Logo Passei Direto
Buscar

1243085 - Available Documentation for GRC Access Control

Material
páginas com resultados encontrados.
páginas com resultados encontrados.
left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

Prévia do material em texto

SAP Note 
Header Data 
Symptom 
Link to available GRC Access Control Documentation. 
 
Other Terms 
Access Control, Virsa, Risk Analysis and Remediation, Compliant User Provisioning, SuperUser Privilege Management, Enterprise Role 
Management, Compliance Calibrator, Access Enforcer, Firefighter, Role Expert, Documentation, Access Risk Management, Access Request, 
Emergency Access Management, Business Role Management 
 
Reason and Prerequisites 
Provide shortcuts to the available documentation. 
 
Solution 
Documentation is available in various areas of the SAP Ecosystem.  This note is meant to provide an overview of where different information is 
stored. 
 
The four main documentation repositories are below.  The type of documentation under each is described in the following sections. 
 
1.  Service Marketplace 
2.  help.sap.com 
3.  Business Process Expert Site (BPX) 
4.  SAP Notes 
 
Service Marketplace 
 
There are many pieces of information available on the SAP Service Marketplace.  Below are the key areas where this information is stored: 
l Release Notes.  This includes the new features added in 5.3 (as compared to 5.2) and in 10.0 (as compared to 5.3).  There are also 
documents for 5.2 but no customer should be implementing 5.2 at this time. 
           https://service.sap.com/releasenotes 
           Release Notes -> Analytics -> SMP-hosted Documents -> Governance, Risk, Compliance (GRC) -> SAP Access Control 
l Master, Installation, Upgrade, Configuration and Security Guides. Guides are available for 4.0, 5.1, 5.2, 5.3 and 10.0 
           https://websmp203.sap-ag.de/support 
           Release & Upgrade Info > Installation & Upgrade Guides > Analytics> Governance, Risk, and Compliance -> Access Control 
           From there, choose the version of application you're using. 
l Support pack schedule.  This will show the planned dates of when support packs are scheduled to be released for 4.0, 5.2 and 5.3.  
           https://service.sap.com/ocs-schedules 
           GRC Access Control Support Package Schedule 
l Product Availability Matrix.  This location will show the maintenance dates for our various product versions.  These are the dates through 
    1243085 - Available Documentation for GRC Access Control   
Version   28     Validity: 07.08.2014 - active   Language   English (Master) 
Released On 07.08.2014 23:32:57 
Release Status Released for Customer 
Component GRC-SAC-ARA Access Risk Management 
 GRC-SAC-ARQ Access Request
 GRC-SAC-BRM Business Role Management
 GRC-SAC-CONF Configuration
 GRC-SAC-EAM Emergency Access Management
 GRC-SAC-REP Repository
 GRC-SAC-RPT Reporting
 GRC-SAC-UAR User Access Review
 GRC-SAC-UPG Installation & Upgrade
 GRC-SAC-WF Workflow
Priority Recommendations / Additional Info 
Category FAQ 
Other Components
which the application version will remain supported by SAP GRC Support. 
           https://service.sap.com/~form/handler?_APP=00200682500000002212&_EVENT=DISPLAY 
           Search for Access Control and click on Search in PAM. 
           This will display the 5.3 and 10.0 maintenance dates. 
           Search for Firefighter and this will give you maintenance dates for 4.0 and 5.2. 
           Once you select a version, click on the Languages tab and you can see what languages are supported for each version of our product. 
l Sizing Guide.  This provides an overview of how best to size the GRC Access Controls hardware for optimum performance.  The link below 
is specific to version 10.0. 
           https://service.sap.com/~sapidb/011000358700000435122007E 
 
 
help.sap.com 
 
Beginning with Access Control 5.3, the information contained in the User Guides previously stored on the Service Marketplace have been moved 
to the SAP Help Portal.  The exact link is below: 
 
http://help.sap.com/saphelp_grcac53/helpdata/en/45/92c7fa00494714a4162ad707d9b328/frameset.htm 
 
This is similar to the Help for other application components of SAP. 
 
