{"id":10674,"date":"2024-05-03T10:39:33","date_gmt":"2024-05-03T08:39:33","guid":{"rendered":"https:\/\/www.inprosec.com\/?page_id=10674"},"modified":"2024-11-21T11:38:27","modified_gmt":"2024-11-21T09:38:27","slug":"access-control","status":"publish","type":"page","link":"https:\/\/www.inprosec.com\/en\/services\/sap-grc\/access-control\/","title":{"rendered":"Access Control"},"content":{"rendered":"<section class=\"l-section wpb_row cabecera-interior height_medium color_primary with_img parallax_ver parallax_xpos_right\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1018\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-abstracto-azul.jpg);background-position: bottom right;\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><nav class=\"g-breadcrumbs us_custom_f4397b66 separator_custom align_left\" itemscope itemtype=\"http:\/\/schema.org\/BreadcrumbList\"><div class=\"g-breadcrumbs-item\">Pages<\/div><\/nav><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h1 style=\"text-align: left;\">Access Control<\/h1>\n<h2>SAP\u00ae GRC Services<\/h2>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_f1f1dff3 menu-servicios has_text_color hide_on_mobiles height_auto type_sticky\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><nav class=\"w-menu us_custom_ea2be81a layout_hor style_links us_menu_1\" style=\"--main-gap:2.5rem;--main-ver-indent:0.8em;--main-hor-indent:0.8em;--main-color:inherit;\"><ul id=\"menu-menu-access-control-ingles\" class=\"menu\"><li id=\"menu-item-11158\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11158\"><a href=\"#access-risk\">Access Risk Analysis<\/a><\/li><li id=\"menu-item-11159\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11159\"><a href=\"#access-request\">Access Request Management<\/a><\/li><li id=\"menu-item-11160\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11160\"><a href=\"#emergency-access\">Emergency Access Management<\/a><\/li><li id=\"menu-item-11161\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11161\"><a href=\"#business-role\">Business Role Management<\/a><\/li><\/ul><style>@media ( max-width:600px ){.us_menu_1 .menu{display:block!important}.us_menu_1 .menu>li{margin:0 0 var(--main-gap,2.5rem)!important}}<\/style><\/nav><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_b03640aa height_auto\"><div class=\"l-section-overlay\" style=\"background:rgba(40,139,208,0.10)\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container  has_bg_color stretched\"><div class=\"vc_column-inner us_custom_2b532575 us_animate_this\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_23786b5e us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_large\"><\/div><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Monitor and control access to your SAP\u00ae systems<\/span><\/span><\/h2><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><strong>SAP\u00ae GRC Access Control<\/strong> is an application that <strong>monitors, evaluates and controls user access and authorisation<\/strong>, ensuring that only the right people have the right access to the right data.<\/p>\n<\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_33c3a0a5 height_large\" id=\"access-risk\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Access Risk Analysis (ARA)<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>The SAP\u00ae GRC Access Control ARA (Access Risk Analysis) <strong>module<\/strong> is used for SAP\u00ae access management with <strong>preventive and continuous monitoring of risks, critical transactions and compensating controls<\/strong>.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"lf76\"><button class=\"w-tabs-section-header\" aria-controls=\"content-lf76\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-lf76\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i>It is common for organisations to have a <strong>lack of visibility of user access<\/strong> in SAP\u00ae systems, which creates risk.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>The existence of <strong>users with many more accesses than they need.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i>All of these issues lead to a lack of visibility into <strong>segregation of duties (SoD) risks.<\/strong><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"m303\"><button class=\"w-tabs-section-header\" aria-controls=\"content-m303\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-m303\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i>At Inprosec we have our own risk matrix, which is based on the SAP\u00ae matrix and to which we have made more than 200 changes, such as identifying new risks, new functions, and incorporating standard transactions for the following systems: APO, BASIS, CRM, ECCS, HANA DB, HR, ISU, R3, S\/4HANA, SRM and SuccessFactors Employee Central.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>We also have our own IT risk matrix (Basis).<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>The use of multiple systems also creates risks between them. Our Cross-System Risk Analysis analyses these risks.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"z673\"><button class=\"w-tabs-section-header\" aria-controls=\"content-z673\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits of ARA<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-z673\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i>Get real and true <strong>information about the risks in your SAP\u00ae system<\/strong>.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Identify <strong>actions to mitigate risks.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Facilitate decision making to <strong>reduce the number of SoD risks in SAP\u00ae<\/strong>.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/12-1-1024x538.jpg\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/12-1-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/12-1-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/12-1-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/12-1.