1 SAP R/3 Security |
2. BW/BI Security |
1.1 Overview of SAP |
2.1 Architecture and strategies for a BI |
1.2 Overview of SAP BASIS |
authorization concept |
1.3 Introduction to SAP Security |
2.2 Security requirements in SAP BI |
1.3.1 Why we need security |
2.3 Standard roles and templates for the |
1.3.2 What needs to be protected |
authorization concept |
1.3.3 From whom we need to protect |
2.4 Creating BW/BI roles and modification |
1.3.4 Implementation methodology |
2.5 Difference between BW and R/3 security |
1.4 User administration |
2.6 Difference between BW and BI Security |
1.4.1 Single user administration |
2.7 Different authorization objects involved |
1.4.2 Mass User administration |
in BW/BI |
1.4.3 LSMW Script running |
2.8 Analysis authorization concept and |
1.5 Introduction of CUA (Central User administration) |
reporting |
1.5.1 CUA Configuration for different landscapes |
2.9 Troubleshooting BW/BI issues |
1.5.2 Performing user administration activities in CUA |
|
1.5.3 Distributing User/IDOCS and troubleshooting issues |
3 HR Security |
1.6 User Groups Concept |
3.1 Introduction to HR security |
1.7 Role Administration and authorizations concept |
3.2 Personal administration and |
1.7.1 Overview of authorizations and roles |
Organizational management |
1.7.2 Change management process |
3.3 HR General and Structural authorizations |
1.7.3 Creating custom authorization objects |
3.4 HR authorization objects and info types |
1.7.4 SAP Role types |
3.5 Troubleshooting HR issues |
1.7.5 Working with Profile Generator |
|
1.7.6 Creating and modifying different roles |
4 GRC (Governance, Risks and Compliances 5.3 |
1.8 Authorization Group Concept |
4.1 Introduction to GRC |
1.9 Missing authorization |
4.2 Sarbanes Oxley Rules (SOX) |
1.10 Tracing the user for missing authorization. |
4.3 In depth discussion of GRC |
1.11 Working with R/3 tables, parameters and Reports |
Components |
1.12 SAP Security Audit |
4.3.1 Compliance User Provisioning (CUP) |
|
4.3.2 Risk Analysis and Remediation (RAR) |
|
4.3.3 Enterprise Role management (ERM) |
|
4.3.4 Super User Privilege Management |
|
(SPM) |
|
4.4 Working with functions, Risks and |
|
Mitigation Controls |
|
4.5 Introduction to GRC 10. |