In addition to GRC 5.3, 10.0 and 10.1 specific help is also available on help.sap.com 
 
http://help.sap.com/grc-ac?current=grc-ac101&show_children=false 
 
Business Process Expert 
 
Below is the link for Business Process Expert website.  This website holds many Quick Reference Guides and other How-to documents. 
 
http://scn.sap.com/community/grc 
 
Below are the Key Topic areas: 
 
1.  SAP BusinessObjects Access Control 
2.  SAP BusinessObjects Process Control 
3.  SAP BusinessObjects Risk Management 
4.  SAP BusinessObjects Global Trade Services 
5.  SAP Environment, Health, and Safety (EH&S) 
6.  SAP and Financial Excellence 
7.  SAP Fraud Management, powered by SAP HANA 
  
Under All Articles on Governance, Risk and Compliance (Access Control) 
 
This website is constantly being updated.  The items listed below are just the key documents out there, but there are many others and more will 
continue to be added. This Note will only be for Access Control related topics. 
 
Under Key Topics - SAP BusinessObjects Access Control 10.0 
 
l GRC 10.0 Pre-Installation   (PDF 1 MB)  
The presentation explains the new architecture and the necessary prerequisites for a successful installation of SAP BusinessObjects GRC 
10.0 and guides the reader through the installation procedure of the software. 
 
l GRC 10.0 Post-Installation   (PDF 673 KB)  
The presentation explains the necessary post-installation steps in SAP BusinessObjects GRC 10.0. 
 
l AC 10.0 Post-Installation   (PDF 566 KB)  
The presentation covers the basic steps required for setting up SAP BusinessObjects GRC 10.0. For setting up specific functionality 
please refer to corresponding pre-implementation guide. 
 
l AC 10.0 - Installation Checklist   (PDF 580 KB)  
This guide provides a checklist for your installation activities for the Access Control 10.0 application. 
 
l AC 10.0 Pre-Implementation From Post-Installation to First Risk Analysis   (PDF 709 KB)  
 
This document allows implementation consultants and administrators to setup the required functionality for running a user level risk analysis after 
the post-installation has been finished. This is by no means a comprehensive guide for setting up the Access Risk Analysis component, rather it 
allows testing the application is working properly by setting up a basic test case. 
 
l AC 10.0 - Enhanced Access Risk Analysis 
 
This document describes the major enhancements to the access risk analysis capability of GRC, including end user customization and 
personalization. It covers how to navigate through the different reports, and also about new functionality such as new bulk maintenance, automation, 
audit trail, and mitigation options. 
 
l AC 10.0 Pre-Implementation From Post-Installation to First Emergency Access   (PDF 631 KB)  
 
This document allows implementation consultants and administrators to setup the required functionality for running an emergency access 
(firefighter) session after the post-installation has been finished. This is by no means a comprehensive guide for setting up the Emergency Access 
Management component, rather it allows testing the application is working properly by setting up a basic test case. 
 
l AC 10.0 - Centralized Emergency Access   (PDF 1 MB)  
 
This document is a detailed guide on the emergency access capability of Access Control 10.0. It explains the basic concepts about emergency 
access and provide details on how to configure the application. Also this document includes additional information on the types of logs available 
for monitoring the emergency accesses. 
 
l AC 10.0 Pre-Implementation From Post-Installation to First Role Creation   (PDF 814 KB)  
 
This document allows implementation consultants and administrators to setup the required functionality for creating a single role in AC after the 
post-installation has been finished. This is by no means a comprehensive guide for setting up the Business Role Management component, rather it 
allows testing the application is workingproperly by setting up a basic test case. 
 
l AC 10.0 - Business Role Management   (PDF 3 MB)  
 
This document allows implementation consultants and administrators to setup the required functionality for creating roles in AC after the post-
installation has been finished. This guide provides the configuration steps for setting up Business Role Management. 
 
l AC 10.0 Pre-Implementation From Post-Installation to First Access Request   (PDF 736 KB)  
 
This document allows implementation consultants and administrators to setup the required functionality for creating an access request after the 
post-installation has been finished, please notice that it is required to configure Role Management before being able to request role assignments. 
This is by no means a comprehensive guide for setting up MSMP workflows, rather it allows testing the application is working properly by setting 
up a basic test case. 
 
l AC 10.0 - Customizing Workflows for Access Management   (PDF 1 MB)  
 
This document allows implementation consultants and administrators to setup the required functionality for enabling the workflow engine in AC 
10.0. You will learn the main components of the new workflow engine and how to customize them, also how to create agents and initiators using 
Function Modules and BRFplus. 
 
l AC 10.0 - How to Customize Notification Templates for AC Workflow   (PDF 827 KB)  
 
