SlideShare a Scribd company logo
1 of 7
EAM: Emergency Access Management
VIRSA 4.0 ------ > Fire Fighter
GRC AC 5.3 ------- > Super user Privilege Management
GRC AC 10, 10.1 ------- > EAM
Background of this Concept:
 70% of the Authorizations assigned to user, were never used by User
 15 – 20% of the Authorizations are rarely used
T-codes have been categorized as below
 Daily used – Assigned to user on permanent basis (30% Tcodes)
 Rarely used, Never Used = Critical – this access would be assigned only
when required and requested b user (70% T-codes)
Firefighter Concept based on providing access:
ID based
Normal user id will be linked to FF ID for short duration which has critical Access
assigned to it
Role Based
FF role will be assigned to normal user based on the request and also for short
duration
FF Concept based on Login:
 Centralized FF - Login from GRC system – GRAC_SPM or GRAC_EAM (T-
codes)
 Decentralized FF – Login from Plug In system and execute T-code
/n/GRCPI/GRIA_EAM
Centralized - ID based firefighting concept set up:
1) We need following ids as mentioned below
GRC system – FF, FF ID Owner, FF ID Controller
Plug in System (ECC) – FF, FF ID
ID Based:
 Firefighter – Normal User (dialog) or person who uses FF ID
 FF ID – Special id which is of Service User Type assigned with critical access
SAP_GRAC_SPM_FFID: Role that has to be assigned to every FF ID
 FF ID Owner – Person who approves FF Access to user and also responsible
for assigning FF ID to normal user
 FF ID Controller – person who monitors the activity done by user (FF) using
the FF ID
Role Based:
 FF
 FF Role Owner
 FF Role Controller
2) Define /Declare FF ID Owner and FF ID Controller in the Access Control
Owners link.
NWBC ------ > Set Up ----- > Access Owners
3) Mapping FF ID Owner and FF ID controller to the FF ID
NWBC ---- > Set Up ---- > Super User Assignment ------ > Owners
NWBC ---- > Set Up ---- > Super User Maintenance ------ > Controllers
4) Define Reason Codes
NWBC ---- > Set Up ---- > Super User Maintenance ------ > Reason Codes
This is the task done by us if ARM is not implemented
5) Linking FF ID with FF (normal user id)
NWBC ---- > Set Up ---- > Super User Assignment ------ > FF IDs
Or
NWBC ---- > Set Up ---- > Super User Maintenance ------ > Firefighters
If the FF ID is not visible in GRC system what could be the Reasons?
1) 4010 Parameter role is not assigned to FF ID
2) Sync job is not run
Note: Never assign SAP_ALL to FF ID
Logs are generated for each and every T-code and FF ID Controller is not
interested in review of logs for daily used t-codes. Hence only Critical T-codes
access should be assigned to FF ID
SAP_GRAC_SPM_FFID: Role that has to be assigned to every FF ID.
Whichever role is mentioned in parameter 4010, that role has to be assigned to
every FF ID in plug in systems
If this is custom role, that should be copy of SAP_GRAC_SPM_FFID
4000 Series is related to EAM/FF
4010: FF ID role - SAP_GRAC_SPM_FFID (Identifier Role – Which ever user id is
assigned with this role, that ID is considered as FF ID in GRC system)
4000: ID based or Role based
4001: Default Firefighter Validity Period (Days)
4015: Centralized or Decentralized
Note: 4015 Parameter was launched from SP10 and above. Earlier to that, only
centralized concept is available by default.
FF ID Linking with Normal User is done in 2 ways
 Manually
 Automated – Workflow
Disadvantages of Role Based:
1) User is not conscious about using the FF role
2) User unknowingly uses the FF access
Disadvantage of Centralized FF concept:
1) When GRC system is down, FF concept cannot be used in any plug in system.
2) All the users who ever exist in Plug in systems should also exist in GRC system.
BASIS Team
 FFID_BASIS1
 FFID_BASIS2
 FFID_BASIS3
Finance Team
 FFID_FIN1
 FFID_FIN2
 FFID_FIN3
Some Clients have dedicated FFID to every user in the Org
BASIS Team
 U1 : FF_U1
 U2 : FF_U2
 U3 : FF_U3
SAP_ALL should not be assigned to FF ID? (Daily used tcodes should not be
assigned to FF ID)
 There is no use of creating separate FF ID team wise
 Unnecessary logs will be generated and it is difficult for Controller to
monitor. He will lose interest in reviewing the logs.
Advantages of FF concept:
1) Tracking the usage of critical TCodes
2) Minimize the total risk count in the organization
If FF ID is not visible in GRC system, what could be the reasons?
1) Sync Job
2) The role under 4010 parameter is not assigned to FF ID.
FF LOGS:
NWBC ----- > Reports & Analytics ------ > EAM Reports
1) FF log Summary Report
Disadvantage of Role Based:
User is not aware (not conscious) of the T-code used , is part of Normal role or FF
role.