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_d6434207 height_large\" id=\"access-request\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default reversed stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/11\/arm-1024x538.jpg\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/11\/arm-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/11\/arm-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/11\/arm-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/11\/arm.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Access Request Management (ARM)<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>The SAP\u00ae GRC Access Control ARM (<strong>Access Request Management<\/strong>) module facilitates efficient and controlled processes for requesting, approving and provisioning access to SAP\u00ae systems by enabling <strong>customisation of user approval flows in SAP\u00ae with tailored approval steps<\/strong>.<\/p>\n<p>Password Self Service enables users to reset passwords without the need for a helpdesk team.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"a743\"><button class=\"w-tabs-section-header\" aria-controls=\"content-a743\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-a743\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Manual access management in SAP\u00ae systems<\/strong> generates inefficiencies and wastes time.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Lack of traceability<\/strong> over access management processes in SAP\u00ae causes<strong> audit deficiencies<\/strong>.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Dependence<\/strong> on a HelpDesk team to <strong>reset passwords<\/strong>.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"na4a\"><button class=\"w-tabs-section-header\" aria-controls=\"content-na4a\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-na4a\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Integration with other tools as a user data source<\/strong> (Active Directory, IdM, etc.).<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>This module can be used to define <strong>customised workflows for the creation and modification of SAP\u00ae users<\/strong>.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"zd40\"><button class=\"w-tabs-section-header\" aria-controls=\"content-zd40\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits of ARM<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-zd40\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i>Access management via SAP\u00ae GRC AC ARM <strong>increases security and traceability.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Efficiency gains and cost savings are achieved through faster <strong>access assignment<\/strong>.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Low-value tasks (such as <strong>manual password resets<\/strong>) are <strong>avoided<\/strong>.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_33c3a0a5 height_large\" id=\"emergency-access\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Emergency Access Management (EAM)<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>The EAM (<strong>Emergency Access Management<\/strong>) module of SAP GRC Access Control <strong>efficiently manages emergency access<\/strong>. This module is essential for<strong> organizations that require rigorous and secure control over temporary accesses<\/strong> granted in critical or emergency situations.<\/p>\n<p>This service ensures that emergency accesses are granted in a controlled, traceable manner and in accordance with internal security policies, thereby minimizing the risk of privilege abuse and ensuring business continuity.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"ma74\"><button class=\"w-tabs-section-header\" aria-controls=\"content-ma74\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-ma74\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i>The presence of many users with <strong>critical privileges<\/strong> in SAP\u00ae systems creates <strong>risks and is a misuse<\/strong> of this type of emergency access.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Many organisations manage emergency <strong>access manually<\/strong>, which makes management inefficient.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Many organisations use these emergency privileges on a regular basis, making it <strong>complex to review logs<\/strong> and reducing visibility, while increasing the risk of unauthorised access.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"wd7f\"><button class=\"w-tabs-section-header\" aria-controls=\"content-wd7f\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-wd7f\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Efficient emergency access management<\/strong> processes.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Definition of customised emergency access assignment workflows in SAP\u00ae.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Provide a <strong>visualisation role<\/strong> for the consulting team (<strong>SAP_ALL_DISPLAY<\/strong>).<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"d063\"><button class=\"w-tabs-section-header\" aria-controls=\"content-d063\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits of EAM<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-d063\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Users without critical privileges<\/strong> in SAP\u00ae systems.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Emergency access <strong>change log review<\/strong> flow.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Reduce the number of change logs<\/strong> to review.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Efficient management of SAP\u00ae incidents.<\/strong><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/11\/emergency-acces-1024x538.jpg\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/11\/emergency-acces-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/11\/emergency-acces-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/11\/emergency-acces-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/11\/emergency-acces.