100% found this document useful (1 vote)
1K views

GRC Related Parameters and Tables

eGRC provides tools for governance, risk, and compliance including business configuration sets, T-codes, reports, tables, background jobs, default roles, and parameters. It includes modules for governance, risk analysis, emergency access management, business role management, and access request management. Key aspects are risk analysis to identify segregation of duty violations, emergency access management for temporary access requests, and role management to define and provision user permissions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views

GRC Related Parameters and Tables

eGRC provides tools for governance, risk, and compliance including business configuration sets, T-codes, reports, tables, background jobs, default roles, and parameters. It includes modules for governance, risk analysis, emergency access management, business role management, and access request management. Key aspects are risk analysis to identify segregation of duty violations, emergency access management for temporary access requests, and role management to define and provision user permissions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

eGRC: Governance Risk and Compliance

Governance: Structure of an organization Hierarchy

Risk: Able to commit a fraud

Compliance: Follow set of Rules and Regulations

BC SETS: A Business Configuration set (BC Set) is a management tool which helps users to
record, save and share customized settings.

BC SET contains a standard data provided by SAP which all the configuration data populated
into tables.

T-Codes:

SPRO: All Background Configurations:

NWBC: Technical Data Table (Net Weaver Business Client)

SCPR20: To activate BC SETS

SICF: To see whether the ICF Services are has been activated or not

SMGW: Host name and Service name

SM59: RFC Destinations (Display/Maintain) in SAP

SWU3: To change WF-BATCH password


SM12: Used for Display and Delete Locks in SAP

GRAC_REP_OBJ_SYNC: Repository Object Sync

GRFNMW_Configure_WD: T-code to open MSMP WORKFLOW

GRFNMW_Dev_Rules: T-code to open BRF+ Application

SWE2: SAP parameter transaction code that is used to maintain the contents of

SWFDVEVTY2 database table

Reports:
RS_APPL_REFRES : To make entries appear in SPRO

GRAC_REPOSITORY_OBJECT_SYNC: Report to do repository object sync

Tables:
SCPRACTP: To see whether the BC SETS has been activated or not

SCPRACTR: Table which contains BC Set configuration data

GRFNCONNSCNLK: Relation between Integration Scenario and connectors

RFCDES: RFCDES is a standard SAP Table which is used to store Destination table for
Remote Function Call data and is available within R/3 SAP systems depending on the version
and release level.

Background Jobs Related to GRC:

Basis:

GRAC_Repository_Object_Sync

GRAC_Action_Usage_Sync

GRAC_PFCG_Authorization_Sync

ARA:

Grac_BATCH_Risk_Analysis

EAM:

GRAC_SPM_LOG_SYNC_Update
GRAC_SPM_SYNC

ARM:

GRFNMW_BATCH_EMAIL_REMINDER

Default Roles to users:


SAP_GRC_FN_Base - Base role to run GRC applications

SAP_GRC_FN_Business_User – For Business User

SAP_GRC_NWBC – For Governance, Risk, & Compliance

Default Roles to ADMIN:


SAP_GRC_FN_Base

SAP_GRC_FN_Business_User

SAP_GRC_NWBC - Governance, Risk, & Compliance

SAP_GRAC_ALL - Super Admin for AC

SAP_GRAC_NWBC

Reports Available for EAM:

1. Consolidated Log Report


2. Invalid Super User Report
3. FF Log Summery Report
4. Reason Code & Activity Report
5. Transaction Log & Session Details
6. SOD Conflict Report

Logs Available in GRC:

1. Transaction Log – STAD


2. Change Log – CDHRD, CDPOS
3. Audit Log – SM20
4. System Log – SM21
5. OS Command Log – SM49
6. All System Logs – Select this
EAM: Emergency Access Management

BC Sets Related to EAM:

GRAC_SPM_Criticality_level

T-Codes:

GRAC_SPM: EAM/SPM launch pad logon (Centralized EAM)


GRAC_EAM: EAM/SPM launch pad logon (Centralized EAM)

/GRCPI/GRIA_EAM: For Decentralized launch pad

Tables:

GRACFFOWNER: FF Owners

GRACFFUSER: FFID’s Users

GRACFFUSERT: Details about FFID assignment to FF

GRACOBJECTT: Text table for FFID & Role details

/GRCPI/GRIAFFUSR: Relationship between User and FF (Decentralized)

Reports:

GRAC_REPOSITORY_OBJECT_SYNC: Report to do repository object sync

Users & Default Roles in EAM:

ADMIN User:

SAP_GRC_FN_Base

SAP_GRC_FN_Business_User

SAP_GRC_NWBC

SAP_GRAC_NWBC
SAP_GRAC_ALL

SAP_GRAC_Super_User_Mgmt_ADMIN

Owner:

SAP_GRC_FN_Base

SAP_GRC_FN_Business_User

SAP_GRC_NWBC

SAP_GRAC_Super_User_Mgmt_Owner

Controller:

SAP_GRC_FN_Base

SAP_GRC_FN_Business_User
SAP_GRC_NWBC

SAP_GRAC_Super_User_Mgmt_Cntlr

FF USER:

