Hi ,
Currently i am working in an MNC company as an SAP
Security tier1 member , we will take care of User
Administration , Profile/authorization administration
activities .Could any one tell me , is i am eligible to
apply for an SAP Security job for 2 years experience .
Could any one tell me about SOD , SOX Audit and Virsa tool ,
i have never worked before .
Prakash
Answer Posted / reddy
What is GRC ?
Governance, Risk, and Compliance.
The goal of GRC is to help a company efficiently put
policies and controls in place to address all its
compliance obligations while at the same time gathering
information that helps proactively run the business.
This means Ethical Business Process should comply with
Effective Process controls as per the related industry
Business Process and accounting Process and Govt Policy .
This GRC process finally Can Conculded with respect to Govt
Orgasnisations and Public Orgaanisation which are
Registered in Local Stock Markets are accountable to have
Effective Governance and Process Controls to Protect the
Share holder rights and Prevent Organised Corporate Fruads
and scams.
GRC Tools and IT applications
There are many GRC AUDIT tools in the Market to Facilitate
Internal and External Audit of the Companies .
What is SAP VIRSA Tool.
focused on 1) Access controls , 2) Process Controls.
It Has 4 Sections to Audit the system.
1. Compliance Caliberator
2. Role Expert
3. Firefighter
4. Access enforcer .
VIRSA systems is now takenover by SAP AG.
It has been aprt of Netwever and add on now .
| Is This Answer Correct ? | 9 Yes | 0 No |
Post New Answer View All Answers
Any details about secatt apart from SAPSecurity online.com?
How we schedule and administering background jobs?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Differentiate between usobx_c and usobt_c
Pfcg proposed activities but you need only two. What would you do?
Differentiate between derived role and composite role
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How can sap security be improved?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
How to insert missing authorization?
What are st01 t-codes used for?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
In pfcg where we can add customized t-codes. And where we can see customized t-codes
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.