SAP Cloud Identity Access Governance (IAG) - A Primer
Skip to Posts
Filter By
Browse By
- SAP Analytics and AI
- SAP Application Development and Integration
- All SAP Application Development and Integration
- SAP ABAP
- SAP ABAP Development Tools
- SAP ABAP Test Cockpit
- SAP API Management
- SAP BAPI
- SAP Basis
- SAP BRF
- SAP Business Application Studio
- SAP CMS
- SAP Design Studio
- SAP Development Tools
- SAP DevOps
- SAP EAI
- SAP EDI
- SAP Extension Suite
- SAP Fiori
- SAP Fiori Elements
- SAP Integration Suite
- SAP Low Code Application Development
- SAP Low Code Automation
- SAP Netweaver
- SAP Release Management
- SAP UI5
- SAP Web Application Server
- SAP Web IDE
- SAP Business Process Management
- SAP Center of Excellence
- SAP CIO
- SAP Customer Experience
- SAP Data and Data Management
- All SAP Data and Data Management
- SAP BW
- SAP BW/4HANA
- SAP Crystal Reporting
- SAP Data Archiving
- SAP Data Center
- SAP Data Governance
- SAP Data Integration
- SAP Data Migration
- SAP Data Quality
- SAP Data Services
- SAP Data Strategy
- SAP Data Visualization
- SAP Data Warehouse Cloud
- SAP DMS
- SAP Document Control
- SAP EIM
- SAP ETL
- SAP ETL Tools
- SAP HANA
- SAP HANA Administration
- SAP HANA Deployment Infrastructure
- SAP HANA Studio
- SAP Master Data
- SAP Master Data Governance
- SAP MDM
- SAP Enterprise Architect
- SAP Enterprise Asset Management
- SAP ERP
- SAP Finance
- All SAP Finance
- SAP Accounting
- SAP AR AP
- SAP Asset Accounting
- SAP Billing Systems
- SAP BPC
- SAP BRIM
- SAP Cash Management
- SAP Central Finance
- SAP Controlling
- SAP COPA
- SAP Cost Center Accounting
- SAP e-invoicing
- SAP FICO
- SAP Finance Automation
- SAP Financial Closing Cockpit
- SAP Financial Consolidation
- SAP Financial Planning
- SAP FX Risk
- SAP General Ledger
- SAP Global Tax Management
- SAP Hyperion
- SAP Order to Cash
- SAP Payment Processing
- SAP Profitability Analysis
- SAP Rebate Management
- SAP S/4HANA Finance
- SAP Universal Journal
- SAP Governance Risk and Compliance
- SAP Human Capital Management
- SAP Intelligent Technologies
- SAP Platform and Technology
- All SAP Platform and Technology
- SAP Business Technology Platform
- SAP Cloud Connector
- SAP Cloud Integration Platform
- SAP Cloud Migration
- SAP Cloud Platform
- SAP Cloud Providers
- SAP Cloud Strategy
- SAP Container Platform
- SAP Digital Asset Management
- SAP Digital Integration Hub
- SAP Digital Signature
- SAP HANA Enterprise Cloud
- SAP HEC
- SAP Hyperscalers
- SAP Infrastructure
- SAP Messaging
- SAP Smart Forms
- SAP Quality and Testing
- SAP Security
- SAP Spend Management
- SAP Supply Chain Management
- All SAP Supply Chain Management
- SAP APO
- SAP Asset Management
- SAP Business Network
- SAP Digital Manufacturing Cloud
- SAP Digital Twin
- SAP EWM
- SAP IBP
- SAP Inventory Management
- SAP Label Printing
- SAP Logistics
- SAP Manufacturing
- SAP Manufacturing Automation
- SAP MES
- SAP MII
- SAP MM
- SAP MRO
- SAP MRP
- SAP Order Management
- SAP Plant Maintenance
- SAP PLM
- SAP Production Planning
- SAP S&OP
- SAP SD
- SAP SPM
- SAP Supply Chain Planning
- SAP Track and Trace
- SAP Transportation Management
- SAP System Administration
819 results
-
Perform Risk Analysis Using a Point-Based Scoring Method for Probability and Impact
A risk is basically any event that can prevent executive management from meeting the defined business goals of an organization. Learn how to perform risk analysis using a simplified score-based concept that involves numeric-centric evaluation. Key Concept Risk management is the identification, analysis, and prioritization of risks followed by the optimal use of resources to…...… -
Conduct a Workflow-Driven Risk Analysis Across Your Enterprise and Tune It to Your Business Needs
Become acquainted with the third of the five-phase enterprise risk management (ERM) process: risk analysis. Step through the configuration to customize the risk analysis to your business needs. Learn how a risk analysis is initiated either directly by a responsible risk owner as a scheduled workflow task or by a key risk indicator (KRI) showing…...… -
