
Challenge consumption assumptions. Your contract may permit pooling, temporary licensing, or role-based access that USMM doesn't account for.
LAW Vulnerability
Challenge the narrative of sustained non-compliance. Business justifications, seasonal patterns, or process changes may explain the trend LAW identifies.
The Bottom Line: Three Tools, One Narrative
SAP's three measurement tools tell a coordinated story designed to maximize licensing expansion. STAR says you have exposure. USMM quantifies it. LAW proves it's sustained. Together, they create an airtight audit case.
Your defense must be equally comprehensive, challenging all three tools' assumptions, methodologies, and business interpretations. This isn't a battle you fight with a single counter-argument. It's a forensic defense that requires understanding how each tool works, where they overlap, and where they create audit leverage for you.
For the complete strategic framework for defending SAP audits using all available tools, see our comprehensive SAP STAR Measurement Deep Dive.
Independent SAP Licensing Advisory
Audit defence, contract negotiation, licence optimisation — all buyer-side, no SAP affiliation.
Explore All Services → Case StudiesReal Results for Enterprise Buyers
See how we've helped enterprises reduce SAP spend by 30-60% and win audit disputes.
Read Case Studies →