GRCAC Contents 03
GRCAC Contents 03
X
Goals:
Security Training
Explain how SAP GRC Access Control (Risk Analysis and Remediation, Super user Privilege Management, Compliant User Provisioning and Enterprise Role Management) works in combination with SAP business processes.
Demonstrate the functionalities and usage of the different components within SAP GRC
Access Control Discuss how to use the SoD Management process as standard approach for implementing SAP GRC Access Control Configure and use workflow-based SoD and User Access Reviews to ensure a continuous assessment of the risk situation by the business process owners Discuss how the use of Enterprise Role Management will help to maintain a clean SoD environment with respect to your organizations roles. Identify the integration points across the whole SAP GRC Access Control Suite Implementation strategy of GRC Access Control Project. Course Based on Software Release
SAP GRC Access Control 5.3 SAP ERP Central Control 6.0 Duration :30 HRS
SAP R/3 Architecture SAP Basis Security Authorization concept User and Role creation Concept of Derived role Derived Role benefits Exercise on Role creation (Hands-On) Auditing and Monitoring Security Reports
2.SoD overview
10. 11. 12. 13. 14.
SOX Compliance SoD Management Process Phases SoD Implementation Methodology SoD Matrix How Risk Analysis & Remediation/CC compatible to SoDs.
Security Training
Why GRC? SAP GRC Components Product architecture SAP GRC Access Control 5.3 suite features Prerequisites Installation System Landscape SAP GRC Access Control Authorizations
Overview Architecture Verification of Installation Getting Clean using RAR Compliance Calibrator tabs Exercise Implementation Process Flow User Management Engine Key Terminology Introduction to the SoD Risk Management Process RAR Rule Architect SoD Rule Building Process Exercise Rule Library Management View- Risk Violations Risk Analysis Adhoc Reports Risk Analysis Risk Remediation Simulation Exercise Alerts Exercise Mitigation Exercise Organizational Rules and Organizational Level Reporting Exercise Continuous Compliance Operational guide
Security Training
Overview Verification of Installation Exercise Super user Privilege Management functionality and uses SPM configuration SPM Reports Exercises
Overview Verification of Installation Compliant User Provisioning Functionality Integration with RAR & ERM Workflow-based Reviews Compliant User Management Lifecycle Work flow creation Super user access workflow Request creation and approval flow Types of workflows Configurations Different reports Exercises
Overview Verification of Installation Configuration Review Workflow Steps Access Control Integration Integration between all Access Control Products Compliance Reporting Role creation workflow
Security Training
8. Project flow methodology Project preparation Requirement gathering Blue print Architecture & SLD Operational steps
9. GRC 10 Introduction