Answer Posted / praveen
Sarbanes Oxley, focus for corporations is more on compliance and security. Sarbanes Oxley has had a major impact on the organizations using SAP R/3 as their ERP. Some of the changes seen in the corporate landsacpe include identifying and documenting processes, implementing controls and safeguards, documenting user access approvals etc. In short, there has been a cultural shift in organizations post Sarbanes Oxley. Below, I have listed 7 major pointers which can help organizations towards better SAP security in the Sarbanes Oxley Era.
Is This Answer Correct ? | 6 Yes | 1 No |
Post New Answer View All Answers
How to codify for an Item in SAP? How many digits are required for an item?
Authorization check on s_btch_job failed. What would happen now?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
Is it possible to have more than one st of org-level values in one role? Explain your answer.
How to do Role Design, Testing and Implementation
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What is sap cryptographic library?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What does the item category specify in a purchasing order in SAP Materials Management?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
Differentiate between usobx_c and usobt_c
what is the process to find that one consultant had removed a table from sap tables
What are se10 t-codes used for?
what is user buffer?
How to find out who has deleted users in the system?