Quantcast
Channel: SCN : Document List - Governance, Risk and Compliance (SAP GRC)
Viewing all 459 articles
Browse latest View live

SAP GRC Risk Management - Useful Documents, Blogs, Resources, etc.

$
0
0

This document is a collection of the most useful SAP GRC Risk Management documents, blogs, resources, links, etc. here in SCN.

 

Overview

Getting Started with SAP Governance, Risk and Compliance Solutions (GRC)

GRC Risk Management and Process Control 10.0 Content Starter Kits

Overview of SAP BusinessObjects Risk Management 10.0

 

 

General opinion and thought-leadership

Are you ready to implement GRC 10?

Using RiskBusiness Content with GRC Risk Management and Process Control 10.0

 

 

How To's

SAP BusinessObjects Process Control 3.0 and Risk Management 3.0 How to Enable Additional Survey Capabilities

SAP BusinessObjects RM 3.0 Quantitative Risk Analysis v1.0

Risk Management 3.0 Architecture Requirements

 

 

GRC General

wiki.png General tips to help in troubleshooting scenarios

wiki.png Debugging tips

 

 

Mobile Apps in SAP GRC

Administrator guides for Access Approver, Policy Survey, etc.

Fiori apps in GRC – Install two applications in 5 easy steps

 

 

Bow-Tie Risks

wiki.png Integration with Bow-Tie Builder in Risk Management 10.0

 

 

Risk Aggregation

wiki.png Risk Aggregation in RM 10.0

 

 

Integration

wiki.pngRM 10.0 Integration of Activity and Process Control local Sub processes


 

See also

SAP GRC Access Control - Useful Documents, Blogs, Resources, etc.

SAP GRC Process Control - Useful Documents, Blogs, Resources, etc.

SAP Fraud Management - Useful Documents, Blogs, Resources, etc.

 

Legend

 

document.pngSAP SCN Documents
blog.pngSAP SCN Blogs
wiki.pngSAP Wiki

 

 

Please help in updating the collection so that new users can get a well structured overview for their information.

 

Best regards,

Alessandro& Fernando


SAP GRC Access Control - Useful Documents, Blogs, Resources, etc.

$
0
0

This document is a collection of the most useful SAP GRC Access Control documents, blogs, resources, links, etc. here in SCN.

 

Overview

Getting Started with SAP Governance, Risk and Compliance Solutions (GRC)

GRC Processes, Lifecycles and Responsibilities

 

 

General opinion and thought-leadership

Are you ready to implement GRC 10?

A lot of help from my friends

If I had it to do all over: looking back on GRC 10 projects

Lessons learned from SAP GRC projects

Remediating Access Control SoD Risks

Internal Controls - a step towards strong controls

Defining Mitigating Controls / Compensating Controls

IT Control Testing - SOX Compliance

A #GRC tool is just part of the solution

 

 

GRC General

NWBC screen layout options for GRC

Customizing NWBC for New Menus with our own Transactions, Reports and Accessing SAP Backend Systems from NWBC

Configure LaunchPad for Menus

Customizing Access request and approval screens in GRC Access Control

Issues, Bugs in GRC SP13 - Related Fixes

wiki.pngGeneral tips to help in troubleshooting scenarios

wiki.pngAccess Control Debugging tips

SAP GRC AC 10.1 - Enhancements

 

HR Triggers

wiki.png Understanding HR Triggers in Access Control 10.0 - Governance, Risk and Compliance - SCN Wiki

wiki.png GRC 10.0 - HR Trigger configuration - Governance, Risk and Compliance - SCN Wiki

Example of decision table for GRC 10 HR Trigger rule, using BRF+ tool

GRC Access Control - Compliant User Provisioning: HR Triggers

wiki.png Debugging HR Trigger - GRAC_HR_TRIGGER_EVENT_RECIEVER

wiki.png Debugging HR Trigger - Simulation

wiki.png Debugging HR Trigger - PA40 changes to infotypes

 

 

MSMP Workflows

AC 10.0 - Customizing Workflows for Access Management

MSMP - Multi Step Multi Process – GRC’s answer to Workflow Configuration Flexibility

 

 

LDAP

Configuring LDAP Connector in Compliant User Provisioning of GRC Access Control

LDAP Group parameter mapping.. what does it mean?

 

 

Mobile Apps in SAP GRC

Administrator guides for Access Approver, Policy Survey, etc.

Fiori apps in GRC – Install two applications in 5 easy steps

 

 

Access Control with Identity Management (IdM)

SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

SAP Access Control 10.0 Interface for Identity Management

 

 

Access Risk Analysis (ARA)

Rule set - Rules & Rule Types

Business Risks / Rule Set

How to set up a Configurable Business Rule

Online vs. Offline Risk Analysis

Creation of Mitigation Controls in GRC 10.0

Organizational Rules in GRC Access Control

Mass change of Mitigation Assignments

SAP GRC AC 10.0 Alerting

wiki.png The Action Usage Sync job in technical details - GRC Access Control 10.0

wiki.png The Repository - GRC Access Control 10.0 

 

 

Access Request Management (ARM)

AC10.0/10.1: Create Rule Based on Risk Violation in Request, Using BRF+ Procedure Calls

Approve/Reject Own Requests

How to Change Subject Line in SAP GRC Email notification

Recommendations for using Business roles provisioning in access request

Configure Manager Look-Up in ARM for GRC 10

Role Search Screen Enhancement – GRC 10

Terminate Account - Request Process - GRC 10

Creating Access Request: Template Based Requests and Configuring End User Personalization forms for use with Access Requ…

GRC Request with both System and Role Line Items

Access Control 10 (ARM) – Risk Analysis Report Type is editable in Access Request.

Access Control: - Create Access Request Using Web Service in GRC10

wiki.png User Access Review(UAR) Workflow Configuration and Description - Governance, Risk and Compliance - SCN Wiki

 

 

Business Role Management (BRM)

Maintain Default Roles in BRM GRC AC 10.1

Role Import - GRC 10

Import Role from ECC to GRC system

wiki.png Business Roles concept and usability in GRC AC10 

 

 

Emergency Access Management (EAM)

EAM - Provisioning Strategies

ID-Based Firefighting vs. Role-Based Firefighting

AC 10.0 - Centralized Emergency Access

Configure Emergency Access (EAM) in GRC 10

De-centralized EAM GRC 10.0

EAM - Approve through Wrokflow

Emergency Access Management Reporting

 

 

See also

SAP GRC Process Control - Useful Documents, Blogs, Resources, etc.

SAP GRC Risk Management - Useful Documents, Blogs, Resources, etc.

SAP Fraud Management - Useful Documents, Blogs, Resources, etc.

 

Legend

 

document.pngSAP SCN Documents
blog.pngSAP SCN Blogs
wiki.pngSAP Wiki

 

 

Please help in updating the collection so that new users can get a well structured overview for their information.

 

Best regards,

Alessandro

EAM - For the new kid on the block

$
0
0

G’Day All,

 

Picking up from my previous topic aboutARA - For the new kid on the block, this document is just an overview of my understanding of what EAM is (from what I read here and SAP documentation) and how it works.

 

The objective of this document is to give people who are just starting out or even beginning to find their feet, a brief overview of EAM before they can get stuck into it and go all in(links provided). This is not intended for people who are well versed on this topic, so if that is you, please feel free to skip it as this might not interest you. However if you do want to stick around and point/correct any mistakes or offer advice/suggestions, please by all means do so. I am open to constructive criticism.


I understand there is a lot of content related to EAM in this site and some of the information covered herein might exist elsewhere in some shape or form however this is just meant to serve as a conduit for freshers, who might get a tad overwhelmed by all the information lying around. So I hope this document can give them a glimpse of what it is all about and then help them to venture out into the wild.

 

What is it all about?

EAM enables end-users to perform emergency activities outside the parameters of their standard role, but within a controlled and fully audit-able environment. The application assigns a temporary Firefighter ID that grants an end user(firefighter) broad yet regulated access, and logs every activity he/she performs using the temporary ID.

 

This is usually done in emergency situations, where it is imperative for a user to execute certain tasks irrespective of SOD violations and transaction code clashes however all of his/her actions are monitored and recorded making the session completely visible and transparent.

 

 

Key challenges of EAM
  1. Identification of Business Processes and creating dedicated Firefighter IDs/Roles pertinent to them.
  2. Identification of the need for usage of Firefighter ID/Role
  3. Identification of Firefighters, Firefighter Owners, Controllers, and Administrators.
  4. Identification/Standardization of Reason Codes
  5. Consistency of naming conventions for Firefighter ID/Roles and Reason Codes.
  6. Archival policy for the Firefighter Logs
  7. EAM usage policy should be created to identify tasks which can be positively supported by EAM.
  8. Last but not least, performance optimization.

 

 

Potential functional scenarios for EAM Access

Additional resources with additional roles

Approaching month/financial year end and need additional resources to speed up certain activities. Additional resources are required but they don’t have enough authorizations. This task can be easily automated by EAM and individual activity log would be generated for later review.

 

Developer access on production system

Developer access on production systems is one of the most critical scenarios, but at times it becomes necessary to allow developer access to fix certain bugs urgently. This is an ideal emergency scenario for assigning firefighter id to track each and every activity a developer or a group of developers perform. However developer access on production is never recommended but when you can’t wait for a bug-fix to travel from a lengthy procedure (Dev-Qual-Prod) then EAM works as a mighty mitigation control.

 

Contract user access

To maintain track of contract users activities for a certain period of time. This can be achieved by assigning Firefighter IDs to contract users for access on the assigned system. This allows all their activities to be recorded for an extended review and hence management oversight is achieved.

 

Auditor Access

Most companies have strict audit procedures in place, which entails both internal and external auditors to conduct audits on a regular basis. Auditors can be granted temporary access through EAM.

