Hi ,
Currently i am working in an MNC company as an SAP
Security tier1 member , we will take care of User
Administration , Profile/authorization administration
activities .Could any one tell me , is i am eligible to
apply for an SAP Security job for 2 years experience .
Could any one tell me about SOD , SOX Audit and Virsa tool ,
i have never worked before .
Prakash
Answer Posted / reddy
What is GRC ?
Governance, Risk, and Compliance.
The goal of GRC is to help a company efficiently put
policies and controls in place to address all its
compliance obligations while at the same time gathering
information that helps proactively run the business.
This means Ethical Business Process should comply with
Effective Process controls as per the related industry
Business Process and accounting Process and Govt Policy .
This GRC process finally Can Conculded with respect to Govt
Orgasnisations and Public Orgaanisation which are
Registered in Local Stock Markets are accountable to have
Effective Governance and Process Controls to Protect the
Share holder rights and Prevent Organised Corporate Fruads
and scams.
GRC Tools and IT applications
There are many GRC AUDIT tools in the Market to Facilitate
Internal and External Audit of the Companies .
What is SAP VIRSA Tool.
focused on 1) Access controls , 2) Process Controls.
It Has 4 Sections to Audit the system.
1. Compliance Caliberator
2. Role Expert
3. Firefighter
4. Access enforcer .
VIRSA systems is now takenover by SAP AG.
It has been aprt of Netwever and add on now .
| Is This Answer Correct ? | 9 Yes | 0 No |
Post New Answer View All Answers
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
How to update risk id in rule set?
What are the most used tables in sap?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
You want to remove a developer's and developer keys from a system. How would you do that?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Can you explain sap system transactions?
How to codify for an Item in SAP? How many digits are required for an item?
What is the maximum number of profiles in a role and maximum number of object in a role?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
What are su25 t-codes used for?
What appears as the last sentence in sap note 587410?
how we do CUA configuration in Quality system
What are su22 t-codes used for?