More Related Content

What's hot

Building RT image with Yocto
Building RT image with YoctoBuilding RT image with Yocto
Building RT image with YoctoAlexandre LAHAYE
 
Japanese Linguistics in Lucene and Solr
Japanese Linguistics in Lucene and Solr Japanese Linguistics in Lucene and Solr
Japanese Linguistics in Lucene and Solr lucenerevolution
 
SplunkLive! Getting Started with Splunk Enterprise
SplunkLive! Getting Started with Splunk EnterpriseSplunkLive! Getting Started with Splunk Enterprise
SplunkLive! Getting Started with Splunk EnterpriseSplunk
 
A Forgotten HTTP Invisibility Cloak
A Forgotten HTTP Invisibility CloakA Forgotten HTTP Invisibility Cloak
A Forgotten HTTP Invisibility CloakSoroush Dalili
 
Attacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit FrameworkAttacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit FrameworkChris Gates
 
Element Management Subsystem
Element Management SubsystemElement Management Subsystem
Element Management Subsystemdevalnaik
 
Snort IPS(Intrusion Prevention System) Eğitimi
Snort IPS(Intrusion Prevention System) EğitimiSnort IPS(Intrusion Prevention System) Eğitimi
Snort IPS(Intrusion Prevention System) EğitimiBGA Cyber Security
 
Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Rogerio Ferraz
 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & ArchitecturePriyanka Aash
 
6.Resource Exhaustion
6.Resource Exhaustion6.Resource Exhaustion
6.Resource Exhaustionphanleson
 
Security analytics for dummies Securonix special edition
Security analytics for dummies Securonix special editionSecurity analytics for dummies Securonix special edition
Security analytics for dummies Securonix special editionMarusya Maruzhenko
 
Server-side template injection- Slides
Server-side template injection- Slides Server-side template injection- Slides
Server-side template injection- Slides Amit Dubey
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made SimplePaul Melson
 
Power of Splunk Search Processing Language (SPL) ...
Power of Splunk Search Processing Language (SPL)                             ...Power of Splunk Search Processing Language (SPL)                             ...
Power of Splunk Search Processing Language (SPL) ...Splunk
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectivessombat nirund
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceMITRE - ATT&CKcon
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 

What's hot (20)

Building RT image with Yocto
Building RT image with YoctoBuilding RT image with Yocto
Building RT image with Yocto
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
 
Japanese Linguistics in Lucene and Solr
Japanese Linguistics in Lucene and Solr Japanese Linguistics in Lucene and Solr
Japanese Linguistics in Lucene and Solr
 
SplunkLive! Getting Started with Splunk Enterprise
SplunkLive! Getting Started with Splunk EnterpriseSplunkLive! Getting Started with Splunk Enterprise
SplunkLive! Getting Started with Splunk Enterprise
 