SAP_GRC_FN_Base

SAP_GRC_FN_Business_User

SAP_GRC_NWBC

SAP_GRAC_Super_User_Mgmt_User

FFID USER: Service User

SAP_GRAC_SPM_FFID

Provided relavent FF roles

Parameters related to EAM – Few important parameters: (Total 21 Parameters)

4000 – 4015, 4017, 4018, 4020, 4021, 4025, 5033

4000 - Application Type (ID Based or Role Based)

4001 – Validity Period (default period 30 days)

4002 & 4008 – Login Notifications (When FF User login to FFID and if they execute any

Transactions it will send reports to controller)

4003 – Retrive Change Log

4004 – Retrive System Log

4005 – Retrive Audit Log

4007 & 4009 – Log Report

4010 – FFID Role Name (Default role SAP_GRAC_SPM_FFID)

4013 – FFID owner can submit request FFID owned

4012 – To all users & Controllers

4014 – FFID controller cannot raise request on his own

4015 – Centralized (No), Decentralized (Yes)


5033 – Allow FF with no controller (Yes)

SUPMG: Integration Scenario used in EAM

ARA: Access Risk Analysis (Get Clean & Stay Clean)


BC Sets Related to ARA:

 GRAC_RA_RULESET_COMMON - SoD Rules Set


 GRAC_RA_RULESET_JDE - JDE Rules Set
 GRAC_RA_RULESET_ORACLE - ORACLE Rules Set
 GRAC_RA_RULESET_PSOFT - PSOFT Rules Set
 GRAC_RA_RULESET_SAP_APO - JDE Rules Set
 GRAC_RA_RULESET_SAP_BASIS - SAP BASIS Rules Set
 GRAC_RA_RULESET_SAP_CRM - SAP CRM Rules Set
 GRAC_RA_RULESET_SAP_ECCS - SAP ECCS Rules Set
 GRAC_RA_RULESET_SAP_HR - SAP HR Rules Set
 GRAC_RA_RULESET_SAP_NHR - SAP R/3 less HR Basis Rules Set
 GRAC_RA_RULESET_SAP_R3 - SAP R/3 AC Rules Set
 GRAC_RA_RULESET_SAP_SRM - SAP SRM Rules Set

Types of Risks: SOD Risk, Critical Action, Critical Permission

SOD Risk: If user having 2 or more conflicting actions which allows to commit a fraud
Critical Action: T-Code itself is risk (like SCC5, SM01 etc)

Critical Permission: Risk at field and values level (S_Develop, S_User_GRP with activity 02)

Risk Levels: Critical, High, Medium, Low

Execution: For Existing Violations

Simulation: Possible Violations

Remediation: Preventive Control

Mitigation: By passing SOD violations for specific period. Detective control

Process:

Create Ruleset

Screens: Manditory fields in Ruleset

Create min 2 Functions


Generate rules in Access Risk – Build Risk

Perform User/Role level Execution and User /Rolelevel Simulation

Tables:

GRACFUNC – Functions

GRACACTRULE – It store SOD Action Rule detail data


GRACFUNCT – Functions with Description

GRACFUNCACT – What actions are there against functions

GRACCRROLE – Critical Roles

GRACCRROLET – Critical Roles with Description

GRACCRPROFILE – Critical Profile

GRACCRPROFILET – Critical Profile with description

GRACSODRISK – SOD Risks in System

GRACSODRISKT – SOD Risks in System with description

GRACSODRISKOWN – SOD Risks owner in System

GRACOWNER – Master table for central owner Admin

GRACUSERCONN – Connector Specific User (relation between users and systems)

Parameters related to ARA:

1001 – Enable function change log

1002 – Enable risk change log

1003 – Enable Organization rule log

1004 – Enable Supplementary rule log

1005 – Enable critical role log

1006 – Enable critical profile log

1007 – Enable RuleSet change log

1008 – Enable role change log

1023 – Default role type for risk analysis

1024 – Risk level

1025 – Rule set

1026 – User type

1027 – Enable Offline risk analysis (Batch process)

1028 – Include expired users


1029 – Include locked users

1030 – Include mitigated risk

1031 – Ignore critical roles and profiles

1032 – Include reference user when doing user analysis

1036 – Show all objects in risk analysis

1050 – Default report view

1063 – SAP Change Log that is stored in the CDHDR/CDPOS tables. ... If this parameter is set

to YES then the Firefighter can use logon pad available in Missing: 1063 | Must
include: 1063

1064 – SAP Change Log that is stored in the CDHDR/CDPOS tables. ... If this parameter is set

to YES then the Firefighter can use logon pad available in Missing: 1063 | Must
include: 1063

1071 – Enable risk analysis on form submission

Users in ARA:

Risk Owner:

SAP_GRC_FN_Base

SAP_GRC_FN_Business_User
SAP_GRC_NWBC

SAP_GRAC_RISK_OWNER

MITIGATION APPROVER:

SAP_GRC_FN_Base

SAP_GRC_FN_Business_User

SAP_GRC_NWBC

SAP_GRAC_CONTROL_APPROER

MITIGATION CONTROL MONITOR:

