What is the difference between ECC security and RAR security
when GRC (RAR<SPM<CUP) is used, when similar functionality can
be performed SAP R3 level(ECC)?
Answer Posted / itsgaurav151
The things ECC security and RAR security are different. ECC
is a system whereas RAR is a tool. ECC security involves
securitg data, t-code access, report access and maintaining
the suthorizations. RAR(Risk analysis and Remediation) is a
tool that is used for analysis of risk analysis and its
remeduation as name suggests. Rhis tool determines all
potential risks that arises if a t-code/object/role/auth is
assigned to a user. Also this tool helps to remediate that
risk using mitigation technique.
Is This Answer Correct ? | 6 Yes | 1 No |
Post New Answer View All Answers
what is user buffer?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is use of derived roles?
how you can delete multiple roles from qa, dev and production system?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
By which parameter number of entries are controlled in the user buffer?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Explain document transfer-level security?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
How we schedule and administering background jobs?
Explain network topology in sap systems?
What authorization is required to create and maintain user master records?
what things you have to take care before executing run system trace?