What are the 5 things you'll do if you have sap system to maintain (Sap securiy)
Answer Posted / siva ramaiah b v
1.Identify the users and their functionalities.
2.define and use authorization objects.
3.Roles will be designed as per GRC i.e single roles and composite role.
4.All roles should be controlled by objects ie. it should not be wild chars ( Notification Type : t1, t2..)
5.All roles will controlled with business functions i.e (If not required controlled functions like Release, create, close, TECO, Change etc.)
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
Which tables will you use for making customizing setting for security administration?
Which transaction should not be given to BASIS and DEV team in Production?
What profile versions?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
What appears as the last sentence in sap note 587410?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
What is the use of su56?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
what is the different b/w su10 and su12