How does Fraud Management stack up against Process Control CCM
Lately during discussions with some customers and partners, the topic of differences between SAP Fraud Management and Continuous Control Monitoring Framework in Process Control came up. In other words...
View ArticleWhy the email is not triggering when the firefighter controller asks for more...
When the controller asks the firefighter user for more information the notification email is not triggering? - To solve this follow the steps is SAP Note 2024111 - Firefighter not receiving email...
View ArticleGRC. Recent experience with BSP hanging
Dear colleagues,I would like to share my recent experience with BSP hanging while I was trying to create ARQ. The only two services were hanging and only in one client. Please read my investigations...
View ArticleGRC PC FI & MM: Pre Delivered Configurable Rule List- Table and Field...
Rule/Business RuleNameTableMapping View/Object Class/HandlerDeficiency FieldsTransaction CodeFIDOTYP_05C1_01_AChanges to Accounting Document TypesT003V_T003 /T003(SCU3)N/AOBA7FIDOTYP_05C3_01_AChanges...
View ArticleLast 5 SAP Notes of Access Control realeased to customer
This is a weekly blog that will have the 5 last SAP Notes of Access Control corrections released to customer by SAP! 1 - 2290322 - UAM: Missing Reviewer Agent for Notification purpose in UAR and SOD...
View ArticleLast 5 SAP Notes of Access Control realeased to customer
This is a weekly blog that will have the 5 last SAP Notes of Access Control corrections released to customer by SAP! 1 - 2290322 - UAM: Missing Reviewer Agent for Notification purpose in UAR and SOD...
View ArticleJust because users “can”, doesn't mean they “do” [Webcast with Greenlight]
Register now for Extending SAP Access Control with SAP Access Violation Management by Greenlight, 25th May 2016Risk for organisations is growing. With more devices to protect, more people who require...
View ArticleHow to search only relevant SAP Notes for your system version?
First enter is SAP Note search on the link bellow https://support.sap.com/notes 1- Click on "Launch the SAP Note and KBA Search" button 2 - Insert the search term that you want to look for, and...
View ArticleSAP GRC 10 - Add Custom fields in UAR Workflow
I have recently got a requirement from the Business users to get some additional fields in UAR Workflow. For example they wanted to get Valid From and Valid To in the Review list which will be of great...
View ArticleMaster Data in Process Control-GRCV10.0/10.1
Dear all, This blog will give you an overview about the master data in GRC Process Control As we know already, the master data is shared between all 3 components (AC, PC and RM) of GRC.Master data in...
View ArticleHow to Perform a Disclosure Survey
I am creating this blog to provide the steps of Disclosure Survey creation process. Prerequisites:Process:Creating the SurveyPlanning Disclosure SurveyReview after choosing the plan combinationsReview...
View ArticleBack to School:Important options you need to know about Application in BRFPlus
Introduction to ApplicationAn Application object serves as a container which holds all the BRFPlus objects that is built to solve a particular business task.In order to create a new application go to....
View ArticleInclude approval levels and prevent false positives with SAP GRC...
In purchasing release strategies in SAP are used to ensure that purchase requisitions, purchase orders and purchase agreements are only released by an authorized individual with sufficient approval...
View ArticleSRM rule set (alternative)
SAP Supplier Relationship Management (SRM) is developed to purchase predefined items from approved suppliers using an online catalogue. Selected items are put in a shopping cart. SAP also provides a...
View ArticleSNC Name in Access Request
In SAP GRC Access Control it is common practice to provision SNC Name via Access Request. As the SNC name will be different for each user, the core question is, how to populate the correct SNC name in...
View Article#askSAP Session: Cybersecurity Risk and Governance: Are You Prepared?
This post originally appeared on the Analytics blog and has been republished with permission.http://blog-sap.com/analytics/2016/05/25/cybersecurity-risk-and-governance-are-you-prepared/ It's the stuff...
View Article