A Forgotten HTTP Invisibility Cloak
A Forgotten HTTP Invisibility CloakA Forgotten HTTP Invisibility Cloak
A Forgotten HTTP Invisibility Cloak
 
Nmap
NmapNmap
Nmap
 
Attacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit FrameworkAttacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit Framework
 
Element Management Subsystem
Element Management SubsystemElement Management Subsystem
Element Management Subsystem
 
Snort IPS(Intrusion Prevention System) Eğitimi
Snort IPS(Intrusion Prevention System) EğitimiSnort IPS(Intrusion Prevention System) Eğitimi
Snort IPS(Intrusion Prevention System) Eğitimi
 
Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)
 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
 
6.Resource Exhaustion
6.Resource Exhaustion6.Resource Exhaustion
6.Resource Exhaustion
 
API Security Fundamentals
API Security FundamentalsAPI Security Fundamentals
API Security Fundamentals
 
Security analytics for dummies Securonix special edition
Security analytics for dummies Securonix special editionSecurity analytics for dummies Securonix special edition
Security analytics for dummies Securonix special edition
 
Server-side template injection- Slides
Server-side template injection- Slides Server-side template injection- Slides
Server-side template injection- Slides
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
Power of Splunk Search Processing Language (SPL) ...
Power of Splunk Search Processing Language (SPL)                             ...Power of Splunk Search Processing Language (SPL)                             ...
Power of Splunk Search Processing Language (SPL) ...
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 

Similar to EAM: Emergency Access Management for Critical Tasks

Mastering Microcontroller : TIMERS, PWM, CAN, RTC,LOW POWER
Mastering Microcontroller : TIMERS, PWM, CAN, RTC,LOW POWERMastering Microcontroller : TIMERS, PWM, CAN, RTC,LOW POWER
Mastering Microcontroller : TIMERS, PWM, CAN, RTC,LOW POWERFastBit Embedded Brain Academy
 
MICROCONTROLLER PROGRAMMING.pdf
MICROCONTROLLER PROGRAMMING.pdfMICROCONTROLLER PROGRAMMING.pdf
MICROCONTROLLER PROGRAMMING.pdfKarthiA15
 
MARS User Login Logout MIS for Cisco Call Manager
MARS User Login Logout MIS for Cisco Call ManagerMARS User Login Logout MIS for Cisco Call Manager
MARS User Login Logout MIS for Cisco Call ManagerPRANJOL SAIKIA
 
6 profiling tools
6 profiling tools6 profiling tools
6 profiling toolsvideos
 
Project Proposal Presentation-C.O.D.E-7 Solutions
Project Proposal Presentation-C.O.D.E-7 SolutionsProject Proposal Presentation-C.O.D.E-7 Solutions
Project Proposal Presentation-C.O.D.E-7 SolutionsDiren Dantanarayana
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 testSoporte Yottatec
 
Pandora FMS: Cisco Remote inventory modules
Pandora FMS: Cisco Remote inventory modulesPandora FMS: Cisco Remote inventory modules
Pandora FMS: Cisco Remote inventory modulesPandora FMS
 
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...CODE BLUE
 
Global counters (ssh log)
Global counters (ssh log)Global counters (ssh log)
Global counters (ssh log)David Derrej
 
Aspect oriented software engineering-draft
Aspect oriented software engineering-draftAspect oriented software engineering-draft
Aspect oriented software engineering-draftAbdelfattah Al Zaqqa
 
IETF98 - 3rd-Party Authentication for SIP
IETF98 - 3rd-Party Authentication for SIPIETF98 - 3rd-Party Authentication for SIP
IETF98 - 3rd-Party Authentication for SIPVictor Pascual Ávila
 
fortimanager-v5.0.10-release-notes
fortimanager-v5.0.10-release-notesfortimanager-v5.0.10-release-notes
fortimanager-v5.0.10-release-notesDrew Shearman
 
