GRC 12.0 PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

SAP GRC AC 12.0 duration – 1.

5 months
Introduction to Governance, Risk and Compliance 12.0

Installation of Business Objects enterprise GRC AC 12.0

Introduction to Components of Access Control

a. Access Risk Management (ARA)

b. Access Request Management (ARM)

c. Business Role Management (BRM)

d. Emergency Access Management (EAM)

Basic configurations (post installation steps)

a. Basic configuration
b. Create connector
c. Create connector group
d. Configuration settings
e. Configuration parameters
f. Action type configurations

Synchronization of jobs meaning and purpose

a. Authorization sync
b. Repository object sync
c. Action uses sync
d. Role uses sync
e. FFID log sync
f. FFID Master data sync

Sub-module specific configurations:

Access Risk management

a. Configuration of Access Risk Management


b. Global SOD Matrix – Risk Rules
c. Critical action (Transaction code) rule
d. Critical permission rule
e. Critical role/Profile rule definition
f. SOD Review
g. User level risk analysis
h. Role level risk analysis
i. Profile level risk analysis
j. Mitigation Process
k. Remediation Process
l. Customization of Access Risk Management reports
m. Monthly Reports
n. Weekly Reports
o. Review the Risk Analysis Reports
p. Business Process Owners / SOX Controllers /SOX Audits
q. Global ruleset copy to custom ruleset
r. bulk change in ruleset
s. transport of ruleset
t. delete ruleset

Access Request Management

a. Define the Workflows for Access Request

b. Define the Agents / Process /Rule ID’s

c. Standard Configuration / MSMP Workflows

d. Customization of Access Request Management

e. Business Process / Sub-Process /Functional Area / Roles /Role Owners

f. BRF+ and MSMP configuration with standard and customized workflow

g. Define the Workflows for Access Request

e. Define the Agents / Process /Rule ID’s tion / MSMP Workflows

f. Customization of Access Request Management Process /Functional Area / Roles /Role


Owners

g. Provisioning settings

h. activation of workflow

i. user personalization

Business Role Management

g. Define role naming conventions


h. Define different Methodology for different types of role
i. Define the Workflow for Role Maintenance
j. Business Process / Sub-Process /Functional Area / Roles /Role Owners
k. Single role creation
l. Composite role creation
m. Master – derived role creation using GRC - BRM
n. Customization of Business Role Management
o. Workflow for role methodology
p. Concept of business role
q. Creation of business role
r. Role upload

Emergency Access Management

Emergency access concept and prerequisite for FFID configuration

1. Centralized FFID and how to configure it

a. Configuration of Emergency Access Management

b. Define the FF ID, FF Owner, FF Controller

c. Define the Workflow for Super User Access

d. Configure Log Reports

e. FFID reports

2. Decentralized approach and how to configure it

a. Configuration of Emergency Access Management

b. Define the FF ID, FF Owner, FF Controller

c. Define the Workflow for Super User Access

d. Configure Log Reports

e. FFID reports

You might also like