What is the difference between ECC security and RAR security
when GRC (RAR<SPM<CUP) is used, when similar functionality can
be performed SAP R3 level(ECC)?

Answer Posted / itsgaurav151

The things ECC security and RAR security are different. ECC
is a system whereas RAR is a tool. ECC security involves
securitg data, t-code access, report access and maintaining
the suthorizations. RAR(Risk analysis and Remediation) is a
tool that is used for analysis of risk analysis and its
remeduation as name suggests. Rhis tool determines all
potential risks that arises if a t-code/object/role/auth is
assigned to a user. Also this tool helps to remediate that
risk using mitigation technique.

Is This Answer Correct ?    6 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is sap internet transaction server?

704


What authorization is required to create and maintain user master records?

674


Can you explain secure store and forward?

624


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2134


Authorization check on s_btch_job failed. What would happen now?

784






Tell me about derived role?

631


What does the pfcg_time_dependency clean up?

808


What is t code?

692


Which t-code can be used to delete old security audit logs?

898


What is the difference between usobx_c and usobt_c?

646


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4146


What is sap’s grc?

727


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2010


How do we test security systems.

654


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2235