This how-to-guide explains how to set up the SAPconnect communication interface in your application server in order to send out email 
notifications triggered by workflow events in Access Control 10.0. This guide provides a comprehensive overview of workflow events that can 
trigger email notifications and notification variables used to populate the message bodies with information that is specific to each request. The 
guide also explains how the pre-delivered message bodies can be replaced by custom messages as well as how email reminders are set up. 
 
l AC 10.0 - Managing Custom Fields for Access & Role Management   (PDF 317 KB)  
 
This document explains how to setup the required functionality for adding custom fields to access requests and roles maintained in GRC 10.0. 
 
l AC 10.0 - End User Personalization   (PDF 895 KB)  
 
This how-to-guide explains the End User Personalization concept in Access Control 10.0 and the technical configuration to attain that functionality. 
 
l AC 10.0 Performing Segregation of Duties Reviews   (PDF 1 MB)  
 
This how-to-guide explains the Segregation of Duties Review concept and the technical configuration to attain that functionality. 
 
l GRC 10.0 Integration Guide and NetWeaver Identity Management 
l SAP Access Control 10.0 Interface for Identity Management   (PDF 646 KB)  
 
These documents cover all the new web services for Access Control 10.0 and integration scenarios with IDM solutions. The main foundation for 
this integration is based on NeetWeaver Identify Management 7.2. 
 
l SAP BusinessObjects GRC 10.0 Integration Guide - Access and Process Control 10.0   (PDF 1 MB)  
 
With the release of GRC 10.0, Access Control and Process Control are offered as an integrated solution, both at the data layer and at the user 
interface layer.  This new unified platform enables increased harmonization of key master data.  Organization and process and control structures 
can now be shared across components of Access Control and Process Control, which supports a more integrated approach to governance, risk, 
and compliance. Access risks identified in Access Control can be mitigated using controls managed by Process Control, as an example. This 
document details methods for harmonizing data across Access Control and Process Control. 
 
 
l Risk Terminator Configuration 
(PDF 480 KB) 
 
This how-to guide shows how to set up risk terminator to validate new roles and assignments. 
 
 
Under Key Topics - SAP BusinessObjects Access Control - SAP GRC Access Control 5.3: 
l Getting Started with GRC Access Control 
 
This page provides an overview of GRC Access Control. To maintain compliance with current and future regulations, organizations must implement 
a sustainable, automated solution that provides end-to-end automation for detecting, remediating, mitigating, and preventing access and 
authorization risk across the business. 
l GRC Access Control - Access Risk Management Guide   (PDF 268 KB)  
 
The access risk management guide helps you set up and implement risk identification and remediation with GRC Access Control. 
l GRC Access Control - Comprehensive, Cross-Enterprise Analysis, Remediation, and Prevention of Access Risk   (PDF 343 KB)  
 
Take an in-depth look at how SAP GRC Access Control - part of SAP solutions for Governance, Risk, and Compliance - is helping organizations 
close gaps in access risk. This broad access and authorization solution extends from design time through runtime to ensure compliance to 
segregation of duties. 
  
l Tour the Five Building Blocks of SAP NetWeaver Security   (1 hour 1 minute)  
 
This e-learning session provides an introduction to user management, trust management, secure system management, application security, and 
auditing. 
l The Three C's of SAP Identity Management - Centralization, Certified Partners and Compliance   (PDF 407 KB)  
 
One of the fundamentals of securing an SAP system landscape is user identity management. This SAP Insider article discusses maintaining strict 
control over the creation, authorization, and deletion of user identities, which is imperative for securing company data. 
l J-SOX Insights   (PDF 117 KB)  
 
"J-SOX" is an unofficial term that refers to the Japanese requirements similar to Sarbanes-Oxley Act Section 302 (management certification) and 
Section 404 (management evaluation and report on internal controls) in the USA. This FAQ about J-SOX appears here with the permission of 
Protiviti. 
l J-SOX Flash Report   (PDF 75 KB)  
 
Information on Japanese compliance legislation as of November 2006. This report appears here with the permission of Protiviti. 
l How to Performance Optimize SAP GRC Access Control 5.3   (PDF, 303 KB)  
 
The guide provides an overview of the technical architecture of SAP GRC Access Control 5.3 and a structured list of recommendations and 
preferred practices for performance optimization. 
l SAP GRC Access Control 5.3 - Pre-Installation - Voice Over (FLASH 20,869 KB) 
 