Define Risks and Functions with Risk Analysis and Remediation Rule Architect
Discover the makeup and functionality of Rule Architect within SAP BusinessObjects Access Control Risk Analysis and Remediation. Key Concept Risk Analysis and Remediation (RAR) is part of SAP BusinessObjects Access Control. This capability helps all key stakeholders work in a collaborative manner to achieve ongoing segregation of duties (SoD) and audit compliance at all levels…....… -
-
Get Your System Clean with Risk Analysis and Remediation
Become and stay Sarbanes-Oxley compliant with Risk Analysis and Remediation. Learn about its main features, technical architecture, and setup. Key Concept SAP GRC Access Control delivers controls that identify and prevent access and authorization risks in cross-enterprise systems. The controls prevent fraud and reduce the cost of continuous compliance and control. SAP GRC Access Control…...… -
Optimize Application Integration by Running Risk Analysis and Remediation for SAP NetWeaver Portal
/ITThe Web-based environment of SAP NetWeaver Portal provides business users in your organization secure access to a wide array of SAP and non-SAP applications, information, and services, such as SAP ERP, analytics, business intelligence, and document repositories. The diversity of content delivered to your business users through SAP NetWeaver Portal may come with user access-related…...… -
3 Scenarios for Simulating Risk Analysis Processes with Risk Terminator
Follow three scenarios that simulate risk analysis for role maintenance and user role provisioning with Risk Terminator in SAP BusinessObjects Access Control 10.0. Key Concept An access risk violation occurs when defined access control policies and procedures designed to enforce control of a user’s capability to perform specific activities in the system are compromised. In…...… -
Increase the Success Rate of Your Strategies and Initiatives through an Enterprise Risk Management System
Many risk managers complain about a lack of enterprise insight and alignment of risk management to the strategic objectives of their organization. With a rather manual and inconsistent approach based on emails and spreadsheets, they often fail to oversee the impact of risks to the strategic goals and whether appropriate risk responses were implemented to…...… -
-
Prevent False Conflicts with Supplemental Rules in SAP Access Control
SAP Access Control provides you with the option to create a supplementary rule. The rule gives additional information to prevent a false conflict in a segregation of duties (SoD) risk analysis report. Learn the steps you need to complete to enable the supplementary rule. Key Concept A supplementary rule for segregation of duties (SoD) risk…...… -
Dodd-Frank Act: Standardize Risk Management Processes with SAP BusinessObjects Risk Management 10.0
Ensure that your enterprise’s risk management procedures comply with the Dodd-Frank Act’s requirements pertaining to the management of systemic risks by using SAP BusinessObjects Risk Management 10.0. It supports the five phases of risk management. Key Concept The Dodd-Frank Act was signed into law in July 2010 in response to the 2007 US financial crisis…....… -
Harness Risk Threshold Definition to Drive Ad Hoc Risk Escalation
Kehinde Eseyin shows how to configure, create, and process ad hoc risk escalations using SAP Risk Management 10.1. Key Concept Risk threshold is a reflection of the amount of risk an organization is ready to tolerate. Because risk threshold can be defined at the organizational unit level based on specific metrics, such as size, revenue,…...…
Become a Member
Unlimited access to thousands of resources for SAP-specific expertise that can only be found here.
Upcoming Events
Related Vendors
Your request has been successfully sent
This website uses cookies. If you continue to use the site you consent to our use of cookies in accordance with our Cookie Policy.ACCEPT Read More
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.