SAP Security & GRC Tutorial (Beginner to
Professional)
Part 1 – SAP Security Fundamentals
- SAP landscape basics (ECC, S/4HANA, modules).
- User administration (SU01, password policies, lock/unlock).
- Roles & authorizations (PFCG, authorization objects, profiles).
- Concept of authorization fields & values.
- Common T-codes (SU01, SUIM, SU10, PFCG, ST01, SU53, etc.).
- Transporting roles between systems (DEV → QA → PROD).
- Troubleshooting authorization issues.
Part 2 – Introduction to SAP GRC
- What is GRC? (Governance, Risk, Compliance explained).
- Why companies implement GRC.
- SAP GRC Access Control architecture.
- Integration with SAP Security.
Part 3 – SAP GRC Access Control Modules (Deep Dive)
1. ARA – Access Risk Analysis
* Segregation of Duties (SoD) explained.
* Risk analysis, mitigation, remediation.
* Preventive vs Detective controls.
2. ARM – Access Request Management
* Workflow-driven user/role request process.
* Role approval hierarchy.
* Provisioning integration.
3. BRM – Business Role Management
* Role design & catalogues.
* Single vs composite vs derived roles.
* Risk-free role building.
4. EAM – Emergency Access Management
* Firefighter ID concept.
* Logging & monitoring firefighter usage.
* Auditor’s perspective.
Part 4 – Hands-On Scenarios
- Create a role in PFCG with specific auth.
- Perform an SoD analysis in GRC.
- Raise and approve an ARM request.
- Assign Firefighter access & analyze logs.
- Common troubleshooting examples.
Part 5 – Interview Preparation (2+ Years Experience Level)
Frequently asked SAP Security Q&A;:
- What is the difference between a role and a profile?
- How do you troubleshoot missing authorization errors?
- Explain the difference between single, composite, and derived roles.
Frequently asked SAP GRC Q&A;:
- What is firefighter ID and when do you use it?
- How do you handle SoD conflicts in GRC?
- What is the role of BRM in role management?
Scenario-based interview questions:
- Steps to transport a role from DEV to PROD?
- How would you analyze SoD conflicts?
- Explain the process of raising an access request in ARM.
Part 6 – Best Practices & Tips
- Role design strategy (avoid role duplication).
- Maintaining SoD free environment.
- Compliance & audit reporting.
- Real-world challenges in projects.