Student biometric identification srs
Student biometric identification srsStudent biometric identification srs
Student biometric identification srsHassaan Afzal
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
 

Similar to EAM: Emergency Access Management for Critical Tasks (20)

Mastering Microcontroller : TIMERS, PWM, CAN, RTC,LOW POWER
Mastering Microcontroller : TIMERS, PWM, CAN, RTC,LOW POWERMastering Microcontroller : TIMERS, PWM, CAN, RTC,LOW POWER
Mastering Microcontroller : TIMERS, PWM, CAN, RTC,LOW POWER
 
MICROCONTROLLER PROGRAMMING.pdf
MICROCONTROLLER PROGRAMMING.pdfMICROCONTROLLER PROGRAMMING.pdf
MICROCONTROLLER PROGRAMMING.pdf
 
Srs master login module
Srs master login moduleSrs master login module
Srs master login module
 
MARS User Login Logout MIS for Cisco Call Manager
MARS User Login Logout MIS for Cisco Call ManagerMARS User Login Logout MIS for Cisco Call Manager
MARS User Login Logout MIS for Cisco Call Manager
 
6 profiling tools
6 profiling tools6 profiling tools
6 profiling tools
 
Project Proposal Presentation-C.O.D.E-7 Solutions
Project Proposal Presentation-C.O.D.E-7 SolutionsProject Proposal Presentation-C.O.D.E-7 Solutions
Project Proposal Presentation-C.O.D.E-7 Solutions
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
Pandora FMS: Cisco Remote inventory modules
Pandora FMS: Cisco Remote inventory modulesPandora FMS: Cisco Remote inventory modules
Pandora FMS: Cisco Remote inventory modules
 
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
 
BSNL hacks
BSNL hacksBSNL hacks
BSNL hacks
 
Pwning bsnl
Pwning bsnlPwning bsnl
Pwning bsnl
 
Global counters (ssh log)
Global counters (ssh log)Global counters (ssh log)
Global counters (ssh log)
 
Aspect oriented software engineering-draft
Aspect oriented software engineering-draftAspect oriented software engineering-draft
Aspect oriented software engineering-draft
 
IETF98 - 3rd-Party Authentication for SIP
IETF98 - 3rd-Party Authentication for SIPIETF98 - 3rd-Party Authentication for SIP
IETF98 - 3rd-Party Authentication for SIP
 
fortimanager-v5.0.10-release-notes
fortimanager-v5.0.10-release-notesfortimanager-v5.0.10-release-notes
fortimanager-v5.0.10-release-notes
 
Vip000
Vip000Vip000
Vip000
 
GRC DEMO 12.pptx
GRC DEMO 12.pptxGRC DEMO 12.pptx
GRC DEMO 12.pptx
 
Student biometric identification srs
Student biometric identification srsStudent biometric identification srs
Student biometric identification srs
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 

Recently uploaded

Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 

Recently uploaded (20)

Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 

EAM: Emergency Access Management for Critical Tasks

  • 1. EAM: Emergency Access Management VIRSA 4.0 ------ > Fire Fighter GRC AC 5.3 ------- > Super user Privilege Management GRC AC 10, 10.1 ------- > EAM Background of this Concept:  70% of the Authorizations assigned to user, were never used by User  15 – 20% of the Authorizations are rarely used T-codes have been categorized as below  Daily used – Assigned to user on permanent basis (30% Tcodes)  Rarely used, Never Used = Critical – this access would be assigned only when required and requested b user (70% T-codes) Firefighter Concept based on providing access: ID based Normal user id will be linked to FF ID for short duration which has critical Access assigned to it Role Based FF role will be assigned to normal user based on the request and also for short duration
  • 2. FF Concept based on Login:  Centralized FF - Login from GRC system – GRAC_SPM or GRAC_EAM (T- codes)  Decentralized FF – Login from Plug In system and execute T-code /n/GRCPI/GRIA_EAM
  • 3. Centralized - ID based firefighting concept set up: 1) We need following ids as mentioned below GRC system – FF, FF ID Owner, FF ID Controller Plug in System (ECC) – FF, FF ID ID Based:  Firefighter – Normal User (dialog) or person who uses FF ID  FF ID – Special id which is of Service User Type assigned with critical access SAP_GRAC_SPM_FFID: Role that has to be assigned to every FF ID  FF ID Owner – Person who approves FF Access to user and also responsible for assigning FF ID to normal user  FF ID Controller – person who monitors the activity done by user (FF) using the FF ID Role Based:  FF  FF Role Owner  FF Role Controller 2) Define /Declare FF ID Owner and FF ID Controller in the Access Control Owners link. NWBC ------ > Set Up ----- > Access Owners 3) Mapping FF ID Owner and FF ID controller to the FF ID NWBC ---- > Set Up ---- > Super User Assignment ------ > Owners NWBC ---- > Set Up ---- > Super User Maintenance ------ > Controllers 4) Define Reason Codes NWBC ---- > Set Up ---- > Super User Maintenance ------ > Reason Codes
  • 4. This is the task done by us if ARM is not implemented 5) Linking FF ID with FF (normal user id) NWBC ---- > Set Up ---- > Super User Assignment ------ > FF IDs Or NWBC ---- > Set Up ---- > Super User Maintenance ------ > Firefighters If the FF ID is not visible in GRC system what could be the Reasons? 1) 4010 Parameter role is not assigned to FF ID 2) Sync job is not run Note: Never assign SAP_ALL to FF ID Logs are generated for each and every T-code and FF ID Controller is not interested in review of logs for daily used t-codes. Hence only Critical T-codes access should be assigned to FF ID SAP_GRAC_SPM_FFID: Role that has to be assigned to every FF ID. Whichever role is mentioned in parameter 4010, that role has to be assigned to every FF ID in plug in systems If this is custom role, that should be copy of SAP_GRAC_SPM_FFID 4000 Series is related to EAM/FF 4010: FF ID role - SAP_GRAC_SPM_FFID (Identifier Role – Which ever user id is assigned with this role, that ID is considered as FF ID in GRC system) 4000: ID based or Role based 4001: Default Firefighter Validity Period (Days) 4015: Centralized or Decentralized Note: 4015 Parameter was launched from SP10 and above. Earlier to that, only centralized concept is available by default.
  • 5. FF ID Linking with Normal User is done in 2 ways  Manually  Automated – Workflow Disadvantages of Role Based: 1) User is not conscious about using the FF role 2) User unknowingly uses the FF access Disadvantage of Centralized FF concept: 1) When GRC system is down, FF concept cannot be used in any plug in system. 2) All the users who ever exist in Plug in systems should also exist in GRC system.
  • 6. BASIS Team  FFID_BASIS1  FFID_BASIS2  FFID_BASIS3 Finance Team  FFID_FIN1  FFID_FIN2  FFID_FIN3 Some Clients have dedicated FFID to every user in the Org BASIS Team  U1 : FF_U1  U2 : FF_U2  U3 : FF_U3 SAP_ALL should not be assigned to FF ID? (Daily used tcodes should not be assigned to FF ID)  There is no use of creating separate FF ID team wise  Unnecessary logs will be generated and it is difficult for Controller to monitor. He will lose interest in reviewing the logs. Advantages of FF concept: 1) Tracking the usage of critical TCodes 2) Minimize the total risk count in the organization
  • 7. If FF ID is not visible in GRC system, what could be the reasons? 1) Sync Job 2) The role under 4010 parameter is not assigned to FF ID. FF LOGS: NWBC ----- > Reports & Analytics ------ > EAM Reports 1) FF log Summary Report Disadvantage of Role Based: User is not aware (not conscious) of the T-code used , is part of Normal role or FF role.