How to Simplify the Data Sources and Business Rules Logistics Process in SAP Process Control 10.1

  • by Kehinde Eseyin, Security Architect
  • April 7, 2014
Kehinde Eseyin shows you how to use standard tools for the data sources and business rules logistics process in SAP Process Control 10.1.
Learning Objectives

Reading this article, you will learn:

  • Prerequisites to successfully use the export and import tool for data sources and business rules
  • What to do when you do not have an automated monitoring application in your destination system.
  • How to seamlessly import and export data sources and business rules from one SAP GRC system to another SAP GRC system
Key Concept

Data source refers to the data to be monitored, including how and from where it is obtained. It can be associated with one or more business rules and supports search term filtering. Business rules are designed to process statements capable of influencing the collective behavior of organizations, people, and information systems. Data source and business rules largely form the major master data definitions for the delivery of continuous control monitoring capability in the SAP Process Control product suite.

Continuous controls monitoring is a functionality that is at the core of SAP Process Control. The capability relies largely on defined data sources and business rules to drive controls monitoring. Therefore, data sources and business rules are sets of important master data.

SAP Process Control supports the building of compliance, error, or fraud detection rules using a Web interface. This capability has been enhanced over time to make the maintenance of these objects easy. A lot of work goes into setting up these master data elements (data sources and business rules) and as such, SAP has designed them to be reusable so that you define them once and then use them several times across your system landscape.

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.

See more by this author


No comments have been submitted on this article. 

Please log in to post a comment.

To learn more about subscription access to premium content, click here.