How will you mitigate a user against an authorization
object which is decided as sensitive by Business
Answer Posted / ernest
Hi,
create a mitigation control based on 'permission' level and
restrict the user based on that.
Rgds,
Ernest
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Differentiate between saml token profile and a sap logon ticket
Differentiate between temp role and copy role
What does the item category specify in a purchasing requisition in SAP Materials Management?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
What is the maximum number of profiles in a role and maximum number of object in a role?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What is the use of su56?
Tell me about derived role?
What is t code?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
What are the upgrades happened in GRC 5.3 from GRC 5.2?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
What are some ap security t codes?
Support types of WOs you have faced?