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_d6434207 height_large\" id=\"business-role\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default reversed stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/2-1024x538.jpg\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/2-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/2-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/2-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Business Role Management (BRM)<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>The SAP\u00ae GRC Access Control BRM (<strong>Business Role Management<\/strong>) module easily automates the process of managing, cataloguing and defining roles in SAP\u00ae systems. The centralised approach facilitates alignment between business processes and security policies, enabling efficient access management and contributing to more robust and consistent<strong> internal control structures<\/strong>.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"y625\"><button class=\"w-tabs-section-header\" aria-controls=\"content-y625\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-y625\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Manual role management<\/strong> in SAP\u00ae systems wastes time and money.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Lack of traceability of role management processes in SAP\u00ae leads to <strong>audit deficiencies<\/strong>.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Role management via transports.<\/strong><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"l9de\"><button class=\"w-tabs-section-header\" aria-controls=\"content-l9de\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-l9de\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i>Replace role management via transports with an <strong>approval workflow tool<\/strong>.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Define <strong>fully customised role management workflows<\/strong> in SAP\u00ae.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"gd60\"><button class=\"w-tabs-section-header\" aria-controls=\"content-gd60\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits of BRM<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-gd60\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li><i class=\"fas fa-check-square\"><\/i>SAP GRC BRM<strong> improves role management security and traceability<\/strong>.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Centralisation of role management<\/strong> in all SAP\u00ae systems in a single tool (BRM).<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large color_primary\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Why choose Inprosec?<\/h2>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">people<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Multidisciplinary team<\/h4><div class=\"w-iconbox-text\"><p style=\"text-align: center;\">At Inprosec we have a multilingual team formed of various academic profiles (engineers, business analysts, auditors, \u2026) who perform their duties assuming the roles of consultants, auditors, project managers, etc.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">signal_cellular_alt<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Continuous improvement<\/h4><div class=\"w-iconbox-text\"><p style=\"text-align: center;\">In a world that is constantly changing, it is fundamental learn and improve to adapt and offer services aligned with the needs of Customers.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox acordeon iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">add_task<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Value proposition<\/h4><div class=\"w-iconbox-text\"><ul style=\"text-align: left;\">\n<li><i class=\"fas fa-check-square\"><\/i>We are not incompatible with audits.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>We are independent. We are Consultants.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>We do not compete in markets that are unfamiliar to us.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<section class=\"l-section wpb_row height_large\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 class=\"titular\" style=\"text-align: center;\"><span class=\"fina\">Do you want to learn about <\/span>SAP\u00ae GRC Access Control<span class=\"fina\">?<\/span><\/h2>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-grid type_grid layout_5303 cols_3 overflow_hidden with_css_animation\" id=\"us_grid_1\" style=\"--gap:0.5rem;\" data-filterable=\"true\"><style>@media (max-width:1024px){#us_grid_1 .w-grid-item{width:50%}}@media (max-width:600px){#us_grid_1 .w-grid-list{margin:0}#us_grid_1 .w-grid-item{width:100%;padding:0;margin-bottom:var(--gap,0px)}}.layout_5303 .w-grid-item-h{background:var(--color-header-middle-bg);color:var(--color-content-text);box-shadow:0 0rem 0rem rgba(0,0,0,0.1),0 0rem 0rem rgba(0,0,0,0.1);transition-duration:0.3s}.no-touch .layout_5303 .w-grid-item-h:hover{box-shadow:0 0.1rem 0.2rem rgba(0,0,0,0.1),0 0.33rem 1rem rgba(0,0,0,0.15);z-index:4}.layout_5303 .usg_post_title_1{font-size:1.4rem!important;font-weight:700!important}.layout_5303 .usg_vwrapper_1{padding:9% 11% 11% 11%!important}.layout_5303 .usg_post_taxonomy_1{font-weight:700!important;text-transform:uppercase!important;font-size:10px!important;position:absolute!important;top:1.2rem!important;right:1.2rem!important;left:1.2rem!important}.layout_5303 .usg_hwrapper_1{color:var(--color-content-faded)!important;font-size:0.9rem!important}@media (max-width:600px){.layout_5303 .usg_post_title_1{font-size:1.2rem!important}}<\/style><div class=\"w-grid-list\">\t<article class=\"w-grid-item us_animate_fade size_1x1 post-6323 post type-post status-publish format-standard has-post-thumbnail hentry category-sap-grc-en category-technical-article tag-access-control-en tag-process-control-en tag-sap-grc-en\" data-id=\"6323\" style=\"animation-delay:0s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/mitigating-controls-in-sap-grc\/\" aria-label=\"Mitigation Controls in SAP\u00ae GRC\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/Mitigating-Controls-in-SAP\u00ae-GRC-1024x538.