Table of contents
I. Basics of SAP Security
- Transaction codes, Programs , Tables(USR*,AGR*,USH*)
- Types of Roles(Derived ,Master , Single,Composite)
- Types of Users( Dialog, Service, Communication,Reference,System)
- Authorization object (10 fields)
- Organizational Levels( Plant,Company Code,Sales org etc etc) all available in the SAP System can be seen in agr_1252 table.
- Standard programs available to convert a field to custom org level field as per requirement
- SECATT Scripts available to mass perform Security activities.
- SU24( Tcode to auth object relationship)
- Table and Program Authorization groups
2. Basics of SAP GRC
- GRC Access Risk Analysis
- GRC Access Risk Management
- GRC Business Role Management
- GRC Emergency Access Management
(e)GRC Process Control
(f)GRC Risk Management
(g) GRC MSMP Workflows
(h) GRC Rule Sets
- (i) GRC BC Sets
(h) GRC SPRO Config Parameters
- SAP Implementation, Upgrade and SUPPORT Methodologies of SAP
- SAP Security Design Consideration
- SAP Security Process area requirements
- S/4 HANA Security strategy
- Testing Methodologies
- Internal/External audits
- SU25 usage in implementation and Upgrades
- Future Trends of SAP Security and GRC
- Cloud Security
- Cloud IAG