SAP Access Control
182 Blog Posts
67 Contributors
-
A total of more than 4,100 publicly disclosed data breaches occurred in 2022, resulting in the exposure of approximately 22 billion records. 14 new ransomware groups target organizations worldwide. Since Jan 2023 to July 2023 approx. 2700+... Read More »0Comments1Like
-
As SAP security practitioners, we frequently encounter a critical decision-making process concerning the effective management of user access. Today, we will explore a pivotal subject that often sparks debates within the SAP community: The... Read More »0Comments6Likes
-
Not everything that glitters is gold! This statement applies perfectly to the external reporting solutions that many enterprises are embracing today. Surprisingly, approximately 40% of enterprises are outsourcing their reporting to external analytic... Read More »1Comment2Likes
-
Objective: This try is to give increased visualization of the Note: 2615341 with a tiny narration. Build: Mail conversation between Customer (A) and SAP GRC Consultant (A). ‘Cut to the main plot’. Customer A: I really appreciate your... Read More »0Comments4Likes
-
SAP GRC framework has a new buzzword – IAG, or Identity and Access Governance. Many of us have heard about this for the past couple of years, but are unsure of its capabilities. The purpose of this blog is to explain what IAG is and how it... Read More »4Comments10Likes
-
SAP GRC Augmented Access Control Introduction SAP GRC Augmented Access Control (AC) is a solution that helps organizations protect their data and systems by providing a comprehensive framework for managing access control. It combines the power of... Read More »0Comments8Likes
-
Access Request Management (ARM) ensures secure and controlled access to sensitive systems and data within organizations. To implement an effective risk management strategy, it is essential to identify and mitigate authorization risks. However, have... Read More »0Comments1Like
-
In this blog I will go through the steps to Integrate IAG with IAS. SAP Cloud Identity Access Governance is a cloud-based service for creating self-service requests to applications for on-premise and cloud source applications and systems. By... Read More »2Comments4Likes
-
Part #5/5: Summary and conclusions The fifth and the last part of the article summarizes the topic. In this section, we will gather all the information and answer the questions: Why the topic of access risk and SoD control is important? and Why it... Read More »0Comments3Likes
-
Part #4/5: How to implement SoD and support for mitigating checks – tool layer (5 minutes) The last stage of introducing mitigating controls to the organization is the implementation in systems and automation. In this part of the article,... Read More »0Comments1Like