SAP GRC Interview Questions 1702535530
SAP GRC Interview Questions 1702535530
SAP GRC
INTERVIEW
QUESTIONS
Q2. Is there a table for authorizations where I can quickly see the values entered in a group of
fields?
A. In particular, I am looking to find the field values for P_ORGIN across a number of
authorization profiles, without having to drill down on each profile and authorization.
Q3. How can I do a mass delete of the roles without deleting the new roles?
A. There is an SAP-delivered report that you can copy, remove the system type check, and run.
To do a landscape with delete, enter the roles to be deleted in a transport, run the delete
program or manually delete and then release the transport and import them into all clients
and systems.
It is called: AGR_DELETE_ALL_ACTIVITY_GROUPS.
To use it, you need to tweak/debug and replace the code as it has a check that ensures it is
deleting SAP-delivered roles only. Once you get past that little bit, it works well.
Q4. Someone has deleted users in our system, and I am eager to find out who. Is there a table
where this is logged?
A. Debug or use RSUSR100 to find the info. Run transaction SUIM and down its Change
documents.
Q9. What is the difference between a single role & a composite role?
A. A role is a container that collects the transaction and generates the associated profile. A
composite role is a container that can collect several different roles.
Q13. What authorization is required to create and maintain user master records?
A. The following authorization objects are required to create and maintain user master records:
S_USER_GRP: User Master Maintenance: Assign user groups
S_USER_PRO: User Master Maintenance: Assign authorization profile
A Service user – Only user administrators can change the password. No check for
expired/initial passwords. Multiple logins permitted
System users are not capable of interaction and are used to perform certain system
activities, such as background processing, ALE, Workflow, and so on.
A Reference user is, like a System user, a general, non-personally related, user.
Additional authorizations can be assigned within the system using a reference user. A
reference user for additional rights can be assigned for every user in the Roles tab.
Q18. How do I change the name of master/parent role keeping the name of derived/child role
the same? I would like to keep the name of the derived /child role the same and also the
profile associated with the child roles.
A. First, copy the master role using PFCG to a role with the new name you wish to have. Then
you have to generate the role. Now open each derived role and delete the menu. Once the
menus are removed it will let you put new inheritance. You can put the name of the new
master role you created. This will help you keep the same derived role name and also the
same profile name. Once the new roles are done you can transport them. The transport
automatically includes the Parent roles.
1. CM (Check/Maintain)
An authority check is carried out against this object.
The PG creates an authorization for this object and field values are displayed for
changing.
Default values for this authorization can be maintained.
2. C (Check)
An authority check is carried out against this object.
The PG does not create an authorization for this object, so field values are not
displayed.
3. N (No check)
The authority check against this object is disabled.
The PG does not create an authorization for this object, so field values are not
displayed.
No default values can be maintained for this authorization.
4. U (Unmaintained)
No check indicator is set.
An authority check is always carried out against this object.
The PG does not create an authorization for this object, so field values are not
displayed.
No default values can be maintained for this authorization.
Q22. How we Check if the PFCG_TIME_DEPENDENCY is running for user master reconciliations?
A. Execute SM37 and search for PFCG_TIME_DEPENDENCY
Q24. What happens to change documents when they are transported to the production system?
A. Change documents cannot be displayed in transaction ‘SUIM’ after they are transported to
the production system because we do not have the ‘before input’ method for the transport.
This means that if changes are made, the ‘USR10? the table is filled with the current values
and writes the old values to the ‘USH10? table beforehand.
The difference between both tables is then calculated and the value for the change
documents is determined as a result. However, this does not work when change documents
are transported to the production system.
The ‘USR10? table is automatically filled with the current values for the transport and there
is no option for filling the ‘USH10? table in advance (for the history) because we do not have
a ‘before input’ method to fill the ‘USH10? a table in advance for the transport.
Q25. What is the difference between the table buffer and the user buffer?
A. The table buffers are in the shared memory. Buffering the tables increases performance
when accessing the data records contained in the table. Table buffers and table entries are
ignored during startup. A user buffer is a buffer from which the data of a user master record
is loaded when the user logs on. The user buffer has different setting options with regard to
the ‘auth/new_buffering’ parameter.
Q28. How Can I massly erase the roles without erasing the new roles?
A. There is an SAP report that removes the system type check and runs. To do a landscape
with delete first enter the deleted roles to be deleted in a transport, run the erased program
or manually erased, and then leave the transport and include it into all kinds of systems. To
use it you have to replace the code and check the SAP delivered roles only.
Q31. If UR using 10 firefighter IDS at a time? How will the log report go to the controller?
A. This is assigned to the users with changing roles with high-level comparison.
Q39. Is it possible to lock all the users at the same time in SAP system?
A. Yes, using Tcode EWZ5.
Q41. How do you perform in the SAP system using GRC access control?
A. SAP GRC access control uses UNE roles to control the system and administrator actions
which represent the smallest entity of UME role that a user can build access rights.
Q44. What are the key activities that process control shares with access controlling GRC?
A. In the process control solution, controls are activated as mitigation control in access
control under the SAP GRC 10.0 solution.
Access control and process control share the same organization.
Process control and access control are integrated access risk analyses to monitor
segregation of duties (SOD).
Q46. What are the different activities that can be performed under IAM?
A. The audit universe contains audit entities
Audit risk rating
Audit planning to define the procedure for audit compliance.
Audit issues for audit actions.
Audit reports see what risks are there on auditable entities?
Q52. What is the difference between preventive mitigation controls and detective mitigation
controls?
A. Configuration
User exit
Security
Define workflow
Custom object
Q53. What are the critical Tcodes and authorization objects R/3?
A. User master records are critical one SU01, PFCG, RZ10, RZ11, SU21, Su03, and many more.
S_Tabu_DIS
S_USER_PRO
S_USER_GRP
It can also be used to remotely analyze an ERP system that may be present in a different
ERP Landscape.
Q58. How can find out whether CUA (Central User Administration) is configured on your sap
system?
A. Execute su01 You can find a tab called system tab... If the system tab is not displayed there
in the su01 screen there is no CUA that is configured.
Q61. Does s_tabu_dis org level values in a master role gets reflected in the child role?
A. If we do the adjusted derived role in the master role while updating the values in the master
role then values will be reflected in the child roles.