Vous êtes sur la page 1sur 4

SAP GRC10 & SECURITY (ECC, HANA, EP & BO)

GRC Introduction
Introduction to GRC
Components of GRC Suite
Features & Advantages
Introduction to NWBC
Post Installation Settings
Enabling GRC Applications
Activating ICF services
Activating BC Sets
Configuration settings
Create backend roles
Create connectors
Create connector groups
Maintain integration scenarios
Plugin configuration in backend systems
Connector settings in GRC system
Access Risk Analysis(ARA)
Introduction to ARA
ARA terminology
Risk Analysis
ARA configuration
ARA Options
Understanding Risk types
Mitigation controls
ARA Owners
Defining Rulesets
Background jobs
Alert generation
Creating Functions
Creating Risks
Updating ruleset
Regenerating risks
Using MSMP workflow
Emergency Access Management (EAM)
Introduction to EAM
Features & Benefits
Terminology
Overview
Parameters
FF types

Configuration
FF ID setup
Logging on using FF
Role based FF
De-centralized FF
MSMP Workflow
Pre configuration for MSMP
MSMP Workflow usage
MSMP Workflow usage
Business Role Management(BRM)
Introduction
Configuration
Defining various types of roles
Risk mitigation
Role mining options
Role status
Using MSMP workflow
Define Role methodology
Business Rule Framework+
Introduction to BRF
Using BRF Flat Rule
Configuration
Access Request Management(ARM)
Introduction
Types of Requests
Creating first request
End user personalization
Template management
UAR Review

SECTION 1 SAP Security Concepts


Introduction to SAP Security
User Master Record
Authorization Check
Select Authorization Concept
SECTION 2 SAP User Maintenance
User Types in SAP R/3
User Maintenance in SAP R/3

Login Profile Parameters


Roles and Authorizations in SAP
Parent and Derived Roles
Composite Roles
SECTION 3 SAP ECC Security
Organizational Levels in SAP
Authorization Groups
Security Tables
Critical Basis Authorizations
Custom Auth Objects
Default Users in SAP
SAP Delivered Checks
SAP Profile Reconciliation - PFUD
SAP ABAP Security
SECTION 4 SAP Security on HANA
Creating Users in HANA Studio
User Administration in SAP HANA
Role Concept
Authentication in SAP HANA
Authorization Methods in SAP HANA
Auditing in SAP HANA
SECTION 5 SAP Security Reporting
SAP User Information System
SECTION 6 Security Support and Troubleshooting - Tips and Tricks
Display Auth Data in SU53
ST01 Trace in Security
SECTION 7 SAP Upgrades
SU24 Maintain Check Indicators
Copy Check Indicators - SU25
SECTION 8 SAP AS JAVA Security(EP)
SAP AS JAVA Security
Portal Permissions
UME SAP User Management
UME SAP Roles Mangement
SAP UME Group Management

SECTION 9 SAP Business Objects Security(BO)


Central Management Console - CMC
Creating Users and Groups in CMC
Access Levels
SECTION 10 SAP Technical Know how to Manage SAP Security
Central User Administration - CUA
Maintain T-Code using SE93
SU10 - Mass User Maintenance in SAP R/3
SECTION 11 Conclusion
Conclusion

Vous aimerez peut-être aussi