Introduction to GRC 10.1
• Difference between GRC 5.3 and GRC 10.1
• Overview of different applications in GRC 10.1
• Introduction to different components of GRC AC
Installation of GRC 10.1
• Prerequisites of GRC 10.1 installation
• Post Installation activities of GRC 10.1
• Configuration settings of GRC 10.1 Access Control 10.1 Architecture
GRC 10.1 security and authorizations
• Object level security
• Authorization requirements
• Access Control delivered role
• Shared configuration settings
• Configure the Integration framework
• Configure shared access control settings
• Identify Business Configuration (BC) sets
• Synchronizing with the Access Control Repository
Access Risk Analysis (ARA)
• Creating Rule set,
• Creating Business Processes
• Creating Functions
• Creating SOD Risks
• Creating Critical Role, Profile, Action and Permission
• Risk analysis at user level
• Risk analysis at role level
• Risk analysis at profile level
• Mitigation process
• Creating MIT Control Approvers and Monitors
• Creating Control Id
• Assigning Control Id to Users
• Assigning Control Id to Roles
• Assigning Control Id to Profiles
• Remediation process
• Simulation at user level, role level and profile level
Emergency Access Management (EAM)
• Managing emergency access
• Planning emergency access
• Configuration of EAM component and parameters
• Centralized Emergency Access Management
• Decentralized Emergency Access Management
• Types of EAM users
• Creating Firefighter, Firefighter ID, Firefighter Controller and Firefighter Owner
• Maintaining reason codes
• Assigning firefighter controller and owner to FFID
• Assigning FFID to FF
• Performing Additional Access activities in back end (Business) system by FFID
• Synchronisation of FF logs
• Checking FF logs
• Assigning emergency access through Decentralize EAM
Business Role Management (BRM)
• Configuring Business Role Management
• Business Role Methodology
• Implement Condition Groups in Role Management
• Business role definition- Technical role definition
• Maintaining role owners/approvers
• Creating roles by BRM component
• Assigning role owner to role
• Role Mass Maintenance
• Role Mass Import
• Role Mass Update
Role Comparison Role Comparison
• Role Mining
Access Request Management (ARM)
• Provisioning configurations
• End User Personalization (EUP)
• Configuring Approvers and Managers
• Creating access request
• Types of access request
• Creating Template based request
• Creating Model User
• Admin Delegation
• Creating Emergency Access Request
• Responding to access request by the Approver
MSMP Workflow and Business Rule Framework
• MSMP Workflow Introduction
• Configuration of MSMP
• Perform Automatic Workflow Customizing
• Configuring Access Control Process ID’s
• The concept of BRF+ Application
• Initiator rule
• Agent rule
• Routing rule
• Notification and Variable Rule
• Mapping BRF+ rule to standard process id
• Background jobs in GRC AC