Introduction
  • 1.1 Introduction to GRC
  • 1.2 Regulations & Standards
  • 1.3 Organizational Approach
  • 1.4 SAP GRC Overview
SAP GRC Components
  • 2.1.1 Access Control
  • 2.1.2 GRC and AC Harmonization
  • 2.2 Process Control
  • 2.3 Global Trade Services
  • 2.4 Risk Management
  • Components
Architecture
  • 3.1 Technical Architecure
  • 3.2 User Interface
  • 3.3 GRC Authoirzation
  • Architecture
SoD Risk Management
  • 4.1 Understanding Authorization Risks
  • 4.2 Managing Risk by SoD
  • Risk Management
General Configuration Settings
  • 5.1 GRC Settings
  • 5.2 Access Control Settings
  • Configuration
Synchronizing Repository
  • 6.1 Synchronizing Repository
  • Repository Sync
MSMP Workflow
  • 7.1 MSMP Workflow Introduction
  • 7.2 Configuring MSMP - Part 1
  • 7.3 Configuring MSMP - Part 2
  • MSMP
Business Rules Framework Plus
  • 8.1 Introduction to Business Rules Framework
  • 8.2 Create BRF+ Rules - Part 1
  • 8.2 Create BRF+ Rules - Part 2
  • BRF+
Access Risk Analysis
  • 9.1 Maintaining Rule Set - Part 1
  • 9.1 Maintaining Rule Set - Part 2
  • 9.2 Shared Master Data
  • 9.3 Remediating and Mitigating Risk
  • Access Risk Analysis (ARA)
Emergency Access Management
  • 10.1 Emergency Access Management (EAM) Overview
  • 10.2 Emergency Access Management (EAM) Configuration
  • 10.3 Emergency Access Management (EAM) Logs & Reports
  • Emergency Access Management (EAM)
Access Request Management
  • 11.1 Provisioning Configuration
  • 11.2 Create Access Request
  • 11.3 Access Request Log and Workflow (MSMP)
  • Access Request Management (ARM)
Business Role Management
  • 12.1 Configuring Business Role Management
  • 12.2 Role Methodology & BRF+ Configuration
  • 12.3 Role Definition & Creation
  • 12.4 Managing Roles
  • Business Role Management (BRM)
Report & Review
  • 13.1 Report & Review
  • Report & Review