 

* By no means is this list exhaustive however it should give you an indication of the potential reasons for EAM Access.

* Given the fact that EAM is a form of Mitigation (Please check the ARA document), It is used in scenarios where you have exhausted all other options!!

 

 

Firefighter Users, Roles and Responsibilities
Users/FFID/FFROLERoles & Responsibilities
Firefighter ID

This is a unique user id, created with specific roles that allow the firefighter to perform the required tasks. So we can create multiple Firefighter id’s with specific roles and assign them to the designated users (Firefighters) for a set period of time.

  • SU01: Create FFID
  • Roles: SAP_GRAC_SPM_FFID (This should be exactly the same in config settings as well. Shown further in the document)
Firefighter Role

This is a unique role, which gets assigned to the firefighter to perform the requited tasks.

  • PFCG/BRM: Create FFROLE. Ensure this role is enabled for firefighting in BRM.
Firefighter

These are the users who get assigned with the required Firefighter ID/Role. Firefighter users use Firefighter ID/Role to perform firefighting tasks.

  • SU01: Create FFighter or assign the role to an existing user
  • Role: SAP_GRAC_SUPER_USER_MGMT_USER (This role might need other additional authorizations. Please check the links provided)
Firefighter Administrator

This is the person who has got the ultimate authority over the firefighter program. He/she is responsible for assigning FF ID/roles to firefighters (if they choose to), Owners. They can generate reports, ensure reason codes are up to date etc.

  • SU01: Create FF ADMINISTRTOR or assign the role to an existing user
  • Roles: SAP_GRAC_SUPER_USER_MGMT_ADMIN,  SAP_GRAC_BASE,  SAP_GRAC_NWBC
Firefighter Owner

These are the ID/Role owners and are responsible for assigning FF ID/roles assigned to them by the administrator, to firefighters and controllers. They can also act as controllers however they should not be able to assign FF ID/roles to themselves. They can only be one FF Owner per FF ID/role however one FF Owner can have multiple FF ID/roles.

  • SU01: Create FF Owner or assign the role to an existing user
  • Roles: SAP_GRAC_SUPER_USER_MGMT_OWNER,  SAP_GRAC_BASE,  SAP_GRAC_NWBC
Firefighter Controller

These are the people who monitor the actions of the firefighters. They can do this by viewing the log report and can even receive email notifications when a Firefighter logs in.

  • SU01: Create FF Controller or assign the role to an existing user
  • Roles: SAP_GRAC_SUPER_USER_MGMT_CNTLR,  SAP_GRAC_BASE,  SAP_GRAC_NWBC

* All of the aforementioned roles can/needs to be customized. One can use a naming convention that suits their company requirements


AC10 has the option of having either Centralized or Decentralized firefighting (more on this in the links provided at the end of the document).

 

Centralized

  • Firefighter and his/her respective role has to be maintained in both plug-in and GRC system
  • FFID and its respective role has to be maintained only in the plug-in system
  • FFAdministrator, FFOwner and FFController and their respective roles have to be maintained in the GRC system

 

Decentralized

  • Firefighter and his/her respective role has to be maintained just in the plug-in system
  • FFID and its respective role has to be maintained only in the plug-in system
  • FFController and his/her respective role has to be maintained both in the plug-in/GRC system(to receive emails of logs)
  • FFAdministrator and FFOwner and their respective roles have to be maintained in the GRC system

 

 

ID Based vs Role Based

One of  the key difference between assigning a Firefighter an FFID vs FFRole is added security.

 

An FFID is built with a certain role in mind, which has predetermined tcodes assigned to it and this gets assigned to an end user (firefighter). So if this user wishes to commit fraud, he/she can execute certain tcodes from his/her user id and then the remaining from the FFID. This way the chances of him/her getting caught, is dependent on a thorough monitoring/analysis by the controller/auditors.

 

Whereas if you build a specific firefighter role with the same tcodes, this role gets assigned to the end user not an FFID, so every transaction executed shows up against their user id, which makes his/her task of committing fraud a lot harder if not negligible.

 

key differences are as follows:

 

ID BasedRole Based

Logs in using own user ID, accesses FFID from the GRC System and logs into the system assigned to them(ECC, SRM, CRM etc).

Logs into the plug-in system using own user ID, so everything gets logged against that one ID. Multiple users can use the FFROLE at once.

Only one user at a time can use a FFID.Multiple users can use multiple FFRoles at once.
Firefighter need not exist in every system assigned to them due to central logon however they need to exist in the GRC system (This is only applicable for Centralised firefighting).

Firefighter has to exist in every system assigned to them - so multiple logons. (This is only applicable if the user needs to perform tasks in other systems).

Knows exactly when FFID is being used as he/she has to login so has a psychological effect (good thing).

Hard to differentiate between FF tasks and normal tasks as there is no login required. So easy to slip up.

Better tracking of FF tasks - Specific log reports with Reason Codes. Bonus point from Auditors!

Time consuming to track FF tasks - No Specific log reports. No Reason Codes.

Two logins so potential to commit fraud. (1 action using own UserID and 1 action using FFID).

Only one login, so everything gets logged against one id(own user id). Harder to commit fraud.

Could be hard to track and find out when a fraud has been committed so can be a problem with auditors. When two logins used

Easy to track as only one login is used however a thorough analysis is required to differentiate ff tasks from normal tasks.
  • GRAC_SPM : TCode for Centralised FFighting -> You will see FFIDs  assigned to you
  • /n/GRCPI/GRIA_EAM : TCode for DeCentralised FFighting -> You can see the FFIDs assigned to you
  • GRAC_SPM : TCode for Centralised FFighting -> You will see FFROLEs assigned to you
  • /n/GRCPI/GRIA_EAM : TCode for DCentralised FFighting -> Not applicable so wont work

 

 

Configuration in a nutshell
  1. Create all EAM users or decide amongst the existing users who gets what EAM role using ‘SU01’
  2. Create/customize all EAM roles using ‘PFCG’
  3. Assign those roles to their respective users using ‘SU01’
  4. Create an FFID/FFRole with the predetermined roles/tcodes using ‘SU01/PFCG/BRM’
  5. Maintain GRC Plug-In System Configuration Parameters:
    • SPRO -> IMG -> GRC (Plug-In) -> Maintain Plug-In Configuration Settings
    • Parameter IDParameter ValueDescription
      1000Plug-in Connector ID
      This information is used to connect to the Plug-In system.
      4000ID Based:1  Role Based:2
      Application type
      4001DaysDefault Firefighter Validity Period (Days)
      4008Yes/NoSend Firefighter Id Login Notification
      4010Z_SAP_GRAC_SPM_FFID

      Firefighter ID role name

  6. Maintain GRC System Configuration Parameters:
    • SPRO -> IMG -> GRC -> AC-> Maintain Configuration Settings
    • Parameter IDParameter ValueDescription
      4000ID Based:1  Role Based:2Application type
      4001DaysDefault Firefighter Validity Period (Days)
      4002Yes/NoSend Email Immediately
      4003Yes/NoRetrieve Change Log
      4004Yes/NoRetrieve System log
      4005Yes/NoRetrieve Audit log
      4006Yes/NoRetrieve OS Command log
      4007Yes/NoSend Log Report Execution Notification Immediately
      4008Yes/NoSend Firefighter Id Login Notification
      4009Yes/NoLog Report Execution Notification
      4010Z_SAP_GRAC_SPM_FFIDFirefighter ID role name
      4012All Users:1  Controllers:2Default users for forwarding the Audit Log workflow
      4013Yes/NoFirefighter ID owner can submit request for FF ID owned
      4014Yes/NoFirefighter ID controller can submit request for FF ID controlled
      4015Yes/NoEnable Decentralized Firefighting
  7. Maintain User Exits
    • SPRO -> IMG -> GRC (Plug-In) -> Maintain User Exits
  8. Maintain Connection Settings: SUPMG Integration scenario
    • SPRO -> IMG -> GRC -> Common Component Settings -> Integration Framework -> Maintain Integration Scenario
  9. Activate/Check Criticality Level BC Set
    • SPRO -> IMG -> SCPR20 -> GRAC_SPM_CRITICALITY_LEVEL
  10. Maintain Criticality level
    • SPRO -> IMG -> GRC -> AC-> EAM -> Maintain Criticality Levels for EAM
  11. Run Synchronization jobs
    • SPRO -> IMG -> GRC -> AC-> Synchronization Jobs
      • Check for the help option to see what does what.
  12. Schedule Background Jobs for EAM log collection on periodic basis
    • SM36 -> GRAC_SPM_LOG_SYNC_UPDATE
  13. Maintain login/log notifications - only if you want to customize the default ones.
    • SPRO -> IMG -> GRC (Plug-In) -> Maintain Custom Notification/Text Messages for EAM (Plug-In)
  14. Verify Time Zones of the Operating System and the AC server match to ensure EAM logs are captured
    • SPRO -> IMG -> GRC -> General Settings -> Time Zones -> Maintain System Settings
  15. Create/Maintain AC Owners
    • NWBC -> Setup -> Access Owners -> Access Control Owners
  16. Assign FFID/FFRoles to FF Owners
    • NWBC -> Setup -> Superuser Assignment -> Owners
  17. Assign FFID/FFRoles to end users (firefighter) and controllers
    • NWBC -> Setup -> Superuser Assignment -> Firefighter IDs
  18. Create Reason Codes
    • NWBC -> Setup -> Superuser Maintenance -> Reason Codes


Once all of the afore mentioned tasks are performed and successful, firefighter can perform firefighting tasks. His/her activities will be logged, which can be monitored by the Controller and viewed by relevant personnel.


* You might encounter problems in regards to FFID not showing up, Logs not getting collected properly etc. Please check the links provided for additional information.

