Information

Sie befinden sich auf der internationalen Website von Espresso Tutorials. Möchten Sie zur deutschen Website wechseln?

Access Risk Management in SAP

Access Risk Management in SAP

Idioma

English

Páginas

179

Edición

1

Nivel

Intermedio

ISBN

9783960122012

ISBN Imprimir

9783960122029

Libros electrónicos

o acceder a todos los contenidos

Tarifa plana

19 € al mes

  • Licencia única
  • Más de 1000 libros electrónicos y tutoriales en vídeo
  • Acceso instantáneo
  • 12 meses(228 €al año)
  • Renovación automática

Saber más

Do you need expert guidance on how to plan, implement, and run access analyses? This book takes a practical approach to creating customer-specific SAP rulesets for compliance managers, GRC teams, identity and access management teams, as well as administrators who run these systems. Identify types of risk and the tools available. Take a look at use cases and tools for risk maintenance and explore how to optimize processes, the quality of authorization roles and concepts, the transparency of access rights to data, and functions for data and process owners. Explore key considerations for evaluating a tool for hosting and using a risk catalog. Take a look at the limitations of standard access risk catalogs and learn more about a methodology for customizing a standard risk catalog. Find out why the authors recommend starting with a small access risk catalog before moving on to more complex landscapes. Take away best practices for bringing end users up to speed.

  • Considerations for hosting and using a risk catalog
  • Limitations of standard access risk catalogs
  • Methodology for customizing standard access risk catalogs
  • Risk handling process

Ejemplo de lectura

2.1 Why the term “access risk catalog”?

An access risk catalog is the object that contains all the rules defined for analyzing authorizations via any tool. However, let us explain why we like to use this exact term.

2.1.1 Why “access”?

Access because we are talking about rules that can analyze authorizations. In other words: Who has access to certain data or functionalities? To use the term risk catalog only is misleading, as we are talking about risks in a specific sense, rather than in a general sense, such as a fire in a plant/office building, currency fluctuation, energy crisis, etc.

2.1.2 Why “risk”?

Risk because the key purpose of the catalog is to identify risky access to an IT system.

Alternative terms are sometimes used. For example, the goal of analyzing access within an SAP system is not always to evaluate regulatory risks. We often recommend analyzing authorizations for information with the goal of obtaining a certain level of transparency for data or role owners (see also Section 1.1.3). An analysis may also be used to support the execution of internal controls for example, to comply with an audit requirement regarding the listing of persons who have posting authorization to a specific account. In these instances, you may have seen the term rule or even analysis used instead of risk.

However, as the term risk is much more common when talking about GRC tools and analysis of access, we regard this as the best term to use for common understanding.

2.1.3 Why “catalog”?

Catalog since it is the complete list of defined risks.

Again, alternative terms are sometimes used. The term ruleset is often used in software tools for grouping risks to structure them or for a specific purpose (e.g., GDPR, external audit). A risk can usually be assigned to more than one ruleset, so in our view, the term is more useful as an attribute of a risk (see also Section 2.2.2) but not as a term for the whole content of the risk database.

Therefore, database would also fit. However, this is a very technical term and we decided against it because when communicating with business users, it just does not feel right.

Another alternative term used is matrix. For us, this implies a combination of functionalities that results in a violation of segregation of duties (SoD), even more so the terms SoD matrix or SoD ruleset. As there are many single functionalities that we should monitor, we do not regard the term as appropriate for the complete content of a risk database, only for those SoD risks.

This is why we use the term catalog within our projects. It is neutral with regard to content, use cases, and the goal of the analysis.

Clasificaciones

  • A. Sonsalla

    14.09.2025

    page 120 and 131 are missing, please add, thanks.

Support-Team

  • Para obtener más ayuda, visite nuestra documentación o haga clic en Chat.