Majority of SAP audits deal with financial data in the SAP ECC System which can manipulate and distort your Financial Statements. The common Examples are Sarbanes‐Oxley (SOX), under the direction...
Category: SAP Security Assessment
Governance (G) Establish qualitative objectives • Establish quantitative objectives & KPIs • Develop strategies to achieve objectives • Document corporate policies and best...
What you need to learn to become $ 100 Per Hour SAP GRC Consultant- Part 3
Advanced SAP Role Development Topics: Configuring SU24 settings so you can bring in objects into the SAP role which have values as default or the object in the maintain status so you have the...
What you need to learn to become $ 100 Per Hour SAP GRC Consultant- Part 2
SAP Role Administration: Create and Review SAP Role Requirement for creating SAP Role. This document should have the role owner and role approver, location specific information and object related...
SAP Security policy is a collection of security policy features and their values. This procedure replaces the definition of behavior with profile parameters: once a security policy is assigned to a...
Alert Functionality for Your SAP Security Audit Log- Get Alerts when Sensitive Transactions are Used
SAP Security Audit Log can track all the transactions executed or any activities performed in the system. But most of the companies do not have the time to review the Transactions executed. Now SAP...