 

This pretty much is the gist of EAM. For a more comprehensive understanding/configuration and other bits and pieces on this topic, please check out the links in the following document put together by Alessandro, which covers everything in detail. Please check under Emergency Access Management (EAM).


http://scn.sap.com/docs/DOC-57438

 

A big ‘Thank You’ to the people who created and made these posts available for the benefit of people like myself. Your time/effort is very much appreciated guys.

 

Regards,

Leo..

Top 10 most viewed SAP KBA's for GRC Access Control in August 2014

$
0
0

Purpose

The purpose of this document is to provide a list of the top 10 most viewed SAP KBA's for GRC Access Controls in the month of August 2014.


Overview

Below are the top 10 most viewed SAP KBA's for GRC Access Controls.

 

KBA NumberKBA Title
1638100

  Print version Communication Failure: RFC Destination SALV_WD_EXPORT_PDF does not exist.

1967403  EAM: Key note for Firefighter Log and Review Workflow issues
2038308  GRC 10.x Browser and OS compatibility - IE or Windows
1800347  Short Dump on FF Login
1900049  ABAP Dump TSV_TNEW_OCCURS_NO_ROLL_MEMORY, how to verify if it’s a memory issue.
1804207  GRC EAM 10.0: Configuration parameters introduced in SP10 for EAM
2035538  Remediation view in Risk Analysis does not show any data
2030953  ‘No more storage space available for extending an internal table’ Error during provisioning
1637515  GRC 10.0 - Not able to find the pre delivered BRF+ rules
1701047  Is it mandatory to use trusted connection in the RFC destination for Firefighter Connector?


Please note, in order to view the contents of the Knowledgebase Articles (KBA), you will need to be logged into Service Marketplace.

Top 10 most viewed SAP KBA's for GRC Process Control in August 2014

$
0
0

Purpose

The purpose of this document is to provide a list of the top ten most viewed SAP KBA's for GRC Process Controls in the month of August 2014.


Overview

Below are the top 10 most viewed SAP KBA's for GRC Process Controls.

 

KBA NumberKBA Title
1884797  System is throwing runtime error "SYSTEM_NO_SHM_MEMORY"
2022567  Access using a 'ZERO' object reference is not possible
2006772  Automated Monitoring Job with status Error
2039958  Export of CSV ,XML,PDF and XLS does not work after update to Adobe Flash Player

version 13.0.0.214 or later

2017507  How to Archive Data in Planner and Planner Monitor
1740512  Can not open Microsoft Office 2010
1793111  Error 'Creating TEXT/LONG TEXT failed"
1863830  Audit log report is not fetching data
2015474  Error while creating (ALL kind) of reports
2028217  Unable to export the report result


Please note, in order to view the contents of the Knowledgebase Articles (KBA), you will need to be logged into Service Marketplace.

 

Related Content

Top 10 most viewed SAP KBA's for GRC Process Control in July 2014

Top 10 most viewed SAP KBA's for GRC Process Control in June 2014

Top 10 most viewed SAP KBA's for GRC Process Control in May 2014

Top 10 most viewed SAP KBA's for GRC Process Control in April 2014

SAP_ALL replace role for user WF-BATCH -ARM,GRC10

$
0
0

Dear all,

 

Generally we will assign SAP_ALL to user id WF-BATCH for mail communication and background jobs to avoid missing authorizations.

 

But we have requirement not to use SAP_ALL for WF-BATCH user id,instead use role for the same.

 

Hence we created role which replaces SAP_ALL profile for communication and background jobs

 

Added 444 authorization objects manually and tested for ARM,the workflow is working fine with approvers and provisioning in back-end.

 

I thought to share the document(As attachment) with you all,might be use full if anybody is looking for same requirement.

 

 

 

BR

Baithi

SAP GRC Risk Management - Useful Documents, Blogs, Resources, etc.

$
0
0

This document is a collection of the most useful SAP GRC Risk Management documents, blogs, resources, links, etc. here in SCN.

 

Overview

Getting Started with SAP Governance, Risk and Compliance Solutions (GRC)

GRC Risk Management and Process Control 10.0 Content Starter Kits

Overview of SAP BusinessObjects Risk Management 10.0

 

 

General opinion and thought-leadership

Are you ready to implement GRC 10?

Using RiskBusiness Content with GRC Risk Management and Process Control 10.0

 

 

How To's

SAP BusinessObjects Process Control 3.0 and Risk Management 3.0 How to Enable Additional Survey Capabilities

SAP BusinessObjects RM 3.0 Quantitative Risk Analysis v1.0

Risk Management 3.0 Architecture Requirements

 

 

GRC General

wiki.png General tips to help in troubleshooting scenarios

wiki.png Debugging tips

 

 

Mobile Apps in SAP GRC

Administrator guides for Access Approver, Policy Survey, etc.

Fiori apps in GRC – Install two applications in 5 easy steps

 

 

Bow-Tie Risks

wiki.png Integration with Bow-Tie Builder in Risk Management 10.0

 

 

Risk Aggregation

wiki.png Risk Aggregation in RM 10.0

 

 

Integration

wiki.pngRM 10.0 Integration of Activity and Process Control local Sub processes


 

See also

SAP GRC Access Control - Useful Documents, Blogs, Resources, etc.

SAP GRC Process Control - Useful Documents, Blogs, Resources, etc.

SAP Fraud Management - Useful Documents, Blogs, Resources, etc.

 

Legend

 

document.pngSAP SCN Documents
blog.pngSAP SCN Blogs
wiki.pngSAP Wiki

 

 

Please help in updating the collection so that new users can get a well structured overview for their information.

 

Best regards,

Alessandro& Fernando

GRC Document Collaboration Topics

$
0
0

Hi All

 

If you are wondering what this document is all about then please refer to: Community Collaboration for GRC Blogs and Documents - you will find an overview of what this community collaboration is about and the rules on how you can contribute. You are still encouraged to write your own blogs and documents without participating in this process (it would be nice if you could update this document to let the community know you are working on something).

 

You are also welcome to be both the person who suggests the topic and the author. This can advertise you are working on the topic and hold yourself accountable to a deadline that the community is aware of.

 

 

Remember: Add a row below the 3rd row of the table to included your suggestion. Please do not change the first three heading rows as these rows indicate the title and a short summary of the content below. When including your name, please include your SCN profile as a hyperlink (easiest way to open your Profile in a new browser tab and copy the URL)

 

 

Step 1: Requester to CompleteStep 2: Author to completeStep 3: Option (collaborator to complete)Step 4: Author to PublishModerator and Coordinator Override
DateSuggestedSuggested ByDocument TypeIdeaAuthorDate DueAssistance?NameLink to itemModerator and reason for rejection
DD/MM/YYYYYour SCN  Profile URLblog or documentTitle or topic ideaYour SCN  Profile URLDD/MM/YYYY

do you want any assistance?

If yes, summarise (input, review, etc)

Your SCN profile URLSCN document or blog linkModerators or Coordinators to advise if topic is not appropriate.
27/08/2014Alessandro Banzer / Colleen LeeDocumentAnalysis of the SAP delivered rule-set - do you accept as it is? Do you build your own or do you do something in between?Approved
08/09/2014S ADocumentSecurity Tools/Transactions one should have in their arsenal as a GRC Consultant?Alessandro10/10/2014Input & Review byCol Colleen LeeApproved
13/09/2014Colleen LeeDocumentBusiness Role Management - overview and use of the methodology customisation
13/09/2014Colleen LeeBlogBusiness Role Manager - What are the benefits and issues with using BRM and integrating with ARA and ARQ?
02/10/14S A)DocumentPSS - Best practices, pitfalls to avoid and things to consider while enabling PSS?Colleen Lee12/10/2014Reviewed by S.A, Alessandro & GretchenDesign Considerations to reduce Password Self Service (PSS) Intruder RiskApproved
02/10/2014Colleen LeeBlogBRM - discussion use of profile generation to distribute role to different systems vs system transports
02/10/2014Colleen LeeDocumentSummary of the GRC Org structure - which sections apply to AC, PC and RM and any tips on integration with ERP

BRM - For the new kid on the block

$
0
0

G'Day All,


In line with my other documents ARA - For the new kid on the block, EAM - For the new kid on the block& ARM - For the new kid on the block this is the final installment of the four components that comprise GRC AC. The objective of this post is to help people who are new to this neck of the woods/Access Control, an overview of my understanding of what BRM is all about and how it works.

 

As usual feel free to skip it if you are well versed in this topic, however please do stick around and feel free to enlighten me with your expertise if I made any mistakes or if you would like to correct/add more on/to this topic. 


Business Role Management (BRM)

This is same as PFCG in R/3 where you build a role. BRM is a web based application that automates the creation and management of Roles. Unlike in the backend system, BRM enforces best practices to ensure that the Role development, testing and maintenance is consistent across the entire implementation, resulting in lower ongoing maintenance and painless knowledge transfer.

 

BRM provides Role Owners and Security Administrators with the means to create and maintain role definitions, identify potential audit and segregation of duties issues. It empowers them to document important role information that can be of great value for better role management.

 

One key element of provisioning in BRM is the identification and mitigation of risks at an early stage, even before the creation of the roles. Risks can be identified as a conflict within a single role, composite role, derived role and templates respectively. This is done with the help of ARA, which provides means to quantify the risks associated with roles and suggests possible remediation and mitigation control procedure.


Business Role concept is the new addition to ERM (5.3). Business roles are system independent, which means you can assign a technical role from one system and another from a different system. A bit like Composite roles but the difference is, roles are not restricted to one system. Although a Business role gets assigned to an end user, it will not be reflected in the backend system. All he/she will be provisioned is a group of technical roles that are associated with the Business Role.


