SAP GRC 12.0 AC

SAP GRC 12.0 AC

Overview

Duration: 1.5 Months

Introduction to Governance, Risk and Compliance 12.0 

Installation of Business Objects enterprise GRC AC 12.0

Introduction to Components of Access Control

  1. Access Risk Management (ARA)
  2. Access Request Management (ARM)
  3. Business Role Management (BRM) 
  4. Emergency Access Management (EAM)

Lessons

  1. Basic configurations (post installation steps)

    1. Basic configuration
    2. Create connector
    3. Create connector group
    4. Configuration settings
    5. Configuration parameters
    6. Action type configurations

    Synchronization of jobs meaning and purpose

    1. Authorization sync
    2. Repository object sync
    3. Action uses sync
    4. Role uses sync
    5. FFID log sync
    6. FFID Master data sync 

     

    Sub-module specific configurations:

    Access Risk management 

    1. Configuration of Access Risk Management 
    2. Global SOD Matrix – Risk Rules
    3. Critical action (Transaction code) rule
    4. Critical permission rule
    5. Critical role/Profile rule definition
    6. SOD Review
    7. User level risk analysis
    8. Role level risk analysis
    9. Profile level risk analysis
    10. Mitigation Process
    11. Remediation Process 
    12. Customization of Access Risk Management  reports
    13. Monthly Reports 
    14. Weekly Reports
    15. Review the Risk Analysis Reports 
    16. Business Process Owners / SOX Controllers /SOX Audits
    17. Global ruleset copy to custom ruleset
    18. bulk change in ruleset
    19. transport of ruleset
    20. delete ruleset

    Access Request Management

    1. Define the Workflows for Access Request 
    2. Define the Agents / Process /Rule ID’s 
    3. Standard Configuration / MSMP Workflows 
    4. Customization of Access Request Management 
    5. Business Process / Sub-Process /Functional Area / Roles /Role Owners 
    6. BRF+ and MSMP configuration with standard and customized workflow
    7. Define the Workflows for Access Request 
    8. Define the Agents / Process /Rule ID’s tion / MSMP Workflows 
    9. Customization of Access Request Management Process /Functional Area / Roles /Role Owners
    10. Provisioning settings
    11. activation of workflow 
    12. user personalization 

     

    Business Role Management 

    1. Define role naming conventions
    2. Define different Methodology for different types of role
    3. Define the Workflow for Role Maintenance 
    4. Business Process / Sub-Process /Functional Area / Roles /Role Owners 
    5. Single role creation
    6. Composite role creation
    7. Master – derived role creation using GRC – BRM
    8. Customization of Business Role Management 
    9. Workflow for role methodology
    10. Concept of business role 
    11. Creation of business role 
    12. Role upload
    13. Reports for BRM

     

    Emergency Access Management 

    Emergency access concept and prerequisite for FFID configuration

    1. Centralized FFID and how to configure it
      • Configuration of Emergency Access Management 
      • Define the FF ID, FF Owner, FF Controller 
      • Define the Workflow for Super User Access
      • Configure Log Reports 
      • FFID reports
    2. Decentralized approach and how to configure it
      • Configuration of Emergency Access Management 
      • Define the FF ID, FF Owner, FF Controller 
      • Define the Workflow for Super User Access
      • Configure Log Reports 
      • FFID reports

Teachers

Picture of Vikas Sir

Vikas Sir

Sr. SAP Security Architect

About Course

5/5

(47 Reviews)

SAP GRC 12.0 AC tutorials provide you everything to learn about SAP GRC 12.0 AC implementation and end-user level process and  step by step with various screenshots.

Query

Fill the form given below.