https://raw.githubusercontent.com/ajmaradiaga/feeds/main/scmt/topics/Governance-Risk-Compliance-(GRC)-and-Cybersecurity-blog-posts.xml
SAP Community - Governance, Risk, Compliance (GRC), and Cybersecurity
2026-03-02T00:10:40.873704+00:00
python-feedgen
Governance, Risk, Compliance (GRC), and Cybersecurity blog posts in SAP Community
https://community.sap.com/t5/security-and-compliance-blog-posts/building-resilient-enterprises-sap-s-security-gains-from-microsoft-defender/ba-p/14251594
Building Resilient Enterprises: SAP’s Security Gains from Microsoft Defender for Cloud
2025-10-27T13:45:39.480000+01:00
AmosW
https://community.sap.com/t5/user/viewprofilepage/user-id/1403767
<H2 id="toc-hId-1763636933"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="resillient-enterprises.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/333026i8450C09879ED5884/image-size/large/is-moderation-mode/true?v=v2&px=999" role="button" title="resillient-enterprises.jpg" alt="resillient-enterprises.jpg" /></span></H2><P> <EM>By Sven Frank, Cyber Security Architect IAM & Zero Trust (SAP), Martin Pankraz, Principal Product Manager SAP Integration and Security (Microsoft), Amos Wendorff, Cyber Security Data Governance Lead</EM></P><P> </P><H1 id="toc-hId-1438040709"><span class="lia-unicode-emoji" title=":police_car_light:">🚨</span>The 3 PM Friday Security Crisis: Why Human-Centered Security Matters</H1><P><STRONG>Picture this</STRONG>: It's 3 PM on a Friday, and your development team just discovered a critical production issue affecting thousands of customers. A major client demo is scheduled for Monday morning, and your lead developer needs to spin up additional Azure resources immediately to implement a hotfix. The standard security approval process typically takes 48 hours.</P><P><span class="lia-unicode-emoji" title=":warning:">⚠️</span><STRONG>The Dangerous Moment</STRONG>: In this high-pressure situation, it's tempting to take shortcuts—opening broader network access than necessary, using shared service accounts, or bypassing security scanning protocols. <EM>"We'll fix it properly after the crisis,"</EM> becomes the dangerous refrain that can turn a temporary workaround into a permanent vulnerability.</P><H2 id="toc-hId-1370609923"><span class="lia-unicode-emoji" title=":shield:">🛡</span>️ The SAP Secure-by-Default Philosophy</H2><P>At SAP, securing our Microsoft Azure landscapes extends beyond technology alone. We face tight deadlines and pressure to complete projects quickly, which can challenge maintaining strong security practices. That's why our secure-by-default approach—closing unnecessary ports, phasing out legacy authentication, and enforcing automated policies with thorough identity management—is designed to support everyone in staying secure, even when time is limited.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="AmosW_0-1761215934708.png" style="width: 771px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331489i4AB737584AAC554A/image-dimensions/771x189/is-moderation-mode/true?v=v2" width="771" height="189" role="button" title="AmosW_0-1761215934708.png" alt="AmosW_0-1761215934708.png" /></span></P><H2 id="toc-hId-1174096418"><span class="lia-unicode-emoji" title=":high_voltage:">⚡</span>Speed AND Security, Not Speed OR Security</H2><P>When our developer can provision resources through pre-configured, security-hardened templates with just a few clicks, we eliminate the false choice between speed and security. Equally important is fostering a security-conscious mindset throughout our teams, grounded in continuous learning and constructive accountability. Through consistent knowledge-sharing sessions, we ensure alignment across the organization.</P><H2 id="toc-hId-977582913"><STRONG><span class="lia-unicode-emoji" title=":link:">🔗</span></STRONG>Bridging Security and Architecture: A Real-World Challenge</H2><P>But here's where it gets more complex. Fast-forward to Monday morning—the crisis is resolved, but now our Enterprise Architecture team discovers something concerning. During the weekend sprint, three different teams independently deployed similar cloud applications to solve related problems. Each believed they were following secure practices, but collectively, they've created an unmanaged sprawl of SaaS applications across our landscape.</P><P><STRONG>The traditional scenario</STRONG>: Our security team knows these applications exist and can assess their individual risk profiles through Microsoft Defender for Cloud Apps. Meanwhile, our enterprise architects are mapping our application portfolio in SAP LeanIX, trying to understand capability gaps and technology dependencies. In most enterprises, IT security and enterprise architecture are two critical disciplines, each with their own priorities, tools, and perspectives. One is laser-focused on threat detection, compliance, and access control. The other is mapping capabilities, rationalizing applications, and shaping long-term IT strategy.<BR />But what if these two worlds could work together seamlessly?<STRONG><BR /></STRONG></P><P> </P><H1 id="toc-hId-651986689"><span class="lia-unicode-emoji" title=":direct_hit:">🎯</span>The Power of Integration: SAP #LeanIX + Microsoft Defender for Cloud App</H1><P>At SAP, we've implemented an integration between SAP LeanIX and Microsoft Defender for Cloud Apps that transforms how we approach secure and compliant software usage. With this integration, you can pull application usage and risk data from Defender for Cloud Apps directly into SAP LeanIX. That means: ... You're no longer just identifying what's out there - you're aligning it with your architecture strategy. This turns ad-hoc discovery into intentional governance.</P><H2 id="toc-hId-584555903"><STRONG><span class="lia-unicode-emoji" title=":magnifying_glass_tilted_left:">🔍</span></STRONG>Real-Time Visibility Meets Strategic Planning</H2><P>Applications are added to Cloud Apps in MS Defender when someone accesses a cloud application through their browser, which could lead to a significant number of discovered applications. This continuous discovery feeds directly into our LeanIX environment, where our enterprise architects can immediately see:</P><UL><LI>Risk-aligned Architecture Decisions: Security risk scores from Defender for Cloud Apps appear alongside capability mappings in LeanIX, enabling architects to make informed decisions about application rationalization</LI><LI>Compliance-Driven Portfolio Management: Applications flagged for compliance issues in Defender are automatically highlighted in our architecture views, allowing us to prioritize remediation based on business impact</LI><LI>Usage-Based Capability Planning: Real usage data helps identify which applications are truly critical versus those that can be consolidated or retired</LI></UL><H2 id="toc-hId-388042398"><span class="lia-unicode-emoji" title=":rocket:">🚀</span>From Reactive Discovery to Proactive Governance</H2><P>This integration fosters collaboration between two personas that often operate in parallel but rarely intersect. With Microsoft Defender for Cloud Apps and SAP LeanIX, they do - bringing security and architecture into a shared conversation around risk, capability, and value.</P><P>Kahoot is an example of an in-house approved application, in the terminology of Defender for Cloud Apps a sanctioned application. This allows the Enterprise Architect to make clear, data-driven decisions when harmonizing tools, eliminating guesswork and ensuring alignment across the organization.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AmosW_1-1761215934719.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331490i34EE6E659FF4EACD/image-size/large?v=v2&px=999" role="button" title="AmosW_1-1761215934719.png" alt="AmosW_1-1761215934719.png" /></span></P><P>If you want to learn more about LeanIX and Defender for Cloud Apps, have a look <A href="https://community.sap.com/t5/technology-blogs-by-members/sap-leanix-integrating-microsoft-defender-for-cloud-apps/ba-p/14089439" target="_blank">here</A>.<BR />This <SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-leanix-integrating-microsoft-defender-for-cloud-apps/ba-p/14089439" target="_blank">blog post</A></SPAN> was co-authored by <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1578736">@Michelle10</a> <STRONG><BR /></STRONG></P><P> </P><H1 id="toc-hId-62446174"><span class="lia-unicode-emoji" title=":water_wave:">🌊</span>The Ripple Effect of Integrated Security / Final Part<STRONG><BR /></STRONG></H1><P>This comprehensive strategy enables us to effectively protect our environments and maintain the highest security standards across our SAP landscapes in Azure - even when the pressure is on.</P><P>Ultimately, our customers and partners benefit directly from these security practices, as they translate into more robust, reliable, and trustworthy SAP solutions. The secure-by-default principles and security-conscious culture that protect our Azure environments become foundational elements when organizations implement our products - creating a ripple effect that strengthens security across the broader ecosystem.</P>
2025-10-27T13:45:39.480000+01:00
https://community.sap.com/t5/financial-management-blog-posts-by-sap/grc-tuesdays-what-s-new-in-sap-risk-and-assurance-management-q4-2025/ba-p/14250804
GRC Tuesdays: What's New in SAP Risk and Assurance Management, Q4 2025
2025-11-04T07:00:00.117000+01:00
T_Frenehard
https://community.sap.com/t5/user/viewprofilepage/user-id/215222
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_0-1761144221110.jpeg" style="width: 500px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331057i075A614A32FB775B/image-dimensions/500x334/is-moderation-mode/true?v=v2" width="500" height="334" role="button" title="T_Frenehard_0-1761144221110.jpeg" alt="T_Frenehard_0-1761144221110.jpeg" /></span></P><P><SPAN>As I am sure you are already well aware, if you want to be amongst the first to know what is new within SAP Risk and Assurance Management, all the information is just one click away in the dedicated section of the <A href="https://help.sap.com/whats-new/f443ad2e47794510805f060352fc27df" target="_blank" rel="noopener noreferrer">product Help Portal</A>.</SPAN></P><P><SPAN>In these GRC Tuesdays blog, we take a different angle: we don’t provide an exhaustive list, instead, we just make a focus on certain capabilities that we think can spark your interest.</SPAN></P><P><SPAN>Working with <A href="https://de.linkedin.com/in/claudia-behrendt-9050bb126" target="_blank" rel="noopener nofollow noreferrer">Claudia Behrendt</A> and <A href="https://de.linkedin.com/in/alain-brieuc-gall-377728" target="_blank" rel="noopener nofollow noreferrer">Alain-Brieuc Gall</A> from SAP Product Management, we have decided to highlight 2 new enhancements delivered recently in SAP Risk and Assurance Management: </SPAN></P><UL><LI><SPAN>New integrated reporting dashboards in Enterprise SAP Analytics Cloud (SAC)</SPAN></LI><LI><SPAN>Predicted Conclusions in the Issue Management and Remediation service</SPAN></LI></UL><P><SPAN> </SPAN></P><H2 id="toc-hId-1763609746"><STRONG><SPAN>New integrated reporting dashboards in Enterprise SAP Analytics Cloud</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>By leveraging the SAP Analytics Cloud stories, users of SAP Risk and Assurance Management can significantly improve their master data compliance and risk management processes, leading to enhanced efficiency, reduced risks, and a more robust assurance framework.</SPAN></P><P><SPAN>To support this objective the team has released a new SAC story: </SPAN></P><P><STRONG><SPAN>Risk & Assurance Management Cockpit</SPAN></STRONG></P><P><SPAN>This new dashboard increases transparency for Compliance executives as it provides them with a cockpit-like experience with actionable insights derived from visual and comparative analysis of compliance data. It helps in identifying patterns, tracking performance over time, and prioritizing efforts effectively. </SPAN></P><P><SPAN>This comprehensive view enhances the organization’s ability to manage risks and assurance activities, ultimately leading to better compliance and operational excellence. </SPAN></P><P><SPAN>This SAP Analytics Cloud story includes the following visualisations:</SPAN></P><P><U><SPAN>Instant Overview</SPAN></U></P><P> </P><TABLE><TBODY><TR><TD width="301"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_1-1761144221112.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331056iBE3A9F16AD9AB076/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_1-1761144221112.png" alt="T_Frenehard_1-1761144221112.png" /></span><P> </P></TD><TD width="301"><P><SPAN>Provides an immediate snapshot of compliance issues, organized by type and status, with visual charts that display trends over time.</SPAN></P></TD></TR></TBODY></TABLE><P><U><SPAN>Efficiency Metrics</SPAN></U></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_2-1761144221114.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331055iA36FEB97A00B7706/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_2-1761144221114.png" alt="T_Frenehard_2-1761144221114.png" /></span><P> </P></TD><TD width="301"><P><SPAN>Offers insights into average issue resolution times and year-to-year analysis, helping to identify process inefficiencies.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN><U><SPAN>Comparative Analysis</SPAN></U></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_3-1761144221117.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331058iC9D0DE635CC57686/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_3-1761144221117.png" alt="T_Frenehard_3-1761144221117.png" /></span><P> </P></TD><TD width="301"><P><SPAN>Makes it easy to compare current performance and highlights long-term trends and deviations, facilitating informed decision-making.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P><STRONG><SPAN>Controls Compliance Dashboard</SPAN></STRONG></P><P><SPAN>And, in case you missed the information or simply forgot about it, allow me to refresh your memory: there is already another SAC story previously available: the Controls Compliance Dashboard. </SPAN></P><P><SPAN>With this dashboard, users to have a granular view of their compliance posture, ensuring that all necessary controls are in place and that data integrity is maintained. It helps them identify potential risks early and taking proactive measures to mitigate them, thereby enhancing overall operational efficiency and compliance readiness.</SPAN></P><P><SPAN>The SAP Analytics Cloud stories in this dashboard are based on information from the controls’ master data and associated run results:</SPAN></P><P><U><SPAN>Compliance Coverage</SPAN></U></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_4-1761144221139.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331059i29F074037C465C9C/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_4-1761144221139.png" alt="T_Frenehard_4-1761144221139.png" /></span><P> </P></TD><TD width="301"><P><SPAN>Helps to understand the compliance coverage of controls, ensuring that all critical areas are adequately monitored.</SPAN></P></TD></TR></TBODY></TABLE><P><U><SPAN>Master Data Completeness</SPAN></U></P><P><SPAN> </SPAN></P><TABLE width="604"><TBODY><TR><TD width="160"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_5-1761144221156.png" style="width: 188px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331060iEAE3F9193ADCBDA5/image-dimensions/188x87?v=v2" width="188" height="87" role="button" title="T_Frenehard_5-1761144221156.png" alt="T_Frenehard_5-1761144221156.png" /></span><P> </P></TD><TD width="444"><P><SPAN>Assesses the completeness of master data across the controls, identifying any gaps or discrepancies that need attention.</SPAN></P></TD></TR></TBODY></TABLE><P><U><SPAN>Data Hygiene</SPAN></U></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_6-1761144221167.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331063iF4446ACF3DB93B25/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_6-1761144221167.png" alt="T_Frenehard_6-1761144221167.png" /></span><P> </P></TD><TD width="301"><P><SPAN>Highlights data holes and orphaned data, facilitating timely data completion or clean-up efforts to maintain accuracy and relevance.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN><U><SPAN>Complementary Insights</SPAN></U></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_7-1761144221174.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331061i8E73842458F976B5/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_7-1761144221174.png" alt="T_Frenehard_7-1761144221174.png" /></span><P> </P></TD><TD width="301"><P><SPAN>Complements the Fiori apps but provides additional, in-depth insights not available in the standard apps.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN><U><SPAN>Compliance Status</SPAN></U></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_8-1761144221177.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331062iA5D41755A8C08677/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_8-1761144221177.png" alt="T_Frenehard_8-1761144221177.png" /></span><P> </P></TD><TD width="301"><P><SPAN>Offers a comprehensive view of the compliance status of controls across organizations, processes, and regulations, with dedicated KPIs.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN><U><SPAN>Failure Analysis</SPAN></U></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="T_Frenehard_9-1761144221181.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331065i8837EC0FC40455A2/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_9-1761144221181.png" alt="T_Frenehard_9-1761144221181.png" /></span><P> </P></TD><TD width="301"><P><SPAN>Shows which and how many controls fail at any given time and over time, across various dimensions, including automated and manual procedures.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><H2 id="toc-hId-1567096241"><STRONG><SPAN>Predicted Conclusions in the Issue Management and Remediation service</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>Shifting gear from reporting to workflows, with decision support for issues with Machine Learning, organizations can benefit from predictive model to automate decision-making and speed up issue processing. The model uses historical decisions to predict outcomes for new issues.</SPAN></P><P><SPAN>Compliance specialists are often faced with numerous issues raised that they need to quickly review and categorize so that they are addressed in time by relevant stakeholders.</SPAN></P><P><SPAN>If this is a key aspect of their role – especially when new types of issues arise that would require expert review, many issues are quite “standard” and decisions can be streamlined by an intelligent engine: confirm the issue and assign it for remediation or close it as a false positive. </SPAN></P><P><SPAN>This is precisely what this capability offers: to serve as an enabler for further automation steps for issue processing.</SPAN></P><P><SPAN>Based on previous manual decisions for related issues, SAP Risk and Assurance Management can generate an automated conclusion and display its level of confidence:</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="thumbnail_ML Result explain.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/333274i2B52640F40DC8B55/image-size/large?v=v2&px=999" role="button" title="thumbnail_ML Result explain.png" alt="thumbnail_ML Result explain.png" /></span></P><P><SPAN> </SPAN><SPAN> </SPAN></P><H2 id="toc-hId-1370582736"><STRONG>More information</STRONG></H2><P> </P><P>Should you be interested in drilling-down further here, then I would suggest the following links:</P><UL><LI><SPAN><A href="https://help.sap.com/whats-new/f443ad2e47794510805f060352fc27df?locale=en-US&state=PRODUCTION&version=1.0" target="_blank" rel="noopener noreferrer">What's New in SAP Risk and Assurance Management</A></SPAN> – the single source of truth for what has been released</LI><LI><SPAN> <A href="https://help.sap.com/docs/link-disclaimer?site=https%3A%2F%2Froadmaps.sap.com%2Fboard%3FPRODUCT%3D73554900100800002693%26range%3DCURRENT-LAST" target="_blank" rel="noopener noreferrer">SAP Road Map Explorer</A> – the single source of truth, but this time for what is planned to be released!</SPAN></LI><LI><SPAN><A href="https://help.sap.com/docs/risk-and-assurance-management/admin-guide-risk-and-assurance-management/sap-grc-ram-compliancereporting" target="_blank" rel="noopener noreferrer">Risk and Compliance Cockpit</A></SPAN> – for more granular details on this new SAP Analytics Cloud story</LI></UL><P>We hope this was useful. Keep an eye open for our next blogs in the <SPAN><A href="https://community.sap.com/t5/forums/searchpage/tab/message?q=%22What%27s%20New%20in%20SAP%20Risk%20and%20Assurance%20Management%22" target="_blank">What's New in SAP Risk and Assurance Management</A></SPAN> series. In the meantime, <SPAN>I look forward to reading your thoughts and comments on this blog.</SPAN></P><P><SPAN>And if you are interested in learning more about SAP solutions for Governance, Risk, and Compliance, feel free to fill-in the <A href="https://www.sap.com/registration/request-demo.html?product=237150e2-6555-4a16-b49e-e93dbf1891da&productName=Governance%2C+Risk%2C+Compliance+%28GRC%29%2C+and+Cybersecurity&pageTitle=Cybersecurity+and+Governance%2C+Risk%2C+and+Compliance+Software&countryOfOrigin=en_au&refererPagePath=https%3A%2F%2Fwww.sap.com%2Faustralia%2Fproducts%2Ffinancial-management%2Fgrc.html&refererContentPath=%2Fcontent%2Fsapdx%2Flanguages%2Fen_gb%2Fproducts%2Ffinancial-management%2Fgrc&navTitle=Request+a+Demo" target="_blank" rel="noopener noreferrer">demo request form</A>!</SPAN></P>
2025-11-04T07:00:00.117000+01:00
https://community.sap.com/t5/technology-blog-posts-by-members/sal-sap-integrity-protection-format-secured-with-distributed-ledger/ba-p/14260756
SAL: SAP 'Integrity Protection Format' secured with Distributed Ledger Technology on SAP BTP Kyma 🚀
2025-11-04T21:48:39.476000+01:00
AndySilvey
https://community.sap.com/t5/user/viewprofilepage/user-id/1397601
