SAP BusinessObjects Access Control 5.3 - Implementation and Configuration

GRC300 5 days

Classroom

SAP BusinessObjects Access Control 5.3 - Implementation and Configuration

Delivery:
Classroom
Country:
Display Language:
Portuguese
Rating:
Insufficient data for accurate rating at this time.

Goals

  • Explain how SAP GRC Access Control (Risk Analysis and Remediation, Superuser Privilege Management, Compliant User Provisioning and Enterprise Role Management) works in combination with SAP business processes
  • Show how to implement SAP GRC Access Control following the best practices from SAP
  • Demonstrate the functionalities and usage of the different components within SAP GRC Access Control
  • Discuss how to use the SoD Management process as standard approach for implementing SAP GRC Access Control in a sustainable manner
  • Configure and use workflow-based SoD and User Access Reviews to ensure a continuous assessment of the risk situation by the business process owners
  • Discuss how the use of Enterprise Role Management will help to maintain a clean SoD environment with respect to your organization’s roles
  • Identify the integration points across the whole SAP GRC Access Control Suite

Audience

  • Key Technical Business User involved in an Access Control project
  • IT Governance Experts
  • Consultants for SAP Security and GRC IT Auditors

Prerequisites

Essential

  • GRC030 SAP GRC Access Control 5.3 – Overview
  • Knowledge of integrated processes in an SAP System.
  • Knowledge of authorization concept of an SAP System.

Course based on software release

  • SAP GRC Access Control 5.3
  • SAP ERP Central Control 6.0

Content

  • Overview of SAP GRC Access Control
  • SAP GRC Access Control Authorizations
  • Risk Analysis and Remediation
    • Overview
    • Verification of Installation
    • Introduction to the SoD Risk Management Process
    • Rule Building and Validation
    • Risk Analysis
    • Risk Remediation
    • Mitigation
    • Continuous Compliance
  • Compliant User Provisioning
    • Overview
    • Verification of Installation
    • Compliant User Provisioning Functionality
    • Workflow-based Reviews
    • Compliant User Management Lifecycle
  • Superuser Privilege Management
    • Overview
    • Verification of Installation
    • Superuser Privilege Management functionality and uses
  • Enterprise Role Management
    • Overview
    • Verification of Installation
    • Configuration Review
    • Workflow Steps
  • Access Control Integration
    • Integration between all Access Control Products
    • Compliance Reporting

Popular tags

No tags submitted for this course yet

Share this course: Print