This eLearning session explains the necessary prerequisites for a successful installation of SAP GRC Access Control 5.3 and guides the reader 
through the installation procedure of the software. Underlying presentation: SAP GRC Access Control 5.3 - Pre-Installation (PDF 923 KB) 
l SAP GRC Access Control 5.3 - How To - Apply Support Packages in AC5.3 - Voice over (FLASH 7,500 KB) 
 
The presentation explains the necessary steps for a successful installation of a Support Package in SAP GRC Access Control 5.3 and guides the 
reader through the procedure.  Underlying presentation: SAP GRC Access Control 5.3 - HowTo - Apply Support Packages in AC5.3 (PDF 1,643 
KB) 
l SAP GRC Access Control - How To - Integrate GRC AC53 CUP and NW IdM (PDF 1.438 KB) 
 
This How-To guide explains the integration of SAP GRC AC 5.3 CUP and NetWeaver IdM 7.0. 
l SAP GRC Access Control - Application Integration Documentation (PDF 514 KB) 
 
 
 
The purpose of this Quick Reference Guide is to provide best practices and instructions on how to integrate the application capabilities of Access 
Control (rel. 5.2) that also known as Access Enforcer (AE), Compliance Calibrator (CC) and Role Expert (RE). 
  
l SAP GRC Access Control 5.3 - Post-Installation - RAR - Voice over (FLASH 17,337 KB) 
 
This eLearning session outlines necessary post-installation steps for the implementation of risk analysis and remediation in SAP GRC Access 
Control 5.3. Underlying presentation: SAP GRC Access Control 5.3 - Post-Installation - RAR (PDF 1,676 KB) 
l GRC Access Control - Risk Analysis and Remediation(formerly Virsa Compliance Calibrator) Offline-Mode Risk Analysis (PDF 2,738 KB) 
 
Risk Analysis may be performed in offline-mode (aka remote risk analysis). The process helps in detecting SOD violations in an ERP system 
without having to connect online. Instead data from the ERP system is exported to files and subsequently imported to GRC Access Control by 
using the data extractor utility. 
l Background Jobs for Risk Analysis and Remediation (PDF 345 KB) 
 
This document discusses the background jobs available in the context of using risk analysis and remediation in SAP GRC Access Control. Best 
practices on executing these jobs are given, e.g. the order in which background jobs should be executed, the difference between full synch mode 
and incremental mode. 
l Organizational Rules and Organizational Level Reporting (PDF 2,807 KB) 
 
Use this Quick Reference Guide to understand and create Organizational Rules and perform organization level reporting. 
  
l Periodic Job Processing for Risk Identification and Remediation (PDF 134 KB) 
 
SAP's solutions for Governance, Risk, and Compliance comprise GRC Access Control, an application that handles sustainable prevention of 
Segregation of Duties violations. This Quick Reference Guide for periodic job processing applies to the system's capability for risk analysis and 
remediation. 
l Post-Installation Tasks for Risk Identification and Remediation (PDF 105 KB) 
 
This Quick Reference Guide for post-installation tasks applies to the system's capability for risk analysis and remediation. 
l Creating Roles and Users in SAP NetWeaver User Management Engine (PDF 46 KB) 
 
This Quick Reference Guide describes the creation of roles and users in SAP NetWeaver User Management Engine (UME). 
l Pre-Implementation Checklist for Risk Identification and Remediation (PDF 53 KB) 
 
This Quick Reference Guide for a pre-implementation checklist applies to the system's capability for risk analysis and remediation. 
l SAP GRC Access Control 5.3 - Post-Installation - ERM - Part I - Voice Over (FLASH 17,122 KB) 
 
This eLearning session explains the required post-installation steps for enterprise role management in SAP GRC Access Control 5.3. This is a 
prerequisite to start customizing and implementation of their role management. Underlying presentation: SAP GRC Access Control 5.3 - Post-
Installation - ERM - Part I (PDF 668 KB) 
l SAP GRC Access Control 5.3- Post-Installation - ERM - Part II - Voice Over (FLASH 7,355 KB) 
 
This eLearing session runs through typical implementation steps of enterprise role management in SAP GRC Access Control 5.3. It explains how 
roles may be created. Projects may apply a different methodology. Underlying presentation: SAP GRC Access Control 5.3 - Post-Installation - 
ERM - Part II (PDF 506 KB) 
  
l SAP GRC Access Control 5.3 - Post-Installation - CUP - Voice Over (FLASH 14,607 KB) 
 