<P>Did you know,</P><P>the<EM> S/4HANA SAP Audit Log (SAL) </EM></P><P>has a configuration, </P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">'Integrity Protection Format',</P><P>which enables (malicious) modifications to be detected:</P><P><A href="https://me.sap.com/notes/2033317" target="_blank" rel="noopener noreferrer">2033317 - Integrity protection format for Security Audit Log - SAP for Me</A></P><P><A href="https://me.sap.com/notes/2191612#Q21" target="_blank" rel="noopener noreferrer">2191612 - FAQ | Use of Security Audit Log as of NetWeaver 7.50 - SAP for Me</A></P><P>This integrity protection is an extremely important part of your holistic Security Posture.</P><P>As <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/5736">@kevinrichardson</a> showed and stated in this excellent picture, '<EM><STRONG>You cannot solve today's challenges with yesterday's tools</STRONG></EM>',</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1762287465475.png" style="width: 689px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/336244iE100CA597DC718D8/image-dimensions/689x374/is-moderation-mode/true?v=v2" width="689" height="374" role="button" title="AndySilvey_0-1762287465475.png" alt="AndySilvey_0-1762287465475.png" /></span><FONT size="3">(Source: <A href="https://assets.dm.ux.sap.com/au-sap-business-unleashed-innovation-day-melbourne/pdfs/002_rise_with_sap_kr.pdf" target="_blank" rel="noopener noreferrer">002_rise_with_sap_kr.pdf</A>)</FONT></P><P>In the ERP modernisation and transformation which is happening everywhere, there is not enough being done on Security Posture Modernisation, SAL: SAP 'Integrity Protection Format', is available now included in your License and enabled with a Profile Parameter, so why not to do it ?</P><P>The OSS Notes explain that, SAL: SAP 'Integrity Protection Format', works like this:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1762287621076.png" style="width: 691px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/336245iB59B816D17650091/image-dimensions/691x239/is-moderation-mode/true?v=v2" width="691" height="239" role="button" title="AndySilvey_1-1762287621076.png" alt="AndySilvey_1-1762287621076.png" /></span></P><P><A href="https://me.sap.com/notes/2033317" target="_blank" rel="noopener noreferrer">2033317 - Integrity protection format for Security Audit Log - SAP for Me</A></P><P>And that's all fine, but where does the, 'Distributed Ledger Technology on SAP BTP Kyma <span class="lia-unicode-emoji" title=":rocket:">🚀</span>' fit in to the equation, where's the relevance ?</P><P>Here's the answer, this Note <A href="https://me.sap.com/notes/2191612#Q21" target="_blank" rel="noopener noreferrer">2191612 - FAQ | Use of Security Audit Log as of NetWeaver 7.50 - SAP for Me</A> has a pdf attached: <EM>Explain SAL Integrity Format.pdf , </EM>and the pdf goes on to explain that,</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_2-1762287797394.png" style="width: 689px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/336246i729644AA630C9586/image-dimensions/689x212/is-moderation-mode/true?v=v2" width="689" height="212" role="button" title="AndySilvey_2-1762287797394.png" alt="AndySilvey_2-1762287797394.png" /></span></P><P>'<EM>You should download the HMAC Ident as a backup, but you should save it on a secure place. The log files written with that can only be checked with that. It’s important to have this HMAC key data after a system copy or if the files should be evaluated in another system than the original. '</EM></P><P>That's where the Blockchain / Distributed Ledger Technology running on the SAP BTP Kyma comes in,</P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">store the HMAC Keys in the Distributed Ledger Technology running on the SAP BTP Kyma</P><P>This will ensure that nobody can tamper with the keys, and therefore nobody can tamper with the SAL Audit Logs and you have the least chance of losing the keys thanks to the built in characteristics of the Distributed Ledger Technology running on the SAP BTP Kyma, HA&DR out of the box, distributed, immutable, etc.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_5-1762288844416.png" style="width: 676px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/336249i9DF9C85AF0CB499E/image-dimensions/676x380/is-moderation-mode/true?v=v2" width="676" height="380" role="button" title="AndySilvey_5-1762288844416.png" alt="AndySilvey_5-1762288844416.png" /></span></P><P>Source: <A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/bcp-business-continuity-planning-for-sap-s-4hana-made-easy-with-enterprise/ba-p/13647824" target="_blank">BCP: Business Continuity Planning for SAP S/4HANA - made easy with Enterprise Blockchain <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></P><P>Creating digital finger prints of data is going to come in to our Security Posture whether it's protecting integrity of AI LLMs or Document Grounding, Log Files, Backups and more:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_4-1762288308473.png" style="width: 686px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/336248i0BAC76B133590049/image-dimensions/686x393/is-moderation-mode/true?v=v2" width="686" height="393" role="button" title="AndySilvey_4-1762288308473.png" alt="AndySilvey_4-1762288308473.png" /></span></P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;"><A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-ai-security-how-to-tamperproof-ai-llm-s-with-sap-btp-kyma-and/ba-p/14099291" target="_blank">SAP AI Security - How To: Tamperproof AI LLM's with SAP BTP Kyma and Enterprise Blockchain <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A> </P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;"><A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/cyber-security-protection-for-s-4hana-backups-with-enterprise-blockchain/ba-p/13872997" target="_blank">Cyber Security Protection for S/4HANA Backups with Enterprise Blockchain and SAP BTP Kyma <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></P><P>If you want to try it out there's a blog here, <A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/running-your-own-blockchain-on-the-sap-btp-kyma-trial-a-hands-on-how-to/ba-p/13724580" target="_blank">Running Your Own Blockchain on The SAP BTP Kyma Trial: A Hands On How To Guide <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A> </P><P>Have a think about, <A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_blank">SAP Enterprise Architecture: Positioning Blockchain Database as an Enterprise Technology Standard <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A> and then you can <A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_blank">SAP Enterprise Architecture: Let the Use Case find the Blockchain<span class="lia-unicode-emoji" title=":rocket:">🚀</span></A> by following SAP Enterprise Architecture Principles and the <A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/enterprise-architecture-enterprise-blockchain-platform-business-capability/ba-p/13902640" target="_blank">Enterprise Architecture: Enterprise Blockchain Platform Business Capability Map <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></P><P>And this is why, <A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_blank">Why I love SAP and Blockchain Databases and why you should too <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A></P><P>If you learn one thing from this blog, it's that you can protect the integrity of your SAL Audit Logs with SAP 'Integrity Protection Format', and that is a cool feature.</P><P>Until next time,</P><P>Andy Silvey.</P><P>Independent <EM>SAP Technical Architect and SAP Basis SME</EM> [you might also find my SAP S/4HANA RISE & BTP Toolbox interesting: <SPAN> </SPAN><A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/%EF%B8%8F-the-sap-s-4hana-rise-amp-sap-btp-toolbox-%EF%B8%8F/ba-p/13944069" target="_blank">🧰👷‍ The SAP S/4HANA RISE & SAP BTP - Toolbox 👷‍🧰</A>] and CEO of atkrypto (.) io</P><P>Author Bio:</P><P>Andy Silvey is a 26 years SAP Technology veteran [26<EM> years SAP Basis and including 12 years SAP Tech Arch including Tech, Integration, Security, Data from 3.1H to S/4HANA PCE on RISE and the BTP and everything in between, and<SPAN> </SPAN><A href="https://community.sap.com/t5/welcome-corner-blog-posts/andy-silvey-scn-moderator-spotlight/ba-p/13054438" target="_self">former SCN Moderator and Mentor alumni</A>].</EM></P><P>Andy is also co-Founder of atkrypto inc, an startup whose ambition is to make Blockchain easy for Enterprise.</P><P>atkrypto (.) io's flagship product is the atkrypto Enterprise Blockchain Platform for SAP, and atkrypto (.) io is a SAP Partner Edge Open EcoSystem Partner. </P><P>The atkrypto Enterprise Blockchain Platform for SAP has been designed by SAP Independent Experts for the needs of SAP Customers and to be deployed on the SAP BTP Kyma Runtime Service and leverage native integration to SAP Products.</P><P>atkrypto Enterprise Blockchain Platform for SAP has a number of unique qualities, including being the only Blockchain software in the world which has a DataCenter version and a light mobile version which can run on Edge/IoT/Mobile devices and enables data to be written to the Blockchain at the Edge where that same Blockchain is running on a Server in the DataCenter, protecting the integrity and originality of data from the Edge to Insights. Taking Blockchain to the Data at the Edge instead of taking the Data to the Blockchain.</P><P> </P>
2025-11-04T21:48:39.476000+01:00
https://community.sap.com/t5/technology-blog-posts-by-members/sap-ea-real-world-asset-tokenization-with-distributed-ledger-technology-on/ba-p/14263514
SAP EA - Real World Asset Tokenization with Distributed Ledger Technology on the SAP BTP Kyma 🚀
2025-11-10T06:21:30.705000+01:00
AndySilvey
https://community.sap.com/t5/user/viewprofilepage/user-id/1397601
<P>I is for Innovation.... EA is about... the goal of this blog is to get us thinking and talking about tokenization before the Business turn up demanding it...</P><P>I've always wished and dreamed that us SAP EA's would know our Business so well and at the same time have Road Maps for all of our Technology Standards and including Emerging Standards so that we would know what Technical Capabilities the Business requires before they even come to us with their Demand.</P><P>In reality, in my experience 9 times out 10 it's the Business who come to EA with demands for new technologies (innovations).</P><P>How do we bring in or do "Innovation" ? Ideally with Roadmaps and Emerging Technology Standards. </P><P>SAP's next generation Customer CoE guides <A href="https://support.sap.com/en/offerings-programs/ccoe/cio-customer-coe-guides.html" target="_blank" rel="noopener noreferrer">SAP Guides for Customer COE</A> provide thought leadership on bringing in innovations, <A href="https://support.sap.com/content/dam/support/en_us/library/ssp/offerings-and-programs/customer-center-of-expertise/ccoe-document-store/ccoe_strategy_framework.pdf" target="_blank" rel="noopener noreferrer">Customer Center of Expertise - Strategy, Governance and Organization</A></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1762682779455.png" style="width: 615px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337570i27B1E817EBC24DDA/image-dimensions/615x232/is-moderation-mode/true?v=v2" width="615" height="232" role="button" title="AndySilvey_0-1762682779455.png" alt="AndySilvey_0-1762682779455.png" /></span></P><P>and <A href="https://support.sap.com/content/dam/support/en_us/library/ssp/offerings-and-programs/customer-center-of-expertise/media-library/general-information/continuous-improvement-and-innovation-with-a-ccoe.pdf" target="_blank" rel="noopener noreferrer">continuous-improvement-and-innovation-with-a-ccoe.pdf</A></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1762682809277.png" style="width: 666px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337571iADBDBB14302DDC90/image-dimensions/666x164/is-moderation-mode/true?v=v2" width="666" height="164" role="button" title="AndySilvey_1-1762682809277.png" alt="AndySilvey_1-1762682809277.png" /></span><FONT size="2"><EM><A href="https://support.sap.com/en/offerings-programs/ccoe.html" target="_blank" rel="noopener noreferrer">Customer Center of Expertise</A> </EM></FONT></P><P><FONT size="2"><EM><A href="https://support.sap.com/content/dam/support/en_us/library/ssp/offerings-and-programs/customer-center-of-expertise/ccoe-document-store/ccoe_continuous_success_en.pdf" target="_blank" rel="noopener noreferrer">ccoe_continuous_success_en.pdf</A></EM></FONT></P><P>In SAP's documentation, in the North Star Architecture, in the next generation SAP CCoE, innovation responsibilities come in to a number of Roles</P><P class="lia-indent-padding-left-60px" style="padding-left : 60px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Innovation.png" style="width: 494px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337572i4B08DA86F99069D2/image-dimensions/494x66/is-moderation-mode/true?v=v2" width="494" height="66" role="button" title="Innovation.png" alt="Innovation.png" /></span></P><P>And combined with the Digital Innovation Manager <A href="https://pages.community.sap.com/topics/digital-innovation/innovation-manager" target="_blank" rel="noopener noreferrer">Digital Innovation Manager | Digital Technology and Innovation Management| SAP Community</A></P><P>And that is what this blog is about, innovation, and innovation in the area of Tokenization and RWA Real World Asset Tokenization.</P><P>There is a silent digital revolution going on, where evidence, assets, transactions are being given a digital fingerprint, a hash on a Distributed Ledger and being tokenized.</P><P>What is Tokenization and who's doing it and where is it going ?</P><P>Let's start by looking at what's happening in the space:</P><P><FONT size="2"><EM>[Disclaimer - we cannot post links outside of the Community and if you want to read these articles then just go on your favourite search engine and find them]</EM></FONT></P><P><STRONG>Pairpoint - Vodafone Sumitomo JV</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1762686128517.png" style="width: 660px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337573iA002B384AABC2C17/image-dimensions/660x200/is-moderation-mode/true?v=v2" width="660" height="200" role="button" title="AndySilvey_0-1762686128517.png" alt="AndySilvey_0-1762686128517.png" /></span></P><P> </P><P><STRONG>World Economic Forum</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1762686256814.png" style="width: 672px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337574i4A7807BA9CE2E38D/image-dimensions/672x247/is-moderation-mode/true?v=v2" width="672" height="247" role="button" title="AndySilvey_1-1762686256814.png" alt="AndySilvey_1-1762686256814.png" /></span></P><P> </P><P><STRONG>Fortune - Asia's quiet tokenization revolution</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_2-1762686461543.png" style="width: 664px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337575i7E66101D3ED96765/image-dimensions/664x326/is-moderation-mode/true?v=v2" width="664" height="326" role="button" title="AndySilvey_2-1762686461543.png" alt="AndySilvey_2-1762686461543.png" /></span></P><P> </P><P><STRONG>CNBC</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_3-1762686822450.png" style="width: 671px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337576i70B3831229B65900/image-dimensions/671x354/is-moderation-mode/true?v=v2" width="671" height="354" role="button" title="AndySilvey_3-1762686822450.png" alt="AndySilvey_3-1762686822450.png" /></span></P><P> </P><P><STRONG>Oracle</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_4-1762687234784.png" style="width: 664px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337577iD169BB0792B6D8FE/image-dimensions/664x312/is-moderation-mode/true?v=v2" width="664" height="312" role="button" title="AndySilvey_4-1762687234784.png" alt="AndySilvey_4-1762687234784.png" /></span></P><P>from the same article, <STRONG>this is how Oracle sees it</STRONG>:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_5-1762687423595.png" style="width: 683px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337578iCB56818D0FFD22CB/image-dimensions/683x529/is-moderation-mode/true?v=v2" width="683" height="529" role="button" title="AndySilvey_5-1762687423595.png" alt="AndySilvey_5-1762687423595.png" /></span></P><P> </P><P>If they all see Tokenization that way then maybe the EA innovation leads in our Organisations should be having a look at Tokenization too.</P><P>This older SAP article considered common use cases <A href="https://pages.community.sap.com/topics/digital-innovation/non-fungible-token-nft#nft-digital-asset-representation-on-a-blockchain" target="_blank" rel="noopener noreferrer">NFT (Non-Fungible-Tokens) | Digital Technology and Innovation Management | SAP Community</A></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_6-1762688278702.png" style="width: 643px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337579iEC3BBC895BC4A3CD/image-dimensions/643x336/is-moderation-mode/true?v=v2" width="643" height="336" role="button" title="AndySilvey_6-1762688278702.png" alt="AndySilvey_6-1762688278702.png" /></span></P><P>SAP has dipped their toes into the water with the SAP Green Ledger <A href="https://help.sap.com/docs/green-ledger/introduction/introduction" target="_blank" rel="noopener noreferrer">What Is SAP Green Ledger? | SAP Help Portal</A> , in my opinion the scope is too narrow, <A href="https://www.sap.com/assetdetail/2023/05/52ec66b4-727e-0010-bca6-c68f7e60039b.html" target="_blank" rel="noopener noreferrer">Green Ledger: Where Carbon and Financial Accounting Unite</A> <A href="https://www.sap.com/assetdetail/2024/06/428fc78f-c17e-0010-bca6-c68f7e60039b.html" target="_blank" rel="noopener noreferrer">SAP Green Ledger and an ERP-centric approach to reinvent carbon accounting</A> and Carbon Accounting is the tip of the iceberg.</P><P>Learning.sap.com has some excellent resources including videos <A href="https://learning.sap.com/courses/helping-business-thrive-in-a-circular-economy/blockchain-_LE_2bf04a9e-f791-493b-82e3-072718564c9e" target="_blank" rel="noopener noreferrer">Blockchain</A> and this incredible Blockchain course <A href="https://learning.sap.com/courses/what-can-blockchain-do-for-you" target="_blank" rel="noopener noreferrer">What Can Blockchain Do for You</A> .</P><P>Have a think about how Tokenization and Distributed Ledger Technology capabilities fit towards your Business, your Business Processes, your Business Partners.</P><P>Have a think about drawing the <A href="https://community.sap.com/t5/technology-blog-posts-by-members/enterprise-architecture-enterprise-blockchain-platform-business-capability/ba-p/13902640" target="_self">Blockchain Capability Map</A>, <A href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">positioning Enterprise Blockchain as an Emerging Technology Standard</A>, and then when the Business come with the Demand... <A href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_self">let the use-case / Demand find the Blockchain</A>, and if you want to have a play with Enterprise Blockchain on the BTP Kyma, even the BTP Trial Edition Kyma <A href="https://community.sap.com/t5/technology-blog-posts-by-members/running-your-own-blockchain-on-the-sap-btp-kyma-trial-a-hands-on-how-to/ba-p/13724580" target="_self">then just follow this blog</A> and reach out if there are any questions.</P><P>And that's the purpose of this blog, to get Tokenization onto our EA radars.</P><P>What do you think, put your thoughts in the comments.</P><P>Ultimately this is all "<A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_blank">Why I love SAP and Blockchain Databases and why you should too <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A>".</P><P>Andy Silvey.</P><P>Independent<SPAN> </SPAN><EM>SAP Technical Architect and SAP Basis SME</EM><SPAN> </SPAN>[you might also find my SAP S/4HANA RISE & BTP Toolbox interesting: <SPAN> </SPAN><A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/%EF%B8%8F-the-sap-s-4hana-rise-amp-sap-btp-toolbox-%EF%B8%8F/ba-p/13944069" target="_blank">🧰👷‍ The SAP S/4HANA RISE & SAP BTP - Toolbox 👷‍🧰</A>] and CEO of atkrypto (.) io</P><P>Author Bio:</P><P>Andy Silvey is a 26 years SAP Technology veteran [26<EM> years SAP Basis and including 12 years SAP Tech Arch including Tech, Integration, Security, Data from 3.1H to S/4HANA PCE on RISE and the BTP and everything in between, and<SPAN> </SPAN><A href="https://community.sap.com/t5/welcome-corner-blog-posts/andy-silvey-scn-moderator-spotlight/ba-p/13054438" target="_self">former SCN Moderator and Mentor alumni</A>].</EM></P><P>Andy is also co-Founder of atkrypto inc, an startup whose ambition is to make Blockchain easy for Enterprise.</P><P>atkrypto (.) io's flagship product is the atkrypto Enterprise Blockchain Platform for SAP, and atkrypto (.) io is a SAP Partner Edge Open EcoSystem Partner. </P><P>The atkrypto Enterprise Blockchain Platform for SAP has been designed by SAP Independent Experts for the needs of SAP Customers and to be deployed on the SAP BTP Kyma Runtime Service and leverage native integration to SAP Products.</P><P>atkrypto Enterprise Blockchain Platform for SAP has a number of unique qualities, including being the only Blockchain software in the world which has a DataCenter version and a light mobile version which can run on Edge/IoT/Mobile devices and enables data to be written to the Blockchain at the Edge where that same Blockchain is running on a Server in the DataCenter, protecting the integrity and originality of data from the Edge to Insights. Taking Blockchain to the Data at the Edge instead of taking the Data to the Blockchain.</P><P> </P><P> </P><P> </P><P> </P><P> </P>
2025-11-10T06:21:30.705000+01:00
https://community.sap.com/t5/financial-management-blog-posts-by-sap/grc-tuesdays-sap-gts-edition-for-sap-hana-2025-sneak-preview/ba-p/14264140
GRC Tuesdays: SAP GTS Edition for SAP HANA 2025, Sneak Preview
2025-11-18T07:30:00.042000+01:00
T_Frenehard
https://community.sap.com/t5/user/viewprofilepage/user-id/215222
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_0-1762769310147.jpeg" style="width: 500px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337893i169F02474C391FD5/image-dimensions/500x334/is-moderation-mode/true?v=v2" width="500" height="334" role="button" title="T_Frenehard_0-1762769310147.jpeg" alt="T_Frenehard_0-1762769310147.jpeg" /></span></P><P><SPAN>Since Christmas is not far away, I think I would grant you your secret wish: get an early preview of what’s coming in SAP Global Trade Services, edition for SAP HANA 2025. </SPAN></P><P><SPAN>As per the <A href="https://userapps.support.sap.com/sap/support/pam" target="_blank" rel="noopener noreferrer">Product Availability Matrix</A>, this release is planned for this quarter so the Help Portal will be updated accordingly in time, but, if you read this blog, it’s because Santa’s helpers – here more likely Volker Mohr from Product Management and Torsten Stolz from Engineering, have provided a sneak preview of what you can expect in this release. </SPAN></P><P><SPAN> </SPAN></P><H2 id="toc-hId-1764645824"><STRONG><SPAN>Planned enhancements</SPAN></STRONG></H2><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><P class="lia-align-center" style="text-align: center;"><STRONG>Enablement of the administrator function in SAP Fiori launchpad</STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_1-1762769310148.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337892i5760A6BD5970CA0D/image-size/medium/is-moderation-mode/true?v=v2&px=400" role="button" title="T_Frenehard_1-1762769310148.png" alt="T_Frenehard_1-1762769310148.png" /></span></TD><TD width="301"><P><SPAN>A modernization of the user interface for administrators is planned by providing access to transactions using SAP Fiori launchpad. This will help increase work efficiency and enable the administrator role to be consistent with other business roles. </SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><P class="lia-align-center" style="text-align: center;"><STRONG>Mass maintenance of agreement-specific product properties</STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_2-1762769310150.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337891iD1D529AC1D4CA300/image-size/medium/is-moderation-mode/true?v=v2&px=400" role="button" title="T_Frenehard_2-1762769310150.png" alt="T_Frenehard_2-1762769310150.png" /></span></TD><TD width="301"><P><SPAN>This enhancement will enable users to complete the maintenance of agreement</SPAN><SPAN>-specific properties for one or multiple products at the same time in one screen, hence reducing the administrative burden and increasing information quality at the same time.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><P class="lia-align-center" style="text-align: center;"><STRONG>Maintenance of country and region of origin in inbound LTSD (technical delivery)</STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_3-1762769310151.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337894i55F275863535FCDC/image-size/medium/is-moderation-mode/true?v=v2&px=400" role="button" title="T_Frenehard_3-1762769310151.png" alt="T_Frenehard_3-1762769310151.png" /></span></TD><TD width="301"><P><SPAN>First technical delivery in what will further be improved with subsequent Support Packages, the maintenance of country and region of origin will allow users to maintain this information in the inbound Long Term Supplier Declaration (LTSD) at the product level.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><P class="lia-align-center" style="text-align: center;"><STRONG>New SAP Fiori app “Manage Partners – SPL Screening”</STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_4-1762769310153.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337895i9D197F54B801F78E/image-size/medium/is-moderation-mode/true?v=v2&px=400" role="button" title="T_Frenehard_4-1762769310153.png" alt="T_Frenehard_4-1762769310153.png" /></span></TD><TD width="301"><P><SPAN>The previous app “Manage Blocked Business Partners” will be deprecated and a new Fiori app “Manage Partners – SPL* Screening” will enable users to process all business partners, whether they are blocked or released. </SPAN></P><P><SPAN>This ensures that organizations can also manage business partners which were released before and block them again or add them to positive or negative lists. </SPAN></P><P><SPAN>In this app, the user will be able to easily navigate among screening results of different business partners. </SPAN></P><P><FONT size="1 2 3 4 5 6 7">* SPL: Sanctioned Party Lists</FONT></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><P class="lia-align-center" style="text-align: center;"><STRONG>Updates to screening capabilities of the sanctioned party list</STRONG></P><P><STRONG> </STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_5-1762769310155.jpeg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337896iEA147D9FC5BB48F0/image-size/medium/is-moderation-mode/true?v=v2&px=400" role="button" title="T_Frenehard_5-1762769310155.jpeg" alt="T_Frenehard_5-1762769310155.jpeg" /></span></TD><TD width="301"><P><SPAN>The planned enhancement of the screening capabilities of the sanctioned party list will help improve compliance with international regulations and ensure frictionless international trade processes by allowing “block by association” between a business partner and bank master data.</SPAN></P><P><SPAN>To achieve this the following capabilities will be added: </SPAN></P><UL><LI><SPAN>Transferring SWIFT/bank identifier codes (BICs) and benefit-in-kind (BIK) codes of bank master data from the feeder system to SAP GTS</SPAN></LI><LI><SPAN>Transferring a relationship between business partners and banks during the transfer of customers, vendors, and employees from the feeder system and storing the relationship in SAP GTS</SPAN></LI><LI><SPAN>Managing of additional addresses of account holders in the bank details in business partner master data</SPAN></LI><LI><SPAN>Screening of bank master data with related IDs in SAP GTS</SPAN></LI><LI><SPAN>Screening of customers and vendors with associated bank</SPAN></LI></UL></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><P class="lia-align-center" style="text-align: center;"><STRONG>Integration with decentralized advanced shipping and receiving processes</STRONG></P><P><STRONG> </STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_6-1762769310157.jpeg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337900iB38DB698F0B20A5F/image-size/medium/is-moderation-mode/true?v=v2&px=400" role="button" title="T_Frenehard_6-1762769310157.jpeg" alt="T_Frenehard_6-1762769310157.jpeg" /></span></TD><TD width="301"><P><SPAN>Integration of SAP Global Trade Services (SAP GTS) with support for the outbound processes of advanced shipping and receiving in a decentralized extended warehouse management and transportation management landscape for trade compliance and customs management will increase efficiency with integration of the decentralized scenario for outbound freight management supported by SAP GTS. This enhancement will include: </SPAN></P><UL><LI><SPAN>Compliance check for the outbound freight unit and freight order</SPAN></LI><LI><SPAN>Export declaration based on the freight order</SPAN></LI></UL></TD></TR></TBODY></TABLE><P><SPAN> </SPAN><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><P class="lia-align-center" style="text-align: center;"><STRONG>Railway bill of lading </STRONG></P><P><STRONG> </STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Railway.