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/Mitigating-Controls-in-SAP\u00ae-GRC-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/Mitigating-Controls-in-SAP\u00ae-GRC-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/Mitigating-Controls-in-SAP\u00ae-GRC-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/Mitigating-Controls-in-SAP\u00ae-GRC.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><div class=\"w-post-elm-list\"><a class=\"w-btn us-btn-style_badge term-60 term-sap-grc-en\" href=\"https:\/\/www.inprosec.com\/en\/category\/sap-grc-en\/\"><span class=\"w-btn-label\">SAP GRC<\/span><\/a><a class=\"w-btn us-btn-style_badge term-52 term-technical-article\" href=\"https:\/\/www.inprosec.com\/en\/category\/technical-article\/\"><span class=\"w-btn-label\">Technical Article<\/span><\/a><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/mitigating-controls-in-sap-grc\/\">Mitigation Controls in SAP\u00ae GRC<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2025-08-07T10:10:51+02:00\" title=\"7 August 2025 at 10:10:51 +02:00\">August 7, 2025<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/mitigating-controls-in-sap-grc\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">In this article, we will explore how Mitigation Controls in SAP\u00ae GRC help manage risks across the GRC ecosystem. This&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item us_animate_fade size_1x1 post-9211 post type-post status-publish format-standard has-post-thumbnail hentry category-sap-grc-en category-technical-article tag-access-control-en tag-process-control-en tag-risk-management-en tag-sap-grc-en\" data-id=\"9211\" style=\"animation-delay:0.1s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-grc-modules-benefits\/\" aria-label=\"SAP\u00ae GRC: Protect Your SAP\u00ae Systems from Internal Risks\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/07\/SAP-GRC-EN-1024x538.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/07\/SAP-GRC-EN-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/07\/SAP-GRC-EN-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/07\/SAP-GRC-EN-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/07\/SAP-GRC-EN.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><div class=\"w-post-elm-list\"><a class=\"w-btn us-btn-style_badge term-60 term-sap-grc-en\" href=\"https:\/\/www.inprosec.com\/en\/category\/sap-grc-en\/\"><span class=\"w-btn-label\">SAP GRC<\/span><\/a><a class=\"w-btn us-btn-style_badge term-52 term-technical-article\" href=\"https:\/\/www.inprosec.com\/en\/category\/technical-article\/\"><span class=\"w-btn-label\">Technical Article<\/span><\/a><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-grc-modules-benefits\/\">SAP\u00ae GRC: Protect Your SAP\u00ae Systems from Internal Risks<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2025-07-07T12:40:08+02:00\" title=\"7 July 2025 at 12:40:08 +02:00\">July 7, 2025<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/sap-grc-modules-benefits\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">In today\u2019s increasingly regulated and interconnected business environment, having effective management of access, risks, and compliance is essential. For organizations&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item us_animate_fade size_1x1 post-11071 post type-post status-publish format-standard has-post-thumbnail hentry category-general tag-access-control-en tag-sap-grc-en\" data-id=\"11071\" style=\"animation-delay:0.2s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/introduction-to-hr-triggers-in-sap-grc\/\" aria-label=\"Introduction to HR Triggers in SAP GRC\"><img decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/HR-triggers-1024x512.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/HR-triggers-1024x512.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/HR-triggers-300x150.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/HR-triggers-600x300.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/HR-triggers.jpg 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><a class=\"w-btn us-btn-style_badge term-4 term-general\" href=\"https:\/\/www.inprosec.com\/en\/category\/general\/\"><span class=\"w-btn-label\">General<\/span><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/introduction-to-hr-triggers-in-sap-grc\/\">Introduction to HR Triggers in SAP GRC<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2024-04-30T11:10:14+02:00\" title=\"30 April 2024 at 11:10:14 +02:00\">April 30, 2024<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/introduction-to-hr-triggers-in-sap-grc\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">What exactly is an HR Trigger? In short, it is a request automatically launched by GRC Access Control when a&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n<\/div><div class=\"w-grid-preloader\">\t<div class=\"g-preloader type_1\">\r\n\t\t<div><\/div>\r\n\t<\/div>\r\n\t<\/div>\t<div class=\"w-grid-json hidden\" onclick='return {&quot;action&quot;:&quot;us_ajax_grid&quot;,&quot;infinite_scroll&quot;:0,&quot;max_num_pages&quot;:6,&quot;pagination&quot;:&quot;none&quot;,&quot;template_vars&quot;:{&quot;columns&quot;:&quot;3&quot;,&quot;exclude_items&quot;:&quot;none&quot;,&quot;img_size&quot;:&quot;default&quot;,&quot;ignore_items_size&quot;:0,&quot;items_layout&quot;:&quot;5303&quot;,&quot;items_offset&quot;:&quot;1&quot;,&quot;load_animation&quot;:&quot;fade&quot;,&quot;overriding_link&quot;:&quot;%7B%22url%22%3A%22%22%7D&quot;,&quot;post_id&quot;:0,&quot;query_args&quot;:{&quot;post_type&quot;:[&quot;post&quot;],&quot;tax_query&quot;:[{&quot;taxonomy&quot;:&quot;post_tag&quot;,&quot;field&quot;:&quot;slug&quot;,&quot;terms&quot;:[&quot;access-control-en&quot;]}],&quot;post_status&quot;:[&quot;publish&quot;,&quot;acf-disabled&quot;],&quot;posts_per_page&quot;:&quot;3&quot;},&quot;orderby_query_args&quot;:{&quot;orderby&quot;:{&quot;date&quot;:&quot;DESC&quot;}},&quot;type&quot;:&quot;grid&quot;,&quot;us_grid_ajax_index&quot;:1,&quot;us_grid_filter_params&quot;:[],&quot;us_grid_index&quot;:1,&quot;_us_grid_post_type&quot;:&quot;post&quot;,&quot;page_args&quot;:[],&quot;lang&quot;:&quot;en&quot;}}'><\/div>\r\n\t<\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large with_img parallax_ver\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1265\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-ordenador-composicion.jpg);\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-9 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Can we help with SAP\u00ae GRC Access Control?