The Nitty Gritty

Creating Roles through BRM, helps Security Admin and Role Owners in:

  • Tracking progress during role implementation.
  • Monitoring the overall quality of the role implementation.
  • Performing risk analysis at role design phase.
  • Providing an audit trail for all role modifications.
  • Enable Firefighter roles for Firefighting
  • Flexible role building workflows, which includes preventative simulations
  • Maintaining roles after they are generated to keep role information current.
  • Enforces Segregation of duties from the ground up by starting with clean role definitions
  • Role Comparison to detect backend changes, which provides role consistency, synchronization, and compliance

 

For example, a person who has authorization to change HR Master Data, should not have authorization to change payroll information as well. If such a conflict action is found in a role, BRM proactively alerts the security team about the considered risk and hence a corrective measure can be established. BRM centralizes and standardizes enterprise wide role management, eliminating manual errors, providing an audit trail for changes, and enforcing user access best practices.

BRM allows to:

  • Create/Change a role in/for multiple systems.
  • Supports multiple landscapes – cross enterprise/cross platform
  • Risk Analysis/Simulation/Mitigation
  • Multiple Role comparison
  • Mass Role Generate/import/update/RA
  • Role Certification
  • Transaction Usage Report

Key stages in Role Creation process through BRM:

  • Role Definition: Enter the role details
  • Authorization: This is where you assign T-Codes/Authorizations
  • Risk Analysis: This is where you analyze risks through ARA
  • Approval: This is where you integrate it with ARM for role assignment/provisioning through pre-configured workflows.

BRM Best Practices

  • Design a good role naming convention.
  • Well thought out integration of BRM into ongoing role development, testing and change management processes.
  • Identify key users (e.g., Role Owners, Security Administrators, and User Administrators) and how they will use and customize BRM accordingly.
  • Define goals (e.g: role optimization or consolidation, user access optimization, reducing risk, reducing the role change requests)
  • Identify custom reports and attach them to BRM.

 

Linch.pin of BRM

Role Methodology

This is where you define the methodology processes and steps for role maintenance. The application provides a set of actions that can be used for role maintenance, such as definition, risk analysis, generation. You can select which actions to use, the order and the frequency. For example, you can define that four steps are required to maintain a role and that approval is required after each step.

 

Defining a step

SAP provides a set of actions that you can perform for role maintenance. When you define a step, you select which actions to use and assign a name that is in line with your company guidelines. For example, you can select delivered Action and Permissions, and name its phase as Maintain Authorizations.

 

Defining a methodology process

You create the methodology process as a framework to attach the methodology steps. You can create as many methodology processes as needed. For example, you may want to have one methodology for finance role requests, and another for office administration role requests.


Adding steps to the methodology process

You assign the steps to the methodology process and select the order of the steps. For example, for finance role requests, you may want to require several approval steps and risk analysis.


* If you wish to create customized methodology processes, like conditioned based workflows and approvals; then you can incorporate MSMP workflows for automation of approvals and provisioning, using BRF+ to define conditions.

 

Configuration in a Nutshell
  1. Create all BRM users or decide amongst the existing users who gets what BRM role using ‘SU01’
  2. Create/customize all BRM roles using ‘PFCG’
    • SAP_GRAC_ROLE_MGMT_ROLE_OWNER: Approver for Role Maintenance
  3. Assign the roles to their respective users using ‘SU01’
  4. Maintain GRC System Configuration Parameters:
    • SPRO -> IMG -> GRC -> AC-> Maintain Configuration Settings -> Role Management
  5. Activate/Check following BC Sets using ‘SCPR20’
    • GRAC_ROLE_MGMT_LANDSCAPE
    • GRAC_ROLE_MGMT_METHODOLOGY
    • GRAC_ROLE_MGMT_PRE_REQ_TYPE
    • GRAC_ROLE_MGMT_ROLE_STATUS
    • GRAC_ROLE_MGMT_SENSITIVITY
    • GRC_MSMP_CONFIGURATION (Optional)
  6. Maintain Connection Settings: ‘ROLMG’ Integration scenario
    • SPRO -> IMG -> GRC -> Common Component Settings -> Integration Framework -> Maintain Integration Scenario
  7. Associate actions and assign default connectors:
    • SPRO -> IMG -> GRC -> AC-> Maintain Mapping for Actions and Connector Groups
      • 001    Role Generation
      • 002    Role Risk Analysis
      • 003    Authorization Maintenance
      • 004    Provisioning
      • 005     HR Triggers (optional)
  8. Maintain Role Type Settings: You can either activate/deactivate pre-delivered role types to suit your needs and set maximum length for the name of the role
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Maintain Role Type Settings
  9. Defining and manage Naming Conventions: This is where you can set a pre-defined naming convention for naming roles
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Specify Naming Convention
  10. Maintain Project and Product Release Name: These are the attributes that you can assign to roles.
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Maintain Project and Product Release Name
  11. Define Role Sensitivity: Sensitivity of role can be set here
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Define Role Sensitivity
  12. Maintain Role Status:Maintain status of the role here. Only roles with status Production are available for user role requests
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Maintain Role Status
  13. Specify Critical Level: Specify how essential a role is to the company
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Specify Critical Level
  14. Define Companies:
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Define Companies
  15. Maintain Functional Areas: Specify a group or department in a company that performs a specific task or function such as Accounting.
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Maintain Functional Areas
  16. Define Prerequisite Types: Define role prerequisites that are required to be validated before granting access to a user
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Define Prerequisite Types
  17. Define Role Prerequisites: Define prerequisites for a role to be assigned
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Define Role Prerequisites
  18. Maintain Business Processes and Sub Processes: Serves similar purpose as Functional Areas
    • SPRO -> IMG -> GRC -> AC-> Maintain Business Process and Sub Processes
  19. Create/Maintain AC Owners
    • NWBC -> Setup -> Access Owners -> Access Control Owners
  20. Assign Condition Groups to BRFplus Functions: You can assign two pre-delivered condition group types (methodology and approver) to the BRFplus applications and the BRFplus functions.
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Assign Condition Groups to BRFplus Functions
  21. Define Methodology Processes and Steps:
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Define Methodology Process and Steps
  22. Associate Methodology Process to Condition Group: you can associate the methodology processes to a condition group. The application uses this association to determine which methodology process to use based on the specified settings in the condition group.
    • SPRO -> IMG -> GRC -> AC-> Role Management -> Associate Methodology Process to Condition Group
  23. Generate BRF+ Rules (Optional)
    • TCode: BRF+
  24. Maintain MSMP Workflows: This needs to be configured if there is an approval step in Role Creation Methodology

This pretty much is the gist of BRM and should be enough to get you started. For a more comprehensive understanding/configuration and other bits and pieces on this topic, please check out the links in the following document put together by Alessandro, which covers everything in detail. Please check under Business Role Management (BRM).

http://scn.sap.com/docs/DOC-57438

 

 

Regards,

Leo..

SAP GRC Access Control - Useful Documents, Blogs, Resources, etc.

$
0
0

This document is a collection of the most useful SAP GRC Access Control documents, blogs, resources, links, etc. here in SCN.

 

Overview

Getting Started with SAP Governance, Risk and Compliance Solutions (GRC)

GRC Processes, Lifecycles and Responsibilities

 

 

General opinion and thought-leadership

Are you ready to implement GRC 10?

A lot of help from my friends

If I had it to do all over: looking back on GRC 10 projects

Lessons learned from SAP GRC projects

Remediating Access Control SoD Risks

Internal Controls - a step towards strong controls

Defining Mitigating Controls / Compensating Controls

IT Control Testing - SOX Compliance

A #GRC tool is just part of the solution

 

 

GRC General

NWBC screen layout options for GRC

Customizing NWBC for New Menus with our own Transactions, Reports and Accessing SAP Backend Systems from NWBC

Configure LaunchPad for Menus

Customizing Access request and approval screens in GRC Access Control

Issues, Bugs in GRC SP13 - Related Fixes

wiki.pngGeneral tips to help in troubleshooting scenarios

wiki.pngAccess Control Debugging tips

SAP GRC AC 10.1 - Enhancements

 

HR Triggers

wiki.png Understanding HR Triggers in Access Control 10.0 - Governance, Risk and Compliance - SCN Wiki

wiki.png GRC 10.0 - HR Trigger configuration - Governance, Risk and Compliance - SCN Wiki

Example of decision table for GRC 10 HR Trigger rule, using BRF+ tool

GRC Access Control - Compliant User Provisioning: HR Triggers

wiki.png Debugging HR Trigger - GRAC_HR_TRIGGER_EVENT_RECIEVER

wiki.png Debugging HR Trigger - Simulation

wiki.png Debugging HR Trigger - PA40 changes to infotypes

 

 

MSMP Workflows

AC 10.0 - Customizing Workflows for Access Management

MSMP - Multi Step Multi Process – GRC’s answer to Workflow Configuration Flexibility

 

 

LDAP

Configuring LDAP Connector in Compliant User Provisioning of GRC Access Control

LDAP Group parameter mapping.. what does it mean?

 

 

Mobile Apps in SAP GRC

Administrator guides for Access Approver, Policy Survey, etc.

