Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Cross-Enterprise Integration with SAP GRC Access Control

Integrating multiple systems with SAP GRC Access Control

(Autor)

Buch | Hardcover
138 Seiten
2010
SAP Press (Verlag)
978-1-59229-250-9 (ISBN)

Lese- und Medienproben

Cross-Enterprise Integration with SAP GRC Access Control - Raj Behera
CHF 119,80 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
This book provides cross-enterprise configuration instructions and best practices for SAP GRC Access Control implementations in companies with multi-system architectures. The author provides the implementation strategies, configuration steps, and best practices necessary to implement and manage a global access control, risk remediation, and compliance framework across a multi-system landscape, including non-SAP and legacy systems. Readers discover how to use Offline Risk Analysis, Real Time Analysis, and Management Update Report to manage risk analysis across the enterprise and quickly come to understand how to build and manage a rule matrix for a multi-system enterprise using the Real Time Agent (RTA), as well as the functional use of the Rule Architect. Plus, learn how to configure AC for use with the most common non-SAP systems such as Oracle, PeopleSoft, JDEdwards, and others. You'll find out how best to determine the setup of cross-enterprise mitigation controls and alternative controls to mitigate risk as well as how to educate management about conflicts approval and monitoring.
Finally, the author shows you how you can develop and execute a plan for Continuous Compliance using best practices for simulation, monitoring, and control.

Raj Behera is the Manager of the Regional Implementation Group (Americas) for GRC at SAP. He is directly involved in helping SAP customers throughout the Americas implement the GRC AC solution. He has presented on this subject at GRC2008 in Orlando and ASUG/SAPPHIRE.

1 ... Introduction ... 9 ... 1.1 ... What is Access Control ... 9 ... ... 1.1.1 ... Risk Analysis and Remediation (RAR ... 10 ... ... 1.1.2 ... Protect Information and Prevent Fraud ... 12 ... 1.2 ... Architecture of Access Control ... 13 ... 1.3 ... Necessity of SOX ... 15 ... 1.4 ... Overview of Cross-Enterprise for Access Control ... 18 ... 1.5 ... Summary ... 19 2 ... SAP GRC Access Control Rule Architect ... 21 ... 2.1 ... Overview of the Rule Architect ... 21 ... ... 2.1.1 ... Rule Files ... 23 ... ... 2.1.2 ... How to Create Rules in an Application ... 35 ... ... 2.1.3 ... Active Rules ... 37 ... ... 2.1.4 ... Rule Architect Dashboard ... 41 ... 2.2 ... Building Cross-Enterprise Rules ... 43 ... ... 2.2.1 ... Example ... 44 ... 2.3 ... Summary ... 45 3 ... Managing Access Risk ... 47 ... 3.1 ... Central Rule Library: The Global Rule Set ... 47 ... ... 3.1.1 ... Risk Recognition ... 48 ... ... 3.1.2 ... Risk Identification ... 48 ... 3.2 ... Rule Migration in the System Landscape and During the RAR Upgrade Process ... 48 ... 3.3 ... Import/Export Utility ... 50 ... ... 3.3.1 ... Configuration ... 50 ... ... 3.3.2 ... Features ... 51 ... 3.4 ... Summary ... 55 4 ... Cross-Enterprise Matrix for SAP GRC AC ... 57 ... 4.1 ... Available Real Time Agent (RTA) for SAP ... 57 ... 4.2 ... RTA for Non-SAP ERP Applications ... 58 ... ... 4.2.1 ... Integration with Oracle ... 59 ... ... 4.2.2 ... Integration with PeopleSoft ... 63 ... ... 4.2.3 ... Integration with JDE ... 63 ... ... 4.2.4 ... Integration with Legacy Systems ... 64 ... ... 4.2.5 ... RTA Deployment ... 64 ... ... 4.2.6 ... Connector Creation ... 64 ... 4.3 ... Summary ... 64 5 ... Configuration and Operation of the Data Extractor ... 65 ... 5.1 ... System Connector ... 67 ... 5.2 ... Configure Extraction Process ... 67 ... ... 5.2.1 ... Extraction Process in Legacy Systems ... 68 ... ... 5.2.2 ... Extraction Process in SAP Access Control ... 70 ... 5.3 ... Production ... 80 ... 5.4 ... Summary ... 80 6 ... Risk Analysis for Cross-Enterprise Systems ... 81 ... 6.1 ... Scheduling Background Jobs ... 81 ... ... 6.1.1 ... Scheduling Synchronization Jobs, Including Methods for Legacy/Offline Systems ... 82 ... ... 6.1.2 ... Scheduling Batch Risk Analysis ... 84 ... 6.2 ... Management Report Updates ... 85 ... 6.3 ... Real Time Risk Analysis ... 86 ... 6.4 ... Cross-Enterprise Execution in the AC Application ... 87 ... 6.5 ... Offline Risk Analysis ... 92 ... 6.6 ... Summary ... 93 7 ... Mitigation and Alerts ... 95 ... 7.1 ... Mitigation Controls ... 95 ... 7.2 ... Mitigated Users/Roles/Profiles/HR Objects ... 96 ... ... 7.2.1 ... How to Create a Mitigation Control ... 96 ... 7.3 ... Alert Generation ... 101 ... 7.4 ... Alert Dashboard ... 103 ... 7.5 ... Alert Clearing and Archiving ... 104 ... 7.6 ... Summary ... 105 8 ... Continuous Compliance ... 107 ... 8.1 ... Best Practices for Continuous Compliance ... 107 ... 8.2 ... Simulation ... 109 ... 8.3 ... Monitoring and Control ... 112 ... 8.4 ... Summary ... 112 A ... Rule Library File Templates ... 115 ... A.1 ... Business Process Template ... 115 ... A.2 ... Function Template ... 115 ... A.3 ... Function-Business Process Relationship Template ... 116 ... A.4 ... Function-Action Relationship Template ... 116 ... A.5 ... Function-Permission Relationship Template ... 116 ... A.6 ... Rule Set Template ... 117 ... A.7 ... Risk Definition Template ... 117 ... A.8 ... Risk Description Template ... 118 ... A.9 ... Risk to Rule Set Relationship Template ... 119 B ... Legacy System Templates ... 121 ... B.1 ... User File Template ... 121 ... B.2 ... User Action File Template ... 122 ... B.3 ... User Permission File Template ... 122 ... B.4 ... Role File Template ... 124 ... B.5 ... Role Action File Template ... 124 ... B.6 ... Role Permission File Template ... 125 ... B.7 ... Profile File Template ... 126 ... B.8 ... Profile Action File Template ... 126 ... B.9 ... Profile Permission File Template ... 127 ... B.10 ... Action File Template ... 127 ... B.11 ... Permission File Template ... 128 ... B.12 ... Field File Template ... 129 ... B.13 ... Value File Template ... 130 C ... Information Sources ... 133 ... C.1 ... Installation and Upgrades ... 133 ... C.2 ... SAP Help Portal for Access Control ... 134 D ... The Author ... 135

Erscheint lt. Verlag 30.1.2010
Reihe/Serie SAP Press
Verlagsort Maryland
Sprache englisch
Maße 175 x 228 mm
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Weitere Themen SAP
Schlagworte SAP GRC
ISBN-10 1-59229-250-X / 159229250X
ISBN-13 978-1-59229-250-9 / 9781592292509
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Schnittstellenentwicklung für SAP Fiori, mobile und …

von Carsten Bönnen; Volker Drees; André Fischer …

Buch | Hardcover (2024)
Rheinwerk (Verlag)
CHF 125,85