GRCwithRaghu
Explorer
Member since ‎08-15-2017

User Statistics

  • 20 Posts
  • 0 Solutions
  • 5 Kudos given
  • 70 Kudos received

User Activity

FFID's were a commonly used by many users in a system. Users can request for FFID and upon approval by the owner. In many cases, FFIDs are mis-used and owners without validating the actual requirement may approve the request. To avoid this risk, SAP ...
It's a debate worth delving into at any time! Should organizations adhere to the default security configurations within an application, or should they design their own to enhance security?In today's digital world, keeping sensitive business informati...
You might be logging into SAP by entering User name and password. I was doing so from the last 20+ years. However, some of the client systems have Single Sign-on enabled which will login without entering a password and access SAP systems with a conce...
Let’s understand with a use case: A global enterprise that uses SAP for its operations employed an executive who sensitive customer and financial information as part of his job. He was later promoted to a different position and was given new authori...
In a recent study, our team delved into the practices of over 50 customers (with 20 responses depicted in the chart) and uncovered a startling reality: a significant number of organizations overlook the importance of securing custom transaction codes...