Die Lerninhalte richten sich an alle, die sich SAP-Wissen einfach, kompakt und praxisnah aneignen wollen. Unsere Lernplattform bietet Inhalte für Einsteiger, Fortgeschrittene und Experten. So können Sie Ihr Wissen Schritt für Schritt erweitern und sich kontinuierlich zum SAP-Experten entwickeln.
Access Risk Management in SAP
Flatrate
19 € pro Monat
Einzellizenz 1000+ E-Books und Videos Sofortiger Zugang 12 Monate(228 €pro Jahr) Automatische Verlängerung
Mehr Informationen
Do you need expert guidance on how to plan, implement, and run access analyses? This book takes a practical approach to creating customer-specific SAP rulesets for compliance managers, GRC teams, identity and access management teams, as well as administrators who run these systems. Identify types of risk and the tools available. Take a look at use cases and tools for risk maintenance and explore how to optimize processes, the quality of authorization roles and concepts, the transparency of access rights to data, and functions for data and process owners. Explore key considerations for evaluating a tool for hosting and using a risk catalog. Take a look at the limitations of standard access risk catalogs and learn more about a methodology for customizing a standard risk catalog. Find out why the authors recommend starting with a small access risk catalog before moving on to more complex landscapes. Take away best practices for bringing end users up to speed.
- Considerations for hosting and using a risk catalog
- Limitations of standard access risk catalogs
- Methodology for customizing standard access risk catalogs
- Risk handling process
Leseprobe
2.1 Why the term “access risk catalog”?
An access risk catalog is the object that contains all the rules defined for analyzing authorizations via any tool. However, let us explain why we like to use this exact term.
2.1.1 Why “access”?
Access because we are talking about rules that can analyze authorizations. In other words: Who has access to certain data or functionalities? To use the term risk catalog only is misleading, as we are talking about risks in a specific sense, rather than in a general sense, such as a fire in a plant/office building, currency fluctuation, energy crisis, etc.
2.1.2 Why “risk”?
Risk because the key purpose of the catalog is to identify risky access to an IT system.
Alternative terms are sometimes used. For example, the goal of analyzing access within an SAP system is not always to evaluate regulatory risks. We often recommend analyzing authorizations for information with the goal of obtaining a certain level of transparency for data or role owners (see also Section 1.1.3). An analysis may also be used to support the execution of internal controls for example, to comply with an audit requirement regarding the listing of persons who have posting authorization to a specific account. In these instances, you may have seen the term rule or even analysis used instead of risk.
However, as the term risk is much more common when talking about GRC tools and analysis of access, we regard this as the best term to use for common understanding.
2.1.3 Why “catalog”?
Catalog since it is the complete list of defined risks.
Again, alternative terms are sometimes used. The term ruleset is often used in software tools for grouping risks to structure them or for a specific purpose (e.g., GDPR, external audit). A risk can usually be assigned to more than one ruleset, so in our view, the term is more useful as an attribute of a risk (see also Section 2.2.2) but not as a term for the whole content of the risk database.
Therefore, database would also fit. However, this is a very technical term and we decided against it because when communicating with business users, it just does not feel right.
Another alternative term used is matrix. For us, this implies a combination of functionalities that results in a violation of segregation of duties (SoD), even more so the terms SoD matrix or SoD ruleset. As there are many single functionalities that we should monitor, we do not regard the term as appropriate for the complete content of a risk database, only for those SoD risks.
This is why we use the term catalog within our projects. It is neutral with regard to content, use cases, and the goal of the analysis.
Bewertungen
A. Sonsalla
14.09.2025
page 120 and 131 are missing, please add, thanks.
Egal ob Bücher, Videos oder Online-Trainings: Unsere Produkte vermitteln SAP-Wissen kompakt und praxisnah, sodass Sie es auch bei wenig Zeit direkt in Ihren Arbeitsalltag integrieren können. Sie profitieren von einer breiten Abdeckung relevanter SAP-Themen, hochwertigen Inhalten in vier Sprachen und Lernformaten, die sich an Ihren individuellen Bedürfnissen orientieren. So bleiben Sie fachlich auf dem neuesten Stand und bauen Ihr Wissen kontinuierlich aus.
Unsere Bücher zeichnen sich durch einen klaren Praxisfokus und eine kompakte, verständliche Darstellung aus. Wir erklären komplexe SAP-Themen auf den Punkt – ohne unnötige Marketing-Phrasen. So kommen Leser schnell zum Wesentlichen und können das Wissen direkt anwenden.
Unsere Print-Bücher kann man innerhalb von 14 Tagen im Originalzustand und auf eigene Kosten zurückschicken.
Aktuell ist ein direkter Buchversand nur innerhalb Deutschlands möglich. Für Buch-Bestellungen außerhalb von Deutschland empfehlen wir den Kauf via Amazon. Den Link finden sie in einem Produkt bei uns um Webshop auf "E-Book kaufen" klicken. Auf Amazon werden ihnen dann die E-Book und Printvariante des Buches zum Kauf angezeigt.
Zugriff auf alle Inhalte erhalten Sie schon ab 19€ pro Monat mit unserem Digital-Abo.
Unser Team ist jederzeit für Ihre Fragen da und meldet sich schnellst möglich (max 1-2 Tage). Kontaktieren Sie uns auch, wenn Sie Fragen an eine Autorin/einen Autor haben. E-Mail: contact@espresso-tutorials.com

