Contact@bruhastech.com +91-9059761442

SAP SECURITY

 Best SAP- SECURITY & GRC Training in Hyderabad

SAP R/3 SECURITY

• User administration & Types of Users
• Authorizations
• Authorization Objects
• Authorization profiles
• Programming authorizations
• Authorizations groups
• Missing authorization
• Authorizations Trace
• Roles
• Composite Role
• Single Role
• Derived Role
• Parent Role & Child Role
• Transportation of Roles & Role Mitigation
• The complete User status (SUIM)
• Mass Locking & Unlocking of Users Restricting access to SAP* & DDIC
• Central user administration (CUA)

SAP BI SECURITY

• BI Architecture and Administration
• Business Explorer
• Security Components in BI
• Comparison of OLTP and OLAP Security Needs
• Authorizations in BI
• Administration
• Reporting
• Securing Data Access for Administration Users
• Securing Data Access for Reporting Users
• Analysis Authorization
• Securing Data Access for Reporting Users
• How to Use BI-Specific Authorization Values
• Defining Security Using Hierarchies Monitoring Analysis Authorizations (Trace Functions)
• Important Aspects of BI Authorizations
• Super User Privilege Management (SPM)
• Complaint User Provisioning (CUP)
• Enterprise Role Management (ERM)

Implementation Project Planning & Road Map

• GRC H/W Sizing (T-Shirt & Expert)
• GRC Landscape
• Installation Procedure & Considerations for HR & Non – HR Systems
• RFC, Java Connectors(JCo) and Background Jobs

Risk Analysis and Remediation (RAR)

• Pre-and post- installation check lists
• Segregation of Duties (SOD) Risk Management Process
• Understanding RAR data requirements
• Conduction Risks and Rules Workshop
• RAR Rule Building Exercise
• Understanding False Positives & solving them through Org Rules.
• Risk Remediation and Mitigation Strategy
• Configuring RAR
• Troubleshooting RAR

Super Users Privilege Management (SPM)

• Understanding SPM functionality
• Pre- and Post- installation check lists
• Understanding SPM data requirements
• Understanding Fire Fighter Strategy
• Understanding SAP Role, Fire Fighter ID and End user ID mapping
• Fire Fighter Reports, Background Jobs & Tables
• Configuring SPM
• Troubleshooting RAR

Complaint User Provisioning ( CUP)

• User Provisioning Process & Workflows
• Master Data and process Logic
• Workflow Engine: Initiators, Stages & Paths
• Advanced Workflows (Detour, Fork & Rerouting)
• Auto Provisioning & Manual Provisioning
• Tracing Authorizations
• Saving BEx objects to BI Roles
• Securing Workbooks

SAP HR SECURITY

• Structural Authorizations Overview
• Graphical Overview of Structural Authorization Components and Setup
• Considerations for Structural Authorization Implementation
• Overall Design Considerations
• Steps to Implement Structural Authorizations:
• Turn on PD PA Switch
• Turn on Structural Authorizations Main Switches
• Create Organizational Plan
• Create Personnel Master Record
• Create User ID’s
• Create Infotype 105
• Create Structural Authorization Profiles
• Create Infotype 1017
• Assign Structural Authorization Profiles to User ID’s
• Setup Regular Security

SAP EP SECURITY

• User Management
• Role Administration
• iViews
• Pages
• Worksets
• Layouts
• Single Sign On
• Self Registration
• ESS & MSS

SAP GRC Introduction & Overview

• GRC applications, requirements and benefits
• Risk Analysis and Remediation (RAR)
• Multiple Exercises on Workflow Configurations
• Pre- and Post- installation check lists

Enterprise Role Management (ERM)

• Implementation Methodology in ERM
• Configuring different types of Methodologies as per client requirement
• Role Generation using ERM
• Risk Analysis & Simulation before generation Roles
• Proposals in PFCG and GRC
• Pre- and Post- installation check lists
• Integration with CUP and RAR
• Integration with SAP & Non – SAP Products