SAP Cloud Identity Access Governance (IAG) - A Primer

823 results

  1. Conduct a Workflow-Driven Risk Analysis Across Your Enterprise and Tune It to Your Business Needs

    Become acquainted with the third of the five-phase enterprise risk management (ERM) process: risk analysis. Step through the configuration to customize the risk analysis to your business needs. Learn how a risk analysis is initiated either directly by a responsible risk owner as a scheduled workflow task or by a key risk indicator (KRI) showing...…

  2. Define Risks and Functions with Risk Analysis and Remediation Rule Architect

    Discover the makeup and functionality of Rule Architect within SAP BusinessObjects Access Control Risk Analysis and Remediation. Key Concept Risk Analysis and Remediation (RAR) is part of SAP BusinessObjects Access Control. This capability helps all key stakeholders work in a collaborative manner to achieve ongoing segregation of duties (SoD) and audit compliance at all levels....…

  3. Get Your System Clean with Risk Analysis and Remediation

    Become and stay Sarbanes-Oxley compliant with Risk Analysis and Remediation. Learn about its main features, technical architecture, and setup. Key Concept SAP GRC Access Control delivers controls that identify and prevent access and authorization risks in cross-enterprise systems. The controls prevent fraud and reduce the cost of continuous compliance and control. SAP GRC Access Control...…

  4. Optimize Application Integration by Running Risk Analysis and Remediation for SAP NetWeaver Portal

    /ITThe Web-based environment of SAP NetWeaver Portal provides business users in your organization secure access to a wide array of SAP and non-SAP applications, information, and services, such as SAP ERP, analytics, business intelligence, and document repositories. The diversity of content delivered to your business users through SAP NetWeaver Portal may come with user access-related...…

  5. 3 Scenarios for Simulating Risk Analysis Processes with Risk Terminator

    Follow three scenarios that simulate risk analysis for role maintenance and user role provisioning with Risk Terminator in SAP BusinessObjects Access Control 10.0. Key Concept An access risk violation occurs when defined access control policies and procedures designed to enforce control of a user’s capability to perform specific activities in the system are compromised. In...…

  6. Increase the Success Rate of Your Strategies and Initiatives through an Enterprise Risk Management System

    Many risk managers complain about a lack of enterprise insight and alignment of risk management to the strategic objectives of their organization. With a rather manual and inconsistent approach based on emails and spreadsheets, they often fail to oversee the impact of risks to the strategic goals and whether appropriate risk responses were implemented to...…

  7. Prevent False Conflicts with Supplemental Rules in SAP Access Control

    SAP Access Control provides you with the option to create a supplementary rule. The rule gives additional information to prevent a false conflict in a segregation of duties (SoD) risk analysis report. Learn the steps you need to complete to enable the supplementary rule. Key Concept A supplementary rule for segregation of duties (SoD) risk...…

  8. Dodd-Frank Act: Standardize Risk Management Processes with SAP BusinessObjects Risk Management 10.0

    Ensure that your enterprise’s risk management procedures comply with the Dodd-Frank Act’s requirements pertaining to the management of systemic risks by using SAP BusinessObjects Risk Management 10.0. It supports the five phases of risk management. Key Concept The Dodd-Frank Act was signed into law in July 2010 in response to the 2007 US financial crisis....…

  9. Combine SAP Strategy Management and GRC Risk Management for Risk-Intelligent Strategic Execution

    Reading time: 22 mins

    In most organizations, strategic management and risk management are completely separate processes. As a result, it’s often difficult to track strategic goals over time while assessing the risks that might affect strategic initiatives. With an integrated approach to strategy and risk management, you can ensure that business owners are focusing on the right initiatives both...…

  10. Identify Your Key Business Risks in a Collaborative Process Involving All Stakeholders in Your Enterprise

    Learn about the second phase in the enterprise risk management (ERM) process, risk identification. The knowledge about your business risks is spread across your organization and lines of business. A collaborative approach is required to identify and document all risks threatening your enterprise involving many different stakeholders. Discover how SAP BusinessObjects Risk Management 3.0 provides...…