What are the 5 things you'll do if you have sap system to maintain (Sap securiy)
Answer Posted / siva ramaiah b v
1.Identify the users and their functionalities.
2.define and use authorization objects.
3.Roles will be designed as per GRC i.e single roles and composite role.
4.All roles should be controlled by objects ie. it should not be wild chars ( Notification Type : t1, t2..)
5.All roles will controlled with business functions i.e (If not required controlled functions like Release, create, close, TECO, Change etc.)
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
Can you explain protecting public keys?
What is the use of tmssup* rfc destinations?
What does user compare do?
How to update risk id in rule set?
Authorization check on s_btch_job failed. What would happen now?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
How to run the daily background job s for virsa violations ? thabks in advance
What are some ap security t codes?
What authorization is required to create and maintain user master records?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
Differentiate between derived role and composite role
How to find ECC system, GRC system and BI system ?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.