Quantcast
Channel: Governance, Risk and Compliance (SAP GRC)
Browsing latest articles
Browse All 205 View Live

SAP Dynamic Authorization Management Key Functionalities Demo

View Article


GRC PC FI & MM: Pre Delivered Configurable Rule List- Table and Field...

Rule/Business RuleNameTableMapping View/Object Class/HandlerDeficiency FieldsTransaction CodeFIDOTYP_05C1_01_AChanges to Accounting Document TypesT003V_T003 /T003(SCU3)N/AOBA7FIDOTYP_05C3_01_AChanges...

View Article


Image may be NSFW.
Clik here to view.

How to search only relevant SAP Notes for your system version?

First enter is SAP Note search on the link bellow   https://support.sap.com/notes 1-  Click on "Launch the SAP Note and KBA Search" button  2 - Insert the search term that you want to look for, and...

View Article

Image may be NSFW.
Clik here to view.

SAP GRC 10 - Add Custom fields in UAR Workflow

I have recently got a requirement from the Business users to get some additional fields in UAR Workflow. For example they wanted to get Valid From and Valid To in the Review list which will be of great...

View Article

Image may be NSFW.
Clik here to view.

Master Data in Process Control-GRCV10.0/10.1

Dear all, This blog will give you an overview about the master data in GRC Process Control As we know already, the master data is shared between all 3 components (AC, PC and RM) of GRC.Master data in...

View Article


Image may be NSFW.
Clik here to view.

Back to School:Important options you need to know about Application in BRFPlus

Introduction to ApplicationAn Application object serves as a container which holds all the BRFPlus objects that is built to solve a particular business task.In order to create a new application go to....

View Article

Image may be NSFW.
Clik here to view.

Include approval levels and prevent false positives with SAP GRC...

In purchasing release strategies in SAP are used to ensure that purchase requisitions, purchase orders and purchase agreements are only released by an authorized individual with sufficient approval...

View Article

Image may be NSFW.
Clik here to view.

SRM rule set (alternative)

SAP Supplier Relationship Management (SRM) is developed to purchase predefined items from approved suppliers using an online catalogue. Selected items are put in a shopping cart. SAP also provides a...

View Article


Image may be NSFW.
Clik here to view.

SNC Name in Access Request

In SAP GRC Access Control it is common practice to provision SNC Name via Access Request. As the SNC name will be different for each user, the core question is, how to populate the correct SNC name in...

View Article


#askSAP Session: Cybersecurity Risk and Governance: Are You Prepared?

This post originally appeared on the Analytics blog and has been republished with permission.http://blog-sap.com/analytics/2016/05/25/cybersecurity-risk-and-governance-are-you-prepared/ It's the stuff...

View Article

Image may be NSFW.
Clik here to view.

How to Perform a Disclosure Survey

I am creating this blog to provide the steps of Disclosure Survey creation process. Prerequisites:Process:Creating the SurveyPlanning Disclosure SurveyReview after choosing the plan combinationsReview...

View Article

Image may be NSFW.
Clik here to view.

Continuous Control Monitoring-GRCV10.0 Process Controls#Part1

Dear all, This blog will give you an overview about Continuous Control Monitoring(CCM) in GRC Process Control.Intentionally this blog in two parts for better understanding.Continuous control monitoring...

View Article

Image may be NSFW.
Clik here to view.

Continuous Control Monitoring-GRCV10.0 Process Controls#Part2

With Continuous  to Continuous Control Monitoring-GRCV10.0 Process Controls#Part1  Now assign the created business rule to control Please be note that business rules can be assigned to local controls...

View Article


Just because users “can”, doesn't mean they “do” [Webcast with Greenlight]

Risk for organisations is growing. With more devices to protect, more people who require access to data, and more partners to integrate with, the paradigm ofaccess control is larger than ever. The...

View Article

Image may be NSFW.
Clik here to view.

GRC Mitigation Policy

IntroductionRequest Mitigation Policy is basically a set of rules which can be used to control the GRC request approval behaviour when there are risk violations in the request based on “Risk Type”,...

View Article

Browsing latest articles
Browse All 205 View Live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>