SAP Access Control for SAP S/4HANA
42 Blog Posts
19 Contributors
-
A total of more than 4,100 publicly disclosed data breaches occurred in 2022, resulting in the exposure of approximately 22 billion records. 14 new ransomware groups target organizations worldwide. Since Jan 2023 to July 2023 approx. 2700+... Read More »0Comments1Like
-
Not everything that glitters is gold! This statement applies perfectly to the external reporting solutions that many enterprises are embracing today. Surprisingly, approximately 40% of enterprises are outsourcing their reporting to external analytic... Read More »1Comment2Likes
-
Objective: This try is to give increased visualization of the Note: 2615341 with a tiny narration. Build: Mail conversation between Customer (A) and SAP GRC Consultant (A). ‘Cut to the main plot’. Customer A: I really appreciate your... Read More »0Comments4Likes
-
SAP GRC framework has a new buzzword – IAG, or Identity and Access Governance. Many of us have heard about this for the past couple of years, but are unsure of its capabilities. The purpose of this blog is to explain what IAG is and how it... Read More »4Comments10Likes
-
Access Request Management (ARM) ensures secure and controlled access to sensitive systems and data within organizations. To implement an effective risk management strategy, it is essential to identify and mitigate authorization risks. However, have... Read More »0Comments1Like
-
Part #5/5: Summary and conclusions The fifth and the last part of the article summarizes the topic. In this section, we will gather all the information and answer the questions: Why the topic of access risk and SoD control is important? and Why it... Read More »0Comments3Likes
-
Part #4/5: How to implement SoD and support for mitigating checks – tool layer (5 minutes) The last stage of introducing mitigating controls to the organization is the implementation in systems and automation. In this part of the article,... Read More »0Comments1Like
-
Part #3/5: How to build a mitigating controls repository? Building a repository of mitigating controls requires a good understanding of the access risk, the system, and, above all, the context, i.e. business processes (and not only) in which we... Read More »0Comments2Likes
-
Author’s LinkedIn Profile : linkedin.com/in/javedkhan0107 Purpose of the document: Creation and assignment of Mitigation Controls in SAP GRC 12.0.This document describes the Mitigation configuration proces in GRC12 Access Control in very... Read More »0Comments11Likes
-
The implementation of additional mitigating controls is a frequent response from the company management in order to limit the risk of excessive (redundant or unnecessary) authorizations in ERP (SAP) systems. Is it a good way to eliminate the... Read More »3Comments8Likes