Fiori apps in GRC – Install two applications in 5 easy steps

 

 

Access Control with Identity Management (IdM)

SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

SAP Access Control 10.0 Interface for Identity Management

 

 

Access Risk Analysis (ARA)

ARA - For the new kid on the block

Rule set - Rules & Rule Types

Business Risks / Rule Set

How to set up a Configurable Business Rule

Online vs. Offline Risk Analysis

Creation of Mitigation Controls in GRC 10.0

Organizational Rules in GRC Access Control

Mass change of Mitigation Assignments

SAP GRC AC 10.0 Alerting

wiki.png The Action Usage Sync job in technical details - GRC Access Control 10.0

wiki.png The Repository - GRC Access Control 10.0 

 

 

Access Request Management (ARM)

ARM - For the new kid on the block

AC10.0/10.1: Create Rule Based on Risk Violation in Request, Using BRF+ Procedure Calls

Approve/Reject Own Requests

How to Change Subject Line in SAP GRC Email notification

Recommendations for using Business roles provisioning in access request

Configure Manager Look-Up in ARM for GRC 10

Role Search Screen Enhancement – GRC 10

Terminate Account - Request Process - GRC 10

Creating Access Request: Template Based Requests and Configuring End User Personalization forms for use with Access Requ…

GRC Request with both System and Role Line Items

Access Control 10 (ARM) – Risk Analysis Report Type is editable in Access Request.

Access Control: - Create Access Request Using Web Service in GRC10

Design Considerations to reduce Password Self Service (PSS) Intruder Risk

wiki.png User Access Review(UAR) Workflow Configuration and Description - Governance, Risk and Compliance - SCN Wiki

 

 

Business Role Management (BRM)

BRM - For the new kid on the block

Maintain Default Roles in BRM GRC AC 10.1

Role Import - GRC 10

Import Role from ECC to GRC system

wiki.png Business Roles concept and usability in GRC AC10 

 

 

Emergency Access Management (EAM)

EAM - For the new kid on the block

EAM - Provisioning Strategies

ID-Based Firefighting vs. Role-Based Firefighting

AC 10.0 - Centralized Emergency Access

Configure Emergency Access (EAM) in GRC 10

De-centralized EAM GRC 10.0

EAM - Approve through Wrokflow

Emergency Access Management Reporting

 

 

See also

SAP GRC Process Control - Useful Documents, Blogs, Resources, etc.

SAP GRC Risk Management - Useful Documents, Blogs, Resources, etc.

SAP Fraud Management - Useful Documents, Blogs, Resources, etc.

 

Legend

 

document.pngSAP SCN Documents
blog.pngSAP SCN Blogs
wiki.pngSAP Wiki

 

 

Please help in updating the collection so that new users can get a well structured overview for their information.

 

Best regards,

Alessandro

ARA - For the new kid on the block

$
0
0

G’Day All,

 

Considering the fact that so many people out here, have so selflessly shared their expertise through blogs, answers etc. So its only fair that I do my bit to balance the scales. Now if what I contribute is worth it or not, that's a different story and I shall leave it to the moderators to judge for themselves.

 

The topic I would like to present to you is ARA. Just a heads up that whatever is presented here is just an overview of my understanding of what ARA is (from what I read here and SAP documentation) and how it works. I’ll leave it to the experts here to make corrections/suggestions if the need be for the benefit of everyone reading this document and myself included.


A lot of the key terminology has been explained rather brilliantly by Alessandro in the following two documents, so there is no point in me trying to reinvent the wheel.

 

http://scn.sap.com/docs/DOC-54434

http://scn.sap.com/docs/DOC-54530

 

So here we go.

 

Access Risk Analysis - ARA

Analyzing Risks associated with Access

Risk: when an Employee in a Company is assigned with Task/Tasks that could provide him/her with an opportunity to commit fraud

Employee -> Company -> Task/Tasks -> Opportunity -> Fraud

 

Tasks are assigned to the employee in form of Roles, which are made up of Actions/Tcodes, which in turn are made up Permissions/Authorizations

Workshops with BP Owners and other relevant personnel would have to be conducted to gather information about the Risks associated with the following:

 

Roles -> Actions/Transaction Codes -> Permissions/Authorizations

 

Role1                Action1  Action2             Permission1   Permission2

Role2                Action3  Action4             Permission3   Permission4

Based on the information gathered we need to define the Risks

 

    . Action1= Conflicting Action   .Action2= Conflicting Action.   Action3= Critical Action    .Permission1= Critical Permission

Function1= Action1   .Function2= Action2   .Function3=Action3   .Function4= Permission1

Risk 1= Function1+Function2 . Risk 2= Function3

Rule is a condition: If Function1+Function2 is given to a user Then it is a Risk 

Therefore Rule1 is generated against Function1, Function2 and Risk1

 

*Example: Action1= XK99: Vendor Mass Maintenance .Action2= ME2L: Maintain Purchase Order - Purchasing

Risk= Create a fictitious vendor and initiate purchases to that vendor


Run a Risk Analysis against all the Risks defined



Based on the Analysis, Remediate the Risks by executing cleanup process by Re-designing/defining the roles.

This can be done through Simulation to check if the defined Risks will be eliminated if  the cleanup is executed.


In certain unavoidable circumstances Remediation isn’t an option, so the solution is to Mitigate the Risk

 

                         Mitigation                       

  

PreventionDetection

 

Super User Access

Mitigation Control

Audits

Alerts

So when you create a Mitigation Control:

You specify the Risk Ids and the OU they are associated with->  The Risk Ids will look up the Function they are associated with->

Functions will look up the Actions (T-codes) they are associated with. Assign an Owner and Controller to the MC and 

tie all of this up to an end user/role/profile who is assigned with a role/roles, which could pose a threat. 


To Ensure all the hard work done so far does not go for a waste, run

SOD review, Audit Trails and Risk Analysis on a periodic basis



SOD Management Process

The entire process described above is termed as 'SOD Management Process'.


Segregation of Duties (SoD) is an internal control within a Company implemented to prevent or decrease the risk of errors or regulatory irregularities and ensure corrective action is taken. Ideally, no one individual must have the authority of:

Creation .Modification .Reviewing .Deletion

 

SoD ensures no single user has access to separate phases of these business transactions. This is done by Dividing, Distributing and Allocating key tasks amongst various individuals thereby eliminating or at least reducing the possibility of errors and fraud. All of this is carried out in three separate phases:


Phase 1

Risk Recognition

Rule Building & Validation


Phase 2

Risk Analysis

Remediation

Mitigation


Phase 3

Continuous Compliance

 

*Credit for the following SOD Management Process flow goes to: Alessandro& Colleen

StepsDescription
step1.png

Gather a list of applicable SOD conflicts that allow fraud or generate significant errors. The outcome of this step is that your business has determined what is an unacceptable risk that they want to report on and manage via remediation or mitigation.

 

Helpful documents:

Risk Lifecycle

step2.png

Build the rule set based on the recognized risks from step 1. The outcome of this step is the technical rule set to analyze the user and/or role assignments.

 

Helpful documents:

Business Risks / Rule Set

Rule set - Rules & Rule Types

step3.png

Analyze the SoD output. This can be performed with the help of SAP GRC Access Control. In case of manual analysis, for each user, analyze if he/she has the access to perform any of the conflicting functions defined in step 1. The outcome is basically to provide the business insight to alternatives for correcting or eliminating discovered risks.

 

Helpful documents:

Online vs. Offline Risk Analysis

step4.png

In this step, evaluate if the conflicting tasks can be performed by an alternate person. If so, role changes and/or user reassignments can be performed to segregate duties properly. The outcome must be a very low number of remaining risks that need mitigation.

 

Helpful documents:

Remediating Access Control SoD Risks

step5.png

If it would not be possible to remediate the existing conflicts, consider formulating an appropriate control to mitigate the risk. This would typically entail working with the business to setup additional monitoring procedures that ensure to compensate the risk. The outcome must be no remaining risks.

 

Helpful documents:

Internal Controls - a step towards strong controls

Defining Mitigating Controls / Compensating Controls

Creation of Mitigation Controls in GRC 10.0

Mitigating Control Lifecycle

step6.png

Finally, establish a new continuous process wherein every access request is reviewed against the SoD conflict matrix prior to provisioning on the system. Also make sure that all role changes must be analyzed and remediated before implementing. The outcome, and also final result, your system remains clean.


Helpful documents:

Approve/Reject Own Requests

Risk Terminator on SAP Wiki

Configuration in a Nutshell

Now that we’ve covered the what and the why part we have to get our hands dirty and physically create them. If you have access to a Server, after following SAP documentation for 'From Post-Installation to First Risk Analysis' and 'Enhanced Access Risk Analysis', try executing the following tasks:


  1. Create test users using SU01
  2. Create test roles with Critical/Conflicting Actions using PFCG
  3. Assign role/roles to test users including roles for Risk Owner , Mitigation Controller
  4. Create Access Control Owners in NWBC
  5. Activate/Check following BC Sets using ‘SCPR20’
    • GRAC_RA_RULESET_COMMON
    • GRAC_RA_RULESET_SAP_R3
    • GRAC_RA_RULESET_SAP_HR (Optional)
  6. Check Configuration Parameters of Risk Analysis: SPRO -> IMG -> GRC -> Access Control -> Maintain Configuration Settings
    • Risk Analysis
    • Function Maintenance
    • Mitigation Maintenance
    • Change Log
  7. Create/Check Business Process and Sub Process: SPRO -> IMG -> GRC -> Access Control -> Maintain Business Process and Sub processes
    • This will come in handy when creating Functions and Risks
  8. Create Organizations: SPRO -> IMG -> GRC -> Shared Master Data -> create a Root Organization Hierarchy
    • You cannot create a Mitigation Control without this
  9. Add Owners to the created Organization in NWBC: Setup -> Organizations
  10. Run following Sync Jobs:  SPRO -> IMG -> GRC -> Access Control -> Synchronization Jobs
    • Authorization Sync
    • Repository Object Sync
  11. Create the following in NWBC
    • Functions
    • Access Risks
    • Mitigation Control
  12. Run a Risk Analysis against the Risks at Role level and after the cleanup at User level
  13. Remediate using Simulation and see if it works
  14. Mitigate Risks against User/Role/Profile
  15. Create Alerts: SPRO -> IMG -> GRC -> Access Control -> ARA -> Generate Alerts
  16. Setup Batch Risk Analysis on a periodic basis:  SPRO -> IMG -> GRC -> Access Control -> ARA -> Batch Risk Analysis
  17. Setup SOD/UAR Review

I sincerely hope this document will help you in your pursuit to get a grasp on what ARA is all about.For a more comprehensive understanding/configuration and other bits and pieces on this topic, please check out the links in the following document put together by Alessandro, which covers everything in detail. Please check under Access Risk Analysis (ARA).

http://scn.sap.com/docs/DOC-57438


Regards,

Leo..

