SlideShare a Scribd company logo
1 of 1
Download to read offline
GRC 10.0 
GRC: Overview of SOX Overview of SOD Introduction to GRC 10.0 
 Difference between GRC 5.3 and GRC 10.0 
 Overview of different applications in GRC 10.0 
 Introduction to different components of GRC AC 
Installation of GRC 10.0 
 Prerequisites of GRC 10.0 installation 
 Post Installation activities of GRC 10.0 
 Configuration settings of GRC 10.0 
Access Control 10.0 Architecture GRC 10.0 security and authorizations 
 Object level security 
 Authorization requirements 
 Access Control delivered role 
 Shared configuration settings 
 Configure the Integration framework 
 Configure shared access control settings 
 Identify Business Configuration (BC) sets 
Access Risk Analysis (ARA) 
 Creating Rule set, 
 Creating Business Process 
 Creating Risk 
 Creating Function 
 Risk analysis at user level 
 Risk analysis at role level 
 Risk analysis at profile level 
 Mitigation process 
 Remediation process 
 Simulation 
 Creating Control Id 
 Assigning Control Id to Users 
 Assigning Control Id to Roles 
Emergency Access Management (EAM) 
 Managing emergency access 
 Planning emergency access 
 Types of EAM users 
 Creating firefighter, firefighter ID, firefighter controller and firefighter owner 
Maintaining reason codes Assigning firefighter controller and owner to FFID 
 Assigning FFID to FF 
 Checking FF logs 
Business Role Management (BRM) 
 Configuring Business Role Management 
 Creating a role by BRM component 
 Business role definition- technical role definition 
 Creating single role 
 Creating composite role 
 Creating Business role 
 Maintaining role owners/approvers 
 Assigning role owner to role 
Access Request Management (ARM) 
 Provisioning configuration 
 Creating access request 
 Types of access request 
 Responding to access request 
 Designing end user personalization form 
 Comparison with CUP 
MSMP Workflow and Business Rule Framework 
 MSMP Workflow Introduction 
 Configuring MSMP 
 Perform Automatic Workflow Customizing 
 The concept of BRF+ rule 
 Process ID 
 Initiator rule 
 Agent rule 
 Routing rule 
 Creating BRF + rule 
 Maintain multistage multipath (MSMP) workflow 
 Standard process id’s 
 Linking BRF+ rule to standard process id 
 Background jobs in GRC AC 10.0

More Related Content

Similar to Grc

Incredible Edible Identity
Incredible Edible IdentityIncredible Edible Identity
Incredible Edible IdentityForgeRock
 
Component based software development
Component based software developmentComponent based software development
Component based software developmentEmmanuel Fuchs
 
EMEA Partner Summit: jBPM 5 - Bringing More Power to BPM
EMEA Partner Summit: 	jBPM 5 - Bringing More Power to BPMEMEA Partner Summit: 	jBPM 5 - Bringing More Power to BPM
EMEA Partner Summit: jBPM 5 - Bringing More Power to BPMEric D. Schabell
 
Trusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelTrusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelAtlassian
 
Sap process Integration and Exchange Infrastructure
Sap process Integration and Exchange InfrastructureSap process Integration and Exchange Infrastructure
Sap process Integration and Exchange InfrastructureTechneon AIS
 
[Hands-on] CQRS(Command Query Responsibility Segregation) 와 Event Sourcing 패턴 실습
[Hands-on] CQRS(Command Query Responsibility Segregation) 와 Event Sourcing 패턴 실습[Hands-on] CQRS(Command Query Responsibility Segregation) 와 Event Sourcing 패턴 실습
[Hands-on] CQRS(Command Query Responsibility Segregation) 와 Event Sourcing 패턴 실습Oracle Korea
 
CQRS and Event Sourcing
CQRS and Event Sourcing CQRS and Event Sourcing
CQRS and Event Sourcing Inho Kang
 
Sap crm technical online training
Sap crm technical online trainingSap crm technical online training
Sap crm technical online trainingSanthosh Sap
 
Syllabus for Technical courses
Syllabus for Technical coursesSyllabus for Technical courses
Syllabus for Technical coursesMontek1Learning
 
Dynamics CRM 2013 Advanced Customizations
Dynamics CRM 2013 Advanced CustomizationsDynamics CRM 2013 Advanced Customizations
Dynamics CRM 2013 Advanced CustomizationsSatish
 
Oracle OpenWorld 2010 Practical Insights on Using AIA
Oracle OpenWorld 2010 Practical Insights on Using AIAOracle OpenWorld 2010 Practical Insights on Using AIA
Oracle OpenWorld 2010 Practical Insights on Using AIARajesh Raheja
 
Oracle OpenWorld 2010 Practical Insights on Using AIA (presentation only)
Oracle OpenWorld 2010 Practical Insights on Using AIA (presentation only)Oracle OpenWorld 2010 Practical Insights on Using AIA (presentation only)
Oracle OpenWorld 2010 Practical Insights on Using AIA (presentation only)Rajesh Raheja
 
jBPM5 (Argentina workshop)
jBPM5 (Argentina workshop)jBPM5 (Argentina workshop)
jBPM5 (Argentina workshop)Kris Verlaenen
 
Business Process Design
Business Process DesignBusiness Process Design
Business Process DesignSandy Kemsley
 
JBossOneDayTalk 2011: Using jBPM to bring more power to your business processes
JBossOneDayTalk 2011: Using jBPM to bring more power to your business processesJBossOneDayTalk 2011: Using jBPM to bring more power to your business processes
JBossOneDayTalk 2011: Using jBPM to bring more power to your business processesKris Verlaenen
 
Sap xi online training
Sap xi online trainingSap xi online training
Sap xi online trainingVenkat reddy
 
