SAP Security GRC
SAP Security GRC
Module 1: Overview of GRC access control
• Understanding GRC applications, requirements and benefits
• Understanding GRC landscape
• Release roadmap and compatibility
• Understanding GRC landscape
• Release roadmap and compatibility
Module 2: Project planning and stakeholders
Module 3: Pre-implementation and considerations
Module 4: Understanding RFC, JCo and background job requirements
• GIT basics
• Difference between versioning control tools and GIT
• Git installation
• Getting and creating projects: initialize a directory as Git repository and copy a Git repository
• Adding file contents to staging area
• View status of your files in the working directory and the staging area
• Show cliff at various stages
• Record snapshot of staging area
• Undo changes and commits
• Remove files from staging area
• Branching and merging strategies
• Sharing and updating projects
• Difference between versioning control tools and GIT
• Git installation
• Getting and creating projects: initialize a directory as Git repository and copy a Git repository
• Adding file contents to staging area
• View status of your files in the working directory and the staging area
• Show cliff at various stages
• Record snapshot of staging area
• Undo changes and commits
• Remove files from staging area
• Branching and merging strategies
• Sharing and updating projects
Module 5: Risk analysis and Remediation (RAR)
• Understanding RAR functionality
• Pre- and post- installation check lists
• Understanding segregation of duties (SOD)
• Understanding RAR data requirements
• Conducting risks and rules workshop
• RAR rule building exercise
• Understanding Remediation and mitigation strategy
• Configuring RAR
• Troubleshooting RAR
• Pre- and post- installation check lists
• Understanding segregation of duties (SOD)
• Understanding RAR data requirements
• Conducting risks and rules workshop
• RAR rule building exercise
• Understanding Remediation and mitigation strategy
• Configuring RAR
• Troubleshooting RAR
Module 6: Super User Privilege Management (SPM)
• Understanding SPM functionality
• Pre- and post- installation check lists
• Understanding SPM data requirements
• Understanding Fire Fighter strategy
• Understanding SAP role, Fire fighter ID and end user ID mapping
• Configuring SPM
• Troubleshooting SPM
• Pre- and post- installation check lists
• Understanding SPM data requirements
• Understanding Fire Fighter strategy
• Understanding SAP role, Fire fighter ID and end user ID mapping
• Configuring SPM
• Troubleshooting SPM
Module 7: Complaint user provisioning
• User provisioning process workflow: Role request
• Advanced workflows
• Master data and process logic
• Reporting
• Workflow engine
• Compliance exercise and summary
• Pre- and post- installation check lists
• Conclusion
• Advanced workflows
• Master data and process logic
• Reporting
• Workflow engine
• Compliance exercise and summary
• Pre- and post- installation check lists
• Conclusion
Module 8: Enterprise role management
• Implementation Methodology in ERM
• Role Generation using ERM
• Pre- and post- installation check lists
• Integration with CUP and RAR
• Proposals in PFCG and GRC
• Role Generation using ERM
• Pre- and post- installation check lists
• Integration with CUP and RAR
• Proposals in PFCG and GRC