Top 10 most viewed SAP KBA's for GRC Access Control in August 2014

$
0
0

Purpose

The purpose of this document is to provide a list of the top 10 most viewed SAP KBA's for GRC Access Controls in the month of August 2014.


Overview

Below are the top 10 most viewed SAP KBA's for GRC Access Controls.

 

KBA NumberKBA Title
1638100

  Print version Communication Failure: RFC Destination SALV_WD_EXPORT_PDF does not exist.

1967403  EAM: Key note for Firefighter Log and Review Workflow issues
2038308  GRC 10.x Browser and OS compatibility - IE or Windows
1800347  Short Dump on FF Login
1900049  ABAP Dump TSV_TNEW_OCCURS_NO_ROLL_MEMORY, how to verify if it’s a memory issue.
1804207  GRC EAM 10.0: Configuration parameters introduced in SP10 for EAM
2035538  Remediation view in Risk Analysis does not show any data
2030953  ‘No more storage space available for extending an internal table’ Error during provisioning
1637515  GRC 10.0 - Not able to find the pre delivered BRF+ rules
1701047  Is it mandatory to use trusted connection in the RFC destination for Firefighter Connector?


Please note, in order to view the contents of the Knowledgebase Articles (KBA), you will need to be logged into Service Marketplace.

Top 10 most viewed SAP KBA's for GRC Process Control in August 2014

$
0
0

Purpose

The purpose of this document is to provide a list of the top ten most viewed SAP KBA's for GRC Process Controls in the month of August 2014.


Overview

Below are the top 10 most viewed SAP KBA's for GRC Process Controls.

 

KBA NumberKBA Title
1884797  System is throwing runtime error "SYSTEM_NO_SHM_MEMORY"
2022567  Access using a 'ZERO' object reference is not possible
2006772  Automated Monitoring Job with status Error
2039958  Export of CSV ,XML,PDF and XLS does not work after update to Adobe Flash Player

version 13.0.0.214 or later

2017507  How to Archive Data in Planner and Planner Monitor
1740512  Can not open Microsoft Office 2010
1793111  Error 'Creating TEXT/LONG TEXT failed"
1863830  Audit log report is not fetching data
2015474  Error while creating (ALL kind) of reports
2028217  Unable to export the report result


Please note, in order to view the contents of the Knowledgebase Articles (KBA), you will need to be logged into Service Marketplace.

 

Related Content

Top 10 most viewed SAP KBA's for GRC Process Control in July 2014

Top 10 most viewed SAP KBA's for GRC Process Control in June 2014

Top 10 most viewed SAP KBA's for GRC Process Control in May 2014

Top 10 most viewed SAP KBA's for GRC Process Control in April 2014

Top 10 most viewed SAP KBAs for GRC

$
0
0

Purpose


The purpose of this document is to provide links to the top 10 most viewed SAP KBA's for Governance, Risk and Compliance.(GRC)

 


Overview

 

This page will be updated regularly as new documents are published.

 

Click on the month below to view the publications for each GRC component:

 

Access Control                                   

   March 2014

   April 2014

   May 2014

   June 2014

   July 2014

   August 2014

   September 2014

 

 

Process Control

   April 2014

   May 2014

   June 2014

   July 2014

   August 2014

   September 2014

 

 

Risk Management

   April 2014

   May 2014

   June 2014

   July 2014

   August 2014

   September 2014

 

 

 

 

 

Please note, in order to view the contents of the Knowledgebase Articles (KBA), you will need to be logged into Service Marketplace.

SAP GRC Process Control 10.0: Create An Automated Control for a Business Process

$
0
0

SAP GRC Process Control helps organizations to manage their compliance processes more effectively. The objective of Process Control is to provide automated risk and control monitoring, testing and analytical capabilities across the entire enterprise and to improve the effectiveness of a overall compliance program.


SAP GRC Process Control enables organizations realize strategic alignment, predictable performance and confident decision making by leveraging SAP GRC Business Objects GRC solution through values like;

 

• Increased visibility into the impact of risk against performance

 

• Reduced risk and cost across risk and control management objectives

 

• Increased strategic effectiveness through automated monitoring of risks and controls

 

In SAP GRC Process Control 10.0 all evaluation activities are governed by a set of robust workflows and notifications. Based on evaluation schedules, users are automatically notified through workflow tasks which covers test performance, issue management, remediation and retesting.

 

Steps to create Automated Control in SAP GRC:

 

In GRC, an automated control can be created in few steps as given below;

 

    1. Create Control
    2. Create Data Source
    3. Create Business Rule
    4. Assign Business Rule to Control
    5. Schedule continuous monitoring job


    This document is focused on how to create an automated control in SAP GRC 10.0 version. The scenario taken is for "Purchase to Pay" business process. Control specifications are as given below;

     

    Control Objective: To ensure that all the invoices in quantity equal to the respective goods receipts. So, the control captures the changes made to the defined fields of the concerned table.

     

    Deficiency to be captured: Any Change made to the mentioned fields of the given table

     

    Risks & Impact: If not configured, the goods received may be less than the quantity mentioned in the invoice. So, may end up paying for the goods which are not actually received.

     

    Table & Field: Table: T169G

     

    Field: PROZ2 (Percentage Tolerance Limit)

     

               XP2JA (Limits to be checked)

     

               XW2JA (Limits to be checked)

     

      1. Create Control:

       

      The prerequisites for creating a control are;

        • Organizational hierarchy
        • Process hierarchy

       

      A control can be created in the process hierarchy under a sub-process for a particular business process. During implementation, the organizational hierarchy and process hierarchy are generally created.

       

      Create Process: Process can be created or an existing one can be used, if process heirarchy has already maintained.1_a.jpg

      Once process is identified, sub-process has to be created under process. An existing one can also be used. In the following picture, sub-process has been created.

      2.jpg

      In the following picture, regulation has been assigned to the sub-process. So, the control will be regulation specific.

      3.jpg

      Now, as our sub-process is ready we can go ahead for creation of control under the subprocess. Specifications for control can be maintained for the control, as per the requirement.

      1.jpg

      Once all general specifications are maintained, regulation has to be assigned to the control in case the control is a regulation specific control. As this control is a regulation specific control, regulation has to be assigned to the control.

      2.jpg

      Below picture depicts the process hierarchy and our requirement is to create a control under sub-process “P2P: Goods Receipt”.


      1_U.jpg
      In this example we have created new process and sub-process. So, the next step is to assign the sub-process “P2P: Goods Receipt” to organizational hierarchy.

      2_U.jpg


      As shown in the below picture sub process “P2P: Goods Receipt” has been assigned to Organization “Synxxx_New” along with many other assignments.

      1_U.jpg

       

        1. Create Data Source:

         

        Now, as we are ready with the control and subprocess, the next step is to create a data source from which the control will fetch information we are looking for.


        2.jpg

        1.jpg

        Enter the relevant table name for the Data Source. Here, the table is T169G. This is followed by selecting the fields as per the details provided previously. We can execute the adhoc query as well to test if our data source is pulling correct data as per our requirement.


        2.jpg

        1.jpg

         

        The connector tab shows the data source system details from where we are fetching the required data.


        2.jpg

         

          1. Create a Business Rule:

           

          Now, as the data source is ready, our next step is to create a business rule.


          1_1st.jpg
          Click on the “Business Rule” tab to create the required business rule. Once data source is selected for the business rule, it takes to the next screen where we can fill in the business rule details, as shown in the screen shown below.

          2.jpg


          Select the fields which are required for analysis.


          1.jpg
          Create Deficiency Criteria: Deficiency criteria is the most important filed where we decide the limits of the fields selected. Here, we are capturing all the changes in the selected fields.

          2.jpg
          It is also possible to customize our out put the way we need by hiding/displaying some fields. If we need to hide some fields in the output, we can click on the box against the same field as shown in the next picture.
          3.jpg

            1. Business Rule Assignment:


            Once business rule and control are ready, we can assign the control to the business rule. This can be done through tab “Business Rule Assignment” as shown in the below picture.


            1.jpg
            As shown in the picture given below, select the date and search for the control. Check the control and select on modify to select the correct business rule. Then, set the frequency at which the controls should collect the data. It can be daily, weekly, monthly, quarterly, half yearly,
            yearly or any frequency. In the following picture the frequency is set as “any frequency”. This will help us to schedule our job as per our requirement.


            2.jpg

             

              1. Schedule automated Monitoring Job:


              Click on the “automated monitoring” tab to schedule the job.


              1.jpg
              Fill in the job details as shown in the following picture.
              1.jpg


              In the below picture we can see there are options to share/restrict the control result with other regulations.

              2.jpg
              In the next step, search for the control which is assigned to the business rule.

              1.jpg


              Select the control and save the option.

              2.jpg

              3.jpg

              Recipients of the controls result (as defined in GRC, mostly the owners) get mails in their respective GRC inbox. THe below picture depicts how does the control result look like.
              1.jpg


              Initiator rule Using DB Lookup

              $
              0
              0

              Some time we get requirement to define initiator for

               

              1. Manager & Role Owner are same
              2. Requester and Role owner same

               

              In these scenario we normally keep single level of approval,again this is not mandatory depends upon business.

               

              To achieve this you need to create a initiator using DBLOOKUP.

