Access Risk Management

[41 Matches Found]
Page 1 of 3         1 2 3      
Article icon
Financials – 

Learn how ConocoPhillips uses SAP Access Control tools to conduct periodic reviews, gather transaction usage statistics, and determine who is accessing its SAP systems. Find out how the company integrated the access control suite, access request management, and business role management functionality to make user access reviews fully operational in version 10.x.


Article icon
by Suman Puthadi, Associate Architect, SAP Labs India Pvt. Ltd. December 11, 2017
SAP Professional Journal/Financials – 

Suman Puthadi explains the steps for the mass maintenance of mitigation control owners. He also explains the steps for the mass maintenance of risk owners across Access Request Management.


Article icon
SAP Professional Journal/BI/Financials/HR/SCM – 

Hernan Huwyler goes over the particular requirements for reviewing the user and database access in your SAP system to prepare for the new General Data Protection Regulation (GDPR) in the European Union. Controls should be reinforced on user and database rights to access tables with personal information. Documentation, validation, and coordination should also be more comprehensive. 


Article icon
by Neha Garg, Senior Developer, SAP Labs India Pvt. Ltd. January 12, 2017
SAP Professional Journal/Financials/HR – 

Neha Garg explains what SAP Cloud Identity Access Governance is and what organizations can expect to gain from SAP Cloud Identity Access Governance and its newly released SAP Cloud Identity Access Governance, access analysis service in comparison with SAP Access Control.


Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. December 16, 2016
SAP Professional Journal/Financials/HR – 

Joshu Madina explains the process of identifying invalid mitigation assignments for user-level mitigations and role-level mitigations. He also provides you with details regarding extending the validity for expired mitigations and deleting invalid mitigation assignments.


Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin explains how to configure an SAP Enterprise Threat Detection (SAP ETD) system and set up the SAP NetWeaver ABAP system as a log provider for enhanced log mining, threat detection, improved system security, and forensic investigation.


Article icon
by Vinay Gupta, Senior Software Engineer, SAP Labs India Pvt. Ltd. February 8, 2016
SAP Professional Journal/Financials – 

Vinay Gupta explains how to certify roles and different attributes in role certification. He also provides you with details regarding role certification jobs.


Article icon
by Kehinde Eseyin, Security Architect January 4, 2016
SAP Professional Journal/Financials – 

In part 2 of his series, Kehinde Eseyin corrects assumptions about the SAP Access Control system that are not necessarily true and provides guidance on how to meet specific complex business requirements during an implementation project, including maintenance and support activities.


Article icon
by Kehinde Eseyin, Security Architect December 14, 2015
SAP Professional Journal/Financials – 

Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. Kehinde Eseyin shows how to configure the system correctly to achieve your defined business requirements.


Article icon
by Nitin Aggarwal , Chartered Accountant and Certified Information Systems Auditor, Infosys | Sanjeev Kotwal, ABAP Technical Consultant, Infosys November 25, 2015
SAP Professional Journal/BI – 

Nitin Aggarwal and Sanjeev Kotwal show the various options available to customize SAP Access Control to provide automated provisioning of dynamic analysis authorization values in SAP Business Warehouse (SAP BW) systems.


Article icon
by Akansha Gupta, Senior Developer in SAP: Access Control, SAP Labs India Pvt. Ltd. September 28, 2015
SAP Professional Journal/Financials – 

SAP Access Control provides you with the option to create a supplementary rule. The rule gives additional information to prevent a false conflict in a segregation of duties (SoD) risk analysis report. Akansha Gupta outlines the steps you need to complete to enable the supplementary rule.


Video icon
by Tom LaBonte, Senior Manager, Risk and Vulnerability Team, Honeywell Global Security June 29, 2015
Financials/SAP Professional Journal – 

Learn how Honeywell implemented and continues to use SAP Access Control 10.1.


Article icon
by Jitan Batra, Senior Developer for SAP Access Control and Process Control, SAP Labs India, Pvt. Ltd. February 13, 2015
SAP Professional Journal/HR/Financials – 
SAP Access Control and SAP Process Control have common master data elements that are consumed by both applications. Jitan Batra explains how the architectural shift back to ABAP for SAP Access Control 10.0 not only allows SAP Access Control and SAP Process Control to coexist in the same system, but also allows sharing of common master data elements to produce a much more tightly integrated solution.

Video icon
by Alex Joseph, SAP GRC Practice Manager, itelligence Group November 13, 2014
SAP Professional Journal – 

In this webinar, Alex Joseph of itelligence explains how to get your SAP system clean, how to keep it clean, and how to maintain control of your SAP system with SAP Access Control.

 


Article icon
by Gary Prewett, Security Practice Lead, NIMBL July 31, 2014
SAP Professional Journal/Financials – 

Gary Prewett explains how to configure SAP Access Control and SAP Business Planning and Consolidation (BPC) to detect cross-system risk.


Quick tips icon
by Meta Hoetjes, SAP Security Expert, CSI-tools December 31, 2013
SAP Professional Journal/Financials – 
Meta Hoetjes defines what access governance is and explains why it is so important for organizations to use good supporting tools for implementing access governance in organizations using SAP systems.

Article icon
by Dr. Susanne Rothaug, Solution Manager, SOA Middleware, SAP AG | Matthias Kaempfer, Solution Manager, SAP NetWeaver Foundation, SAP August 20, 2013
SAP Professional Journal/Financials – 

Follow these typical scenarios of an implementation of SAP NetWeaver Single Sign-On. They reflect the challenges that users face with authentication in heterogeneous environments and show how SAP NetWeaver Single Sign-On can help overcome them. You can use it in the most diverse environments, including on-premise, on-demand, and legacy applications.


Article icon
by Alpesh Parmar, Managing Partner, ultimumIT, Inc. August 19, 2013
HR/SAP Professional Journal/Financials – 

Learn steps to configure SAP Access Control 10.0 to integrate with SAP ERP HCM. Take advantage of the HR Trigger functionality in SAP Access Control 10.0 to automatically provision and de-provision access via HR event triggering.


Video icon
by Selva Kumar, Vice President, Auditbots July 30, 2013
SAP Professional Journal/Financials – 

SU24 is used to link an authorization object to a transaction. In this video Selva Kumar, vice president, AuditBots, shows you how you can also make the program check and uncheck the authorization object. This configuration is also used in SAP Access Control for identifying objects to be part of the SAP Access Control ruleset.


Video icon
by Selva Kumar, Vice President, Auditbots July 30, 2013
SAP Professional Journal/Financials – 

When you have a new custom transaction in your system, you need to perform a trace to identify the authorization object for which that particular transaction is looking. In this video, Selva Kumar, vice president, AuditBots, explains how this object can be used for updating transaction SU24 with proper authorization values for the custom transaction.


Page 1 of 3         1 2 3