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/339091iB9D2A07A353522C6/image-size/medium/is-moderation-mode/true?v=v2&px=400" role="button" title="Railway.png" alt="Railway.png" /></span></TD><TD width="301"><P><SPAN>The Customs Waybill for Rail feature ensures compliance with U.S. Customs requirements for rail shipments by accurately transmitting waybill data. The feature addresses complexities in coordinating freight forwarders, carriers, and BOL issuers for rail cargo. Overall, it streamlines rail logistics in the context of SAP GTS processes for Importation and US Free Trade Zone processes with customs authorities.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><P class="lia-align-center" style="text-align: center;"><STRONG>Automated Partnering Government Agency (US PGA) change messaging</STRONG></P><P><STRONG> </STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="PGA.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/339092i2245CE3AA6192292/image-size/medium/is-moderation-mode/true?v=v2&px=400" role="button" title="PGA.png" alt="PGA.png" /></span></TD><TD width="301"><P><SPAN>The CA/CC messages supports the changes of PGA Data of a declaration even after no change to the declaration itself is allowed any longer. The system automatically detects the changed PGA data after being changed in the declaration and transmits these to US CBP. By this you can ensure to compliantly close all PGA activities even after customs declaration fixation.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="301"><P class="lia-align-center" style="text-align: center;"><STRONG>Legal changes</STRONG></P><P><SPAN> </SPAN></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_8-1762769310160.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337897i181F685922BD918B/image-size/medium/is-moderation-mode/true?v=v2&px=400" role="button" title="T_Frenehard_8-1762769310160.png" alt="T_Frenehard_8-1762769310160.png" /></span></TD><TD width="301"><P><SPAN>And of course, in addition to the functional and technical enhancements, legal changes are also planned. </SPAN></P><P><SPAN>These can be found in the Regulatory Change Manager which provides timely information on upcoming regulatory changes that can affect SAP products. It offers a comprehensive and well-organized collection of information, and filters by product. To focus only on updates relevant for SAP GTS for instance. </SPAN></P><P><SPAN>This Regulatory Change Manager service can be accessed directly from the <A href="https://me.sap.com/home" target="_blank" rel="noopener noreferrer">SAP For Me</A> portal, under the Services & Support dashboard in the sidebar.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><H2 id="toc-hId-1568132319"><STRONG><SPAN>Be the first to know!</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>They say that information is power, so be the first to know about the details of any enhancement in SAP Global Trade Services, edition for HANA via the dedicated SAP Help Portal Page: </SPAN></P><P><SPAN><A href="https://help.sap.com/docs/SAP_GLOBAL_TRADE_SERVICES_EDITION_HANA/6909fd085b3848c89057759cb8a29a80/3a25bda3c9894404908feef196f3e398.html" target="_blank" rel="noopener noreferrer">What's New in SAP Global Trade Services, edition for SAP HANA | SAP Help Portal</A></SPAN></P><P><SPAN>This page consolidates delta information about all functions of this product that are new, changed, or deleted not only for the latest version, but also all previous updates, and will be updated for SAP GTS, edition for SAP HANA 2025 in due time.</SPAN><SPAN> </SPAN></P><P><SPAN>Finally, on December 9th, there will also be an SAP Global Trade Services Latest Release Updates webinar focused on updates on the last shipment, but also Roadmap, Regulatory Changes and a Q&A. You can register here: <A href="https://event.on24.com/wcc/r/5109432/1A2F9D479074E19CFA3E9B5169E9656D" target="_blank" rel="noopener nofollow noreferrer">SAP Global Trade Services Latest Release Updates</A></SPAN></P><P><SPAN>And if you are interested in learning more about SAP solutions for Governance, Risk, and Compliance, feel free to fill-in the <A href="https://www.sap.com/registration/request-demo.html?product=237150e2-6555-4a16-b49e-e93dbf1891da&productName=Governance%2C+Risk%2C+Compliance+%28GRC%29%2C+and+Cybersecurity&pageTitle=Cybersecurity+and+Governance%2C+Risk%2C+and+Compliance+Software&countryOfOrigin=en_au&refererPagePath=https%3A%2F%2Fwww.sap.com%2Faustralia%2Fproducts%2Ffinancial-management%2Fgrc.html&refererContentPath=%2Fcontent%2Fsapdx%2Flanguages%2Fen_gb%2Fproducts%2Ffinancial-management%2Fgrc&navTitle=Request+a+Demo" target="_blank" rel="noopener noreferrer">demo request form</A>!</SPAN></P>
2025-11-18T07:30:00.042000+01:00
https://community.sap.com/t5/technology-blog-posts-by-sap/roadblocks-to-ai-adoption/ba-p/14281074
Roadblocks to AI Adoption
2025-12-01T13:28:01.063000+01:00
MIKE210
https://community.sap.com/t5/user/viewprofilepage/user-id/1952764
<P class="lia-align-justify" style="text-align : justify;"><U><STRONG>Introduction</STRONG></U></P><P class="lia-align-justify" style="text-align : justify;">In an era defined by rapid technological advancement, businesses face both significant challenges and valuable opportunities as they pursue digital transformation and integrate AI-driven solutions. As organisations work to maintain a competitive edge, AI’s impact on business strategy, customer experience, and operational efficiency has become increasingly pivotal.</P><P class="lia-align-justify" style="text-align : justify;">As part of my recent doctoral studies in Digitalisation, specialising in Technology Adoption and AI Integration at IAE Nice, Graduate School of Management, Université Côte d’Azur, I explored this evolving landscape in depth through research focused on SAP customers. I am Happy to share the key findings through a series of insightful and practical articles, each offering guidance for both SAP customer leadership and SAP executives navigating the complexities of AI adoption and technology transformation.</P><P class="lia-align-justify" style="text-align : justify;"> </P><OL class="lia-align-justify" style="text-align : justify;"><LI><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/maximising-ai-potential-a-blueprint-for-business-success/ba-p/14281058" target="_blank">Maximising AI Potential: A Blueprint for Business Success</A></LI><LI>Roadblocks to AI Adoption <STRONG>(THIS ARTICLE)</STRONG></LI><LI><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/is-sap-business-data-cloud-the-answer-to-your-ai-ambitions/ba-p/14268363" target="_blank">Is SAP Business Data Cloud the Answer to Your AI Ambitions?</A></LI></OL><P class=""><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1760795787743.png" style="width: 850px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347032iF8A6D8889B46C80B/image-size/large?v=v2&px=999" role="button" title="1760795787743.png" alt="1760795787743.png" /></span></SPAN></P><P class=""><SPAN>Photo by adventtron Unsplash</SPAN></P><P class="">With advancements in technology continually reshaping the business landscape, artificial intelligence (AI) stands out as a transformative force across industries. However, despite its potential, many organizations stumble on the road to successful AI adoption. Understanding these barriers is critical for any business hoping to leverage AI effectively.</P><P class=""><U><STRONG>Organizational Readiness and Resistance to Change</STRONG></U></P><P class="">One of the foremost challenges in AI adoption is the readiness of an organization to integrate new technology. According to recent studies conducted by the author within SAP, involving 29 SAP customers and their SAP counterparts, many businesses lack the necessary infrastructure, skilled personnel, and strategic vision to implement AI successfully. Additionally, the cultural resistance within organizations can be a significant hurdle. Employees often fear job displacement due to automation or feel overwhelmed by the pace of technological change, thereby resisting new implementations. A customer from the Oil & Gas industry in EMEA South as part of an interview with the author stated that " The transformation is happening in three areas: people, processes, and technology. One significant challenge is that people often resist change, which is something we frequently notice when adopting new technologies. Sometimes, these technology is introduced without a proper change management. As a result, the leadership faces langes in later stages to manage the change and convince the end users to accept the AI automation and overcome their initial hesitations and fear."</P><P class=""><U><STRONG>Cost and Complexity Considerations</STRONG></U></P><P class="">The cost involved in deploying AI solutions is another significant barrier. Setting up AI systems requires substantial initial investment in technology and training, which can be a deterrent especially for SME enterprises. Moreover, the complexity of AI technology itself poses a challenge. Companies must ensure they have the expertise to not just implement but also maintain and scale AI solutions, which often necessitates costly ongoing training and development. A customer in the Chemicals sector from EMEA South reports to the author of this article that "Yeah, it's an easy question because in the end if there's a SAP competitor upcoming next year with a cheaper alternative, then we will think about going for the SAP’s competition." According to a CSM from EMEA South team share his experience saying with the author "A customer that I managed a couple of years ago has moved away from us and they moved to a SAP’s competitor due to the cost of our solutions"</P><P class=""><U><STRONG>Data Privacy and Security Concerns</STRONG></U></P><P class="">Data is the lifeblood of AI. However, the increasing stringency of data protection regulations such as GDPR in Europe presents a compliance maze for companies to navigate. Ensuring data privacy and securing AI interactions becomes a critical concern that companies must address, adding another layer of complexity to AI adoption. A Higher Education industry customer based in EMEA North shares that with the author "Data Privacy and security is absolutely a concern even today, thought it really depends very much on the industry."</P><P class=""><U><STRONG>Lack of Clear ROI</STRONG></U></P><P class="">The uncertainty about the return on investment (ROI) from AI projects also serves as a barrier. AI initiatives can be experimental in nature, making it difficult to predict outcomes precisely. This uncertainty can make stakeholders hesitant to commit the required resources, slowing down or even halting AI adoption processes.</P><P class=""><U><STRONG>Vendor Selection and Integration Challenges</STRONG></U></P><P class="">Choosing the right technology provider and ensuring the integration of AI with existing systems is another challenge for our customers. Businesses often struggle with choosing between SAP and multiple other options, each promising superior capabilities. Making the wrong choice can lead to integration issues, wasted resources, and failed projects. MEA North’s Oil & Gas industry customer expresses in an interview with the Author that "It also plays a very important role in the industry where I'm working right now, where we have to leaverage technology and AI to lead the market and to deliver the requirement of our demanding customers worldwide."</P><P class=""><U><STRONG>Moving Forward: Recommendations for Overcoming AI Adoption Barriers</STRONG></U></P><P class="">1. At SAP, we understand the importance of cultivating a culture receptive to innovation. We must work with your business to develop comprehensive change management strategies. Our support will help alleviate resistance and ensure a smooth integration of AI into our customer’s existing processes, fostering continuous learning and adaptability.</P><P class="">2. At SAP, we recommend allocating resources for essential infrastructure upgrades such as RISE with SAP. Our team should assist in building AI competency through employee training programs which our leadership is already heavely investing. Additionally, we can help establish partnerships with universities and tech institutes, ensuring a steady flow of skilled talent to support your AI initiatives.</P><P class="">3. At SAP, we prioritise data security. Its necessary for us to help strengthen our customer’s cybersecurity measures and ensure compliance with data protection laws. By safeguarding customer operations, we will build trust among stakeholders, thereby smoothing the path for successful AI integration.</P><P class="">4. To demonstrate the value of AI projects, we ought to work with customers to establish clear metrics for evaluating their performance. This will help secure ongoing support from stakeholders by showcasing tangible results and a positive return on investment.</P><P class="">5. We believe in transparency and performance. By implementing a robust assessment process from our solutions, including pilot projects and performance benchmarks, we will ensure that our collaboration best matches our customers's needs. Our commitment is to be our customer’s trusted partner, guiding customers through successful AI adoption and implementation is the key.</P><P class=""><U><STRONG>Conclusion</STRONG></U></P><P class="">In summary, while artificial intelligence promises transformative benefits for businesses, the journey to successful AI adoption is fraught with challenges. These roadblocks range from organisational readiness and resistance to change, cost and complexity considerations, data privacy and security concerns, uncertainty about ROI, to vendor selection and integration issues. To overcome these hurdles, businesses must approach AI adoption strategically and holistically.</P><P class="">At SAP, we understand these challenges and are committed to helping our customers navigate them effectively. In the light of above information, I do recommend to focusing on cultural receptivity, infrastructure upgrades, data security, clear ROI metrics, and transparent in our sales strategies, and strive to be a trusted partner in our customers' AI adoption journey. Through comprehensive change management, skill development, robust cybersecurity measures, and performance benchmarking, SAP can aim to smooth the path to successful AI integration. By addressing these barriers head-on and fostering a collaborative approach, businesses can unlock the full potential of AI and drive meaningful growth and innovation.</P><P class="">If you'd like to explore further, my full research article with reproach is <A class="" href="https://sap-my.sharepoint.com/:b:/p/mike_popal/EWOViZXA_oNNlQ5_Pg1UgpkBw5wG65O0nkKOcKH4NCnfdg?e=WmYM2z" target="_self" rel="nofollow noopener noreferrer">available here</A>. Please don't hesitate to contact me if you wish to discuss the research findings <span class="lia-unicode-emoji" title=":slightly_smiling_face:">🙂</span></P><P class=""><SPAN>Find me on Linked-in: </SPAN><A href="https://www.linkedin.com/in/mi4po/" target="_blank" rel="noopener nofollow noreferrer">https://www.linkedin.com/in/mi4po/</A></P>
2025-12-01T13:28:01.063000+01:00
https://community.sap.com/t5/financial-management-blog-posts-by-sap/grc-tuesdays-early-preview-of-sap-for-internal-controls-compliance-and-risk/ba-p/14264117
GRC Tuesdays: Early Preview of SAP for Internal Controls, Compliance and Risk Management Conference
2025-12-02T07:30:00.040000+01:00
T_Frenehard
https://community.sap.com/t5/user/viewprofilepage/user-id/215222
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_0-1762768113124.jpeg" style="width: 500px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337884iC966D04CEA6A587B/image-dimensions/500x333/is-moderation-mode/true?v=v2" width="500" height="333" role="button" title="T_Frenehard_0-1762768113124.jpeg" alt="T_Frenehard_0-1762768113124.jpeg" /></span></P><P><SPAN>After visiting Dublin, Copenhagen, Brussels, and Budapest, we continue our European tour with the <A href="https://eu1.hubs.ly/H0pbRFk0" target="_blank" rel="noopener nofollow noreferrer">SAP for Internal Control, Compliance and Risk Management Conference</A>. </SPAN></P><P><SPAN>Next year, we’ll be back to the origin of this conference, in Amsterdam. If you were with us in 2018 and 2023, then this will bring back some fond memories!</SPAN></P><P><SPAN>During the first installation of the conference in Amsterdam in 2018, most of the discussions related to control automation and especially regarding GDPR. But things have definitely changed.</SPAN></P><P><SPAN>Although automation is still central to this conference, companies have started to break down compliance silos, and the 2026 theme of the conference reflects this broader approach: Driving Compliance, Managing Risk, Building Trust.</SPAN></P><P><SPAN>But what hasn’t changed is the continuous support from partners, the insightful customer sessions and the networking event, which have gotten more compelling every year!</SPAN></P><P><SPAN> </SPAN></P><H2 id="toc-hId-1764645738"><STRONG><SPAN>New Trends and Topics Discussed</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>The alignment of IT Risk and Cybersecurity with the wider Enterprise Risk and Compliance framework is a process that started some time ago and will still be core to the discussions in Amsterdam, additional trends will also be at the heart of the presentations. Including how to adapt faster and more effortlessly with ever changing regulatory requirements with a delicate balance of intelligent automation and artificial intelligence to achieve compliance.</SPAN></P><P><SPAN>Additional “hot topics” will include: </SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="236"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Business AI</SPAN></STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_1-1762768113126.jpeg" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337882iBDA8844308AAF2BF/image-size/small/is-moderation-mode/true?v=v2&px=200" role="button" title="T_Frenehard_1-1762768113126.jpeg" alt="T_Frenehard_1-1762768113126.jpeg" /></span></TD><TD width="365"><UL><LI><SPAN>Automatically monitor and analyse regulatory changes</SPAN></LI><LI><SPAN>Detecting unusual patterns or behaviors</SPAN></LI><LI><SPAN>Automating the auditing process by analysing large volumes of data</SPAN></LI></UL></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="236"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Enterprise Risk and Compliance</SPAN></STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_2-1762768113127.jpeg" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337883iD4CA9C1589EC3043/image-size/small/is-moderation-mode/true?v=v2&px=200" role="button" title="T_Frenehard_2-1762768113127.jpeg" alt="T_Frenehard_2-1762768113127.jpeg" /></span></TD><TD width="365"><UL><LI><SPAN>Controlling key processes and compliance</SPAN></LI><LI><SPAN>Monitoring risks and the adequacy of your controls</SPAN></LI><LI><SPAN>Detecting fraud and investigating suspicious patterns faster</SPAN></LI></UL></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="236"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Cybersecurity and Data Protection</SPAN></STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_3-1762768113129.jpeg" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337885i2F5B56054B918C44/image-size/small/is-moderation-mode/true?v=v2&px=200" role="button" title="T_Frenehard_3-1762768113129.jpeg" alt="T_Frenehard_3-1762768113129.jpeg" /></span></TD><TD width="365"><UL><LI><SPAN>Neutralising cyberattacks before they cause damage</SPAN></LI><LI><SPAN>Simplifying the analysis of suspicious activities and detecting security gaps</SPAN></LI><LI><SPAN>Safeguarding the operation of SAP applications</SPAN></LI></UL></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="236"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Identity and Access Governance</SPAN></STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_4-1762768113130.jpeg" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337888i9AA16A4581BEADF1/image-size/small/is-moderation-mode/true?v=v2&px=200" role="button" title="T_Frenehard_4-1762768113130.jpeg" alt="T_Frenehard_4-1762768113130.jpeg" /></span></TD><TD width="365"><UL><LI><SPAN>Detecting and remediating access risk violations</SPAN></LI><LI><SPAN>Simplifying access management in complex environments</SPAN></LI><LI><SPAN>Managing user access in heterogeneous environments</SPAN></LI></UL></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="236"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>RISE with SAP</SPAN></STRONG></P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_5-1762768113131.jpeg" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337886i992BFCBB1AFE71A5/image-size/small/is-moderation-mode/true?v=v2&px=200" role="button" title="T_Frenehard_5-1762768113131.jpeg" alt="T_Frenehard_5-1762768113131.jpeg" /></span></TD><TD width="365"><UL><LI><SPAN>Improving collaboration and mobility</SPAN></LI><LI><SPAN>Achieving faster time to value</SPAN></LI><LI><SPAN>Simplifying your transformation journey</SPAN></LI></UL></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><H2 id="toc-hId-1568132233"><STRONG><SPAN>Is this Conference for Me?</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>Quick hint: if you are reading this blog, then chances are that yes, this conference is 100% for you!</SPAN></P><P><SPAN>If you already are a user of SAP solutions for Governance, Risk, and Compliance for enterprise risk and compliance, identity and access governance or cybersecurity and data protection, and are looking to learn and do more, then this conference will provide you with an update on new features released but also innovative case studies and partner tips.</SPAN></P><P><SPAN>If you are new to the world of SAP and want to learn how others are gaining competitive advantage and staying one step ahead, then this conference will help you discover how your team can accurately and continuously monitor risks, identities, cyberthreats, and compliance across your mission-critical systems and processes.</SPAN></P><P><SPAN>Finally, if you would like to meet your peers to exchange best practices and expand your professional network for future development, then do join us!</SPAN></P><P><SPAN> </SPAN></P><H2 id="toc-hId-1371618728"><STRONG><SPAN>Free Pre-Conference Webinar</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>If you haven’t attended a SAP for Internal Controls, Compliance and Risk Management Conference and are still not sure whether this is the right one for you, then have a look at our free pre-conference webinar from October where speakers from SAP, partners, and customers shared updates on the latest innovations and developments in SAP’s Governance, Risk, and Compliance solutions but also insights into what’s planned for the in-person event. </SPAN></P><P><SPAN>You will be able to view the recording here: <A href="https://2e13kr.share-eu1.hsforms.com/2JXaqhoIeRQeidSws6DTDEw" target="_blank" rel="noopener nofollow noreferrer">Webinar - TAC Insights: Business Events & Networking</A></SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_6-1762768113143.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337889i62BBD90279BDA7A3/image-size/medium/is-moderation-mode/true?v=v2&px=400" role="button" title="T_Frenehard_6-1762768113143.png" alt="T_Frenehard_6-1762768113143.png" /></span></P><P> </P><H2 id="toc-hId-1175105223"><STRONG><SPAN>50 Words Summary</SPAN></STRONG></H2><P><SPAN> </SPAN></P><UL><LI><SPAN>What: only event designed to bring together the ecosystem of SAP users, partners and solution experts to address SAP’s GRC and cyber security portfolio in a business-centric context</SPAN></LI><LI><SPAN>Where: Novotel Amsterdam City Hotel</SPAN></LI><LI><SPAN>When: March 3 - 4, 2026</SPAN></LI><LI><SPAN>What: have a look at the <A href="https://eu1.hubs.ly/H0q0rh80" target="_self" rel="nofollow noopener noreferrer">Agenda page</A> - it will be updated as more sessions are confirmed</SPAN></LI><LI><SPAN>How: <A href="https://eu1.hubs.ly/H0pbRHj0" target="_blank" rel="noopener nofollow noreferrer">Registration page</A> – and additional bonus: there is an <STRONG>Early bird rate</STRONG> running until December 31st 2025!</SPAN></LI></UL><P><SPAN>And if you are interested in learning more about SAP solutions for Governance, Risk, and Compliance, feel free to fill-in the <A href="https://www.sap.com/registration/request-demo.html?product=237150e2-6555-4a16-b49e-e93dbf1891da&productName=Governance%2C+Risk%2C+Compliance+%28GRC%29%2C+and+Cybersecurity&pageTitle=Cybersecurity+and+Governance%2C+Risk%2C+and+Compliance+Software&countryOfOrigin=en_au&refererPagePath=https%3A%2F%2Fwww.sap.com%2Faustralia%2Fproducts%2Ffinancial-management%2Fgrc.html&refererContentPath=%2Fcontent%2Fsapdx%2Flanguages%2Fen_gb%2Fproducts%2Ffinancial-management%2Fgrc&navTitle=Request+a+Demo" target="_blank" rel="noopener noreferrer">demo request form</A>!</SPAN></P>
