Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is the difference between ECC security and RAR security
when GRC (RAR<SPM<CUP) is used, when similar functionality can
be performed SAP R3 level(ECC)?

Answer Posted / rahman shaik

Simply we can say one thing like In Ecc system you cant find any risk while assigning the roles but in RAR tool it will check the RISK of that particular assignment and if risk is their then we can mitigate and simulate to that risk

I mean its purely for SOD(segregation of duties)

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we can see FFID if firefighter not able to see FFids ?

2014


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1013


Explain x-glueb and its use in sap security.

1325


Any details about secatt apart from SAPSecurity online.com?

2280


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2307


How to update risk id in rule set?

1114


What does the account assessment category specify in a purchasing order in SAP Materials Management?

1420


What is the main purpose of parameters, groups & personalization tabs?

1085


Authorization check on s_btch_job failed. What would happen now?

1187


You want to create and maintain user master record. What authorization would you need?

1151


Can you explain network topology in sap systems?

1078


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2445


What does the profile generator do?

1087


What is sap cryptographic library?

1045


You want to remove a developer's and developer keys from a system. How would you do that?

1060