What are the 5 things you'll do if you have sap system to maintain (Sap securiy)

Answer Posted / siva ramaiah b v

1.Identify the users and their functionalities.
2.define and use authorization objects.
3.Roles will be designed as per GRC i.e single roles and composite role.
4.All roles should be controlled by objects ie. it should not be wild chars ( Notification Type : t1, t2..)
5.All roles will controlled with business functions i.e (If not required controlled functions like Release, create, close, TECO, Change etc.)

Is This Answer Correct ?    1 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Can you explain sap system transactions?

691


Can you explain internet-level security?

647


What are the uses of an authorization group?

713


what is user base in sap security?

1142


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

628






Differentiate between temp role and copy role

697


When would you update a sap table directly?

652


What is a composite role?

808


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1227


What are the upgrades happened in GRC 5.3 from GRC 5.2?

3721


What happens to change documents when they are transported to the production system?

1169


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4125


What is the use of Personalization tab in SU01?

5008


What is the maximum number of profiles in a role and maximum number of object in a role?

622


what is the process to find that one consultant had removed a table from sap tables

2041