Redesign core model ECC
Analyze the organization of SAP user support
Analyze the management rules and the operating mode used to define and realize the roles
Analyze access rights on critical transactions
Analyze the principle of separation of tasks or functions
Analyze general security settings in SAP
Draft the intervention report
Activity Support TMA
TMA level 2 remote access on ECC-GRC-CRM-BI-SOLMAN-IT
informations Mgt vendors and customers , authorization TMA SOD on virsa4
Redesign core model ECC,
Analyze the organization of SAP user support
Analyze the management rules and the operating mode used to define and realize the roles
Analyze access rights on critical transactions
Analyze the principle of separation of tasks or functions
Analyze general security settings in SAP
Draft the intervention report
Reporting analyse and solve the conflicts report SOD by users
Activity Full Implementation of GRC 10 Access Control, Process control and Risk management
Full Implementation and configuration of GRC 10 ARA-EAM-BRM-ARM
Management security update roles ECC-SOLMAN-CRM -BW
Test campaign on ALM Quality center Roles IT-SOLMAN-BI-CRM
Configuration IDM Detailed Design ARA and ARM connection for SOD Management
Activity Migration project from EHP6 to EHP7 TMA roll out go live
Analyzed existing SAP Security model and involved in different wave implementation of SAP Security after upgrade
Design news authorization roles based on positional requirement
End to end user support to fix user's problem
Coordinate with different functional teams FI, MM and CRM to design roles successfully
Support ECC, BI, CRM and HR users
Testing modification on DEV with Quality center scripts and scenarios tests, validation and OT
GRC part upgrade
Upgrade GRC SPM firefighters ID
Maintain owners and controllers in central owner maintenance
Assign owners to firefighter IDs
Assign controllers to firefighter IDs
Assign firefighter users to firefighter IDs
Maintain reason codes
Monitoring emergency access
Activity Advancing nuclear safety 3000 users Implementation of GRC Suite Access Control 10.1
Full Implementation Access Control 10.1 with the basis team
Analyzed existing SAP Security model and involved in different wave implementations of SAP security.
Redesign roles
Configuration of ARA, EAM, ARM, BRM
Clean up roles single, master, derives, business roles and composites roles based on positional requirement
End to end user support to fix user's problem
IDM Integration in GRC environment
Maintaining shared master data
Maintain master data of access control owners
Configuring and maintaining the rule set
Review configuration for analyze and manage risk functionalities
Configuring and using audit trail tracking
Plan and prepare a rule set
Build a rule set and prepare for testing
Using the risk analysis framework
Remediating risks
Set up and documented mitigating risks
Perform analysis, remediation and mitigation of risk
Mitigating multiple risks at one time
Redesigned roles based matrix SOD
Activity Redesigning roles p2p
Redesigned roles based matrix SOD
Managing permissions implemented on SAP
Started a pilot on a center as part of lot "Heart Odyssee"
Handle modifications in the permits
Review the permissions production earlier for simplification and delete roles "Emergency
Collect the detailed information permissions
Redesign authorizations
Guide them for the technical translation
Determine the needed competency
Chose MES flexnet
There are a lot of specifics transactions handled in logistics e.g flow that tracks the order and delivery of equipment requested by the customer .
Redesign roles masters activities supply chain cycles
Activity Deployment SEPA and Project redesign of the order to cash and purchase to pay process based on
a new matrix activities SOD
Redesigned roles based matrix SOD
Set up all steps for authorization for all components SEPA procedure
Create BAM roles and users FI CO MM SD SRM
Converting profiles to different types of Roles Simple, Derived and composite
Extract users from profiles and assign them to the new roles through a BAPI
Writing of all security procedures and policies
Project authorization management
General Process design
Process map analysis detailed design
Writing of all security procedures and the policies
Project authorization management
Activity Security SAP authorization concept and deployment system GRC
Deployment of GRC
Redesign profiles/roles and restrictions procedures
Co-ordinate comprehensive testing of all profiles and authorizations to ensure accuracy and segregation of duties
Designed a comprehensive security Matrix that documented the security design and controlled the user requests in the production environment.
Developed, maintained and controlled the access of the project team members in the all environments
Maintaining company approved audit standards for SAP Application security
Resolved BI, SD, FI, CO, ETM, MM, PS security related issues.
Maintenance of administration user s role
Security monitoring and reporting
GRC Implementation components
Super User Privilege Management
Activity Management of SAP GRC and implementation post-install CUP RAR SPM
Writing operating documents GRC access control CUP
Upload UME Roles Refer to Post-Installation Slide Deck for RAR
Upload Initial Configuration Data
Create and Test System Connectors
Configure User Data Source & User Details Source Optionally
Configure Authentication System
Configure SMTP Server for Workflow Email Notifications Optional
Configure Risk Analysis and Mitigation
Configure Miscellaneous Settings
Define Number Ranges for Request Numbering
Create Role Attributes
Upload Roles from SAP Backend Systems via Spreadsheet