SAP Access Control
SAP Access Control helps companies to identify, monitor and prevent access risk. It has a set of tools to secure, control access, and prevent fraud across complex landscapes. The application consists of 4 modules:
- Risk Analysis and Remediation – Run risk analysis to detect access risk violations across systems. Mitigate risks using Mitigating controls and report on your current risk situation.
- Compliant User Provisioning – Flexible workflow configuration allows creation of different workflow paths with different stages of approvals. End Users become capable of creating their own requests (system access or superuser access). Using capabilities such as User Access Review, the reviews of user access, role authorizations and risk violations become an automated task.
- Business Role Management – BRM is the repository of roles. Business roles can be defined according to job/function which makes it easier for business users to understand. A role methodology is available which enables consistency through role design and helps customers to create and maintain risk free roles.
- Emergency Access Management – The application gives temporary access to users who need to execute critical functions outside of their function scope. It makes users accountable for their actions as the access is tracked and monitored. Log reports are available to analyse user activity.