Simplifying SAP Security Management with the Xiting Security Platform (XSP)

802 results

  1. Shared Master Data Management with SAP Access Control and SAP Process Control

    SAP Access Control and SAP Process Control have common master data elements that are consumed by both applications. Jitan Batra explains how the architectural shift back to ABAP for SAP Access Control 10.0 not only allows SAP Access Control and SAP Process Control to coexist in the same system, but also allows sharing of common...…

  2. How to Prepare for a Comprehensive System Audit and Technical Review of SAP Access Control 10.0

    Learn invaluable tricks and tips for overcoming top auditing issues specific to an SAP Access Control 10.0 system. Key Concept A system audit is an exercise performed to gain assurance that defined controls work as intended, thereby eliminating the likelihood of fraudulent or malicious activities in the enterprise system. It involves the verification of conformance...…

  3. Make Sure Ineffective Mitigation Controls in SAP Process Control Don’t Live On in SAP Access Control

    In the integration scenario between SAP Access Control and SAP Process Control, mitigation controls created in SAP Process Control can be used to mitigate access risks for users in SAP Access Control. Subsequently, when an assessment in SAP Process Control finds a control is ineffective, a mechanism is required to delete the respective controls in...…

  4. Enhanced Alerts in SAP Access Control 10.x

    Alerts are more enhanced in Access Control 10.0 and 10.1 as compared to the Access Control 5.x releases. From the 10.x release and on alerts are generated only when an access risk is satisfied at the permission level, which eradicates false positive alerts. An example illustrates the enhanced alerts. Also gain insight into mitigation control...…

  5. SAP Access Control Implementation: The Myths, Truths, and Tricks (Part 1)

    Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. See how to configure the system correctly to achieve your defined business requirements. Key Concept Myth often refers to certain assumptions or thoughts about the capability of a tool or product, either positive or negative, with or without an empirical basis...…

  6. How to Detect BPC Risk in SAP Access Control

    Discover how to detect cross-system risk between SAP ERP and SAP Business Planning and Consolidation (BPC). See how BPC task profiles map to business functions and understand how to create cross-system connector groups and assign appropriate connectors to that group. Key Concept Cross-system groups logically define what connectors are involved in cross-system risk analysis. Task...…

  7. Prevent False Conflicts with Supplemental Rules in SAP Access Control

    SAP Access Control provides you with the option to create a supplementary rule. The rule gives additional information to prevent a false conflict in a segregation of duties (SoD) risk analysis report. Learn the steps you need to complete to enable the supplementary rule. Key Concept A supplementary rule for segregation of duties (SoD) risk...…

  8. SAP Access Control Implementation: The Myths, Truths, and Tricks (Part 2)

    Correct certain assumptions about the SAP Access Control system that are not necessarily true and obtain guidance on how to meet specific complex business requirements during an implementation project, including maintenance and support activities. Key Concept Myth is often the result of wishful thinking about the capability of a product that most times is unfounded....…

  9. SAP Access Control Implementation: The Myth, Truth, and Tricks (Part 2)

    Correct certain assumptions about the SAP Access Control system that are not necessarily true and obtain guidance on how to meet specific complex business requirements during an implementation project, including maintenance and support activities. Membership Required You must be a member to access this content.View Membership LevelsAlready a member? Log in here

  10. Combine SAP NetWeaver Identity Management and SAP Access Control to Automate Management of IT and ERP Access and Identity

    Learn about options for combining SAP Access Control and SAP NetWeaver Identity Management to support automation of identity and access processes and compliance requirements within your organization. Key Concept An integrated software solution that combines SAP NetWeaver Identity Management and SAP Access Control enables you to automate access governance and identity management capabilities to support...…