This eLearning session outlines necessary post-installation steps to enable compliant user provisioning in SAP GRC Access Control 5.3. 
Completing the required post-installation tasks allows to start customizing and implementation of individual workflows. Underlying presentation: 
SAP GRC Access Control 5.3 - Post-Installation - CUP (PDF 635 KB) 
 
l Configuring LDAP connector in compliant user provisioning (PDF 243 KB) 
 
When implementing compliant user provisioning in GRC Access Control the system is typically linked to a LDAP repository. This paper outlines the 
configuration of LDAP connector and provides sample mappings for Active Directory, SunOne, E-Directory, and Tivoli. 
l SAP GRC Access Control: Compliant user provisioning goes Identity Management (PDF 1.19 MB) 
 
According to Gartner, Governance, Risk, and Compliance (GRC) is the ultimate driver for today's identity management projects. SAP GRC Access 
Control has the technology to provide customers with a cross ERP-platform solution for compliant user provisioning and at the same time provides 
an open API/interface for existing identity management vendors to integrate seamlessly with SAP GRC Access Control for an end-to-end user, role 
and rule provisioning solution. 
l Configuring Requestor Landing Page for Compliant User Provisioning (PDF 220 KB) 
 
The purpose of this article is to provide the procedure required to customize the requestor landing page i.e. the request types on the request 
access screen in compliant user provisioning in SAP GRC Access Control. 
l Configuring Compliant User Provisioning into CUA Systems (PDF 457 KB) 
 
For GRC Access Control to be able to perform user provisioning into Central User Administration (CUA) systems certain special configurations 
related to compliant user provisioning (formerly Virsa Access Enforcer) need to be done. This article outlines the configuration procedure for 
provisioning to work with CUA systems. The paper also discusses troubleshooting. 
l Compliant User Provisioning Quick Reference Guide (QRG): Risk Analysis URI Configuration (PDF 280 KB) 
 
SAP GRC Access Control - part of SAP solutions for Governance, Risk, and Compliance - is helping organizations close gaps in access risk. This 
guide indicates how to link the application's capability for compliant user provisioning with the application's capability for risk analysis and 
remediation. 
l Compliant User Provisioning QRG: HR Triggers (PDF 393 KB) 
 
Compliant user provisioning may be triggered by SAP's human resource application. This quick reference guide outlines how set up that HR link. 
l SAP GRC Access Control 5.3 - Post-Installation - SPM - Voice Over (FLASH 12,053 KB) 
 
This eLearning session outlines post-installation tasks that are a prerequisite for the implementation of superuser privilege management in SAP 
GRC Access Control 5.3. The session explains how to effectively set up superuser privilege management in SAP backend systems and enable the 
Java reporting component, which allows for centralized access to log reports in multiple SAP backend systems. Underlying presentation: SAP 
GRC Access Control 5.3 - Post-Installation - SPM (PDF 1,169 KB) 
l SAP GRC AC 5.3 Integrated Project Plan Article (PDF 88 KB) 
 
The integrated Access Control project plan contains steps to be performed in the implementation of Access Control. The steps and task durations 
represent a basic implementation and may be modified to suit a company's project.10 Dec 2008 
l SAP GRC AC 5.3 Implementation Considerations for Enterprise Role Management Article (PDF 180 KB) 
 
This document provides a quick reference guide to understand the main features, business benefits, and implementation best practices of the 
Access Control 5.3's capability for enterprise role management.01 Dec 2008 
l SAP GRC AC 5.3 Implementation Considerations for Superuser Privilege Management Article (PDF 151 KB) 
 
GRC Access Control identifies and prevents access and authorization risks in cross-enterprise IT systems to prevent fraud and reduce the cost of 
continuous compliance and control. This document discusses the key features of Superuser Privilege Management. It also provides scenarios to 
assist project teams in deciding whether to implement role-based or ID-based firefighting.01 Nov 2008 
  
l SAP GRC Access Control: Migration/Upgrade to Release 5.2   (PDF 1.2 MB)  
 
As of GRC Access Control release 5.2 all Access Control capabilities are bundled to one software package. It is therefore neither recommended 
nor supported to upgrade individual capabilities. This guide provides information for existing GRC Access Control customer upgrading their 
existing implementations from release 4.0 or release 5.1 to release 5.2. 
l SAP GRC Access Control 5.2 - Pre-Implementation Guide (PDF 1,265 KB) 
 
