cssadhar Posted September 24, 2014 Report Share Posted September 24, 2014 Course Content Introduce SAP Governance, Risk, and Compliance (GRC) 10.0 Identify key governance process supported in the GRC 10.0 solution Identify risk process supported in the GRC 10.0 solution Identify compliance processes supported in the GRC 10.0 solution Identify applications that integrate with the GRC 10.0 solution Describe how common functions and relative master data are shared across GRC solutions Describe the IMG organization for GRC 10.0 Configure report presentation Configure report structure Configure report content The GRC 10.0 User Interface Work Centers Harmonized Navigation Common Functions and Data User Interface Configuration Framework Shared Master Data Implementation and Configuration Streamlined Configuration Reporting Configure reports without programming SAP GRC 300 (SAP Access Control 10.0 - Implementation and Configuration) Discuss Harmonization topics as they relate to Access Control Explain how GRC helps you to address business challenges Identify authorization risks in typical business processes Describe the Segregation of Duties Risk Management Process Describe and configure functionality and features for SAP Access Control 10.0 Describe the Access Control 10.0 architecture and landscape Describe the Access Control 10.0 Access Control Repository Describe the Access Control 10.0 Object Level Security Describe how to upgrade from Access Control 5.3 to Access Control 10.0 Explain the post-installation steps for Access Control 10.0 Describe the Periodic Access Review process Configure Access Control to support the integration of Identity Management Plan for and manage emergency access Discuss the reporting framework Configure workflows, including multi-stage multi-path (MSMP) workflows and BRF+ Describe how the different components of the GRC application integrate with each other Discuss key steps in the Access Control implementation process Risk Analysis Framework System-Specific Mitigation Mass Mitigation Emergency Access Management Emergency Access Management Overview Centralized Firefighting Plan for Emergency Access Monitor Emergency Access Design and Manage Roles Configure Role Management Configure Role Methodology Plan for Technical Role Definition Plan for Business Role Definition Consolidate Roles through Role Mining Mass Manage Roles Provision and Manage Users Plan for User Access Plan for Human Resources Integration Define User Provisioning Design End User Personalization Forms Request Approval Periodic Access Review Process Plan Periodic Review Review Access Risk (SoD Review) Monitor User Access Monitor Role Access Business Rule Framework (BRF) Define workflow related Multi-Stage Multi-Path Workflow Rules Define business rules using the BRF Workbench Create BRFplus rules & Reporting Reporting Framework Change Existing Reports Add Custom Fields to Access Requests and Roles Access Control Implementation Process Implementation Process Overview Project Teams Designing the Access Control Solution Upgrade and Migration Configuring Access Control using the IMG Implementing the Solution Optimizing and Enhancing the Solution Contact Us:309-200-3848 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.