2025-12-02T07:30:00.040000+01:00
https://community.sap.com/t5/financial-management-blog-posts-by-sap/grc-tuesdays-tickin-off-the-policies-grc-christmas-tune/ba-p/14268872
GRC Tuesdays: Tickin’ Off the Policies (GRC Christmas tune)
2025-12-16T07:30:00.038000+01:00
T_Frenehard
https://community.sap.com/t5/user/viewprofilepage/user-id/215222
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_0-1763111642754.jpeg" style="width: 550px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/340551iF562AA3BF61A22A3/image-dimensions/550x412/is-moderation-mode/true?v=v2" width="550" height="412" role="button" title="T_Frenehard_0-1763111642754.jpeg" alt="T_Frenehard_0-1763111642754.jpeg" /></span></P><P><SPAN>Like decorating the Christmas tree, baking gingerbread cookies and waiting for Santa to arrive, our yearly GRC Christmas parody has now become a tradition.</SPAN></P><P><SPAN>Well, maybe not as famous as the other three, but getting there!</SPAN></P><P><SPAN>Another tradition of course is unwrapping presents… which, for some younger ones, will inevitably be a building brick toy from a very famous Danish company. Did you know that the patent for the toy building brick was lodged in 1958 and that it is possible to combine six 2x4 bricks in 915.103.765 different ways? I don’t know about you but I surely stepped 915.103.765 times on Lego bricks hidden on the carpet!</SPAN></P><P><SPAN>Getting back to our topic today but staying in 1958 because it’s the time of the year to fully embrace nostalgia, this is also the year that <EM>Rockin' Around the Christmas Tree</EM> was released.</SPAN></P><P><SPAN>Our GRC Christmas tune will therefore be inspired by this all-time classic!</SPAN></P><P><SPAN>So, leave your Legos on the table (not on the carpet!) and join me in singing our 2025 Tickin’ Off the Policies parody.</SPAN></P><P> </P><P><div class="video-embed-center video-embed"><iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FTFsZy9t-qDc%3Ffeature%3Doembed&display_name=YouTube&url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DTFsZy9t-qDc&image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FTFsZy9t-qDc%2Fhqdefault.jpg&type=text%2Fhtml&schema=youtube" width="400" height="225" scrolling="no" title="Brenda Lee - Rockin Around The Christmas Tree (Official Music Video)" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"></iframe></div></P><P><SPAN> </SPAN><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="75"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_1-1763111642754.png" style="width: 50px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/340550i505B30E7C6E26D32/image-dimensions/50x50/is-moderation-mode/true?v=v2" width="50" height="50" role="button" title="T_Frenehard_1-1763111642754.png" alt="T_Frenehard_1-1763111642754.png" /></span><P> </P></TD><TD width="526"><P><STRONG><SPAN>Background: </SPAN></STRONG></P><P><SPAN>The day is Tuesday 16th of December 2025, our GRC lead is finalizing his compliance training and making sure that all controls are in place to run smoothly over the holidays to protect the organization and its business.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>Tickin' off the policies</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>Before shutting my laptop</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>Data privacy’s the key</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>Wish I’d gone to the workshop</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>Year-end's near, finally</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>And vacation time coming</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>One last exception to deny</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>And I'll send the reporting</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>Can't wait for my audit lead to send me his cheer</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>When he sees no anomaly</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>We’ll celebrate merrily!</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>Screen' all our 3rd party</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>Making sure they are okay</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>Checkin' blocked payments to prevent any delay</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>[</SPAN></EM><EM><span class="lia-unicode-emoji" title=":trumpet:">🎺</span><SPAN> trumpets ]</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>There is just one last item I need to clear</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>IT checks for security</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>1st line users will be happy</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>Control testin' activity</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>Automated all the way</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>That's how GRC should be carried anyway!</SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN> </SPAN></EM></P><P class="lia-align-center" style="text-align: center;"><EM><SPAN>[</SPAN></EM><EM><span class="lia-unicode-emoji" title=":trumpet:">🎺</span><SPAN> trumpets ]</SPAN></EM></P><P> </P><P><SPAN>I hope you enjoyed this last GRC Tuesdays post of the year. Thank you for following us once again in 2025, reading, sharing and commenting on these blogs and I sincerely hope you will continue to do so in 2026.</SPAN></P><P><SPAN>As usual, if you’d like to get in touch, feel free to add a note on this blog. </SPAN></P><P><SPAN>Finally, in case you’d like to continue singing GRC Christmas tunes, below are links to our previous beats:</SPAN></P><UL><LI><SPAN>2024 – <A href="https://community.sap.com/t5/financial-management-blog-posts-by-sap/grc-tuesdays-last-christmas-i-wasn-t-exemplar-grc-christmas-tune/ba-p/13961603" target="_blank">GRC Tuesdays: Last Christmas... I Wasn’t Exemplar! (GRC Christmas tune)</A></SPAN></LI><LI><SPAN>2023 – <A href="https://community.sap.com/t5/financial-management-blogs-by-sap/grc-tuesdays-all-i-want-for-christmas-is-cyber-safety/ba-p/13579199" target="_blank">GRC Tuesdays: All I Want for Christmas is Cyber Safety</A></SPAN></LI><LI><SPAN>2022 – <A href="https://blogs.sap.com/2022/12/20/grc-tuesdays-let-me-know-let-us-go-take-a-bow-a-grc-christmas-miracle/" target="_blank" rel="noopener noreferrer">GRC Tuesdays: Let me know! Let us go! Take a bow!, a GRC Christmas miracle</A></SPAN></LI><LI><SPAN>2021 – <A href="https://blogs.sap.com/2021/12/14/grc-tuesdays-the-famous-grc-christmas-carol-version-2021/" target="_blank" rel="noopener noreferrer">GRC Tuesdays: The Famous GRC Christmas Carol version 2021</A></SPAN></LI><LI><SPAN>2020 – <A href="https://blogs.sap.com/2020/12/22/grc-tuesdays-we-wish-you-a-threat-free-christmas-and-a-breachless-new-year/" target="_blank" rel="noopener noreferrer">GRC Tuesdays: We Wish You a Threat-Free Christmas and a Breachless New Year</A></SPAN></LI><LI><SPAN>2019 – <A href="https://blogs.sap.com/2019/12/10/the-twelve-days-of-grc-christmas/" target="_blank" rel="noopener noreferrer">GRC Tuesdays: The Twelve Days of (GRC) Christmas</A></SPAN></LI></UL>
2025-12-16T07:30:00.038000+01:00
https://community.sap.com/t5/financial-management-blog-posts-by-members/new-access-risks-new-sod-matrix-how-s-4hana-changes-the-approach-to/ba-p/14298296
New access risks, new SoD matrix: How S/4HANA changes the approach to Segregation of Duties (SoD)
2025-12-30T05:39:35.532000+01:00
FilipGRC
https://community.sap.com/t5/user/viewprofilepage/user-id/11783
<OL><LI>Introduction – can the SoD matrix from SAP ECC be simply copy&paste to S/4HANA?</LI></OL><P>Migrating authorizations from SAP ECC to SAP S/4HANA is not just a technical upgrade — it’s a moment when many organizations, often for the first time in recent years, take a holistic look at their access design. S/4HANA introduces a wide range of new business functionalities, which significantly impact the existing Segregation of Duties (SoD) matrix originally built for ECC.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FilipGRC_0-1766950606835.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356335i6ADCE21E22EEF98D/image-size/medium?v=v2&px=400" role="button" title="FilipGRC_0-1766950606835.png" alt="FilipGRC_0-1766950606835.png" /></span></P><P><STRONG>Business layer</STRONG></P><P>The way business processes operate in S/4HANA has changed significantly - new flexible approval workflows have been introduced (for purchase requisitions, purchase orders, and invoices), along with the centralized Business Partner model, extended budget control mechanisms, automated accounting based on the Universal Journal, and new cloud and cross-module integrations (FI–MM–CO–SD). Users now have broader decision-making and configuration capabilities directly within Fiori applications: such as managing approval rules, reassigning cost center (MPK) ownership, or creating ad-hoc reports using Embedded Analytics. All of this means that the <EM>business layer</EM> of the SoD matrix must be updated: some SAP ECC risks have lost relevance, while new S/4HANA ones have emerged, resulting from greater process flexibility.</P><P><STRONG>Technical layer</STRONG></P><P>There is also a <EM>technical</EM> layer of change, it focus on how SoD matrix business activities are technically defined (transactions, Fiori applications, OData services and authorization objects) in the SoD matrix. The way users interact with the system has evolved: instead of executing transactions in SAP GUI, they now operate through the Fiori Launchpad (tiles/intents), while access to data and operations is handled via OData services (controlled by objects such as S_SERVICE), Spaces/Pages, Launchpad catalogs, and classical backend authorization objects. Access that once relied on a single T-code is now the result of multiple layers working together (frontend: Fiori & OData and backend: tcodes and authorization objects). This means that an SoD risk can now materialize not just at the transaction level but also within an app or service — and therefore must be defined that way in the segregation of duties matrix. This new authorization architecture contribute to the fact that the traditional approach to SAP ECC access control is no longer sufficient.</P><P><STRONG>The SoD matrix</STRONG></P><P>At the center of every access redesign lies something many organizations tend to overlook — the Segregation of Duties (SoD) matrix. It defines access risks and identifies potential threats arising from excessive or conflicting authorizations. It establishes the level of risk for typical business scenarios in which users operate within the S/4HANA system. For example, the matrix describes risks that occur when a user can change a supplier’s bank account and subsequently post a fictitious liability in an invoice document, or when they can receive goods into inventory that never physically arrived — thereby triggering a payment process for non-existent items. In other words, the SoD matrix defines which activities in the system can be performed together and which must remain separated to protect business processes and data from errors or fraud.</P><P>In short, the SoD matrix is a structured set of risks and sensitive activities that should be analyzed, monitored, and incorporated into access management processes to ensure the security and integrity of both business operations and the underlying data.</P><P>It’s also a key focus area for financial auditors, since one of the fundamental control mechanisms for preventing misuse is a properly designed authorization model. Yet many organizations make the same common mistake: they build roles based on the principle of “who needs what,” only later asking whether that person <EM>should</EM> have such access in the first place.</P><P><STRONG>GRC Hack #1: Don’t design or build roles without SoD matrix </STRONG></P><P>Before you start designing authorizations, perform a business process risk analysis and use it to create your SoD matrix as this will serve as the foundation for all role design activities.<BR />Anyone doing it the other way around makes a conceptual error that will eventually surface during an audit. Including a dedicated authorization workstream and engaging experts who understand business process risks is a crucial, yet often overlooked as a part of any S/4HANA implementation project. Remember, the SoD matrix is a conceptual deliverable is a single document that consolidates all key principles related to security, segregation of duties, and access management.</P><P>With the transition to S/4HANA, this map must be redrawn from scratch: names, logic, and process execution methods have all changed and with them, the sources of access risk.</P><P><STRONG>How to Redesign the SoD Matrix in S/4HANA</STRONG></P><P>Changes to the SoD matrix in S/4HANA occur across two dimensions: the business dimension and the technical dimension. The technical dimension is usually more challenging as it requires significantly more work, and without adapting it properly, SoD analysis and reports will produce completely inaccurate results. Let’s start with the technical perspective.</P><P><STRONG>a)Technical Dimension</STRONG></P><P>In the SAP ECC system, authorizations were primarily based on transaction codes (T-codes) and corresponding authorization objects. SoD analysis therefore focused on verifying whether a user or role combined, within their authorizations, two conflicting transactions (together with the necessary authorization objects) that should not be executed by the same person in a given business process that could generate access risk for the organization. In SAP S/4HANA, this logic still applies, but the way users interact with the system has changed fundamentally. This shift has a major impact on how the SoD matrix must be defined and structured for S/4HANA.</P><P><STRONG>b)From Transactions to Fiori Applications</STRONG></P><P>Users no longer enter transaction codes in SAP GUI. Instead, they work within the Fiori Launchpad, where they access applications assigned to their roles. Each application is linked to an Intent, as a combination of a semantic object and an action, which in turn calls a specific OData service in the backend. Data is exchanged via HTTP in JSON (Odata v2, XML, V4) format and is subject to additional authorization checks. This means that user access now depends on the interaction of several components:</P><UL><LI>the Fiori application,</LI><LI>an active OData service,</LI><LI>the assigned Launchpad catalog and Space/Page (despite missing page app can be available), and</LI><LI>the backend authorization objects.</LI></UL><P>Missing any of these elements results in an access error, typically <EM>a 403 Forbidden or No data found message</EM>. From an SoD perspective, this means that access risks can now arise not only at the transaction level, but also at the level of Fiori applications and OData services and therefore must be represented accordingly in the SoD matrix.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FilipGRC_1-1766950606872.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356334i868968E4F3583BE3/image-size/medium?v=v2&px=400" role="button" title="FilipGRC_1-1766950606872.png" alt="FilipGRC_1-1766950606872.png" /></span></P><P><STRONG>GRC Hack #2: Expand the Matrix to Include Fiori Applications</STRONG></P><P>If you don’t add Fiori applications to your SoD matrix, your analysis will be incomplete as reports may both miss real user access risks as well as generate false positives. It’s important to understand that Fiori applications in S/4HANA are not all the same. They fall into two main categories:</P><UL><LI>New Fiori applications (transactional, analytical, or factsheet apps) – completely rewritten using SAPUI5 technology, communicating with the backend via OData services.<BR />These are the ones that most often introduce new functions and risks, e.g.: Manage Purchase Orders (F0842A), Post General Journal Entries (F0718), or Manage Supplier Invoices (F0859).</LI><LI>Classic Fiori applications (GUI transactions in Fiori) – a modern UI wrapper for traditional SAP GUI transactions. In practice, these launch traditional T-codes (e.g. ME21N, FB60, VA01) directly from a Fiori tile. They still rely on classic authorization objects, but are accessed through the Fiori Launchpad.</LI></UL><P>Each application requires its own technical mapping sometimes identifying the relevant OData service and S_SERVICE authorization object and sometimes mapping it back to a traditional GUI transaction. In both cases, the same backend authorization objects from SAP ECC still apply, as they ultimately determine whether the user can perform a given operation in backend system.</P><P>Every Fiori app in S/4HANA is linked to an intent, a combination of two elements:</P><UL><LI>Semantic Object – describes what the action relates to (e.g. PurchaseOrder, SupplierInvoice, SalesOrder).</LI><LI>Action – describes what the user does (e.g. manage, create, display).</LI></UL><P>The full list of Fiori applications, including their corresponding OData services, backend objects, and system versions, can be found in the SAP Fiori Apps Reference Library – an essential source for anyone updating their SoD matrix for S/4HANA. <A href="https://fioriappslibrary.hana.ondemand.com/" target="_blank" rel="noopener nofollow noreferrer">https://fioriappslibrary.hana.ondemand.com/</A></P><P>This library contains hundreds in practice, thousands Fiori apps for S/4HANA.</P><UL><LI>Many standard SoD matrices provided by SAP or vendors include only about 200 Fiori applications, which is just a fraction of the real scope.</LI><LI>Conclusion: every Fiori app can represent a potential SoD risk so verifying and expanding the matrix is essential.</LI></UL><P><STRONG>c) Fiori applications and OData services</STRONG></P><P>In the S/4HANA model, access to business data and processes occurs on the frontend via dedicated OData services (Open Data Protocol) the integration layer through which Fiori applications communicate with the SAP backend, retrieving and writing data in real time. An OData service definition is registered in the S/4HANA system on the Frontend Gateway and includes, for example:</P><UL><LI>the technical service name (e.g. MM_PUR_PO_MAINT_V2_SRV),</LI><LI>the URL path (e.g. /sap/opu/odata/sap/MM_PUR_PO_MAINT_V2_SRV/),</LI><LI>mapping to a backend ABAP component,</LI><LI>authorization control via the S_SERVICE object.</LI></UL><P>Example mappings:</P><UL><LI>Manage Purchase Orders (V2) (F0842A) MM_PUR_PO_MAINT_V2_SRV – Purchasing (MM)</LI><LI>Create Supplier Invoice (F0859) MM_SUPPLIER_INVOICE_MANAGE – Accounts Payable</LI><LI>Post General Journal Entries (F0718) FAC_FINANCIALS_POSTING_SRV – General Ledger (FI)</LI><LI>Manage Bank Statements (F1564) FAR_MANAGE_BS_SRV – Banking (FI)</LI><LI>Manage Sales Orders (F1873) SD_F1873_SO_WL_SRV – Sales Orders (SD)</LI></UL><P>Each of these OData services must be activated in transaction /IWFND/MAINT_SERVICE and granted to users via S_SERVICE authorization before the Fiori app can read or write data to the backend. This is a major shift, because OData access is not tied to T-codes. It requires dedicated S_SERVICE authorization, and such access may not appear in classical role-based analyses based solely on transaction codes. Therefore, the SoD matrix must explicitly include OData services, Fiori applications, and related backend objects.</P><P><STRONG>GRC Hack #3: Include OData and Fiori in the SoD matrix</STRONG></P><P>A user might have access to the classic GUI transaction MIRO (invoice posting) with the required authorization objects, but lack access to the Fiori app “Create Incoming Invoice”, which uses the MM_SUPPLIER_INVOICE_MANAGE service to post invoices in the backend via Fiori. In a traditional SoD analysis, this would be reported as a potential risk, because the GRC system detects authorization for invoice posting. However, in organizations that operate exclusively through the Fiori interface and no longer use SAP GUI, the user would not be able to perform the transaction via browser access, even though the authorizations technically exist. This is a classic false positive, where a GRC system reports a risk that is not executable in practice. Such cases illustrate why SoD analysis must combine authorization logic with an understanding of how users actually work within the modern Fiori interface. Otherwise, SoD reports can become overloaded with irrelevant alerts leading to business and risks owners frustration. </P><P><STRONG>GRC Hack #4: Don’t forget about OData service</STRONG></P><P>OData services form a new access layer for business processes their authorization operates independently from classic transaction-level checks in the backend. If you fail to include them in your SoD matrix, a user may have real operational access to perform actions that your GRC system will never flag as risky. In S/4HANA, a typical role can include:</P><UL><LI>classic SAP GUI transactions,</LI><LI>Fiori applications,</LI><LI>OData services, and authorization objects.</LI></UL><P>As a result, the SoD matrix must now evaluate whether a role combines functions that should remain segregated in the new model. It is equally important to include custom transactions and customer-specific extensions as the standard out of the box vendor SAP matrix does not cover them.</P><P><STRONG>GRC Hack #6: Technical definition must include custom extensions<BR /></STRONG>Don’t rely on the standard transaction list. Add to your matrix:</P><UL><LI>all custom Fiori applications used in your organization,</LI><LI>the OData services those applications call,</LI><LI>and every custom app, T-code, or service built for your specific system.</LI></UL><P>Only then will your SoD matrix will better reflect the real S/4HANA environment.</P><P><STRONG>Business Dimension</STRONG></P><P>If your organization has implemented custom Fiori apps, OData services, or modified backend logic, they must be manually added to the SoD matrix definition. The out-of-the-box matrix won’t be good enough and in these areas, you’ll have blind spots. With the transition to SAP S/4HANA, not only the <EM>technical structure</EM> of roles and authorizations changes, but also the very <EM>way business processes are executed in the system</EM>. This means the SoD matrix must now include new risks that simply did not exist in the old ECC world. One of the best examples involves approval workflows for purchase requisitions, purchase orders, and supplier invoices processes that, in S/4HANA, are configured through new Fiori applications such as <EM>Manage Workflow for Purchase Requisition</EM> and <EM>Manage Purchase Order Workflows</EM>. Each of these applications allows users to define approval paths (approvers), under what financial thresholds, and in which order. They can modify conditions that trigger the workflow or even rearrange the approval hierarchy. This is a powerful automation feature, but also a new source of risk for critical access (restricted access) and Segregation of duties (SoD) violations. If a user simultaneously has access to workflow configuration, purchase order processing, and the ability to edit cost center (MPK) or WBS master data, they could, for example:</P><UL><LI>remove a budget approval step in WF config and trigger the procurement process,</LI><LI>change the approver (e.g., assign themselves as owner) in cost center or WBS master data,</LI><LI>modify approval thresholds or limit values effectively bypassing budget control and the SoD principle.</LI></UL><P><STRONG>GRC Hack #7: Analyze new functionality for new SoD risks</STRONG></P><P>Add a new activity to your SoD matrix: “Manage Workflow Configuration” (for requisitions, purchase orders, and invoices). While these authorizations do not directly post accounting entries, they can indirectly bypass procurement access controls mechanisms. User can change the procurement design approval logic. Monitor who has access to Fiori apps like <EM>Manage Workflows for Centrally Managed Purchase Requisitions</EM> and related backend services such as SWF_FLEX_DEF_SRV, which handle the workflow logic. It’s also important to add new SoD conflicts to the matrix. A good example is when a user can modify Cost Center (MPK) or WBS element master data, assigning ownership to themselves and then approve a purchase requisition for that same object. This is a real risk in S/4HANA that did not exist in ECC, because the approval of requisitions and purchase orders was previously controlled by dedicated authorization objects and the Release strategy mechanism.</P><P>In ECC, approval control for purchase requisitions (PR) and purchase orders (PO) was handled by the classic Release Strategy model, based on authorization objects such as M_EINK_FRG.<BR />Fields of this object included FRGGR (release group) and FRGCO (release code), which determined who could approve which purchasing documents and at what level. Authorizations were tightly linked to document type, purchasing group, and release level the entire process was static and fully embedded within the transactional system.</P><P>As a result, SoD control was relatively simple: it was enough to ensure that a user could not both create and approve a requisition or order under the same release group. Everything was based on authorization objects and could be easily represented in the SoD matrix or analyzed by GRC tools.