Conteúdo Programatico
INTRODUCTION TO SAP ACCESS CONTROL
- Discussing Business Challenges and Solutions
- Using SAP Access Control
ARCHITECTURE, SECURITY, AND AUTHORIZATIONS
- Describing the System Architecture
- Describing Security and Authorizations
SHARED CONFIGURATION SETTINGS
- Configuring Shared GRC Settings
- Configuring Shared SAP Access Control Settings
AUTHORIZATION RISKS AND THE SEGREGATION OF DUTIES (SOD) MANAGEMENT PROCESS
- Identifying Authorization Risks
- Managing Risk by Segregating Duties
SAP ACCESS CONTROL REPOSITORY
- Synchronizing Objects into the Repository
- Scheduling and Viewing Background Jobs
RISK ANALYSIS
- Maintaining Shared Master Data
- Configuring and Maintaining the Rule Set
- Configuring and Using Audit Trail Tracking
- Using the Risk Analysis Framework
- Remediating Risks
- Mitigating Risks
- Mitigating Multiple Risks at One Time
BUSINESS RULE FRAMEWORK
- Creating Rules in the Business Rule Framework (BRF)
- Defining Business Rules
- Multi-Stage, Multi-Path (MSMP) Workflow
- Describing Multi-Stage, Multi-Path (MSMP) Workflow
- Maintaining MSMP Workflow
- Building MSMP Workflow
USER PROVISIONING
- Configuring User Provisioning Settings
- Configuring Access Request Forms
- Requesting Access
- Preparing Roles and Owner Data for MSMP Workflow
- Creating Simplified Access Requests
- Reviewing Search Request Results
SAP FIORI USER EXPERIENCE (UX) FOR GRC
ROLE DESIGN AND MANAGEMENT
- Configuring Role Management
- Configuring Role Methodology
- Configuring Role Search Attributes
- Planning for Technical Role Definition
- Planning for Business Role Definition
- Consolidating Roles Through Role Mining
- Performing Role Mass Maintenance Operations
EMERGENCY ACCESS MANAGEMENT
- Describing Emergency Access Management
- Planning for Emergency Access
- Monitoring Emergency Access
PERIODIC ACCESS REVIEW PROCESS
- Planning Periodic Review
- Monitoring Periodic Review
REPORTS AND CUSTOM FIELDS
- Use the Reporting Framework
SAP ACCESS CONTROL IMPLEMENTATION
- Using the SAP Access Control Implementation Process
- Designing the SAP Access Control Solution
- Planning Upgrade and Migration
- Configuring SAP Access Control
- Implementing the SAP Access Control solution
- Optimizing the SAP Access Control Suite