GRC PC FI & MM: Pre Delivered Configurable Rule List- Table and Field...
Rule/Business RuleNameTableMapping View/Object Class/HandlerDeficiency FieldsTransaction CodeFIDOTYP_05C1_01_AChanges to Accounting Document TypesT003V_T003 /T003(SCU3)N/AOBA7FIDOTYP_05C3_01_AChanges...
View ArticleHow to search only relevant SAP Notes for your system version?
First enter is SAP Note search on the link bellow https://support.sap.com/notes 1- Click on "Launch the SAP Note and KBA Search" button 2 - Insert the search term that you want to look for, and...
View ArticleSAP GRC 10 - Add Custom fields in UAR Workflow
I have recently got a requirement from the Business users to get some additional fields in UAR Workflow. For example they wanted to get Valid From and Valid To in the Review list which will be of great...
View ArticleMaster Data in Process Control-GRCV10.0/10.1
Dear all, This blog will give you an overview about the master data in GRC Process Control As we know already, the master data is shared between all 3 components (AC, PC and RM) of GRC.Master data in...
View ArticleBack to School:Important options you need to know about Application in BRFPlus
Introduction to ApplicationAn Application object serves as a container which holds all the BRFPlus objects that is built to solve a particular business task.In order to create a new application go to....
View ArticleInclude approval levels and prevent false positives with SAP GRC...
In purchasing release strategies in SAP are used to ensure that purchase requisitions, purchase orders and purchase agreements are only released by an authorized individual with sufficient approval...
View ArticleSRM rule set (alternative)
SAP Supplier Relationship Management (SRM) is developed to purchase predefined items from approved suppliers using an online catalogue. Selected items are put in a shopping cart. SAP also provides a...
View ArticleSNC Name in Access Request
In SAP GRC Access Control it is common practice to provision SNC Name via Access Request. As the SNC name will be different for each user, the core question is, how to populate the correct SNC name in...
View Article#askSAP Session: Cybersecurity Risk and Governance: Are You Prepared?
This post originally appeared on the Analytics blog and has been republished with permission.http://blog-sap.com/analytics/2016/05/25/cybersecurity-risk-and-governance-are-you-prepared/ It's the stuff...
View ArticleHow to Perform a Disclosure Survey
I am creating this blog to provide the steps of Disclosure Survey creation process. Prerequisites:Process:Creating the SurveyPlanning Disclosure SurveyReview after choosing the plan combinationsReview...
View ArticleContinuous Control Monitoring-GRCV10.0 Process Controls#Part1
Dear all, This blog will give you an overview about Continuous Control Monitoring(CCM) in GRC Process Control.Intentionally this blog in two parts for better understanding.Continuous control monitoring...
View ArticleContinuous Control Monitoring-GRCV10.0 Process Controls#Part2
With Continuous to Continuous Control Monitoring-GRCV10.0 Process Controls#Part1 Now assign the created business rule to control Please be note that business rules can be assigned to local controls...
View ArticleJust because users “can”, doesn't mean they “do” [Webcast with Greenlight]
Risk for organisations is growing. With more devices to protect, more people who require access to data, and more partners to integrate with, the paradigm ofaccess control is larger than ever. The...
View ArticleGRC Mitigation Policy
IntroductionRequest Mitigation Policy is basically a set of rules which can be used to control the GRC request approval behaviour when there are risk violations in the request based on “Risk Type”,...
View Article