</P><P>In S/4HANA, this model has been simplified, but new business risks have emerged.<BR />Approval processes are now driven not by static authorization objects but by flexible workflows, MPK/WBS ownership assignments, and configuration rules that can be changed from within Fiori apps.</P><P><STRONG>New business SoD risk example in S/4HANA</STRONG></P><P>A user has authorization to change Cost Center (MPK) or WBS master data (e.g., assign a cost owner) <EM>and</EM> the ability to approve a purchase requisition for that same object. As a result, the same person can give themselves control over a cost center or project and then approve related purchases, violating the Segregation of Duties principle, bypassing budget control, and creating the potential for fraud or misstatement.</P><P>New SoD risks aspects in S/4HANA</P><UL><LI>Business risks – new processes and functions (e.g., approval workflows, business partners, flexible budgets) reshape SoD exposure.</LI><LI>Configuration risks – users can modify workflow parameters, approval rules, thresholds, or budget role assignments.</LI><LI>Automation risks – result from background workflows or schedulers performing actions without human confirmation.</LI><LI>Integration risks – arise from API and OData-based integrations that link processes across modules (e.g., FI ↔ MM ↔ CO).</LI></UL><P>In the classic ECC environment, there was no concept of a user “programming” approval logic that could violate internal control policies. In S/4HANA, thanks to Fiori this is now a real, browser-based possibility. Therefore, the modern SoD matrix must include not only traditional actions such as Post, Change, and Approve, but also Manage Workflow, Configure Approval Process, and Change Budget Control Settings because today, risks often occur where the process is configured, not just where it is executed.</P><P><STRONG>GRC Hack #8: New risks are where you configure the process not just where you execute it</STRONG></P><P>In the S/4HANA environment, the line between a business user and a process configurator is becoming increasingly blurred. A person with authorization to manage workflows can, in practice, change how documents are approved — even if they formally lack posting rights. Including such roles in the SoD matrix is now a mandatory step for any organization that wants to maintain control over its procurement and approval processes in S/4HANA.</P><TABLE width="623"><TBODY><TR><TD width="75"><P>Business activity</P></TD><TD width="57"><P>T-Code</P></TD><TD width="66"><P>Fiori</P></TD><TD width="95"><P>Intent</P></TD><TD width="132"><P>OData</P></TD><TD width="95"><P>Authorization object</P></TD><TD width="104"><P>Operation type</P></TD></TR><TR><TD width="75"><P>Create Purchase Order</P></TD><TD width="57"><P>ME21N</P></TD><TD width="66"><P>F0842A</P></TD><TD width="95"><P>PurchaseOrder-manage</P></TD><TD width="132"><P>MM_PUR_PO_MAINT_V2_SRV</P></TD><TD width="95"><P>M_BEST_EKG, M_BEST_BSA, M_BEST_WRK, M_BEST_EKO, S_SERVICE</P></TD><TD width="104"><P>manage</P></TD></TR><TR><TD width="75"><P>Invoice posting</P></TD><TD width="57"><P>MIRO</P></TD><TD width="66"><P>F0859</P></TD><TD width="95"><P>SupplierInvoice-create</P></TD><TD width="132"><P>MM_SUPPLIER_INVOICE_MANAGE</P></TD><TD width="95"><P>F_BKPF_BUK, M_RECH_WRK, S_SERVICE</P></TD><TD width="104"><P>Create, change process</P></TD></TR><TR><TD width="75"><P>Sales order</P></TD><TD width="57"><P>VA01</P></TD><TD width="66"><P>F1873</P></TD><TD width="95"><P>SalesOrder-manage</P></TD><TD width="132"><P>SD_F1873_SO_WL_SRV</P></TD><TD width="95"><P>V_VBAK_AAT, V_VBAK_VKO, S_SERVICE</P></TD><TD width="104"><P>Manage</P></TD></TR></TBODY></TABLE><P><STRONG> </STRONG><STRONG>Tools Supporting the SoD Matrix and Access Verification Process</STRONG></P><P>Building an SoD matrix is only half of the success. The other half is ensuring that its content is taking into account when access management process are executed. Another aspect is that it is regularly updated, and monitored as part of daily user to role provisioning and access review processes. This is where GRC-class tools come in — not only analyzing the SoD matrix and conflicts, but also storing knowledge about risks, linking them with business processes, and supporting audit readiness and compliance reporting.</P><P><STRONG>SAP GRC Access Control 12.0 and the upcoming SAP GRC 2026</STRONG></P><P>This is SAP’s flagship access governance solution and in 2026 it will be succeeded by SAP GRC 2026. It enables centralized role management, SoD conflict analysis, automated risk prevention, and end-to-end control over access request and removal workflows. With its Risk Library repository, GRC Access Control allows you to link business processes with transactions and authorization objects, including Fiori applications and OData services in newer releases. It’s an <EM>enterprise-grade solution</EM>, ideal for large organizations with complex system landscapes, multiple SAP environments, and strong audit requirements.</P><P><STRONG>GRC Hack #8: </STRONG><EM>If your organization plans to upgrade, ensure you migrate your risk repository and all custom extensions to the new version.</EM></P><P><STRONG>SAP IAG (Identity Access Governance)</STRONG></P><P>SAP IAG is the cloud evolution of GRC that delivers the same SoD analysis capabilities, enhanced with identity management and cloud integration (e.g. SuccessFactors, Ariba, Concur). It supports real-time access analysis, automatic role recommendations (auto-proposals), and browser-based Access Request Workflow handling. In hybrid S/4HANA migration projects, IAG is increasingly becoming the central platform for access risk management.</P><P><STRONG>smartGRC – a lightweight alternative and practical complement</STRONG></P><P>smartGRC was designed to meet the need for simpler and more flexible access risk management. It provides a unified place to maintain the SoD matrix, analyze conflicts, manage periodic access reviews, and integrate directly with business processes. Unlike classical GRC, smartGRC can operate as both a complement to SAP tools or a standalone audit platform, particularly valuable for mid-sized organizations and multi- SAP and non- SAP centric system environments. The tool allows easy extension of the SoD matrix with custom Fiori apps, OData services, and non-SAP business applications — extracting authorization data and storing it in a universal XML format, making it possible to audit systems outside the SAP ecosystem. It is equipped with updated segregation of duties matrix risks functions definitions for the newest S/4 Hana system release. smartGRC supports import/export of the SoD matrix (CSV/XML) for non-SAP system, enabling easy synchronization with ITSM or JIRA supporting system.</P><P><STRONG>Why these tools matter</STRONG></P><P>While SAP GRC and IAG provide enterprise-grade control, smartGRC’s advantage lies in speed, adaptability, and cross-system risk analysis making it ideal where agility matters more than standardization. Tools enable organizations to:</P><UL><LI>store the SoD matrix in a centralized, structured repository linking processes, transactions, apps, and services,</LI><LI>perform preventive SoD risk analysis during role provisioning (“what-if” simulation before access approval),</LI><LI>conduct periodic or ad-hoc SoD access reviews in production systems,</LI><LI>integrate SoD analysis with change and approval workflows,</LI><LI>generate audit-ready compliance reports.</LI></UL><P>From my project experience, the standard SAP SoD matrix for S/4 Hana is only a starting point as it usually includes around 200 Fiori apps, while best in class, process-driven Sod matrices contain up to twice as many. That’s why it’s essential to extend and update your matrix regularly with custom and standard Fiori apps, OData services, and project-specific enhancements.</P><P><STRONG>GRC Hack #9: Treat SoD matrix like a living system</STRONG></P><P>An SoD matrix that isn’t updated after every system change quickly loses its control value. Establish a cyclical review process, ideally aligned with your development and change management process cycle, to ensure that every new app, workflow, or extension is captured, analyzed and included if needed in SoD matrix</P><P><STRONG>Summary</STRONG></P><P>In the S/4HANA world, a current and well-defined SoD matrix is the foundation of security, compliance, and access management process efficiency. It’s not a static document, rather it’s a dynamic control mechanism that must evolve together with the system and the organization.</P><P>Recommendations for Authorization, GRC, and Security Teams</P><UL><LI>Refresh your SoD matrix before migrating to S/4HANA, don’t simply copy the old ECC version; many transactions are obsolete, and key functions have moved to Fiori and OData.</LI><LI>Cover all authorization layers as Fiori apps, OData services, roles, authorization objects, and master data (e.g. MPK/WBS ownership).</LI><LI>Retain classic authorization objects since objects like M_RECH_WRK still play a vital control role and must remain part of the SoD model.</LI><LI>Integrate your GRC/IAG/smartGRC tool into the access request process as automated SoD analysis at request time prevents risk before it happens.</LI><LI>Implement a recurring verification cycle: Matrix → Roles → Users → Access → Audit Report the best practice and audit requirement.</LI><LI>Document every update and every role, app, or workflow change must be reflected in the matrix. The standard SAP list is now just a small fraction of your real risk landscape in S/4HANA.</LI></UL><P>Closing Thought</P><P>Your SoD matrix can become your strongest asset in the security and authorization area migration to S/4HANA, if it’s designed well, your business processes will run smoothly, risks will remain under control, and auditors will stay calm. Properly managed authorizations stop being a source of problems, they become a protective mechanism that safeguards both data and business integrity.</P><P>Filip Nowak, Partner</P><P>GRC Advisory</P>
2025-12-30T05:39:35.532000+01:00
https://community.sap.com/t5/financial-management-blog-posts-by-sap/leveraging-sap-grc-for-sap-hana-2026-a-migration-path-to-sap-grc-for-sap-s/ba-p/14249195
Leveraging SAP GRC for SAP HANA 2026: A Migration Path to SAP GRC for SAP S/4HANA
2026-01-13T17:35:47.005000+01:00
andrei_nifatov
https://community.sap.com/t5/user/viewprofilepage/user-id/295249
<P><span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="306004_GettyImages-1441416439_medium_jpg.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/352310i28510C16925F2B31/image-size/large?v=v2&px=999" role="button" title="306004_GettyImages-1441416439_medium_jpg.jpg" alt="306004_GettyImages-1441416439_medium_jpg.jpg" /></span></P><P><BR /><BR /></P><P> </P><H3 id="toc-hId-1892030616"> </H3><H3 id="toc-hId-1695517111"> </H3><H3 id="toc-hId-1499003606"> </H3><H3 id="toc-hId-1302490101"> </H3><H3 id="toc-hId-1105976596"> </H3><P> </P><HR /><H3 id="toc-hId-909463091"> </H3><H3 id="toc-hId-712949586">Introduction</H3><H4 id="toc-hId-645518800">Background</H4><P>Following SAP’s announcement of the upcoming <STRONG>SAP GRC for SAP HANA 2026</STRONG> release, many customers are seeking clarity on how this new version differs from the existing <STRONG>SAP GRC for SAP S/4HANA</STRONG> and what actions they should take today to prepare.</P><P>SAP GRC for SAP HANA 2026 represents the next evolution of SAP’s governance, risk, and compliance portfolio, offering enhanced capabilities and long-term support. While the new release is not yet available, customers can already take important steps to simplify their current GRC landscape and position themselves for a smoother upgrade when SAP GRC for SAP HANA 2026 becomes available.</P><P>This blog outlines <STRONG>why preparing now on SAP GRC for SAP S/4HANA matters</STRONG>, what benefits customers can expect from SAP GRC for SAP HANA 2026, and how SAP consulting services can support this journey.</P><H4 id="toc-hId-449005295"> </H4><H4 id="toc-hId-252491790"><STRONG>Why SAP GRC for S/4HANA Now?</STRONG></H4><P>The move to <STRONG>SAP GRC for SAP S/4HANA is a preparatory and consolidation step</STRONG>, not something customers should delay until <A href="https://userapps.support.sap.com/sap(bD1lbiZjPTAwMQ==)/support/pam/pam.html?smpsrv=https%3A%2F%2Fwebsmp101.sap-ag.de#ts=0&s=sap%20access%20control&o=most_viewed%7Cdesc&st=l&rpp=20&page=1&pvnr=73554900100900008693&pt=g%7Cd" target="_self" rel="noopener noreferrer">SAP GRC for SAP HANA 2026</A> is released.</P><P>Today, many customers run SAP GRC components, UI Data Protection, and Assurance & Compliance solutions across multiple systems or instances, sometimes even outside of SAP S/4HANA. Consolidating these capabilities into a <STRONG>single SAP GRC for SAP S/4HANA instance</STRONG> enables customers to:</P><UL><LI>Simplify their GRC architecture and reduce operational and technical complexity</LI><LI>Be technically ready for a future upgrade to SAP GRC for SAP HANA 2026</LI></UL><P>Importantly, this consolidation effort often requires <STRONG>significant planning and execution time,</STRONG> which is why starting early is critical.</P><H4 id="toc-hId-1628086325" id="toc-hId--441738810">Objectives</H4><P>The primary goals of this paper are to:</P><UL><LI>Highlight the <STRONG>advantages of migrating to SAP GRC for S/4HANA</STRONG>.</LI><LI>Explain how the S<STRONG>AP GRC for S/4HANA version integrates multiple solutions</STRONG>.</LI><LI>Introduce <STRONG>SAP consulting services</STRONG> as a comprehensive solution for a seamless migration.</LI></UL><H4 id="toc-hId-1431572820" id="toc-hId--638252315">Scope</H4><P><SPAN>This blog highlights the benefits of migrating to SAP GRC for S/4HANA, especially for customers using:</SPAN></P><UL><LI><SPAN>SAP Access Control </SPAN></LI><LI><SPAN>SAP Process Control </SPAN></LI><LI><SPAN>SAP Risk Management </SPAN></LI><LI><SPAN>SAP Assurance and Compliance applications (Audit Management, Business Integrity Screening, Business Partner Screening, Tax Compliance) </SPAN></LI><LI><SPAN>UI Data Protection Masking and UI Data Protection Logging </SPAN></LI></UL><P><SPAN>Moving these solutions into a <STRONG>single SAP GRC for SAP S/4HANA</STRONG> instance creates a clean and stable foundation for future innovation and upgrades.</SPAN></P><HR /><H3 id="toc-hId-1105976596" id="toc-hId--541362813">Benefits of SAP GRC for SAP HANA 2026</H3><H4 id="toc-hId-1038545810" id="toc-hId--1031279325">Enhanced Compliance and Efficiency</H4><P>The SAP GRC for SAP HANA 2026 version introduces upcoming innovations designed to enhance compliance and streamline processes in which some key benefits include:</P><UL><LI><STRONG>AI Integration:</STRONG><SPAN> </SPAN>Use of AI for advanced risk detection and reporting.</LI><LI><STRONG>Enhanced User Interface (UI):</STRONG><SPAN> </SPAN>Improved user experience with a more intuitive interface.</LI><LI><STRONG>Improved Reporting:</STRONG><SPAN> </SPAN>Enhanced reporting capabilities for better visualization, disclosure and compliance management.</LI></UL><H4 id="toc-hId-842032305" id="toc-hId--1227792830">Integrated Solutions</H4><P>One of the standout features of the SAP GRC for SAP HANA 2026 version is its ability to combine multiple solutions into a unified platform. This includes:</P><UL><LI><STRONG>GRC Core Solutions:</STRONG><SPAN> </SPAN>Access Control, Process Control, and Risk Management.</LI><LI><STRONG>Assurance and Compliance Solutions:</STRONG><SPAN> </SPAN>Audit Management, Business Integrity Screening, and Tax Compliance.</LI><LI><STRONG>UI Data Protection: </STRONG>Masking, and Logging.</LI></UL><P>By integrating these solutions, organizations can benefit from:</P><UL><LI><STRONG>Centralized Data Management:</STRONG><SPAN> </SPAN>A unified platform for comprehensive data management and reporting.</LI><LI><STRONG>Seamless Workflows:</STRONG><SPAN> </SPAN>Improved coordination between different GRC functions.</LI><LI><STRONG>Reduced Complexity:</STRONG><SPAN> </SPAN>Simplified deployment and maintenance of GRC solutions.</LI></UL><HR /><H3 id="toc-hId-516436081" id="toc-hId--1130903328">Migration Strategy</H3><H4 id="toc-hId-449005295" id="toc-hId--1620819840">Consulting Services</H4><P>To ensure a seamless migration, SAP offers comprehensive consulting services. Our expert team can guide you through every step of the process, providing tailored solutions to meet your specific needs. Prepare today and migrate confidently later.</P><P>Key services include:</P><UL><LI><STRONG>Assessment and Planning:</STRONG><SPAN> </SPAN>Evaluate your current deployment and develop a detailed migration plan.</LI><LI><STRONG>Migration execution:</STRONG><SPAN> </SPAN>Our consulting team has both tools and expertise to perform wide range of migration tasks, from simplest to the most complex.</LI><LI><STRONG>Technical Support:</STRONG><SPAN> </SPAN>Provide hands-on technical assistance during the migration.</LI><LI><STRONG>Post-Migration Support:</STRONG><SPAN> </SPAN>Ensure a smooth transition and address any post-migration issues.</LI></UL><H4 id="toc-hId-252491790" id="toc-hId--1817333345">Customized Solutions</H4><P>SAP's consulting services can be tailored to your organization's unique requirements, ensuring that the migration aligns with your business objectives and technical environment. Our experts will work closely with you to:</P><UL><LI><STRONG>Optimize Workflows:</STRONG><SPAN> </SPAN>Streamline GRC processes to improve efficiency.</LI><LI><STRONG>Enhance Compliance:</STRONG><SPAN> </SPAN>Ensure that your organization meets all regulatory requirements.</LI><LI><STRONG>Maximize ROI:</STRONG><SPAN> </SPAN>Leverage the full potential of the SAP GRC for SAP HANA 2026 version to drive business value.</LI></UL><HR /><H3 id="toc-hId--148335803" id="toc-hId--1720443843">Conclusion</H3><H4 id="toc-hId--638252315" id="toc-hId-2084606941">Summary</H4><P>Preparing for <STRONG>SAP GRC for SAP HANA 2026 starts today</STRONG>. By consolidating on SAP GRC for SAP S/4HANA, customers can simplify their GRC landscape, reduce complexity, and significantly lower the risk and effort of a future upgrade. SAP consulting services provide the guidance and expertise needed to make this transition efficient and well-controlled.</P><H4 id="toc-hId--834765820" id="toc-hId-2056277127">Implications</H4><P>Successful migration to the SAP GRC for SAP HANA 2026 version will enhance your organization's compliance efforts, improve system performance, and ensure long-term support and regulatory compliance. Engaging with SAP's consulting services will make this process efficient and reliable.</P><P><STRONG>Details and Benefits of SAP GRC for SAP HANA 2026 </STRONG></P><UL><LI><STRONG>AI Integration</STRONG><SPAN> </SPAN>improves risk detection and reporting.</LI><LI><STRONG>Enhanced UI</STRONG><SPAN> </SPAN>offers a more intuitive user experience.</LI><LI><STRONG>Improved Reporting</STRONG><SPAN> </SPAN>bolsters visualization and compliance management.</LI><LI><STRONG>Integrated Solutions</STRONG><SPAN> </SPAN>unify GRC Core and Assurance functions, promoting centralized data management, seamless workflows, and reduced complexity.</LI></UL><P>Additionally, for a deeper dive into the product management session and a preview of the SAP GRC for SAP HANA 2026 solution, follow<SPAN> </SPAN><A href="https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&eventid=5065814&sessionid=1&key=6BBD3CA6504EE1632FC19DEE352E213A&groupId=6332333&sourcepage=register" target="_self" rel="nofollow noopener noreferrer">this link</A>.</P><HR /><H3 id="toc-hId--2141800667">Contact Us</H3><P>To learn more about the migration to SAP GRC <SPAN>for S/4HANA</SPAN> and engage with our consulting services, please contact us at:</P><UL><LI><STRONG>Email:</STRONG><SPAN> <A class="" title="mailto:sap_dmlt_gce@sap.com" href="mailto:sap_dmlt_gce@sap.com" target="_blank" rel="noreferrer noopener nofollow">sap_dmlt_gce@sap.com</A></SPAN></LI></UL><P><EM>Stay tuned for announcements about upcoming SAP and partner webinars!</EM></P>
2026-01-13T17:35:47.005000+01:00
https://community.sap.com/t5/financial-management-blog-posts-by-sap/grc-tuesdays-what-risks-to-look-out-for-in-2026/ba-p/14281766
GRC Tuesdays: What Risks to Look Out for in 2026
2026-01-20T07:10:00.025000+01:00
T_Frenehard
https://community.sap.com/t5/user/viewprofilepage/user-id/215222
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_0-1764665194996.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347370i0938728ADF9F8500/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_0-1764665194996.png" alt="T_Frenehard_0-1764665194996.png" /></span></P><P><SPAN>In previous years, I used to release a blog ranking the top risks for the year to come – as per analysts, experts and business leaders insights, but this has proven quite impossible this year.</SPAN></P><P><SPAN>There are mainly 2 reasons for this: </SPAN></P><OL><LI><SPAN>The great discrepancies in views in what the main business threats are – depending on the industry and region. When there was previously somewhat of a consensus on top risks, for 2026 onwards, the risk landscape seems be quite “fractured” with diverging opinions</SPAN></LI><LI><SPAN>The risks are more and more interconnected. An impact on one category directly increases the likelihood of adverse events in another category from occurring</SPAN></LI></OL><P><SPAN>As a result, instead of playing Nostradamus, I decided to try and summarize this complexity without objectively granting more weight to one area over another.</SPAN></P><P><SPAN> </SPAN></P><H2 id="toc-hId-1766409327"><STRONG><SPAN>10 business threats to look out for – in no particular order</SPAN></STRONG></H2><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="66"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_1-1764665194997.png" style="width: 40px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347369i22ACB045849F97D0/image-dimensions/40x40?v=v2" width="40" height="40" role="button" title="T_Frenehard_1-1764665194997.png" alt="T_Frenehard_1-1764665194997.png" /></span></TD><TD width="535"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Geopolitics</SPAN></STRONG></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P><SPAN>With the rise of nationalism and protectionism, the multilateral globalization that fostered international commerce for decades has ceased to exist. Not that global trade won’t continue of course, but the rules are being rewritten due to weakened governing institutions. Whereas trade agreements were previously the result of year long negotiations, this is no longer the case. And it questions their longevity. Will these quickly negotiated treaties continue to apply should administrations change or the legislator rule against their implementation?</SPAN></P><P><SPAN>This risk category and associated events directly impact <FONT color="#3366FF"><STRONG>Supply Chain</STRONG></FONT> and <FONT color="#3366FF"><STRONG>Economic Conditions</STRONG></FONT>, but also <FONT color="#3366FF"><STRONG>Security</STRONG></FONT> since (re-)militarization and conflicts are direct consequences of shifts in the geopolitical technical plaques.</SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="538"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Human Resources and Talent Management</SPAN></STRONG></P></TD><TD width="63"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_2-1764665194997.png" style="width: 40px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347368iABD6DB11719E9DDE/image-dimensions/40x40?v=v2" width="40" height="40" role="button" title="T_Frenehard_2-1764665194997.png" alt="T_Frenehard_2-1764665194997.png" /></span></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P><SPAN>Despite globalization of the labour market, talent shortage in in-demand sectors and functions is obvious. This is further heightened by inadequate skills in these areas.</SPAN></P><P><SPAN>Combined with economic uncertainty and reduction in workforce for some industries, a direct consequence is a much more competitive market for both employees – who must fight for limited number of roles, and for employers – where some roles are not filled due to lack of qualified applicants.</SPAN></P><P><SPAN>A perfect example here is <FONT color="#3366FF"><STRONG>Security</STRONG></FONT> – and especially cybersecurity, where it is estimated that 87% of organizations are experiencing a shortfall of security talent with 3,5 million unfilled jobs worldwide.</SPAN></P><P><SPAN>Going back to <FONT color="#3366FF"><STRONG>Geopolitics</STRONG>,</FONT> new restrictions in visa allocations decided by governments further increases the velocity of this risk as it impedes the movement of workers to countries with higher demand.</SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="66"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_3-1764665194997.png" style="width: 40px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347371i83588866E6F2DAC3/image-dimensions/40x40?v=v2" width="40" height="40" role="button" title="T_Frenehard_3-1764665194997.png" alt="T_Frenehard_3-1764665194997.png" /></span></TD><TD width="535"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Artificial Intelligence</SPAN></STRONG></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P><SPAN>One of the most recent and yet pervasive top risk category is Artificial Intelligence. The more AI develops, the more it offers business opportunities but also the more it opens the door to new risk types. Ranging from legal threats with IP infringement for instance where an AI model can make use of data without licensing or authorization, to economic with <FONT color="#3366FF"><STRONG>Digital Disruption</STRONG></FONT> completely reinventing a market and even rendering obsolete <FONT color="#3366FF"><STRONG>Business Models</STRONG></FONT>, it has since quickly increased for <FONT color="#3366FF"><STRONG>Security</STRONG></FONT> risk levels as well with autonomous AI-driven cyber-attacks in the digital world or even self-directed drones in the physical world. In this regard, the Science and Security Board of the Bulletin of the Atomic Scientists who contribute to setting the time on the Doomsday Clock summarize it better than I would: “<EM>The potential for this particular technology [AI] to constitute an existential threat on its own is highly speculative, but as succeeding generations of such models are released, the potential dangers, existential or otherwise, will increase.</EM>”</SPAN></P><P><SPAN>A key challenge to come will be providing trust and confidence in AI systems. This could come with the implementation of <FONT color="#3366FF"><STRONG>Compliance and Regulations</STRONG></FONT> frameworks such as AI governance structures that maintain human oversight while supporting the achievement of AI’s automation promises. Recent AI legislative acts around the global are already targeting this, and their effectiveness will be crucial in achieving this balance.</SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="538"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Digital Disruption</SPAN></STRONG></P></TD><TD width="63"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_4-1764665194998.png" style="width: 40px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347372i5A060B7048B79E7B/image-dimensions/40x41?v=v2" width="40" height="41" role="button" title="T_Frenehard_4-1764665194998.png" alt="T_Frenehard_4-1764665194998.png" /></span></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P><SPAN>Fostered by AI but not only, Digital Disruption has clearly started with the emergence of new technologies and continues to be a top risk. In addition to bringing new technological landscapes that have their own challenges, organizations also face digital disruption due to changing consumer behaviour in the era of e-commerce and digital-first customer journeys.</SPAN></P><P><SPAN>This is not only redesigning organizations’ marketing approaches, but it’s also impacting sales, delivery, customer support… and much more! And in some extreme cases, completely redefining <STRONG><FONT color="#3366FF">Business Models</FONT></STRONG>.</SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="66"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_5-1764665194998.png" style="width: 40px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347373iF0101763DB72D8F9/image-dimensions/40x40?v=v2" width="40" height="40" role="button" title="T_Frenehard_5-1764665194998.png" alt="T_Frenehard_5-1764665194998.png" /></span></TD><TD width="535"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Security – Cyber and Physical</SPAN></STRONG></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P><SPAN>As already highlighted in the <FONT color="#3366FF"><STRONG>Geopolitics</STRONG></FONT> and <FONT color="#3366FF"><STRONG>Artificial Intelligence</STRONG></FONT> categories, there is no doubt that Security is a major concern for organizations. Physical security with conflict zones extending in geographical scope but also now entering the cyberspace and creating a new age of hybrid attacks where crippled infrastructure poses a vital threat.</SPAN></P><P><SPAN>It is therefore not surprising that the Global Peace Index has worsened and that the Doomsday Clock is inching towards midnight, with only 89 seconds to spare.</SPAN></P><P><SPAN>But increased security threats are also the result of in-house deficiencies. For instance, Cybersecurity experts highlight that the increase in unmonitored vulnerabilities leaving companies exposed can be attributed to unsanctioned AI usage.</SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="538"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Economic Conditions</SPAN></STRONG></P></TD><TD width="63"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_6-1764665194998.png" style="width: 40px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347374i5BC9AFB1BA68B34C/image-dimensions/40x40?v=v2" width="40" height="40" role="button" title="T_Frenehard_6-1764665194998.png" alt="T_Frenehard_6-1764665194998.png" /></span></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P><SPAN>Previous year’s trend on rising costs – especially energy and natural resources, seem to have stabilized but are still very fragile and a persistent concern for organizations. If the global consumer price index (CPI) shows a slight inflationary decrease in 2024 versus 2023, it remains above pre</SPAN>‑<SPAN>pandemic norms. </SPAN></P><P><SPAN>On the downside, continued tariff driven trade tensions will likely add pressure in 2026 and render pricing and sourcing strategies much more volatile due to an unpredictable economic environment and <FONT color="#3366FF"><STRONG>Geopolitical</STRONG></FONT> decisions. </SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="66"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_7-1764665194998.png" style="width: 40px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347375iC3E714A79F913939/image-dimensions/40x40?v=v2" width="40" height="40" role="button" title="T_Frenehard_7-1764665194998.png" alt="T_Frenehard_7-1764665194998.png" /></span></TD><TD width="535"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Business Model</SPAN></STRONG></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P><SPAN>“Business resilience” and “Shift in consumer behaviour” are the most cited keywords in reports and interviews when it comes to root causes of evolving business models. </SPAN></P><P><SPAN>Consumer behaviour is not just about the way customers purchase a product or a service, it is also their spending pattern of course. With pointers indicating significant slowdown in recent months, mostly due to <FONT color="#3366FF"><STRONG>Economic Conditions</STRONG></FONT> and proactive cost reduction. </SPAN></P><P><SPAN>For organizations that have focused on leveraging technology to fuel a new business model or overall preparedness, analyst feedback points out that the return on investment from <FONT color="#3366FF"><STRONG>Artificial Intelligence</STRONG></FONT> and <FONT color="#3366FF"><STRONG>Digital</STRONG></FONT> initiatives has been limited, often hindered by siloed data, misalignment with business needs or misguided decisions based on flawed AI outputs. </SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="538"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Compliance and Regulations</SPAN></STRONG></P></TD><TD width="63"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_8-1764665194999.png" style="width: 40px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347376i691F504F459DFD24/image-dimensions/40x41?v=v2" width="40" height="41" role="button" title="T_Frenehard_8-1764665194999.png" alt="T_Frenehard_8-1764665194999.png" /></span></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P><SPAN>I have already addressed the impetus of <FONT color="#3366FF"><STRONG>Artificial Intelligence</STRONG></FONT> governance earlier and will address <FONT color="#3366FF"><STRONG>Sustainability</STRONG></FONT> reporting just below and it is undeniable that these 2 drivers will continue to spearhead new compliance requirements across the globe.</SPAN></P><P><SPAN>In addition, the mandate for companies to demonstrate continuous oversight of their IT systems and their incident response will remain very high, as requested by requirements such as the Digital Operational Resilience Act (DORA) and others.</SPAN></P><P><SPAN>As a matter of fact, associated data sovereignty directives will be increasingly strict and complex, driven by these new regulatory frameworks and heightened concerns about cross-border data flows, and cyber resilience. As a matter of fact, in this area alone, global regulations are escalating in response to growing <FONT color="#3366FF"><STRONG>Geopolitical</STRONG></FONT> tensions with over 135 countries having already implemented some form of data protection and sovereignty legislation.</SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="66"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_9-1764665194999.png" style="width: 39px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347378i5B8D992CAC857EA2/image-dimensions/39x40?v=v2" width="39" height="40" role="button" title="T_Frenehard_9-1764665194999.png" alt="T_Frenehard_9-1764665194999.png" /></span></TD><TD width="535"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Sustainability</SPAN></STRONG></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P><SPAN>If Sustainability initiatives have slowed down with many companies having reassessed or delayed investments and program deliveries, it can be traced back to more limited regulatory enforcement of legislation than planned, reduced global cooperation on climate change… and of course overall market uncertainty due to <FONT color="#3366FF"><STRONG>Economic Conditions</STRONG></FONT>.</SPAN></P><P><SPAN>That being said, there is an overwhelming consensus across all reports and interviews that sustainability and climate concerns continues to be a top risk. For companies and for the world. If escalating extreme weather conditions is driving higher insurance costs and operational disruptions, policy uncertainty around the low</SPAN>‑<SPAN>carbon transition and additional sustainability reporting rules in leading economic blocks are a reality.</SPAN></P><P><SPAN>It is no longer the case that companies use the green agenda as a reputation boost, but they truly must deliver on measurable sustainability performance gains and demonstrate exemplarity.</SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="538"><P class="lia-align-center" style="text-align: center;"><STRONG><SPAN>Supply Chain</SPAN></STRONG></P></TD><TD width="63"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_10-1764665194999.png" style="width: 40px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347377iFDCD0A6DF5198F4A/image-dimensions/40x41?v=v2" width="40" height="41" role="button" title="T_Frenehard_10-1764665194999.png" alt="T_Frenehard_10-1764665194999.png" /></span></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><P><SPAN>Last but certainly not least in this list of top risks is Supply Chain. To me, it represents the most interconnected category. Any adverse event in another section will increase the likelihood of its own risks manifesting.</SPAN></P><P><SPAN>For instance: </SPAN></P><UL><LI><FONT color="#3366FF"><STRONG>Geopolitics</STRONG></FONT><SPAN><FONT color="#3366FF">:</FONT> an increase in trade wars can lead to new sanctions, exports and/or imports hence, de facto, impacting supply and delivery capabilities.</SPAN></LI><LI><FONT color="#3366FF"><STRONG>Security</STRONG></FONT><SPAN><FONT color="#3366FF">:</FONT> attacks – whether physical or cyber on suppliers, on operational sites, or IT systems can result in system shutdowns, once again preventing the company from procuring the necessary materials for producing and distributing its good and services.</SPAN></LI><LI><FONT color="#3366FF"><STRONG>Economic Conditions</STRONG></FONT><SPAN>: with fluctuating prices and rapidly evolving consumer demands, forecasting and demand planning is becoming increasingly complex.</SPAN></LI><LI><FONT color="#3366FF"><STRONG>Compliance and Regulation</STRONG></FONT><SPAN>: requirements such as the Corporate Sustainability Reporting Directive, the Digital Operational Resilience Act or even the EU AI Act extend transparency and accountability to the company’s third-party providers.</SPAN></LI><LI><FONT color="#3366FF"><STRONG>Sustainability</STRONG></FONT><SPAN><FONT color="#3366FF">:</FONT> extreme weather events such a floods, droughts or hurricanes are causing more frequent and severe operational disruptions, damaging infrastructure, leading to port closures, and blocking key trade routes.</SPAN></LI></UL><P><SPAN> </SPAN></P><H2 id="toc-hId-1569895822"><STRONG><SPAN>What else?</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>This is the question that most business leaders I interviewed answered once they had provided their views: what else did I miss?</SPAN></P><P><SPAN>Despite being somewhat on the horizon for the following year, at the end of 2024, tariffs were not ranked as the major concern for many organizations. That was until the US administration enforced new rules, and this completely flipped the risk landscape upside down in just a few days. From then on, at least 50% of my “risk conversations” revolved around this topic. At least for the first half of 2025. </SPAN></P><P><SPAN>So, I turn the question to you: is there another similar emerging risk that I haven’t captured in this summary that you think should feature? If so, feel free to add your suggestions in the comments section of this blog!</SPAN></P><P><SPAN>If you are interested in comparing this picture to previous years’ reports, then I have listed them below for your convenience:</SPAN></P><UL><LI><SPAN><A href="https://community.sap.com/t5/financial-management-blog-posts-by-sap/grc-tuesdays-what-risks-to-look-out-for-in-2025/ba-p/13972228" target="_blank">GRC Tuesdays: What Risks to Look Out for in 2025</A></SPAN></LI><LI><SPAN><A href="https://community.sap.com/t5/financial-management-blogs-by-sap/grc-tuesdays-what-risks-to-look-out-for-in-2024/ba-p/13574696" target="_blank">GRC Tuesdays: What Risks to Look Out for in 2024</A></SPAN></LI><LI><SPAN><A href="https://blogs.sap.com/2023/01/17/grc-tuesdays-what-risks-to-look-out-for-in-2023/" target="_blank" rel="noopener noreferrer">GRC Tuesdays: What Risks to Look Out for in 2023</A></SPAN></LI></UL><P><SPAN>And if you are interested in learning more about SAP solutions for Governance, Risk, and Compliance, feel free to fill-in the <A href="https://www.sap.com/registration/request-demo.html?product=237150e2-6555-4a16-b49e-e93dbf1891da&productName=Governance%2C+Risk%2C+Compliance+%28GRC%29%2C+and+Cybersecurity&pageTitle=Cybersecurity+and+Governance%2C+Risk%2C+and+Compliance+Software&countryOfOrigin=en_au&refererPagePath=https%3A%2F%2Fwww.sap.com%2Faustralia%2Fproducts%2Ffinancial-management%2Fgrc.html&refererContentPath=%2Fcontent%2Fsapdx%2Flanguages%2Fen_gb%2Fproducts%2Ffinancial-management%2Fgrc&navTitle=Request+a+Demo" target="_blank" rel="noopener noreferrer">demo request form</A>!</SPAN></P>
2026-01-20T07:10:00.025000+01:00
https://community.sap.com/t5/technology-blog-posts-by-members/what-s-next-for-sap-process-control-12-0-and-sap-risk-management-12-0/ba-p/14309096
What’s Next for SAP Process Control 12.0 and SAP Risk Management 12.0 ?
2026-01-21T06:36:57.454000+01:00
santhosha_dasari
https://community.sap.com/t5/user/viewprofilepage/user-id/750626
<P><STRONG><EM>What’s Next for SAP Process Control 12.0 and SAP Risk Management 12.0 ? </EM></STRONG><SPAN>This is one of the common questions to most of the Organizations, Leaders, IT Directors, Managers, SMEs, Consultants and Vendors who are currently using SAP Process Control 12.0 and SAP Risk Management 12.0.</SPAN></P><P>Before exploring the next options for SAP Process Control 12.0 and SAP Risk Management 12.0, I recommend referring to the blog below:</P><P><SPAN><A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/what-s-next-for-sap-access-control-12-0/ba-p/14171491" target="_blank">What’s Next for SAP Access Control 12.0?</A></SPAN></P><P><SPAN>After reading the above blog, you should now have a clear understanding of the future options for SAP Access Control 12.0.</SPAN></P><P><!-- StartFragment --></P><P><STRONG>Option : Upgrade to SAP GRC for HANA 2026 </STRONG>is also applicable to SAP Process Control 12.0 and SAP Risk Management 12.0.</P><P><!-- EndFragment --></P><P><!-- StartFragment --></P><P>Just as SAP Access Control has the option to “Migrate to SAP Cloud IAG,” SAP Process Control and SAP Risk Management have the option to <STRONG>“Migrate to SAP Risk and Assurance Management (RAM).</STRONG></P><P><!-- StartFragment --></P><P>SAP has introduced a new cloud solution — <STRONG>SAP Risk and Assurance Management (RAM)</STRONG> — which is SAP’s next‑generation, cloud‑native platform designed to modernize and unify enterprise risk, controls, and assurance activities, built on <STRONG>SAP Business Technology Platform (BTP).</STRONG> It is ideal for customers seeking a <STRONG>cloud‑first governance, controls, and assurance solution</STRONG> with continuous innovation.</P><P><!-- EndFragment --></P><P><!-- StartFragment --></P><P>In simple terms, <STRONG>SAP Risk and Assurance Management (RAM) </STRONG><STRONG>combines both Process Control (PC) and Risk Management (RM) </STRONG>capabilities and can be considered the <STRONG>“cloud version of PC and RM together.”</STRONG></P><P><STRONG>SAP Risk and Assurance Management (RAM) — includes the following key steps:</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="santhosha_dasari_1-1768690093362.png" style="width: 762px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/362152iAC0B2EE393DCB540/image-dimensions/762x597/is-moderation-mode/true?v=v2" width="762" height="597" role="button" title="santhosha_dasari_1-1768690093362.png" alt="santhosha_dasari_1-1768690093362.png" /></span></P><P> </P><P> </P><P> </P><P> </P><P> </P><P> </P><P> </P><P> </P><P> </P><P> </P><P> </P><P> </P><P> </P><P> </P><P><EM><STRONG>SAP Risk and Assurance Management (RAM) offers below Process Control & Risk Management equivalent capabilities:</STRONG></EM></P><UL><LI><SPAN>Risk Management</SPAN></LI><LI><SPAN>Control Management</SPAN></LI><LI>Control Execution</LI><LI>Result Processing</LI><LI>Issue & Remediation Management</LI><LI>Reporting</LI></UL><P><STRONG>SAP Risk and Assurance Management (RAM) </STRONG>can seamlessly integrate with below systems</P><UL><LI><SPAN>SAP S/4HANA Cloud</SPAN></LI><LI><SPAN>SAP S/4HANA On‑Premise</SPAN></LI><LI><SPAN>SAP Signavio Integration</SPAN></LI><LI><SPAN>SAP Analytics Cloud Integration</SPAN></LI><LI><SPAN>SAP Document and Reporting Compliance</SPAN></LI></UL><P><SPAN><EM>Will be creating a new blog on “<STRONG>SAP Risk and Assurance Management (RAM)</STRONG></EM> with different options, Pros and Cons, possible options<EM>”, stay tuned for this.</EM></SPAN></P><P> </P><P><!-- EndFragment --></P><TABLE width="613px"><TBODY><TR><TD width="40px">#</TD><TD width="186.672px"><P><STRONG>Scenario</STRONG></P></TD><TD width="132.969px"><P><STRONG>Recommended Solution</STRONG></P></TD><TD width="252.359px"><P><STRONG>Why It Works </STRONG></P></TD></TR><TR><TD width="40px"><P>1</P></TD><TD width="186.672px"><P>Long-term on-prem/private-cloud GRC modernization</P></TD><TD width="132.969px"><P>SAP GRC for HANA 2026</P></TD><TD width="252.359px"><P>Unified, AI-powered platform; support to 2040</P></TD></TR><TR><TD width="40px"><P>2</P></TD><TD width="186.672px"><P>Cloud-first strategy (SAP RISE, SAP S/4HANA Cloud etc.)</P></TD><TD width="132.969px"><P>SAP Risk and Assurance Management (RAM)</P></TD><TD width="252.359px"><P>End-to-end cloud based compliance management and Risk Management</P></TD></TR></TBODY></TABLE><H2 id="toc-hId-1787882004">Summary</H2><UL><LI><STRONG>Option 1: Upgrade to SAP GRC for HANA 2026</STRONG><BR />Ideal for on-premise or private-cloud customers using multiple GRC modules. Also with complex landscape, heavy customization and workflows. Provides a unified, AI-powered platform on SAP HANA with support extended to 2040.</LI><LI><STRONG>Option 2: Migrate to SAP Risk and Assurance Management (RAM)</STRONG><BR />Suits cloud-first organizations on RISE, <SPAN>SAP S/4HANA Private and Public Cloud</SPAN> or other BTP scenarios. <SPAN> Cloud-based solution built on the SAP Business Technology Platform (SAP BTP) to manage risk and compliance efficiently while benefiting from real-time performance, automatic updates, and high system availability.</SPAN></LI><LI><STRONG>Option 3: Stay on SAP Process Control 12.0 and SAP Risk Management 12.0 (Short-Term)</STRONG><BR />Gives organizations extra time for budgeting, complex landscape planning, and team training. Later can choose either Option 1 or Option 2.</LI></UL><H2 id="toc-hId-1591368499">Conclusion</H2><P><SPAN>Choosing the right path from <STRONG>SAP Process Control 12.0 and SAP Risk Management 12.0</STRONG> depends on your organization’s strategy, timeline, and risk profile. </SPAN><SPAN>If you’re committed to on‑premise GRC and need long‑term stability, upgrading to <STRONG>SAP GRC for HANA </STRONG>keeps you covered through 2040. </SPAN><SPAN>For those accelerating cloud adoption, migrating to <STRONG>SAP Risk and Assurance Management (RAM)</STRONG> delivers a scalable, unified governance and assurance experience. </SPAN><SPAN>And if you need breathing room to prepare, extending Process Control 12.0 and Risk Management 12.0 in the <STRONG>short term offers</STRONG> continuity without sacrificing compliance.</SPAN></P><P><SPAN>Whichever route you take, start by mapping your current landscape, aligning stakeholders on priorities, and building a clear project roadmap. Weigh the long‑term benefits against immediate constraints to make an informed decision that drives both compliance and innovation.</SPAN></P><P>What option works best for your organization? Tell us your GRC challenge in the comments.</P><P>Like this post if it helped and subscribe for more SAP GRC blogs, news, tips!</P><P> <a href="https://community.sap.com/t5/c-khhcw49343/SAP+Process+Control/pd-p/01200314690800000209" class="lia-product-mention" data-product="769-1">SAP Process Control</a> <a href="https://community.sap.com/t5/c-khhcw49343/SAP+Risk+Management/pd-p/01200314690800000217" class="lia-product-mention" data-product="796-1">SAP Risk Management</a> <a href="https://community.sap.com/t5/c-khhcw49343/SAP+Risk+and+Assurance+Management/pd-p/73554900100700003332" class="lia-product-mention" data-product="1242-1">SAP Risk and Assurance Management</a> </P>
2026-01-21T06:36:57.454000+01:00
https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177
SAP GRC for HANA 1.0 (SAP GRC 2026): Useful Guide of Next‑Gen GRC
2026-01-22T08:26:21.888000+01:00
santhosha_dasari
https://community.sap.com/t5/user/viewprofilepage/user-id/750626