               

              Goto >>SPRO>>>Governance Risk and Compliance>>Access Control>>Workflow flow for Access Control>Define Workflow Related MSMP Rules


              1.jpg

               

              Process ID: as SAP_GRAC_ACCESS _REQUSET, since the entire request submitted for user provisioning is associated to this process id.

              Rule Kind: Initiator Rule, as this rule will be used to initiate a workflow to determine which path it should take upon submission of request

              RuleID: The Name of the Rule you are going to build and can be identified in BRF+ my application.

              Rule type: Its Always BRF+ Flat Line item rules since we check Line item of Request, not just Header to determine path

               

              Now select Header and select REQTYPE as input parameter as we may have may REQUEST TYPE and we need this for specific request type.

               

              2.jpg

              2.jpg

               

              Go to BRF+ tcode

              2.jpg

              now to get the

               

              Manager is equal to Roleowner and Role owner is equal to Requester you need to create DBLOOKUP

               

              1)First identify the request id

              2)Get the Manager of that request

              3)identify the Role ID

              4)Get the Role Owner fro that role.

              5)Get the Requester from the same table of from when Manager is picked

               

              Right click on Initiator application and create a DBLOOKUP

              2.jpg

              2.jpg

              Select single entry table GRACREQ, this table has information about SAP Access Request, so lookup input query in to table is Request NO created during submission in the table and output value is REQUESTID.2.jpg

              Select Request number from context data and put it into a new table in result data, save and activate

               

              comeback to select element REQID element

               

              2.jpg

              NOW Create 1 more DBLOOKUP to get the role id from table GRACROLE

              2.jpg


              NOW Create 1 More DB Lookup to get Manager ID for the particular request.

              Run a look up on table GRACREQOWER, and look for USER TYPE MAN in the DBLOOKUPQUERY

              to get Manager ID for that request need have a query for REQ_ID to fetch the request number and Manger for that request.

               

               

               

              2.jpg

               

              Now create 1 more DB lookup to get Role owner.

              Run a query for Role on Table GRACROLEAPPRVR and lookup for approver in Z_GETROLEID DBLOOKUP table.

              2.jpg

               

               

              Now we need to Create 1 more DBLOOKUP for getting requestor information from the table GRACREQOWNER using request id from ZGETREQ_ID lookup to get requestor for that request only.

              2.jpg

               

              Save and activate all the Lookups .

               

              Now go to decision table.

               

              2.jpg

               

              Click Table setting Select the condition column and Result column, based on which as decision to be made.

               

              2.jpg

              (We had added the elements after creating result table ,reason is if you have element you can select condition column,if you dont then it will be in result column)

               

              Put your conditions in decision table

              2.jpg

               

               

              This was my condition you can use your

               

               

               

               

              2.jpg

               

              activate decision table but  add you lookup tables in signature in Function id then activate

              2.jpg

               

              Added missing screenshot.

               

              Untitled.jpg

               

              ensure its added and activate ..

              now you can add it in MSMP.

               

               

              .

               

              Regards,

              Prasant

              SAP Fraud Management - Useful Documents, Blogs, Resources, etc.

              $
              0
              0

              SAP GRC Access Control - Useful Documents, Blogs, Resources, etc.

              $
              0
              0

              This document is a collection of the most useful SAP GRC Access Control documents, blogs, resources, links, etc. here in SCN.

               

              Overview

              Getting Started with SAP Governance, Risk and Compliance Solutions (GRC)

              GRC Processes, Lifecycles and Responsibilities

               

               

              General opinion and thought-leadership

              Are you ready to implement GRC 10?

              A lot of help from my friends

              If I had it to do all over: looking back on GRC 10 projects

              Lessons learned from SAP GRC projects

              Remediating Access Control SoD Risks

              Internal Controls - a step towards strong controls

              Defining Mitigating Controls / Compensating Controls

              IT Control Testing - SOX Compliance

              A #GRC tool is just part of the solution

               

               

              GRC General

              NWBC screen layout options for GRC

              Customizing NWBC for New Menus with our own Transactions, Reports and Accessing SAP Backend Systems from NWBC

              Configure LaunchPad for Menus

              Customizing Access request and approval screens in GRC Access Control

              Issues, Bugs in GRC SP13 - Related Fixes

              wiki.pngGeneral tips to help in troubleshooting scenarios

              wiki.pngAccess Control Debugging tips

              SAP GRC AC 10.1 - Enhancements

               

              HR Triggers

              wiki.png Understanding HR Triggers in Access Control 10.0 - Governance, Risk and Compliance - SCN Wiki

              wiki.png GRC 10.0 - HR Trigger configuration - Governance, Risk and Compliance - SCN Wiki

              Example of decision table for GRC 10 HR Trigger rule, using BRF+ tool

              GRC Access Control - Compliant User Provisioning: HR Triggers

              wiki.png Debugging HR Trigger - GRAC_HR_TRIGGER_EVENT_RECIEVER

              wiki.png Debugging HR Trigger - Simulation

              wiki.png Debugging HR Trigger - PA40 changes to infotypes

               

               

              MSMP Workflows

              AC 10.0 - Customizing Workflows for Access Management

              MSMP - Multi Step Multi Process – GRC’s answer to Workflow Configuration Flexibility

               

               

              LDAP

              Configuring LDAP Connector in Compliant User Provisioning of GRC Access Control

              LDAP Group parameter mapping.. what does it mean?

               

               

              Mobile Apps in SAP GRC

              Administrator guides for Access Approver, Policy Survey, etc.

              Fiori apps in GRC – Install two applications in 5 easy steps

               

               

              Access Control with Identity Management (IdM)

              SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

              SAP Access Control 10.0 Interface for Identity Management

               

               

              Access Risk Analysis (ARA)

              ARA - For the new kid on the block

              Rule set - Rules & Rule Types

              Business Risks / Rule Set

              How to set up a Configurable Business Rule

              Online vs. Offline Risk Analysis

              Creation of Mitigation Controls in GRC 10.0

              Organizational Rules in GRC Access Control

              Mass change of Mitigation Assignments

              SAP GRC AC 10.0 Alerting

              wiki.png The Action Usage Sync job in technical details - GRC Access Control 10.0

              wiki.png The Repository - GRC Access Control 10.0 

               

               

              Access Request Management (ARM)

              ARM - For the new kid on the block

              AC10.0/10.1: Create Rule Based on Risk Violation in Request, Using BRF+ Procedure Calls

              Approve/Reject Own Requests

              How to Change Subject Line in SAP GRC Email notification

              Recommendations for using Business roles provisioning in access request

              Configure Manager Look-Up in ARM for GRC 10

              Role Search Screen Enhancement – GRC 10

              Terminate Account - Request Process - GRC 10

              Creating Access Request: Template Based Requests and Configuring End User Personalization forms for use with Access Requ…

              GRC Request with both System and Role Line Items

              Access Control 10 (ARM) – Risk Analysis Report Type is editable in Access Request.

              Access Control: - Create Access Request Using Web Service in GRC10

              Design Considerations to reduce Password Self Service (PSS) Intruder Risk

              wiki.png User Access Review(UAR) Workflow Configuration and Description - Governance, Risk and Compliance - SCN Wiki

               

               

              Business Role Management (BRM)

              BRM - For the new kid on the block

              Maintain Default Roles in BRM GRC AC 10.1

              Role Import - GRC 10

              Import Role from ECC to GRC system

              wiki.png Business Roles concept and usability in GRC AC10 

               

               

              Emergency Access Management (EAM)

              EAM - For the new kid on the block

              EAM - Provisioning Strategies

              ID-Based Firefighting vs. Role-Based Firefighting

              AC 10.0 - Centralized Emergency Access

              Configure Emergency Access (EAM) in GRC 10

              De-centralized EAM GRC 10.0

              EAM - Approve through Wrokflow

              Emergency Access Management Reporting

               

               

              See also

              SAP GRC Process Control - Useful Documents, Blogs, Resources, etc.

              SAP GRC Risk Management - Useful Documents, Blogs, Resources, etc.

              SAP Fraud Management - Useful Documents, Blogs, Resources, etc.

               

              Legend

               

              document.pngSAP SCN Documents
              blog.pngSAP SCN Blogs
              wiki.pngSAP Wiki

               

               

              Please help in updating the collection so that new users can get a well structured overview for their information.

               

              Best regards,

              Alessandro

              ARA - For the new kid on the block

              $
              0
              0

              G’Day All,

               

              Considering the fact that so many people out here, have so selflessly shared their expertise through blogs, answers etc. So its only fair that I do my bit to balance the scales. Now if what I contribute is worth it or not, that's a different story and I shall leave it to the moderators to judge for themselves.

               

              The topic I would like to present to you is ARA. Just a heads up that whatever is presented here is just an overview of my understanding of what ARA is (from what I read here and SAP documentation) and how it works. I’ll leave it to the experts here to make corrections/suggestions if the need be for the benefit of everyone reading this document and myself included.


              A lot of the key terminology has been explained rather brilliantly by Alessandro in the following two documents, so there is no point in me trying to reinvent the wheel.

               

              http://scn.sap.com/docs/DOC-54434

              http://scn.sap.com/docs/DOC-54530

               

              So here we go.

