Course Description

SAP GRC Access Control is a suite of capabilities that monitor, test, and enforce access and authorization controls across the enterprise. SAP GRC Access Control helps companies to comply with regulatory mandates such as Sarbanes-Oxley. Organizations can readily identify and remove access and authorization risks from IT systems, as well as embed preventive controls in business processes to stop segregation of duties (SoD) violations. 
Show more

Share

About Trainer

Kumar A
Sr. SAP GRC/Security Consultant/Trainer
Kumar is Certified SAP Security, GRC and Basis, Consultant with more than 15 years of experience in SAP Security & GRC. Present function in the role of Team Lead and Integration Manger responsible for technical implementation at Application Management Center - Asia & Africa with more than 60 ARE with 30,000+ users.
Show more

Duration

20 hrs | 38 Videos

SAP GRC AC 10.1

Duration
20 hrs
$52.15 $149.00    
Expand all
Collapse all
  • SAP GRC Introduction
    • 1.1 Introduction
    • ......Why we need SAP GRC
    • ......Target Audience
    • ......Goals for SAP GRC Course
    • ......Objective of the Course
    • ......What is SAP GRC
    • 1.2 Regulations Standards
    • ......Security Standard around the Globe
    • ......Fragmentation on Security Standard
    • ......Integrated GRC and Security Standard
    • ......How to Manage Risk
    • 1.3 Organizational Approach
    • ......Business Challenge and Solution
    • ......Business Risk Excessive Access
    • ......Who Owns SoD
    • ......Centralized and Decentralized Approach
    • 1.4 SAP GRC Overview
    • ......GRC Interaction
    • ......SAP GRC Process
    • ......Modules of SAP GRC
    • ......Access Control Components
    • 1.1 Introduction
    • ......Why we need SAP GRC
    • ......Target Audience
    • ......Goals for SAP GRC Course
    • ......Objective of the Course
    • ......What is SAP GRC
    • 1.2 Regulations Standards
    • ......Security Standard around the Globe
    • ......Fragmentation on Security Standard
    • ......Integrated GRC and Security Standard
    • ......How to Manage Risk
    • 1.3 Organizational Approach
    • ......Business Challenge and Solution
    • ......Business Risk Excessive Access
    • ......Who Owns SoD
    • ......Centralized and Decentralized Approach
    • 1.4 SAP GRC Overview
    • ......GRC Interaction
    • ......SAP GRC Process
    • ......Modules of SAP GRC
    • ......Access Control Components
  • SAP GRC Components
    • 2.1 Access Control
    • ......Access Control Components
    • ......AC Comparison with old version
    • ......Access Risk Analysis
    • ......Access Request Management
    • ......Emergency Access Management
    • ......Business Roe Management
    • ......Risk Terminator
    • 2.2 GRC and AC Harmonization
    • ......Access Control Harmonization
    • ......GRC Harmonization
    • ......IDM Integration
    • 2.3 Process Control
    • ......SAP GRC Process Control
    • ......SAP GRC Process Control
    • ......PC Monitoring Cycle
    • ......Compliance and Visibility
    • 2.4 Global Trade Services
    • ......SAP GTS
    • ......GTS Function
    • 2.5 Risk Management
    • ......Risk Management
    • ......Risk Assessment
    • ......Incident Management
    • 2.1 Access Control
    • ......Access Control Components
    • ......AC Comparison with old version
    • ......Access Risk Analysis
    • ......Access Request Management
    • ......Emergency Access Management
    • ......Business Roe Management
    • ......Risk Terminator
    • 2.2 GRC and AC Harmonization
    • ......Access Control Harmonization
    • ......GRC Harmonization
    • ......IDM Integration
    • 2.3 Process Control
    • ......SAP GRC Process Control
    • ......SAP GRC Process Control
    • ......PC Monitoring Cycle
    • ......Compliance and Visibility
    • 2.4 Global Trade Services
    • ......SAP GTS
    • ......GTS Function
    • 2.5 Risk Management
    • ......Risk Management
    • ......Risk Assessment
    • ......Incident Management
  • GRC Architecture