<P><STRONG>Table of Contents</STRONG></P><P><ul =""><li style="list-style-type:disc; margin-left:0px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId-1462971873">1. Introduction:</a></li><li style="list-style-type:disc; margin-left:0px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId-1266458368">2. Modules of SAP GRC for HANA 1.0 (SAP GRC 2026)</a></li><li style="list-style-type:disc; margin-left:0px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId-1069944863">3. SAP Roadmap and plan for SAP GRC solutions</a></li><li style="list-style-type:disc; margin-left:0px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId-873431358">4. Release Dates for SAP GRC for HANA 1.0 (SAP GRC 2026)</a></li><li style="list-style-type:disc; margin-left:15px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId-806000572">4.1. Early Adopter Customers</a></li><li style="list-style-type:disc; margin-left:15px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId-609487067">4.2. Regular Customers</a></li><li style="list-style-type:disc; margin-left:0px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId-283890843">5. How to Migrate to SAP GRC for HANA 1.0 (SAP GRC 2026) from SAP GRC v1200?</a></li><li style="list-style-type:disc; margin-left:0px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId-87377338">6. Few New features of SAP GRC for HANA 1.0 (SAP GRC 2026)</a></li><li style="list-style-type:disc; margin-left:15px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId-19946552">6.1. SAP Access Control</a></li><li style="list-style-type:disc; margin-left:15px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId-170687404">6.2. SAP Process Control</a></li><li style="list-style-type:disc; margin-left:15px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId--25826101">6.3. SAP Risk Management</a></li><li style="list-style-type:disc; margin-left:15px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId--222339606">6.4. SAP Audit Management</a></li><li style="list-style-type:disc; margin-left:15px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId--418853111">6.5. SAP Business Integrity Screening</a></li><li style="list-style-type:disc; margin-left:15px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId--615366616">6.6. SAP Tax Compliance</a></li><li style="list-style-type:disc; margin-left:15px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId--811880121">6.7. SAP UIDP Masking</a></li><li style="list-style-type:disc; margin-left:15px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId--1008393626">6.8. SAP UIDP Logging</a></li><li style="list-style-type:disc; margin-left:0px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId--911504124">7. Key characteristics</a></li><li style="list-style-type:disc; margin-left:0px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId--1108017629">8. Licensing model</a></li><li style="list-style-type:disc; margin-left:0px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId--1304531134">9. Benefits</a></li><li style="list-style-type:disc; margin-left:0px; margin-bottom:1px;"><a href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-grc-for-hana-1-0-sap-grc-2026-useful-guide-of-next-gen-grc/ba-p/14311177#toc-hId--1332860948">10.Conclusion</a></li></ul></P><H1 id="toc-hId-1659485378"> </H1><H1 id="toc-hId-1462971873">1. <SPAN>Introduction:</SPAN></H1><P>SAP is entering a major transformation phase in Governance, Risk, and Compliance (GRC). With the introduction of SAP GRC for HANA 1.0 (SAP GRC 2026), SAP is consolidating and modernizing its entire GRC portfolio to support S/4HANA, cloud adoption, real‑time analytics, and continuous compliance.</P><P>SAP GRC for HANA 1.0 has quickly become one of the most discussed topics among organizations, leaders, IT directors, managers, SMEs, consultants, and vendors working in SAP Security and GRC. This 2026 release is designed for both on‑premise and private cloud deployments. It is ideal for organizations that want to remain on‑premise or private cloud while maintaining long‑term GRC capabilities, especially those using or planning to use modules such as SAP Process Control or SAP Risk Management.</P><P>SAP GRC for HANA 1.0 is SAP’s next‑generation unified GRC platform, built natively on SAP HANA.</P><P> </P><H1 id="toc-hId-1266458368">2. <SPAN>Modules of SAP GRC for HANA 1.0 (SAP GRC 2026)</SPAN></H1><P><SPAN>Within SAP’s GRC portfolio, there are multiple solutions that cover both on‑premise and cloud‑based offerings.</SPAN></P><P><SPAN> </SPAN><SPAN>To learn more about the on‑premise SAP GRC solutions, you may refer to the blog </SPAN><SPAN><A href="https://community.sap.com/t5/technology-blog-posts-by-members/kickstart-your-sap-grc-learning-journey-introduction-to-sap-grc-submodules/ba-p/13997059" target="_blank">Kickstart your SAP GRC Learning Journey: Introduction to SAP GRC, Submodules and useful links</A></SPAN></P><P><SPAN> </SPAN><SPAN>To learn more about the cloud SAP GRC solutions, you may refer to the blog </SPAN><SPAN><A href="https://community.sap.com/t5/technology-blog-posts-by-members/kickstart-your-cloud-sap-grc-learning-journey-introduction-to-cloud-sap-grc/ba-p/14115962" target="_blank">Kickstart your Cloud SAP GRC Learning Journey: Introduction to Cloud SAP GRC, its Submodules details</A></SPAN></P><P><SPAN> </SPAN>SAP GRC for HANA 1.0 is delivered as a single unified software component that includes all 8 of the following modules:</P><UL><LI><SPAN>SAP Access Control</SPAN></LI><LI><SPAN>SAP Process Control</SPAN></LI><LI><SPAN>SAP Risk Management</SPAN></LI><LI><SPAN>SAP Audit Management</SPAN></LI><LI><SPAN>SAP Tax Compliance</SPAN></LI><LI><SPAN>SAP Business Integrity Screening</SPAN></LI><LI><SPAN>SAP UI Data Protection Masking</SPAN></LI><LI><SPAN>SAP UI Data Protection Logging</SPAN></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="santhosha_dasari_0-1768918870281.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/363388i20D7E05EE40E46BC/image-size/large/is-moderation-mode/true?v=v2&px=999" role="button" title="santhosha_dasari_0-1768918870281.png" alt="santhosha_dasari_0-1768918870281.png" /></span></P><P><SPAN>Image source: SAP</SPAN></P><H1 id="toc-hId-1069944863">3. <SPAN>SAP Roadmap and plan for SAP GRC solutions</SPAN></H1><P><SPAN>See below SAP Road map of existing SAP GRC v1200 and new SAP GRC for HANA 1.0 along with modules it it.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="santhosha_dasari_1-1768918870319.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/363389iD89C24397EEE5B6C/image-size/large/is-moderation-mode/true?v=v2&px=999" role="button" title="santhosha_dasari_1-1768918870319.png" alt="santhosha_dasari_1-1768918870319.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="santhosha_dasari_2-1768918870326.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/363387i340924502827A3B3/image-size/large/is-moderation-mode/true?v=v2&px=999" role="button" title="santhosha_dasari_2-1768918870326.png" alt="santhosha_dasari_2-1768918870326.png" /></span></P><P><SPAN>Image source: SAP</SPAN></P><P><SPAN>You may refer to the <A href="https://userapps.support.sap.com/sap(bD1lbiZjPTAwMQ==)/support/pam/pam.html?smpsrv=https%3A%2F%2Fwebsmp101.sap-ag.de#ts=0&s=sap%20access%20control&o=most_viewed%7Cdesc&st=l&rpp=20&page=1&pvnr=73554900100900008693&pt=g%7Cd" target="_blank" rel="noopener noreferrer"><STRONG>Details for Product Version SAP GRC FOR SAP HANA 1.0</STRONG></A></SPAN></P><P> </P><H1 id="toc-hId-873431358">4. <SPAN>Release Dates for SAP GRC for HANA 1.0 (SAP GRC 2026)</SPAN></H1><H2 id="toc-hId-806000572">4.1. <SPAN>Early Adopter Customers</SPAN></H2><P><SPAN>If you have already registered as a Early Adopters, SAP planned to release in March 2026.</SPAN></P><H2 id="toc-hId-609487067">4.2. <SPAN>Regular Customers</SPAN></H2><P><SPAN>For General/regular availability it will be early Q3-2026</SPAN></P><H1 id="toc-hId-283890843">5. <SPAN>How to Migrate to SAP GRC for HANA 1.0 (SAP GRC 2026) from SAP GRC v1200?</SPAN></H1><P>Organizations can choose the “Hub Model” or “Embedded Model” for their SAP GRC for HANA (SAP GRC 2026) upgrade/migration. In case if an existing Hub Model setup customer wants to move to Embedded model, it is like a new implementation of SAP GRC for HANA 2026 but can reuse existing GRC design.</P><P>To migrate from SAP GRCv1200 to SAP GRC for HANA 1.0 (SAP GRC 2026), this requires below 2 prerequisites</P><OL><LI>SAP NetWeaver should be minimum SAP S/4HANA Foundation (it is just an upgraded version for SAP NetWeaver). This is not SAP S/4HANA full version. Organizations who are using SAP Fiori 2.0 would have already migrated their SAP NetWeaver to SAP S/4HANA Foundation. Incase if you are having lower version of GRC Support pack or still on Fiori 1.0 or using SAP NetWeaver as a base component for SAP GRC, then this is a mandatory step. In case for an Embedded GRC model, SAP GRC for HANA 2026 can be installed on S4Core.</LI><LI>Databased as HANA DB: SAP GRC for HANA1.0 only supports SAP HANA DB, Organizations are forced to migrate their Non-HANA Database to HANA DB.</LI></OL><P>Once the above prerequisites are complete, SAP GRC v12.0 can be upgraded to SAP GRC for HANA 1.0 release as part of their standard maintenance program, meaning no new SKU or additional purchase is required.</P><P> </P><H1 id="toc-hId-87377338">6. <SPAN>Few New features of SAP GRC for HANA 1.0 (SAP GRC 2026)</SPAN></H1><H2 id="toc-hId-19946552">6.1. <SPAN>SAP Access Control</SPAN></H2><UL><LI><SPAN>Augmented Access request process</SPAN></LI><LI><SPAN>AI supported User Access Review process</SPAN></LI><LI><SPAN>AI driven Emergency Access Management log review process for monitoring, identifying and responding to potential security threats</SPAN></LI><LI><SPAN>Fiori based Access Request and approver process</SPAN></LI><LI><SPAN>Compliance reporting with extended analytics</SPAN></LI><LI><SPAN>Out of the box Fiori based reports – OVP</SPAN></LI><LI><SPAN>Additional Data source – Integrating Identity Services IdDs</SPAN></LI><LI><SPAN>SuccessFactors – Expand rulesets to include target populations</SPAN></LI><LI><SPAN>New EAM logs for Read Access Logs (RAL)</SPAN></LI><LI><SPAN>New Fiori App for Approval Work inbox</SPAN></LI></UL><H2 id="toc-hId-170687404">6.2. <SPAN>SAP Process Control</SPAN></H2><UL><LI><SPAN>SAP Joule integration to create Data Source and Business rules, also to understand the table and required logic.</SPAN></LI><LI><SPAN>Issue Analytics: Smartness for issue analysis and resolution</SPAN></LI><LI><SPAN>MSMP is extended to PC workflows</SPAN></LI><LI><SPAN>No new enhancements for Policy Management</SPAN></LI><LI><SPAN>Improved User Experience: Utilizing Fiori Apps for enhanced usability and accessibility (My Compliance Tasks, MCP, Assessments, Intelligent Self Diagnostic)</SPAN></LI><LI><SPAN>Single Entry Control Screen: Streamlining operation (Manage Controls)</SPAN></LI><LI><SPAN>Intelligent Self-Diagnostic Cockpit: Error analysis and resolution capabilities (CCM)</SPAN></LI><LI><SPAN>Enhanced Integration: Leveraging the SAP Integration Suite and Framework for seamless connectivity</SPAN></LI><LI><SPAN>Flexible Workflow Management: Adapting to business needs with customizable workflows</SPAN></LI><LI><SPAN>Regulatory Alignment: Integrating with Regulatory Insights for compliance and oversight</SPAN></LI></UL><H2 id="toc-hId--25826101">6.3. <SPAN>SAP Risk Management</SPAN></H2><UL><LI><SPAN>Harmonized Email Notification – Planner/Scheduler enhancement</SPAN></LI><LI><SPAN>Business Continuity Management</SPAN></LI><LI><SPAN>MSMP is extended to RM workflows</SPAN></LI><LI><SPAN>SAP Joule integration to create KRIs, also to understand the tables/CDS views etc.</SPAN></LI></UL><H2 id="toc-hId--222339606">6.4. <SPAN>SAP Audit Management</SPAN></H2><UL><LI><SPAN>Overview page for Audit Coverage</SPAN></LI><LI><SPAN>Import Master Data from PC/RM in same system per the push of a button</SPAN></LI><LI><SPAN>Inspection Management module</SPAN></LI><LI><SPAN>Consolidate email notifications for multiple actions</SPAN></LI><LI><SPAN>AI Supported Audit Report Generation</SPAN></LI><LI><SPAN>AI Supported work program preparation</SPAN></LI></UL><H2 id="toc-hId--418853111">6.5. <SPAN>SAP Business Integrity Screening</SPAN></H2><UL><LI><SPAN>Fiori apps for Detection Runs</SPAN></LI><LI><SPAN>Improving performance for Managing Alerts App</SPAN></LI></UL><H2 id="toc-hId--615366616">6.6. <SPAN>SAP Tax Compliance</SPAN></H2><UL><LI><SPAN>Bulk Edit User group attributes</SPAN></LI></UL><H2 id="toc-hId--811880121">6.7. <SPAN>SAP UIDP Masking</SPAN></H2><UL><LI><SPAN>Extending UI Masking to ODATA V4 applications and BW/4AHNA scenarios</SPAN></LI><LI><SPAN>Configurations need to be done in Central S/4 or S/4Foundation system</SPAN></LI><LI><SPAN>No need to install it in each connected system.</SPAN></LI></UL><H2 id="toc-hId--1008393626">6.8. <SPAN>SAP UIDP Logging</SPAN></H2><UL><LI><SPAN>Streamlined UI lugging optimized for SAP HANA</SPAN></LI><LI><SPAN>Configurations need to be done in Central S/4 or S/4Foundation system</SPAN></LI><LI><SPAN>No need to install it in each connected system.</SPAN></LI></UL><H1 id="toc-hId--911504124">7. <SPAN>Key characteristics</SPAN></H1><UL><LI><SPAN>Built on SAP HANA</SPAN></LI><LI><SPAN>HANA DB is mandatory</SPAN></LI><LI><SPAN>Fiori‑based user experience</SPAN></LI><LI><SPAN>Real‑time analytics</SPAN></LI><LI><SPAN>Cloud‑ready architecture</SPAN></LI><LI><SPAN>Integration with SAP Joule, BTP, SAP IAG, SAP Cloud Identity Services</SPAN></LI></UL><H1 id="toc-hId--1108017629">8. <SPAN>Licensing model</SPAN></H1><P>Licence is still separate for each GRC module; hence customers need to buy a separate licence based on required module.</P><H1 id="toc-hId--1304531134">9. <SPAN>Benefits</SPAN></H1><UL><LI><SPAN>Unified GRC platform</SPAN></LI><LI><SPAN>AI Integration </SPAN></LI><LI><SPAN>Easier deployment</SPAN></LI><LI><SPAN>Reduced complexity</SPAN></LI><LI><SPAN>Reduce TOC with increased ROI</SPAN></LI><LI><SPAN>Modern Fiori UX</SPAN></LI><LI><SPAN>Improved Reporting</SPAN></LI><LI><SPAN>Future‑proof roadmap</SPAN></LI></UL><H1 id="toc-hId--1332860948">10.<SPAN>Conclusion</SPAN></H1><P><SPAN>SAP GRC for HANA 1.0 (SAP GRC 2026) is more than an upgrade — it is a complete modernization of SAP’s GRC landscape. It brings real‑time capabilities, unified architecture, cloud readiness, and a simplified user experience.<BR /><BR />For organizations, leaders, IT directors, managers, SMEs, consultants, and vendors, now is the time to:<BR />- Understand the new platform<BR />- Assess your current GRC landscape<BR />- Plan your migration strategy<BR />- Align with SAP’s long‑term roadmap<BR /><BR />The future of GRC is real‑time, automated, cloud‑ready, and unified — and SAP GRC for HANA 1.0 is the platform that delivers it.</SPAN></P><P><SPAN>#SAP GRC #SAP GRC 2026 #SAP GRC for HANA 1.0</SPAN></P>
2026-01-22T08:26:21.888000+01:00
https://community.sap.com/t5/security-and-compliance-blog-posts/more-effective-security-programs-through-security-risk-quantification/ba-p/14314906
More Effective Security Programs Through Security Risk Quantification
2026-01-27T10:00:00.097000+01:00
JayThvV
https://community.sap.com/t5/user/viewprofilepage/user-id/160843
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="quantitiative-risk-management-communication.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/365292iCF870C77F28F0E89/image-size/large/is-moderation-mode/true?v=v2&px=999" role="button" title="quantitiative-risk-management-communication.jpg" alt="quantitiative-risk-management-communication.jpg" /></span></P><P> <EM>By Josh Marker, Head of Security Risk Management, and Jay Thoden van Velzen, Technical Advisor, Office of the CSO</EM></P><P> </P><H1 id="toc-hId-1659582221">Security Risks, Enterprise Risks, and Business Priorities</H1><P>This year has seen a further rise in cyber threats with increasing business impact. Just in recent months, cyber attacks have disrupted <A href="https://www.raconteur.net/technology/which-uk-retailers-have-been-hit-by-cyber-attacks-in-2025" target="_blank" rel="noopener nofollow noreferrer">retail chains</A>, <A href="https://www.reuters.com/business/aerospace-defense/eu-agency-says-third-party-ransomware-behind-airport-disruptions-2025-09-22/" target="_blank" rel="noopener nofollow noreferrer">air travel</A> and <A href="https://industrialcyber.co/manufacturing/brewer-asahi-suspends-domestic-operations-after-cyberattack-disrupts-ordering-and-shipping/" target="_blank" rel="noopener nofollow noreferrer">beer production</A>, and an entire supply chain in the automotive industry requiring <A href="https://www.bbc.com/news/articles/cgl15ykerlro" target="_blank" rel="noopener nofollow noreferrer">government support</A>. Managing security risks well is more critical than ever to organizations.</P><P>From our conversations with customers and partners, we know that business leaders are concerned about security and compliance risks. We also know that many security leaders still struggle to communicate security risks, and, given the current climate, face challenges to justify investment when organizations are looking to cut cost and run more efficiently. Both sides are familiar and comfortable with uncertainty and balancing their respective risks. Business leaders set out strategic directions they bet the success of the company on, by opening new markets, launching new product lines, or investing in new technologies where despite good execution external factors outside of their control may determine the outcome. Security leaders similarly chart out strategies and uplift programs they anticipate will best defend their organizations against unpredictable and ever evolving threats. The remaining challenge to action appears to be miscommunication and misalignment.</P><P>For effective communication and decision on the appropriate response, we need to translate security risks into business terms, and in ways that they can be related and prioritized alongside enterprise risks and business priorities. At SAP, we have found that a quantitative security risk approach, based on the methodology of the <A href="https://www.fairinstitute.org/" target="_blank" rel="noopener nofollow noreferrer">FAIR Institute</A>, is very helpful in providing that, as well as hold the organization to account driving change and effective progress through measurable accountability.</P><P> </P><H1 id="toc-hId-1463068716">Risk Identification, Analysis and Response</H1><P>Every risk analysis involves some combination of <EM>probability x impact. </EM>The problem is that calculating either is very difficult. There is in cybersecurity in general a lack of good data, but organizations struggle even more to estimate to probability of a particular event to occur in their own landscape – especially if a new threat hasn’t happened yet. Impact is similarly difficult to estimate, as that depends in large part on the intent and actions of the adversary. This forces you to shoehorn more likely but lower impact events together with low probability but catastrophic potential outcomes.</P><P>The common “rainbow” <A href="https://en.wikipedia.org/wiki/Risk_matrix" target="_blank" rel="noopener nofollow noreferrer">risk matrix</A> is a poor communicator for this. Even when category ranges are appropriately chosen, and position of the risk on the matrix is justified, it gives an inappropriately definite and reductive answer that allows risks to both be under- and overrated. It doesn’t tell the whole story and therefore is often not a useful communication device to convince others – especially those outside cybersecurity and business leaders - investment or action is required.</P><H2 id="toc-hId-1395637930">Risk Identification and Analysis with a Quantitative Approach</H2><P>To better express this larger story, we need an approach that expresses risk in financial terms. It also needs to allow for uncertainty in the world. And it should account for inputs that are sometimes educated guesses.</P><P>In SAP, during risk identification, we try to capture as many parameters as possible for which we can reasonably find information or can make informed guesses on based on threat intelligence data and landscape scans of the likelihood the threat materializes in a given year. Subject matter experts (SMEs) provide the information, when can be expressed in a range – avoiding the conversation falling in “it depends” traps.</P><P>“Defenders have to be right all the time, attackers only once”, is a common theme in cybersecurity. The reality is that attackers usually require multiple steps to succeed before they reach any data and system with high business impact, giving defenders multiple opportunities to put obstacles in their way, or detect and contain them. Attackers can be extremely lucky, by obtaining credentials of exactly the right privileged administrator, but more likely they follow a longer path of initial access, persistence, privilege escalation and lateral movement. By allowing the domain experts to express a range of scenarios and consequences for these parameters, supported by data available, we get a far more nuanced understanding of the risk.</P><P>Core input for impact is based on direct financial loss in case the risk materializes, to keep the financial calculation conservative and avoid exaggerating a risk. It’s always easier to present your case when able to say other less tangible downstream consequences are not included in the analysis, and the impact could be higher.</P><P>To make sense of the data ranges in the parameters, we <SPAN>use machine learning and</SPAN> run 50,000 Monte Carlo simulations to create a model for the risk scenario. This results in a dataset that is sorted by probability and impact and plotted on a graph. A curve is drawn through the data points, resulting in the Loss Exceedance Curve. This curve and the analysis that led to that is reviewed with the SMEs to validate if they agree and accept the results.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image (5).png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/365440iE818B211DD694BA0/image-size/large?v=v2&px=999" role="button" title="image (5).png" alt="image (5).png" /></span><SPAN>By following the curve from the top left to the bottom right, we can see what loss we can expect with what probability. In this example, the curve starts with a steep slope, indicating that a certain percentage of cases where the risk is manifested the impact is low. After that, the curve flattens out and ends with a long tail indicating rare but catastrophic cases. The way to read this is to find a probability along the vertical axis, for example 5%, then trace a horizontal line from that value until it intersects with the Loss Exceedance Curve. Follow a vertical line down from that intersection point to find the value along the horizontal axis, so in this case there is a 5% chance to exceed $126.4M in loss (in any given year, from this scenario). An average and 90th percentile financial impact is provided as an easy to remember label used in conversations, but always with the understanding of the curve behind it.</SPAN></P><P>By updating the values of model parameters, we can express how planned remediations effect the financial risk by running the same Monte Carlo simulations to produce a Loss Exceedance Curve for the risk after remediations. That provides a projection of risk reduction for any investment or effort required. The model for the risk can also be rerun when new information emerges – internally or externally – that requires updating the parameters.</P><P> </P><H1 id="toc-hId-1070041706">Loss Exceedance Curve as Communication Device</H1><P>The Loss Exceedance Curve is very useful for security leaders to better understand their organization’s security risks, and how proposed remediations reduce that risk and what risk remains after any mitigations have been deployed and operationalized. This can be a sobering exercise if the investment to remediate is too close to the risk and projected risk reduction, forcing you to reevaluate your approach. On the other hand, it can also provide strong justification for that investment if it is only a fraction of the risk and risk reduction that would deliver.</P><P>But it works also well with business- and executive leaders. The narrative can be entirely expressed in likelihood and impact in financial terms, while avoiding complexity. The conversation takes place without cyber security jargon, aside from terms business leaders are bound to be familiar with from business reports, such as ransomware attacks and social engineering. It allows business leaders to evaluate security risks better and decide what scenarios they want to protect against and whether they consider the needed effort or investment justified. At times, even a small probability of a catastrophic outcome can lead to a business decision to address a low average risk threat. In other cases, the same business leaders can be more comfortable to accept a reasonable residual risk at a higher probability. Meanwhile, there is no need to go into technical details and explain <EM>how</EM> such threats would materialize that could derail the discussion, unless a business leader specifically requests it.</P><P>When business leaders challenge the impact parameters, the model can be adjusted with more accurate information and the simulations rerun. Since business leaders typically own risks – security or enterprise – it is just as important that they stand behind the inputs into the model as the security and compliance SMEs. The balance between risk reduction and remediation cost along the curve further helps justification for investment of financial and human resources. If most of the risk can be addressed with a minor investment, this can set the upper limit of what is feasible. On the other hand, the long tail of the curve can justify a greater investment to limit the likelihood and impact of catastrophic events.</P><P>Allowing both sides to debate the risk through the Loss Exceedance Curve and follow its slope, it serves as an excellent communication device. It helps security and business leaders to get on the same page and express complex scenarios in a way both can understand and relate to.</P><P> </P><H1 id="toc-hId-873528201">Investment Prioritization and Optimization</H1><P>The quantification of security risks enables prioritization among them and see where there may be overlaps in mitigation strategies. The remediation plan for one risk is likely to have positive impact on other risks in a layered defense approach. For instance, stronger automated network controls are likely to have a positive impact on the reachability of known vulnerabilities, beyond their immediate intent to protect the network. Such remediations should be prioritized.</P><P>Other risks can prove not to have much business impact at all in relation to others. Security professionals and business leaders are prone to overreaction when certain threats hit the media – whether through security conferences or business press – and overvalue the importance of a threat. Risk quantification assists in prioritizing what is important and avoids chasing ghosts while greater immediate risks remain. This way, constrained budgets can be optimized for greater effectiveness in risk reduction.</P><P> </P><H1 id="toc-hId-677014696">Security Program Governance</H1><P>The effects are even greater when the risk analysis and response tracking are tied to data than indicates progress along the remediation plan. For instance, the percentage compliance of the landscape with security policies, or how well a team meets remediation target timelines for alerts from landscape scans, or how fast a team adopts a central service can be directly tied to model parameters. That way the model can be rerun with updated parameters as remediation plans progress to show how much risk has been reduced for the effort and how well the organization is progressing on the planned timeline.</P><P>The Loss Exceedance Curve aids in target setting, as well. It protects us against unrealistic expectations of targets that can’t be achieved or require high effort to squeeze out a bit more risk reduction. At the same time, it prevents organizations from setting targets too low, because it believes that is what the available resources can achieve. The Loss Exceedance Curve shows at what percentage of remediation of the threat the residual risk falls to an acceptable level. That level is the target to achieve.</P><P> </P><H1 id="toc-hId-480501191">Summary</H1><P>The Loss Exceedance Curve helps express the uncertainty that we find in the world: ranges of values are used for inputs which means that variations in outputs need to be expressed. The Loss Exceedance Curve helps us do that, enabling better conversations among various stakeholders, including SMEs who live and breathe the cyber jargon, as well as the managers and business leaders who make decisions that govern and guide the organization.</P><P>This approach leads to truly risk-informed decisions and prioritization, rather than what feels good, what cyber textbooks tell us, what vendors sell, or what was exciting at the latest security conference.</P><P> </P><H1 id="toc-hId-283987686">More Information</H1><P>For more information, please see:</P><UL><LI><A href="https://www.raconteur.net/technology/which-uk-retailers-have-been-hit-by-cyber-attacks-in-2025" target="_self" rel="nofollow noopener noreferrer">Which UK retailers have been hit by cyber attacks in 2025?</A></LI><LI><A href="https://www.reuters.com/business/aerospace-defense/eu-agency-says-third-party-ransomware-behind-airport-disruptions-2025-09-22/" target="_self" rel="nofollow noopener noreferrer">EU agency confirms ransomware attack behind airport disruptions</A></LI><LI><A href="https://industrialcyber.co/manufacturing/brewer-asahi-suspends-domestic-operations-after-cyberattack-disrupts-ordering-and-shipping/" target="_self" rel="nofollow noopener noreferrer">Brewer Asahi suspends domestic operations after cyberattack disrupts ordering and shipping</A></LI><LI><A href="https://www.bbc.com/news/articles/cgl15ykerlro" target="_self" rel="nofollow noopener noreferrer">Government to guarantee £1.5bn JLR loan after cyber shutdown</A></LI><LI><A href="https://www.fairinstitute.org/" target="_blank" rel="noopener nofollow noreferrer">FAIR Institute</A></LI></UL>
