Académique Documents
Professionnel Documents
Culture Documents
GRC Introduction
Introduction to GRC
Components of GRC Suite
Features & Advantages
Introduction to NWBC
Post Installation Settings
Enabling GRC Applications
Activating ICF services
Activating BC Sets
Configuration settings
Create backend roles
Create connectors
Create connector groups
Maintain integration scenarios
Plugin configuration in backend systems
Connector settings in GRC system
Access Risk Analysis(ARA)
Introduction to ARA
ARA terminology
Risk Analysis
ARA configuration
ARA Options
Understanding Risk types
Mitigation controls
ARA Owners
Defining Rulesets
Background jobs
Alert generation
Creating Functions
Creating Risks
Updating ruleset
Regenerating risks
Using MSMP workflow
Emergency Access Management (EAM)
Introduction to EAM
Features & Benefits
Terminology
Overview
Parameters
FF types
Configuration
FF ID setup
Logging on using FF
Role based FF
De-centralized FF
MSMP Workflow
Pre configuration for MSMP
MSMP Workflow usage
MSMP Workflow usage
Business Role Management(BRM)
Introduction
Configuration
Defining various types of roles
Risk mitigation
Role mining options
Role status
Using MSMP workflow
Define Role methodology
Business Rule Framework+
Introduction to BRF
Using BRF Flat Rule
Configuration
Access Request Management(ARM)
Introduction
Types of Requests
Creating first request
End user personalization
Template management
UAR Review