    • 3.1 Technical Architecture
    • ......SAP GRC landscape
    • ......SAP GRC Components
    • ......Front END Client
    • ......GRC Portal Content
    • ......Non SAP Plug-Ins, etc
    • ......Access Control Landscape
    • 3.2 User Interface
    • ......Access Work Centers
    • ......Overview Work Center
    • 3.3 GRC Authoirzation
    • ......GRC 10 Authorization
    • ......Access Control Security Objects
    • 3.1 Technical Architecture
    • ......SAP GRC landscape
    • ......SAP GRC Components
    • ......Front END Client
    • ......GRC Portal Content
    • ......Non SAP Plug-Ins, etc
    • ......Access Control Landscape
    • 3.2 User Interface
    • ......Access Work Centers
    • ......Overview Work Center
    • 3.3 GRC Authoirzation
    • ......GRC 10 Authorization
    • ......Access Control Security Objects
  • SoD Risk Management
    • 4.1 Understanding Authorization Risks
    • ......Segregation of Duties
    • ......Purchase to Pay (P2P) process
    • ......Authorization Risk in HR
    • 4.2 Managing Risk by SoD
    • SoD Risk Management
    • ......Phases of Risk Management
    • ......Rule Structure, Rule Building
    • ......Risk Management Roles
    • 4.1 Understanding Authorization Risks
    • ......Segregation of Duties
    • ......Purchase to Pay (P2P) process
    • ......Authorization Risk in HR
    • 4.2 Managing Risk by SoD
    • SoD Risk Management
    • ......Phases of Risk Management
    • ......Rule Structure, Rule Building
    • ......Risk Management Roles
  • Customizing GRC Settings
    • 5.1 GRC Settings
    • ......GRC IMG Structure
    • ......Creating & Maintaining Connection
    • ......Managing Connection Setting
    • ......Configuring Integration Scenarios
    • 5.2 Access Control Settings
    • ......BC Sets
    • ......Connection Group
    • ......IMG Configuration
    • ......Plug-in Settings
    • ......AC Customizing
    • ......Define Business Processes
    • 5.1 GRC Settings
    • ......GRC IMG Structure
    • ......Creating & Maintaining Connection
    • ......Managing Connection Setting
    • ......Configuring Integration Scenarios
    • 5.2 Access Control Settings
    • ......BC Sets
    • ......Connection Group
    • ......IMG Configuration
    • ......Plug-in Settings
    • ......AC Customizing
    • ......Define Business Processes
  • Synchronizing Repository
    • AC Repository
    • Synchronizing Jobs
    • Background Jobs
    • AC Repository
    • Synchronizing Jobs
    • Background Jobs
  • MSMP Workflow
    • 7.1 MSMP Workflow Introduction
    • ......Business Workflow
    • ......MSMP Initial Configuration
    • ......MSMP Related Roles
    • 7.2 Configuring MSMP
    • ......Process Global Settings
    • ......Maintaining Rules
    • ......Maintaining Agent
    • ......Variable and Templates
    • ......Path and Stage
    • ......Route Mapping
    • ......Generating Versions
    • 7.1 MSMP Workflow Introduction
    • ......Business Workflow
    • ......MSMP Initial Configuration
    • ......MSMP Related Roles
    • 7.2 Configuring MSMP
    • ......Process Global Settings
    • ......Maintaining Rules
    • ......Maintaining Agent
    • ......Variable and Templates
    • ......Path and Stage
    • ......Route Mapping
    • ......Generating Versions
  • Business Rules Framework Plus
    • 8.1 Introduction to Business Rules Framework
    • ......Use of BRFplus
    • ......Components of BRF+
    • ......BRFplus Rule Type
    • ......BRF+ Integration rule for MSMP
    • 8.2 Create BRF+ Rules
    • ......Define MSMP Rules
    • ......Test Result
    • ......Define BRF
    • ......Expression and Function
    • ......Table Condition and Values
    • 8.1 Introduction to Business Rules Framework
    • ......Use of BRFplus
    • ......Components of BRF+
    • ......BRFplus Rule Type
    • ......BRF+ Integration rule for MSMP
    • 8.2 Create BRF+ Rules
    • ......Define MSMP Rules
    • ......Test Result
    • ......Define BRF
    • ......Expression and Function
    • ......Table Condition and Values
  • Access Risk Analysis
    • 9.1 Maintaining Rule Set
