3
SAP ECC HR BI Business Objects Security and GRC Audit Training ( Email:[email protected] or Phone 302 494 9476) Event Details Overview OvervR/3 System Security and the Authorization Concept Overview Overview of the Authorization Concept SAP* and DDIC Users What Is the Profile Generator? What Is a Security role? What Happened to Responsibilities? Security role Assignments The Big Picture: Successful and Secure R/3 Implementation Case Study: Security Strategy in a Three-System Environment Authorization Administration Using the Profile Generator Setting Up Security Administrators Policies and Procedures Auditing Requirements Naming Convention for Authorization Profiles Setting Up the Profile Generator Overview When to Use the Profile Generator Activating the Profile Generator Working on SAP Check Indicator Defaults and Field Values Reducing the Scope of Authorization Checks in R/3 (SU24) Generating the SAP Standard Menu and Company Menu Getting Support from the Online Service System Applying Advance Corrections to Your R/3 System User Administration: Overview System Users External R/3 Users Internal R/3 Users Special R/3 Users User Groups Authorizations and Authorization Profiles Mass Operations Creating a New User Listing All Defined System Users Changing a User’s Password Displaying a Generated Authorization Profile and its Authorizations Working with Security roles Overview Starting Security role Maintenance (PFCG) Creating Security roles Copying and Deriving Security roles Choosing the Correct Menu Path in Session Manager Selecting Workflow Tasks Displaying Security roles Changing Security roles Deleting Security roles Transporting Security roles Generating and Maintaining Authorization Profiles Overview Generating the Authorization Profiles Where 103 Ascension Drive Wilmington, DE 19808 Yahoo | Mapquest | Microsoft SAP GRC AUDIT ECC BI and HR Training Wilmington, DE SAP GRC AUDIT ECC BI and HR Training - Eventbrite http://sapgrc.eventbrite.com /?ref=esli&goback =.gde_54221_membe... 1 of 3 13-12-2010 11:39

SAP GRC AUDIT ECC BI and HR

Embed Size (px)

Citation preview

Page 1: SAP GRC AUDIT ECC BI and HR

SAP ECC HR BI Business Objects Security and GRC Audit Training ( Email:[email protected] or Phone 302 494 9476)

Event Details

Overview

OvervR/3 System Security and the Authorization Concept

Overview

Overview of the Authorization Concept

SAP* and DDIC Users

What Is the Profile Generator?

What Is a Security role?

What Happened to Responsibilities?

Security role Assignments

The Big Picture: Successful and Secure R/3 Implementation

Case Study: Security Strategy in a Three-System Environment

Authorization Administration Using the Profile Generator

Setting Up Security Administrators

Policies and Procedures

Auditing Requirements

Naming Convention for Authorization Profiles

Setting Up the Profile Generator

Overview

When to Use the Profile Generator

Activating the Profile Generator

Working on SAP Check Indicator Defaults and Field Values

Reducing the Scope of Authorization Checks in R/3 (SU24)

Generating the SAP Standard Menu and Company Menu

Getting Support from the Online Service System

Applying Advance Corrections to Your R/3 System

User Administration:

Overview

System Users

External R/3 Users

Internal R/3 Users

Special R/3 Users

User Groups

Authorizations and Authorization Profiles

Mass Operations

Creating a New User

Listing All Defined System Users

Changing a User’s Password

Displaying a Generated Authorization Profile and its Authorizations

Working with Security roles

Overview

Starting Security role Maintenance (PFCG)

Creating Security roles

Copying and Deriving Security roles

Choosing the Correct Menu Path in Session Manager

Selecting Workflow Tasks

Displaying Security roles

Changing Security roles

Deleting Security roles

Transporting Security roles

Generating and Maintaining Authorization Profiles

Overview

Generating the Authorization Profiles

Where

103 Ascension Drive

Wilmington, DE 19808

Yahoo | Mapquest | Microsoft

SAP GRC AUDIT ECC BI and HR Training

Wilmington, DE

SAP GRC AUDIT ECC BI and HR Training - Eventbrite http://sapgrc.eventbrite.com/?ref=esli&goback=.gde_54221_membe...

1 of 3 13-12-2010 11:39

Page 2: SAP GRC AUDIT ECC BI and HR

Displaying an Overview of Generated Profiles

Displaying the Technical Names in the Tree List

Regenerating Authorization Profiles After Making Changes

Elements and Symbols of the Hierarchy Display

Using Utilities

Customizing Authorizations

Day 2 ( 10 Hours)

Special Cases

Overview

Manually Post maintaining Authorizations

Assigning Transaction Codes to Reports

Adding Any Missing Transactions to the Company Menu Tree

Assigning Security roles and Users

Overview

Assigning Users to Security roles

Assigning Security roles to Users

Assigning PD Objects to Security roles

Assigning Security roles to PD Objects

Transferring Users from an IMG Project to an Security role

Updating Profiles in the User Master Records

Creating a Sample Organizational Plan

Info system Authorizations

Overview

Displaying Information

Additional Reports and Transactions

Predefined Security roles and Authorization Profiles

What Are Predefined Security roles

Advantages of Predefined Security roles

Which Security roles Are Predefined

Predefined Data for the Security roles

Adapting the Predefined Security roles to Your Specific Needs

Installing the Predefined Security roles

Transports

Overview

Transports Between Clients

Transports Between R/3 Systems

Transporting Security roles

Transporting Check Indicators and Field Values

Transporting the Company Menu

Transporting Authorization Templates

Transporting User Master Records

Tips and Troubleshooting Management

Overview

Tracing Authorizations with Transaction SU53

System Trace Using Transaction ST01

Evaluating a Written Trace File

Day 3 ( 10 Hours)

Upgrades

Overview

Upgrade from a Release Before 3.1x to 4.5

Upgrade from Release 3.0F to 4.5A or 4.5B

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.5x

Online Service System Notes

Overview

Online Service System Notes

Important System Profile Parameters

Incorrect Logons, Default Clients, and Default Start Menu

SAP GRC AUDIT ECC BI and HR Training - Eventbrite http://sapgrc.eventbrite.com/?ref=esli&goback=.gde_54221_membe...

2 of 3 13-12-2010 11:39

Page 3: SAP GRC AUDIT ECC BI and HR

Contact Host for event and ticket information.

Setting Password Length and Expiration

Specifying Impermissible Passwords

Securing SAP* Against Misuse

Tracing Authorizations

Profile Generator and Transaction SU24

User Buffer

No Check on Object S_TCODE

No Check on Certain ABAP Objects

RFC Authority Check

Frequently Used Transactions

Overview

Transaction Code Switches

Authorizations/User Administration Function

Miscellaneous Transactions

Frequently Asked Questions

Overview

Profile Generator Setup

Working with the PG and Profiles

Authorization Checks (SU24)

Including Transactions or Reports

Missing Authorizations

User Administration

Session Manager

Transporting

Menu Generation

Tables

Day 4 ( 10 Hours)

SAP BW/BI Security Concepts

User Administration and Authentication

Authorizations – Administration and Reporting

Communication Security

Security and Data Storage

Trace and Log files

SAP GRC Concepts

Functions of SAP GRC access control

Risk analysis and remediation- ABAP Version Only

Compliant User Provisioning- Concept Overview

Enterprise Role Management- Concept Overview

Super user privilege management- ABAP Version Only

SAP Security Automation

CATT Scripts

SAP GRC AUDIT ECC BI and HR Training - Eventbrite http://sapgrc.eventbrite.com/?ref=esli&goback=.gde_54221_membe...

3 of 3 13-12-2010 11:39