Unlocking the Real Power of SAP GRC Access Control Solution with VASPP Add-Ons

794 results

  1. How to Prepare for a Comprehensive System Audit and Technical Review of SAP Access Control 10.0

    Learn invaluable tricks and tips for overcoming top auditing issues specific to an SAP Access Control 10.0 system. Key Concept A system audit is an exercise performed to gain assurance that defined controls work as intended, thereby eliminating the likelihood of fraudulent or malicious activities in the enterprise system. It involves the verification of conformance...…

  2. Shared Master Data Management with SAP Access Control and SAP Process Control

    SAP Access Control and SAP Process Control have common master data elements that are consumed by both applications. Jitan Batra explains how the architectural shift back to ABAP for SAP Access Control 10.0 not only allows SAP Access Control and SAP Process Control to coexist in the same system, but also allows sharing of common...…

  3. Make Sure Ineffective Mitigation Controls in SAP Process Control Don’t Live On in SAP Access Control

    In the integration scenario between SAP Access Control and SAP Process Control, mitigation controls created in SAP Process Control can be used to mitigate access risks for users in SAP Access Control. Subsequently, when an assessment in SAP Process Control finds a control is ineffective, a mechanism is required to delete the respective controls in...…

  4. What’s New in Version 10.0 of SAP BusinessObjects Access Control?

    Learn about the key benefits arising from recoding version 10.0 of SAP BusinessObjects Access Control on the ABAP platform and its harmonization with other SAP BusinessObjects GRC solutions such as version 10.0 of SAP BusinessObjects Process Control and version 10.0 of SAP BusinessObjects Risk Management. Walk through the key improvements in the areas of access...…

  5. Enhanced Alerts in SAP Access Control 10.x

    Alerts are more enhanced in Access Control 10.0 and 10.1 as compared to the Access Control 5.x releases. From the 10.x release and on alerts are generated only when an access risk is satisfied at the permission level, which eradicates false positive alerts. An example illustrates the enhanced alerts. Also gain insight into mitigation control...…

  6. How to Migrate Your Current SAP BusinessObjects Access Control Deployment to Version 10.0

    Version 10.0 of SAP BusinessObjects Access Control comes with a revised platform and runs on an SAP NetWeaver application server ABAP. If you want to upgrade your current implementation of SAP BusinessObjects Access Control you’ll need to migrate your data using export and import tools provided with the software. Learn how to plan a migration...…

  7. SAP Access Control Implementation: The Myths, Truths, and Tricks (Part 1)

    Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. See how to configure the system correctly to achieve your defined business requirements. Key Concept Myth often refers to certain assumptions or thoughts about the capability of a tool or product, either positive or negative, with or without an empirical basis...…

  8. How to Detect BPC Risk in SAP Access Control

    Discover how to detect cross-system risk between SAP ERP and SAP Business Planning and Consolidation (BPC). See how BPC task profiles map to business functions and understand how to create cross-system connector groups and assign appropriate connectors to that group. Key Concept Cross-system groups logically define what connectors are involved in cross-system risk analysis. Task...…

  9. Prevent False Conflicts with Supplemental Rules in SAP Access Control

    SAP Access Control provides you with the option to create a supplementary rule. The rule gives additional information to prevent a false conflict in a segregation of duties (SoD) risk analysis report. Learn the steps you need to complete to enable the supplementary rule. Key Concept A supplementary rule for segregation of duties (SoD) risk...…

  10. SAP Access Control Implementation: The Myths, Truths, and Tricks (Part 2)

    Correct certain assumptions about the SAP Access Control system that are not necessarily true and obtain guidance on how to meet specific complex business requirements during an implementation project, including maintenance and support activities. Key Concept Myth is often the result of wishful thinking about the capability of a product that most times is unfounded....…