<\/h2>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-3 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-btn-wrapper default_align_none laptops_align_none tablets_align_none mobiles_align_center\"><a class=\"w-btn us-btn-style_1\" title=\"Contact\" href=\"http:\/\/inprosec.com\/contacto\/\"><span class=\"w-btn-label\">Contact with us<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"What exactly is an HR Trigger? In short, it is a request automatically launched by GRC Access Control when a specific change is made in HR master data. HR Triggers are commonly used to monitor employee terminations in a company, as each time HR processes a termination, GRC will launch an automatic request at the...","protected":false},"author":6,"featured_media":0,"parent":10914,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-10674","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP\u00ae GRC Access Control | Inprosec, information security<\/title>\n<meta name=\"description\" content=\"Monitor, evaluate, and control user access and authorizations within the system with SAP\u00ae Access Control, ensuring that only the right people have the correct access to data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/services\/sap-grc\/access-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Access Control\" \/>\n<meta property=\"og:description\" content=\"Monitor, evaluate, and control user access and authorizations within the system with SAP\u00ae Access Control, ensuring that only the right people have the correct access to data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/services\/sap-grc\/access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-21T09:38:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/sap-grc\\\/access-control\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/sap-grc\\\/access-control\\\/\",\"name\":\"SAP\u00ae GRC Access Control | Inprosec, information security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"datePublished\":\"2024-05-03T08:39:33+00:00\",\"dateModified\":\"2024-11-21T09:38:27+00:00\",\"description\":\"Monitor, evaluate, and control user access and authorizations within the system with SAP\u00ae Access Control, ensuring that only the right people have the correct access to data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/sap-grc\\\/access-control\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/sap-grc\\\/access-control\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/sap-grc\\\/access-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/servicios\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SAP\u00ae GRC\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/servicios\\\/sap-grc\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP\u00ae GRC Access Control | Inprosec, information security","description":"Monitor, evaluate, and control user access and authorizations within the system with SAP\u00ae Access Control, ensuring that only the right people have the correct access to data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/services\/sap-grc\/access-control\/","og_locale":"en_US","og_type":"article","og_title":"Access Control","og_description":"Monitor, evaluate, and control user access and authorizations within the system with SAP\u00ae Access Control, ensuring that only the right people have the correct access to data.","og_url":"https:\/\/www.inprosec.com\/en\/services\/sap-grc\/access-control\/","og_site_name":"Inprosec","article_modified_time":"2024-11-21T09:38:27+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/services\/sap-grc\/access-control\/","url":"https:\/\/www.inprosec.com\/en\/services\/sap-grc\/access-control\/","name":"SAP\u00ae GRC Access Control | Inprosec, information security","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"datePublished":"2024-05-03T08:39:33+00:00","dateModified":"2024-11-21T09:38:27+00:00","description":"Monitor, evaluate, and control user access and authorizations within the system with SAP\u00ae Access Control, ensuring that only the right people have the correct access to data.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/services\/sap-grc\/access-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/services\/sap-grc\/access-control\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/services\/sap-grc\/access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.inprosec.com\/en\/servicios\/"},{"@type":"ListItem","position":3,"name":"SAP\u00ae GRC","item":"https:\/\/www.inprosec.com\/en\/servicios\/sap-grc\/"},{"@type":"ListItem","position":4,"name":"Access Control"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/10674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=10674"}],"version-history":[{"count":18,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/10674\/revisions"}],"predecessor-version":[{"id":12394,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/10674\/revisions\/12394"}],"up":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/10914"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=10674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}