Summer School Soa Governance 09 Jul
Summer School Soa Governance 09 JulSummer School Soa Governance 09 Jul
Summer School Soa Governance 09 JulWSO2
 

Similar to Grc (20)

Incredible Edible Identity
Incredible Edible IdentityIncredible Edible Identity
Incredible Edible Identity
 
Component based software development
Component based software developmentComponent based software development
Component based software development
 
EMEA Partner Summit: jBPM 5 - Bringing More Power to BPM
EMEA Partner Summit: 	jBPM 5 - Bringing More Power to BPMEMEA Partner Summit: 	jBPM 5 - Bringing More Power to BPM
EMEA Partner Summit: jBPM 5 - Bringing More Power to BPM
 
Trusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelTrusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy Model
 
Enterprise service bus part 2
Enterprise service bus part 2Enterprise service bus part 2
Enterprise service bus part 2
 
Sap process Integration and Exchange Infrastructure
Sap process Integration and Exchange InfrastructureSap process Integration and Exchange Infrastructure
Sap process Integration and Exchange Infrastructure
 
[Hands-on] CQRS(Command Query Responsibility Segregation) 와 Event Sourcing 패턴 실습
[Hands-on] CQRS(Command Query Responsibility Segregation) 와 Event Sourcing 패턴 실습[Hands-on] CQRS(Command Query Responsibility Segregation) 와 Event Sourcing 패턴 실습
[Hands-on] CQRS(Command Query Responsibility Segregation) 와 Event Sourcing 패턴 실습
 
CQRS and Event Sourcing
CQRS and Event Sourcing CQRS and Event Sourcing
CQRS and Event Sourcing
 
Sap crm technical online training
Sap crm technical online trainingSap crm technical online training
Sap crm technical online training
 
BPMN2 and jBPM5
BPMN2 and jBPM5BPMN2 and jBPM5
BPMN2 and jBPM5
 
Syllabus for Technical courses
Syllabus for Technical coursesSyllabus for Technical courses
Syllabus for Technical courses
 
Biz talk BI
Biz talk BIBiz talk BI
Biz talk BI
 
Dynamics CRM 2013 Advanced Customizations
Dynamics CRM 2013 Advanced CustomizationsDynamics CRM 2013 Advanced Customizations
Dynamics CRM 2013 Advanced Customizations
 
Oracle OpenWorld 2010 Practical Insights on Using AIA
Oracle OpenWorld 2010 Practical Insights on Using AIAOracle OpenWorld 2010 Practical Insights on Using AIA
Oracle OpenWorld 2010 Practical Insights on Using AIA
 
Oracle OpenWorld 2010 Practical Insights on Using AIA (presentation only)
Oracle OpenWorld 2010 Practical Insights on Using AIA (presentation only)Oracle OpenWorld 2010 Practical Insights on Using AIA (presentation only)
Oracle OpenWorld 2010 Practical Insights on Using AIA (presentation only)
 
jBPM5 (Argentina workshop)
jBPM5 (Argentina workshop)jBPM5 (Argentina workshop)
jBPM5 (Argentina workshop)
 
Business Process Design
Business Process DesignBusiness Process Design
Business Process Design
 
JBossOneDayTalk 2011: Using jBPM to bring more power to your business processes
JBossOneDayTalk 2011: Using jBPM to bring more power to your business processesJBossOneDayTalk 2011: Using jBPM to bring more power to your business processes
JBossOneDayTalk 2011: Using jBPM to bring more power to your business processes
 
Sap xi online training
Sap xi online trainingSap xi online training
Sap xi online training
 
Summer School Soa Governance 09 Jul
Summer School Soa Governance 09 JulSummer School Soa Governance 09 Jul
Summer School Soa Governance 09 Jul
 

Grc

  • 1. GRC 10.0 GRC: Overview of SOX Overview of SOD Introduction to GRC 10.0  Difference between GRC 5.3 and GRC 10.0  Overview of different applications in GRC 10.0  Introduction to different components of GRC AC Installation of GRC 10.0  Prerequisites of GRC 10.0 installation  Post Installation activities of GRC 10.0  Configuration settings of GRC 10.0 Access Control 10.0 Architecture GRC 10.0 security and authorizations  Object level security  Authorization requirements  Access Control delivered role  Shared configuration settings  Configure the Integration framework  Configure shared access control settings  Identify Business Configuration (BC) sets Access Risk Analysis (ARA)  Creating Rule set,  Creating Business Process  Creating Risk  Creating Function  Risk analysis at user level  Risk analysis at role level  Risk analysis at profile level  Mitigation process  Remediation process  Simulation  Creating Control Id  Assigning Control Id to Users  Assigning Control Id to Roles Emergency Access Management (EAM)  Managing emergency access  Planning emergency access  Types of EAM users  Creating firefighter, firefighter ID, firefighter controller and firefighter owner Maintaining reason codes Assigning firefighter controller and owner to FFID  Assigning FFID to FF  Checking FF logs Business Role Management (BRM)  Configuring Business Role Management  Creating a role by BRM component  Business role definition- technical role definition  Creating single role  Creating composite role  Creating Business role  Maintaining role owners/approvers  Assigning role owner to role Access Request Management (ARM)  Provisioning configuration  Creating access request  Types of access request  Responding to access request  Designing end user personalization form  Comparison with CUP MSMP Workflow and Business Rule Framework  MSMP Workflow Introduction  Configuring MSMP  Perform Automatic Workflow Customizing  The concept of BRF+ rule  Process ID  Initiator rule  Agent rule  Routing rule  Creating BRF + rule  Maintain multistage multipath (MSMP) workflow  Standard process id’s  Linking BRF+ rule to standard process id  Background jobs in GRC AC 10.0