SAP SECURITY
User Administration
Role Administration
ASAP Methodology
Role Design
Security Audit Log
Diff btw SU22 & SU24
SU25 Upgrade Steps
Role delete/upload/download
Role mass transport
Mass User Creation
Types of Roles - Single/Composite/Master/Derived/Enabler
Transport Management
Audit Reports
Troubleshooting ST01/STAUTHTRACE
Realtime Project
SAP GRC
GRC10 COURSE CONTENTS
Overview of SOX
Overview of SOD
Introduction to GRC 10.1
Difference between GRC 5.3 and GRC 10.1
Overview of different applications in GRC 10.1
Introduction to different components of GRC AC
Installation of GRC 10.1
Prerequisites of GRC 10.1 installation
Post Installation activities of GRC 10.1
Configuration settings of GRC 10.1
Access Control 10.1 Architecture
GRC 10.1 security and authorizations
Object level security
Authorization requirements
Access Control delivered role
Shared configuration settings
Configure the Integration framework
Configure shared access control settings
Identify Business Configuration (BC) sets
Synchronizing with the Access Control
Repository
Access Risk Analysis (ARA)
Creating Rule set,
Creating Business Processes
Creating Functions
Creating SOD Risks
Creating Critical Role, Profile, Action and Permission
Risk analysis at user level
Risk analysis at role level
Risk analysis at profile level
Mitigation process
Creating MIT Control Approvers and Monitors
Creating Control Id
Assigning Control Id to Users
Assigning Control Id to Roles
Assigning Control Id to Profiles
Remediation process
Simulation at user level, role level and profile level
Emergency Access Management (EAM)
Managing emergency access
Planning emergency access
Configuration of EAM component and parameters
Centralized Emergency Access Management
Decentralized Emergency Access Management
Types of EAM users
Creating Firefighter, Firefighter ID, Firefighter Controller and Firefighter Owner
Maintaining reason codes
Assigning firefighter controller and owner to FFID
Assigning FFID to FF
Performing Additional Access activities in backend (Business) system by FFID Synchronization of FF logs
Checking FF logs
Assigning emergency access through Decentralize EAM
usiness Role Management (BRM)
Configuring Business Role Management
Business Role Methodology
Implement Condition Groups in Role Management
Business role definition- Technical role definition
Maintaining role owners/approvers
Creating roles by BRM component
Assigning role owner to role
Role Mass Maintenance
Role Mass Import
Role Mass Update
Role Comparison
Role Mining
Access Request Management (ARM)
Provisioning configurations
End User Personalization (EUP)
Configuring Approvers and Managers
Creating access request
Types of access request
Creating Template based request
Creating Model User
Admin Delegation
Creating Emergency Access Request
Responding to access request by the Approver
MSMP Workflow and Business Rule Framework
MSMP Workflow Introduction
Configuration of MSMP
Perform Automatic Workflow Customizing
Configuring Access Control Process ID's
The concept of BRF+ Application
Initiator rule
Agent rule
Routing rule
Notification and Variable Rule
Mapping BRF+ rule to standard process id
Background jobs in GRC AC
Realtime Project