SAP Security policy is a collection of security policy features and their values. This procedure replaces the definition of behavior with profile parameters: once a security policy is assigned to a...
Category: GRC Software
When you are auditing for SAP Transaction access within a SAP role or SAP users in the SAP ECC system, as an auditor you should also be aware of some of the back door transactions which are in SAP...
Business Owner: Approve risks for Monitoring and identify suitable reports for mitigation Approve remediation for user access and roles Actively participate in role design and changes Approve or...
[slideshow_deploy id='1684'] [vc_row css=".vc_custom_1512575306373{margin-top: 50px !important;}"][vc_column width="1/3"][vc_cta h2="Free Step by Step SAP License Optimization Guide" shape="square"...
This Information and documentation is copyright by SAP AG UCON Phase Tool (Transaction UCONPHTL) UCON RFC Security Concept External access to RFC function modules requires assignment to the UCON...
SAP provides a solution that allows to log read access to sensitive data
This documentation is copyright by SAP AG Read Access Logging Read Access Logging (RAL) allows to track data access: Who did access the data Which data was accessed When was the data accessed How...