               

              Access Risk Analysis - ARA

              Analyzing Risks associated with Access

              Risk: when an Employee in a Company is assigned with Task/Tasks that could provide him/her with an opportunity to commit fraud

              Employee -> Company -> Task/Tasks -> Opportunity -> Fraud

               

              Tasks are assigned to the employee in form of Roles, which are made up of Actions/Tcodes, which in turn are made up Permissions/Authorizations

              Workshops with BP Owners and other relevant personnel would have to be conducted to gather information about the Risks associated with the following:

               

              Roles -> Actions/Transaction Codes -> Permissions/Authorizations

               

              Role1                Action1  Action2             Permission1   Permission2

              Role2                Action3  Action4             Permission3   Permission4

              Based on the information gathered we need to define the Risks

               

                  . Action1= Conflicting Action   .Action2= Conflicting Action.   Action3= Critical Action    .Permission1= Critical Permission

              Function1= Action1   .Function2= Action2   .Function3=Action3   .Function4= Permission1

              Risk 1= Function1+Function2 . Risk 2= Function3

              Rule is a condition: If Function1+Function2 is given to a user Then it is a Risk 

              Therefore Rule1 is generated against Function1, Function2 and Risk1

               

              *Example: Action1= XK99: Vendor Mass Maintenance .Action2= ME2L: Maintain Purchase Order - Purchasing

              Risk= Create a fictitious vendor and initiate purchases to that vendor


              Run a Risk Analysis against all the Risks defined



              Based on the Analysis, Remediate the Risks by executing cleanup process by Re-designing/defining the roles.

              This can be done through Simulation to check if the defined Risks will be eliminated if  the cleanup is executed.


              In certain unavoidable circumstances Remediation isn’t an option, so the solution is to Mitigate the Risk

               

                                       Mitigation                       

                

              PreventionDetection

               

              Super User Access

              Mitigation Control

              Audits

              Alerts

              So when you create a Mitigation Control:

              You specify the Risk Ids and the OU they are associated with->  The Risk Ids will look up the Function they are associated with->

              Functions will look up the Actions (T-codes) they are associated with. Assign an Owner and Controller to the MC and 

              tie all of this up to an end user/role/profile who is assigned with a role/roles, which could pose a threat. 


              To Ensure all the hard work done so far does not go for a waste, run

              SOD review, Audit Trails and Risk Analysis on a periodic basis



              SOD Management Process

              The entire process described above is termed as 'SOD Management Process'.


              Segregation of Duties (SoD) is an internal control within a Company implemented to prevent or decrease the risk of errors or regulatory irregularities and ensure corrective action is taken. Ideally, no one individual must have the authority of:

              Creation .Modification .Reviewing .Deletion

               

              SoD ensures no single user has access to separate phases of these business transactions. This is done by Dividing, Distributing and Allocating key tasks amongst various individuals thereby eliminating or at least reducing the possibility of errors and fraud. All of this is carried out in three separate phases:


              Phase 1

              Risk Recognition

              Rule Building & Validation


              Phase 2

              Risk Analysis

              Remediation

              Mitigation


              Phase 3

              Continuous Compliance

               

              *Credit for the following SOD Management Process flow goes to: Alessandro& Colleen

              StepsDescription
              step1.png

              Gather a list of applicable SOD conflicts that allow fraud or generate significant errors. The outcome of this step is that your business has determined what is an unacceptable risk that they want to report on and manage via remediation or mitigation.

               

              Helpful documents:

              Risk Lifecycle

              step2.png

              Build the rule set based on the recognized risks from step 1. The outcome of this step is the technical rule set to analyze the user and/or role assignments.

               

              Helpful documents:

              Business Risks / Rule Set

              Rule set - Rules & Rule Types

              step3.png

              Analyze the SoD output. This can be performed with the help of SAP GRC Access Control. In case of manual analysis, for each user, analyze if he/she has the access to perform any of the conflicting functions defined in step 1. The outcome is basically to provide the business insight to alternatives for correcting or eliminating discovered risks.

               

              Helpful documents:

              Online vs. Offline Risk Analysis

              step4.png

              In this step, evaluate if the conflicting tasks can be performed by an alternate person. If so, role changes and/or user reassignments can be performed to segregate duties properly. The outcome must be a very low number of remaining risks that need mitigation.

               

              Helpful documents:

              Remediating Access Control SoD Risks

              step5.png

              If it would not be possible to remediate the existing conflicts, consider formulating an appropriate control to mitigate the risk. This would typically entail working with the business to setup additional monitoring procedures that ensure to compensate the risk. The outcome must be no remaining risks.

               

              Helpful documents:

              Internal Controls - a step towards strong controls

              Defining Mitigating Controls / Compensating Controls

              Creation of Mitigation Controls in GRC 10.0

              Mitigating Control Lifecycle

              step6.png

              Finally, establish a new continuous process wherein every access request is reviewed against the SoD conflict matrix prior to provisioning on the system. Also make sure that all role changes must be analyzed and remediated before implementing. The outcome, and also final result, your system remains clean.


              Helpful documents:

              Approve/Reject Own Requests

              Risk Terminator on SAP Wiki

              Configuration in a Nutshell

              Now that we’ve covered the what and the why part we have to get our hands dirty and physically create them. If you have access to a Server, after following SAP documentation for 'From Post-Installation to First Risk Analysis' and 'Enhanced Access Risk Analysis', try executing the following tasks:


              1. Create test users using SU01
              2. Create test roles with Critical/Conflicting Actions using PFCG
              3. Assign role/roles to test users including roles for Risk Owner , Mitigation Controller
              4. Create Access Control Owners in NWBC
              5. Activate/Check following BC Sets using ‘SCPR20’
                • GRAC_RA_RULESET_COMMON
                • GRAC_RA_RULESET_SAP_R3
                • GRAC_RA_RULESET_SAP_HR (Optional)
              6. Check Configuration Parameters of Risk Analysis: SPRO -> IMG -> GRC -> Access Control -> Maintain Configuration Settings
                • Risk Analysis
                • Function Maintenance
                • Mitigation Maintenance
                • Change Log
              7. Create/Check Business Process and Sub Process: SPRO -> IMG -> GRC -> Access Control -> Maintain Business Process and Sub processes
                • This will come in handy when creating Functions and Risks
              8. Create Organizations: SPRO -> IMG -> GRC -> Shared Master Data -> create a Root Organization Hierarchy
                • You cannot create a Mitigation Control without this
              9. Add Owners to the created Organization in NWBC: Setup -> Organizations
              10. Run following Sync Jobs:  SPRO -> IMG -> GRC -> Access Control -> Synchronization Jobs
                • Authorization Sync
                • Repository Object Sync
              11. Create the following in NWBC
                • Functions
                • Access Risks
                • Mitigation Control
              12. Run a Risk Analysis against the Risks at Role level and after the cleanup at User level
              13. Remediate using Simulation and see if it works
              14. Mitigate Risks against User/Role/Profile
              15. Create Alerts: SPRO -> IMG -> GRC -> Access Control -> ARA -> Generate Alerts
              16. Setup Batch Risk Analysis on a periodic basis:  SPRO -> IMG -> GRC -> Access Control -> ARA -> Batch Risk Analysis
              17. Setup SOD/UAR Review

              I sincerely hope this document will help you in your pursuit to get a grasp on what ARA is all about.For a more comprehensive understanding/configuration and other bits and pieces on this topic, please check out the links in the following document put together by Alessandro, which covers everything in detail. Please check under Access Risk Analysis (ARA).

              http://scn.sap.com/docs/DOC-57438


              Regards,

              Leo..

              GRC Document Collaboration Topics

              $
              0
              0

              Hi All

               

              If you are wondering what this document is all about then please refer to: Community Collaboration for GRC Blogs and Documents - you will find an overview of what this community collaboration is about and the rules on how you can contribute. You are still encouraged to write your own blogs and documents without participating in this process (it would be nice if you could update this document to let the community know you are working on something).

               

              You are also welcome to be both the person who suggests the topic and the author. This can advertise you are working on the topic and hold yourself accountable to a deadline that the community is aware of.

               

               

              Remember: Add a row below the 3rd row of the table to included your suggestion. Please do not change the first three heading rows as these rows indicate the title and a short summary of the content below. When including your name, please include your SCN profile as a hyperlink (easiest way to open your Profile in a new browser tab and copy the URL)

               

               

              Step 1: Requester to CompleteStep 2: Author to completeStep 3: Option (collaborator to complete)Step 4: Author to PublishModerator and Coordinator Override
              DateSuggestedSuggested ByDocument TypeIdeaAuthorDate DueAssistance?NameLink to itemModerator and reason for rejection
              DD/MM/YYYYYour SCN  Profile URLblog or documentTitle or topic ideaYour SCN  Profile URLDD/MM/YYYY

              do you want any assistance?

              If yes, summarise (input, review, etc)

              Your SCN profile URLSCN document or blog linkModerators or Coordinators to advise if topic is not appropriate.
              27/08/2014Alessandro Banzer / Colleen LeeDocumentAnalysis of the SAP delivered rule-set - do you accept as it is? Do you build your own or do you do something in between?Approved
              08/09/2014S ADocumentSecurity Tools/Transactions one should have in their arsenal as a GRC Consultant?Alessandro07/11/2014Input & Review byColColleen LeeApproved
              13/09/2014Colleen LeeDocumentBusiness Role Management - overview and use of the methodology customisation
              13/09/2014Colleen LeeBlogBusiness Role Manager - What are the benefits and issues with using BRM and integrating with ARA and ARQ?
              02/10/14S A)DocumentPSS - Best practices, pitfalls to avoid and things to consider while enabling PSS?Colleen Lee12/10/2014Reviewed by S.A, Alessandro & GretchenDesign Considerations to reduce Password Self Service (PSS) Intruder RiskApproved
              02/10/2014Colleen LeeBlogBRM - discussion use of profile generation to distribute role to different systems vs system transports
              02/10/2014Colleen LeeDocumentSummary of the GRC Org structure - which sections apply to AC, PC and RM and any tips on integration with ERP
              30/10/2014Darnell SuggsDocumentLink or Page to latest Configuration and Integration Documents for GRC AC 10.1 similar to SAP BOBJ AC 10.0
              Viewing all 459 articles
              Browse latest View live


              <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>