SAP_GRC_FN_Base

SAP_GRC_FN_Business_User

SAP_GRC_NWBC

SAP_GRAC_CONTROL_MONITOR

USER LEVEL
SIMULATION LEVEL
ROLE LEVEL

ROLE LEVEL SIMULATION LEEL


BRM: Business Role Management
BC Sets Related to BRM:

 GRAC_ROLE_MGMT_SENTIVITY* - Sensitivity
 GRAC_ROLE_MGMT_METHODOLOGY* - Methodology Process and Steps
 GRAC_ROLE_MGMT_ROLE_STATUS* - Role Status
 GRAC_ROLE_MGMT_PRE_REQ_TYPE* - Prerequisite Types
 GRAC_ROLE_SEARCH_COFIGURATION - Role Search Configuration for Access
Request
Role Types:

SIN – Single Role

COM – Composite Role

BUS – Business Role

DRD – Derived Role

Download and Upload – Temp Files

 Business Process
 Functions
 Function Business Process
 Function Actions
 Function Permissions
 Rule set
 Risk
 Risk Description
 Risk Rule Set Relationship
 Risk Owner

Important Fields to import Roles:

1. Role Name
2. Role Type
3. Business Process Name
4. Subprocess Name
5. Project/Release Name
6. Role Status
7. Methodology Status
8. System Allow Auto Provision
9. Role Name
10. Master
11. Assignment Approver
12. Role Content Approver

Parameters related to BRM:


3004 – Parameter Value – PRD - Default Role Status

3005 – Parameter Value – No - Reset Role Methodology when Changing Role Attributes

3014 – Parameter Value –Yes - Allow role generation with Permission Level violations
Tables Related BRM:
ARM: Access Request Management
ARA provides automatic workflow for access request form

MSMP is to build a workflow for access request management

BC Sets Related to ARA:

 GRAC_ACCESS_REQUEST_REQ_TYPE* - Request Type


 GRAC_ACCESS_REQUEST_EUP* - EUP (Note: Only the value EU ID 999 is valid for this
BC set.)
 GRAC_ACCESS_REQUEST_APPL_MAPPING* - Mapping BRF Function IDs and AC
Applications
 GRAC_ACCESS_REQUEST_PRIORITY* - Request Priority
 GRAC_DT_REQUEST_DISPLAY_SECTIONS - Simplified Access Request Display
Sections
 GRAC_DT_REQUEST_FIELD_LABELS - Simplified Access Request Field Labels
 GRAC_DT_REQUEST_PAGE_SETTINGS
Tables in ARM:

Modify Task Settings:


Parameters in ARM:

2004 – Request type for UAR (001)

2005 – Default Priority (008)

2006 – Who are reviewers?

2007 – Admin review required before sending tasks to reviewers

2009 – Consider default roles

2011 – Default role level

2013 – Request Attributes

2024 – Training and Verification

2035 – Allow role comments

2038 – Auto approve roles without Approvers

2051 – Enable User ID validation in Access Request against search data source

T- Codes:

GRFNMW_Configure_WD

GRFNMW_DEV_RULES

Create BRF+ Application Type and Function Type:


MSMP Stages:

1. Process Global Settings


2. Maintain Rules
3. Maintain Agents
4. Variable & Templates
5. Maintain Path
6. Main Route Mapping
7. Generate versions

Process ID’s:

SAP_GRAC_ACCESS_REQUEST

SAP_GRAC_ACCESS_REQUEST_HR

SAP_GRAC_CONTROL_ASGN

SAP_GRAC_CONTROL_MAINT

SAP_GRAC_FFID_REVIEW

SAP_GRAC_FIREFIGHTER_LOG_REVIEW

SAP_GRAC_FUNC_APPR

SAP_GRAC_RISK_APPR

SAP_GRAC_ROLE_APPR
SAP_GRAC_SOD_RISK_REVIEW

SAP_GRAC_USER_ACCESS_REVIEW

Escalations Conditions:

1. No Escalations
2. Defaults
3. Escalate to Specific Agent
4. Skip to Next Stage

Notification Settings:

Notification Event:

1. Request Submission
2. End of Request

Template ID: Set of rules/messages are developed by ABAP team

Recipient ID: Approver who is going to approve

Escape Conditions:

1. Approver not Fount


2. Auto Provision Failure

Rule ID Maintenance:

Rule Kind:

1. Initiator Rule
2. Agent Rule
3. Notification Variable Rule
4. Routing Rule (n-1) stage

Routing Rule:

1. SOD Violations and no role owners


2. SOD Violations
3. Training Verification
4. No Role Owner

Rule Type:

1. BRFPLUS Rule
2. Function Module Based Rule
3. ABAP Class Based Rule
4. BRFPLUS Flat Rule (Lineitem by Lineitem)

AGENT TYPE:

1. GRC API Rules


2. PFCG Rules
3. PFCG User Groups
4. Directly Mapped Users

Provisioning Rules:

Auto provisioning at end of request

Auto Provisioning at end of each stage

No Provisioning

Manual Provisioning with auto password generation

Manual Provisioning

You might also like