This guide provides guidelines and best practices for the pre-implementation of SAP GRC Access Control. Pre-implementation is the process of 
understanding customer requirements. It helps to lay a firm groundwork for successful implementation of the application.The guide outlines the 
different steps of the process and describes some of the factors that influence performance and hardware requirements. 
l GRC Access Control - Risk Analysis and Remediation (Release 5.2): Quick Reference Guide for Moving to Production (PDF 192 KB) 
 
Moving GRC Access Control from a development/testing environment to production requires populating data in the production version so that risk 
analysis can be performed and  management views are available. 
l Delta Quick Reference Guide 5.1/5.2 for Risk Analysis and Remediation (PDF 61 KB) 
 
This Delta Quick Reference Guide outlines high-level differences between release 5.1 and release 5.2. 
l SAP GRC Access Control 5.2 implementation guide for enterprise role management (PDF 91 KB) 
 
GRC Access Control identifies and prevents access and authorization risks in cross-enterprise IT systems to prevent fraud and reduce the cost of 
continuous compliance and control. This paper provides a quick reference guide to understand the main features, business benefits, and 
implementation best practices of the application's capability for enterprise role management (formerly known as Virsa Role Expert). 
 
 
Under All Articles on Governance, Risk and Compliance: 
 
Link - https://www.sdn.sap.com/irj/scn/articles-grc-all 
 
This link will show all the GRC articles from all areas in the Business Process Expert website. 
 
SAP Notes 
 
Corrections to documentation or additional information can also be stored as SAP Notes.  You can use the SAP Note Search function to identify 
whether the issue you encounter has a SAP Note. 
 
Below are some key SAP notes relevant to providing additional information and documentation about Access Control.  This is just an example of 
some of the SAP Notes available. You may perform a SAP Note search on the Service Marketplace for component GRC* to see all of the SAP 
Notes released. 
 
1085097 Lead Approver radio button not checked in Role Upload 
1134833 AE5.2 - Mass Copy of Requests limitation 
1035063 5.X - Setting up Blanket Mitigation Controls 
1055976 Firefighter 5.2 - Unable to run the SoD analysis report 
1145700 Risk Analysis not recommended for multi-user change requests 
  986996 Best Practice for SAP CC Rules and Risks 
1178372 Risk Analysis and Remediation - Cross and Logical systems 
1178370 Risk Analysis and Remediation - Table sizes 
1179717 Risk Analysis and Remediation - Management Reports 
 
The following OSS Notes have been produced on specific BI related issues: 
 
1155096 Master Data Process Chain failure 
1155095 Alert Header DSO refresh required in process chain 
1155468 Alert Details (0GCC_ALD) InfoCube Start Routine fails 
1155469 InfoPackage Date Selection in Delta Processing 
1155913 Error in deletion programs associated with delta processing 
1229932 Duplicate data records in CUP language dependent text DTPs 
1170897 Permission Violations Delta Deletion Programs Generation 
 
 
Related Wiki page 
 
Governance, Risk, and Compliance (GRC) How-To Guides 
 
Validity 
References 
This document refers to: 
SAP Notes 
Software Component From Rel. To Rel. And Subsequent 
 VIRCC 530.700 530.700  
 VIRAE 530.700 530.700  
 VIRRE 530.700 530.700  
 VIRFF 530.700 530.700  
 GRCFND_A V1000 V1000  
1673593   Updates to Customizing for GRC 10 Due to SP08 
1647291   Access Control 10.0 SP08 Report Documentation Updates 
1602186   GRC Access Risk Analysis tables 
1369045   AC SP09 Data Mart Design Description 
1261750   Upgrade Java Netweaver and GRC applications to AC 5.3 
1153091   Role Expert Implementation Guide 
1054121   The SAP Ecosystem in a Nutshell 
 
This document is referenced by: 
SAP Notes (7) 
 
1369045   AC SP09 Data Mart Design Description 
1602186   GRC Access Risk Analysis tables 
1054121   The SAP Ecosystem in a Nutshell 
1647291   Access Control 10.0 SP08 Report Documentation Updates 
1261750   Upgrade Java Netweaver and GRC applications to AC 5.3 
1673593   Updates to Customizing for GRC 10 Due to SP08 
1153091   Role Expert Implementation Guide

Mais conteúdos dessa disciplina