    • ......Rule Set & Hierarchy
    • ......Risk Terminology
    • ......Configuration Setting
    • ......ARA Configuration
    • ......Crating Function and Risk
    • 9.2 Shared Master Data
    • ......Organization Hierarchy
    • ......Mitigation Controls
    • ......Mitigation Monitoring
    • ......PFCG Roles
    • 9.3 Remediating and Mitigating Risk
    • ......Risk Remediating Method
    • ......Mitigating Risk
    • ......Mass Mitigation
    • ......Audit Logs
    • 9.1 Maintaining Rule Set
    • ......Rule Set & Hierarchy
    • ......Risk Terminology
    • ......Configuration Setting
    • ......ARA Configuration
    • ......Crating Function and Risk
    • 9.2 Shared Master Data
    • ......Organization Hierarchy
    • ......Mitigation Controls
    • ......Mitigation Monitoring
    • ......PFCG Roles
    • 9.3 Remediating and Mitigating Risk
    • ......Risk Remediating Method
    • ......Mitigating Risk
    • ......Mass Mitigation
    • ......Audit Logs
  • Emergency Access Management
    • 10.1 Emergency Access Management (EAM) Overview
    • ......EAM Overview
    • ......Key players
    • ......Methods of EAM
    • ......Centralized and Decentralized EAM
    • 10.2 Emergency Access Management Configuration
    • ......Configuration
    • ......Create Firefighter ID
    • ......Assign Owners and Controllers
    • ......Maintain Reason Codes
    • ......Firefight
    • 10.3 Emergency Access Management EAM Logs Reports
    • ......Consolidated Log Report
    • ......BG job for Log Collection
    • ......FF Logs
    • 10.1 Emergency Access Management (EAM) Overview
    • ......EAM Overview
    • ......Key players
    • ......Methods of EAM
    • ......Centralized and Decentralized EAM
    • 10.2 Emergency Access Management Configuration
    • ......Configuration
    • ......Create Firefighter ID
    • ......Assign Owners and Controllers
    • ......Maintain Reason Codes
    • ......Firefight
    • 10.3 Emergency Access Management EAM Logs Reports
    • ......Consolidated Log Report
    • ......BG job for Log Collection
    • ......FF Logs
  • Access Request Management
    • 11.1 Provisioning Configuration
    • ......Provisioning Setting
    • ......End User Personalization Form
    • ......User provisioning Setting
    • ......Create Template
    • 11.2 Create Access Request
    • ......Access request roles
    • ......Create Request
    • 11.3 Access Request Log and Workflow (MSMP)
    • ......MSMP Workflows
    • ......Access Request Logs
    • 11.1 Provisioning Configuration
    • ......Provisioning Setting
    • ......End User Personalization Form
    • ......User provisioning Setting
    • ......Create Template
    • 11.2 Create Access Request
    • ......Access request roles
    • ......Create Request
    • 11.3 Access Request Log and Workflow (MSMP)
    • ......MSMP Workflows
    • ......Access Request Logs
  • Business Role Management
    • 12.1 Configuring Business Role Management
    • ......BRM Overview
    • ......Role Attributes
    • ......Role Management
    • ......Configure BRM
    • 12.2 Role Methodology & BRF+ Configuration
    • ......Role Methodology
    • ......Define BRF+ Application
    • 12.3 Role Definition & Creation
    • ......Maintain Role Owner
    • ......Role Types
    • ......Create Role
    • 12.4 Managing Roles
    • ......Role Mining
    • ......Role Mass Maintenance
    • 12.1 Configuring Business Role Management
    • ......BRM Overview
    • ......Role Attributes
    • ......Role Management
    • ......Configure BRM
    • 12.2 Role Methodology & BRF+ Configuration
    • ......Role Methodology
    • ......Define BRF+ Application
    • 12.3 Role Definition & Creation
    • ......Maintain Role Owner
    • ......Role Types
    • ......Create Role
    • 12.4 Managing Roles
    • ......Role Mining
    • ......Role Mass Maintenance
  • Report & Review
    • SoD Review
    • URA Review
    • Requesting Review
    • Configuration of Review
    • SoD Review
    • URA Review
    • Requesting Review
    • Configuration of Review
  • Conclusion

Last Viewed Video

No Video Viewed.