2026-01-27T10:00:00.097000+01:00
https://community.sap.com/t5/security-and-compliance-blog-posts/to-be-more-effective-cybersecurity-must-learn-to-think-in-matrices/ba-p/14318188
To Be More Effective Cybersecurity Must Learn to Think in Matrices
2026-02-02T09:30:00.019000+01:00
JayThvV
https://community.sap.com/t5/user/viewprofilepage/user-id/160843
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="matrices-securing-business-function.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367185i41DA66479BD3D6B7/image-size/large/is-moderation-mode/true?v=v2&px=999" role="button" title="matrices-securing-business-function.jpg" alt="matrices-securing-business-function.jpg" /></span></P><P> <EM>By Jay Thoden van Velzen, Technical Advisor, Office of the CSO</EM></P><P>Cybersecurity leaders have been recommending for years to learn to speak to the business. However, I hear from many that they are still struggling to get heard in their organizations. This is puzzling, since media and industry reports on cyber incidents with significant business and operational impact and increase in regulations have put security and compliance firmly on the agenda of business leaders.</P><P>There is still a communications gap. To get to the source of this communication challenge, it is helpful to explore how different groups in organizations look at applications.</P><P>Since the word “application” is used loosely in a variety of contexts, it is important to define what we mean by it. Following <A href="https://kellyshortridge.com/blog/posts/security-chaos-engineering-sustaining-software-systems-resilience-cliff-notes/" target="_blank" rel="noopener nofollow noreferrer">Kelly Shortridge</A>, I define an application as a combination of technical and human resources, that is, a <EM>socio-technical</EM> system that delivers a necessary (business) function.</P><P>A human resource (HR) management application, for instance, that supports employee recruitment, compensation, learning, payroll, and so on, is composed of the technical stack of infrastructure, operating systems, code and surrounding tooling, as well as the developers, operators and administrators managing its configuration, uptime, and resilience. That holds whether the application is run on-premise, is in-house developed or comes from a third party, is operated in the cloud by yourself, by a managed service provider, or through a Software-as-a-Service provider.</P><P> </P><H1 id="toc-hId-1659693947">Different Perspectives</H1><P>However, different groups of stakeholders look at applications very differently.</P><H2 id="toc-hId-1592263161">Business Users and Owners</H2><P>Business owners support business functions and processes. Whether intermediated through a central IT organization or functional business owners directly, they seek a solution on the market or developed in-house, and authorize purchases, fund development and operational teams to manage it in production. They are responsible for Procurement, or Finance, or HR business processes. Or an online catalog and store.</P><P>For the application users, they need to get their jobs done. They buy and sell products and services, they hire and fire employees and contractors, they manage warehouses and production lines.</P><P>That is, this group has a business to run. They don’t care how the application achieves that, or what the technical stack is, as long as it supports them in their functional role. Their domain knowledge is functional within the vertical.</P><H2 id="toc-hId-1395749656">Application Developers, Operators and Administrators</H2><P>Applications have operators and administrators who run the application for functional business users. They manage access and authorizations, provide user support, and manage the underlying technical stack the application relies on, such as servers and operating systems, databases, backups and relevant networking. The technical stack could be on-premise or in the cloud, whether on Infrastructure-as-a-Service (IaaS) or as full Software-as-a-Service.</P><P>The application can be in-house developed or come from a 3rd-party provider. Either way, the operators and administrators need to work with the application developers or service provider on feature requests, bug fixes, or implementing patches and upgrades to the application.</P><P>This group is still closely tied to the business function. The technical teams supporting each application will know the technical stack and functionality of <EM>their</EM> application, but not that of others. Their domain knowledge is technical within the vertical space of a specific application supporting a particular business function.</P><H2 id="toc-hId-1199236151">Cybersecurity Professionals</H2><P>Cybersecurity is cross-functional, and in case of the application technology stack, looks at it in horizontal layers. Frameworks such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) describe functions horizontally, such as Govern, Identify, Protect, Detect, Respond and Recover. Cybersecurity thinks in terms of network security, cloud security, operating system hardening, identity and access management, configure-, posture- and vulnerability management, application (or product) security, and so on, and then applies that across business functions across the application space. The domain expertise accordingly is horizontal, along layers of the technology stack.</P><P>Where cybersecurity connects with business users and executives, such as security and compliance awareness programs or mandatory training, they are often not engaged specifically targeted to their business function. Even privileged access users are seen as a singular class, rather than segmented by business function criticality. Cybersecurity sees them as undifferentiated between business functions, as if they all have the same requirements.</P><P>This horizontal, layered perspective also drives the market segmentation of cybersecurity solutions, targeting different layers of the technology stack:</P><UL><LI>network security (firewalls, web application firewalls (WAF), intrusion detection and protection systems (IDS/IPS) or anti-Denial of Service (DoS))</LI><LI>End point detection and protection agents</LI><LI>cloud posture management</LI><LI>vulnerability scanners</LI><LI>E-mail security</LI><LI>Security Incident and Event Management (SIEM) systems</LI><LI>Identity and Access Management (IAM), or zero trust access</LI></UL><P>It even has Application Security as a market category, despite lacking application-specific domain expertise.</P><P>In summary, each group has a fundamentally different view of applications:</P><UL><LI><STRONG>Business users, owners</STRONG>: care about what the application <STRONG>does</STRONG> – functional focus on business benefit</LI><LI><STRONG>Application developers, DevOps, operators, administrators: </STRONG>care about what to do to make the application <STRONG>work </STRONG>– a practical focus in service of functional requirements (including security and compliance requirements)</LI><LI><STRONG>Cybersecurity professionals: </STRONG><SPAN>care about what the application is composed of – a cross-functional technical stack focus on security and compliance</SPAN></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Diagram illustrating the different worldviews of application owners, users, and operators along business functions, and Cybersecurity teams who look at the world horizontally in layers of technical stacks." style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367187i205210BCC47ECD17/image-size/large/is-moderation-mode/true?v=v2&px=999" role="button" title="JayThvV_0-1769725923638.png" alt="Diagram illustrating the different worldviews of application owners, users, and operators along business functions, and Cybersecurity teams who look at the world horizontally in layers of technical stacks." /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Diagram illustrating the different worldviews of application owners, users, and operators along business functions, and Cybersecurity teams who look at the world horizontally in layers of technical stacks.</span></span></P><P>The diagram above illustrates these different ways that our groups perceive their function.</P><P> </P><H1 id="toc-hId-873639927"> Misaligned Communication</H1><P>There is no wrong or right. These differences in perspective are the natural outcome of performing a vertical business function or a horizontal, cross-organizational one. But it has clear implications for misaligned communication and the potential pushback against central security programs from business units. A couple of examples can illustrate this:</P><UL><LI>Cybersecurity sets a policy for Single Sign On (SSO) and Multi-Factor Authentication (MFA) for application access, a solution has been acquired, and teams are expected to onboard. Several business units raised objections that they need an exception because<UL><LI>their application vendor doesn’t support the solution</LI><LI>is too old to adopt it</LI><LI>the developer has left but the application still provides a business function, or</LI><LI>they’re a new acquisition and have a completely different technical stack and a competitive solution is in place</LI></UL></LI><LI>A business unit always misses their vulnerability management target on their application and escalations from cybersecurity are frequently denied, because patching requires a reboot that would disrupt critical business operations</LI><LI>To be more agile and resilient and save cost, a business unit decides to adopt a cloud solution. Since they want to move fast, they didn’t engage the cybersecurity team in advance, because “they just slow things down”. During implementation, the security team comes with a long checklist of requirement, delaying adoption of the solution.</LI><LI>Application teams taking it upon themselves to secure their applications while the cybersecurity team is mostly concerned with their OS and network logs and configuration</LI><LI>Cybersecurity never managing to get the budget their need from the business</LI></UL><P>This miscommunication persists even now that business executives through their professional networks and media are increasingly aware of the potential business impact of security and compliance incidents, if not direct experience.</P><P> </P><H1 id="toc-hId-677126422">Cybersecurity Must Learn To Think in Matrices</H1><P>Cybersecurity must learn to think in matrices. That is, cybersecurity must learn to apply their horizontal domain expertise to the different business functional verticals to properly understand the context of what they are trying to protect. Teams must be sensitive to both the variety of technology stacks in their organizations and the value to the business functions these applications and their operating teams provide. “Enabling the business” means to enable the business <EM>functions</EM> to operate securely, not only to secure their technology stacks.</P><P>Cybersecurity mustn’t lose its horizontal perspective. Central governance, policies and services are more effective and efficient than fragmented and different in each business unit. But without the additional understanding of the vertical perspective cybersecurity can’t be optimally effective either.</P><P>At SAP, this matrixed cybersecurity function is achieved through the central-and federated Business Information Security Officer (BISO) model. This consists of a central Security and Compliance organization that sets policies and standards, mandates security solutions, runs central security programs and services, security and exception management, and provides central governance. This is paired with BISO teams within the different business units responsible for ensuring security and compliance requirements are implemented and followed in their unit. Together it creates a continuous dialogue between the central organization and the business units, where the BISO teams help provide the context and constraints of their specific vertical and the cyber teams provide the horizontal domain expertise.</P><P> </P><H1 id="toc-hId-480612917">Recommendations</H1><H2 id="toc-hId-413182131">Learning To Listen</H2><P>Setting up a matrixed operating model doesn’t work if we don’t learn to listen, or it just becomes another forum to talk past each other. Central cybersecurity teams can often dismiss any objection by business units as an excuse not to do something, and inevitably that is sometimes the case. But in many cases, there are real constraints that should be acknowledged. It’s hard to convince a business unit that a potential but not materialized risk must be mitigated with urgency when doing so causes business disruptions with a guaranteed price tag.</P><H2 id="toc-hId-216668626">Quantitative Security Risk Management as an Aid</H2><P>Quantitative security risk management can be an effective communication aid that works both ways. It is easier to articulate the probability of real business impact if the security risk is not remediated, and it justifies the cost of remediation in relation to the risk. But it also educates and disciplines the cybersecurity team on what is critical and important to the business, and what is therefore more important to protect. This can be enlightening, but also sobering, if the plan to address the latest hyper cybersecurity trend proves to cost too much relative to the risk it is meant to address.</P><P>More on how SAP uses quantitative security risk management can be found in <A href="https://community.sap.com/t5/security-and-compliance-blog-posts/more-effective-security-programs-through-security-risk-quantification/ba-p/14314906" target="_self">this article</A>.</P><H2 id="toc-hId-20155121">Cloud Transformation and Platformization as Opportunities</H2><P>Cloud transformation and the trend of platformization in software and services provides further opportunities. Technology stacks can be simplified both horizontally from the bottom up - through use of IaaS - and vertically - through moving from spot solutions to integrated platforms and application suites. By doing so, we make the matrix simpler, reducing complexity. Cloud transformation reduces the depth of the technology stack by outsourcing more responsibilities to cloud providers. Platformization reduces the width and variety of the technology stack by reducing the number of different solutions to support, operate and integrate.</P><H2 id="toc-hId-170895973">Look Beyond the Tech Stack</H2><P>Applications have a business function. They are not only a collection of code, infrastructure, network configurations and open-source libraries that may be vulnerable to SQL injections, cross-site scripting, or directory traversal. To secure applications, and not just the components in the technology stack, requires domain knowledge of the application. Otherwise, we miss what the application is for, how it and its business logic can be abused, and what impact such abuse would have on the business function it supports.</P><P>SAP and the partner ecosystem provide security solutions with application domain expertise, that is, they are aware of what the application is for, and how it can be abused, within the context of the application and business function it provides. Explore if similar solutions exist for your other applications.</P><P>Even further, cybersecurity must understand the social aspects of the application as well – the constraints that developer and operations teams are under – for instance in terms of budget and headcount. Security teams also must have a sense of how application users use it and how it helps them perform their business function. When users bypass your security controls, sit with those users to understand what they need to do to do their job.</P><P>Finally, understanding the challenges and motivations of those in the business unit makes the communication with the business owners much easier.</P><P>This is how we get better.</P><P> </P><H1 id="toc-hId-267785475">More Information</H1><P>For more information, see:</P><UL><LI><A class="" href="https://community.sap.com/t5/security-and-compliance-blog-posts/more-effective-security-programs-through-security-risk-quantification/ba-p/14314906" target="_blank">More Effective Security Programs Through Security Risk Quantification</A></LI><LI><A href="https://community.sap.com/t5/security-and-compliance-blog-posts/how-sap-security-teams-can-help-cyber-teams-towards-cyber-resilience/ba-p/13860382" target="_blank">How SAP Security Teams Can Help Cyber Teams Towards Cyber Resilience</A></LI><LI><A href="https://community.sap.com/t5/security-and-compliance-blog-posts/cyber-resilience-and-cloud-transformation-resolving-the-erp-security/ba-p/13625662" target="_blank">Cyber Resilience and Cloud Transformation: Resolving the ERP Security Hamster Wheel</A></LI></UL>
2026-02-02T09:30:00.019000+01:00
https://community.sap.com/t5/financial-management-blog-posts-by-sap/grc-tuesdays-drive-compliance-manage-risk-build-trust-at-sap-ccr-conference/ba-p/14307439
GRC Tuesdays: Drive Compliance, Manage Risk, Build Trust at SAP CCR Conference 2026 in Amsterdam
2026-02-03T07:30:00.016000+01:00
T_Frenehard
https://community.sap.com/t5/user/viewprofilepage/user-id/215222
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_0-1768397583264.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/361357i43FF7FC1488E030E/image-size/large/is-moderation-mode/true?v=v2&px=999" role="button" title="T_Frenehard_0-1768397583264.png" alt="T_Frenehard_0-1768397583264.png" /></span></P><P><SPAN>Every 100 years, a major event transforming the risk and compliance landscape takes place:</SPAN></P><UL><LI><SPAN>1726 – The United Kingdom enforces 2 new trade <STRONG>compliance</STRONG> acts – the Importation Act for importing salt from Europe into the Province of Pensilvania (sic) and the Taxation Act for “Duties upon Malt, Mum, Cyder, and Perry”. Proving that tariff and trade restrictions have a long history.</SPAN></LI><LI><SPAN>1826 – Nicéphore Niépce takes the first photograph in history and <STRONG>trust</STRONG> in what is reported by other parties is established. Quality auditors will soon embrace this technology for their missions… Later to be questioned by AI but that’s a whole different story.</SPAN></LI><LI><SPAN>1926 – The United States Congress passes the Air Commerce Act. Creating safety standards for civil aviation, an industry-wide scale <STRONG>risk</STRONG> mitigation to reduce accidents.</SPAN></LI></UL><P><SPAN>1726 for Driving Compliance with new legislation, 1826 for Building Trust with photographic proof, 1926 for Managing Risks to commercial flying… And now, in 2026, it all comes together: Drive Compliance, Manage Risk, Build Trust at the <A href="https://tacinsights.events/events/sap-for-internal-controls-compliance-and-risk-management-conference/" target="_blank" rel="noopener nofollow noreferrer"><STRONG>SAP for Internal Controls, Compliance and Risk Management Conference</STRONG></A> on March 3rd and 4th in Amsterdam!</SPAN></P><P><SPAN>Whether you are already using SAP solutions for Governance, Risk, and Compliance, or looking at options to help you automate your GRC processes, then this two packed days of great content, inspiring talks, and valuable networking opportunities is the perfect channel. Since you missed the tectonic changes of 1726, 1826 and 1926, make sure you don’t miss 2026!</SPAN></P><P> </P><H2 id="toc-hId-1787826083"><STRONG><SPAN>Keynotes</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>After a welcome by TAC Insights, in the <STRONG>SAP</STRONG> opening session, Axel Vetter – Head of Product Marketing for Quote-to-Cash and GRC will kick-off the conference with an overview on how to enhance your organisation’s agility in meeting new compliance requirements — and turn regulatory change into a business advantage.</SPAN></P><P><SPAN>Then, Dr Bruce Garvey – Managing Director from <STRONG>Strategy Foresight</STRONG> and Adam Svendsen – Associate Professor from the <STRONG>Norwegian Defence University College</STRONG>, will explain how Foresight provides “Strategic Options Analysis” acting as an insurance against uncertainties defined as “unknown-knowns” and “unknown-unknowns”, hence improving organisational resilience.</SPAN></P><P><SPAN>Later on the first day, <STRONG>Turnkey Consulting</STRONG> and SAP will unpack the Shared Responsibility Model within RISE, clarifying exactly what SAP manages – and what remains in the customer’s hands.</SPAN></P><P><SPAN> </SPAN></P><H2 id="toc-hId-1591312578"><STRONG><SPAN>Customer Stories</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>As for previous years, this conference is centred around customer case studies which has been a key success criterion for attendees to this event. But don’t just take my word for it. Here are a few testimonials from previous attendees: </SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_1-1768397583269.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/361356i3FDFC05E13B66CC8/image-size/large?v=v2&px=999" role="button" title="T_Frenehard_1-1768397583269.png" alt="T_Frenehard_1-1768397583269.png" /></span></P><P><SPAN>Use cases that will you hear about from representatives of</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_2-1768397583285.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/361358iACDB9BCFFE2CAFB0/image-size/large/is-moderation-mode/true?v=v2&px=999" role="button" title="T_Frenehard_2-1768397583285.png" alt="T_Frenehard_2-1768397583285.png" /></span></P><P> </P><H3 id="toc-hId-1523881792"><U><SPAN>Compliance, Control and Risk Management (“CCR track”)</SPAN></U></H3><UL><LI><SPAN>Utilizing AI with SAP Process Controls to streamline controls, enhance risk visibility and drive greater efficiency.</SPAN></LI></UL><UL><LI><SPAN>Practical developments including the implementation of manual control performance, continuous control monitoring, control design assessment, risk assessment workflow, and backend mass upload functionality to strengthen the internal control system cycle and drive efficiency.</SPAN></LI></UL><UL><LI><SPAN>Insights into Transport for London’s journey in identifying key gaps, implementing sustainable improvements, and embedding risk-aware practices across the organisation by leveraging SAP GRC solutions.</SPAN></LI></UL><UL><LI><SPAN>Common challenges organisations face in governance, access management, process controls, and audit readiness, and how targeted improvements and modern tooling can drive measurable results.</SPAN></LI></UL><UL><LI><SPAN>The ongoing journey from manual controls to digitally-enabled efficient controls through SAP Process Control, the challenges faced in scaling a solution internally, and the response to these challenges.</SPAN></LI></UL><UL><LI><SPAN>How engaged teams (People), strong security and control foundations (Protection), and clear business priorities (Performance) work in unison to transform GRC from a compliance tool into a driver of growth, innovation, and resilience.</SPAN></LI></UL><UL><LI><SPAN>How SAP S/4HANA drives automation and process efficiencies to make the overall internal controls environment robust, resulting in greater effectiveness, transparency, substantially, flexibility, and efficiency.</SPAN></LI></UL><UL><LI><SPAN>How organisations can simplify access governance, automate key controls, and improve visibility across complex landscapes.</SPAN></LI></UL><P><SPAN> </SPAN></P><H3 id="toc-hId-1327368287"><U><SPAN>Identity and Access Management & Cybersecurity and Data Protection (“Cyber track”)</SPAN></U></H3><UL><LI><SPAN>Enhancing security, compliance, and governance across their SAP landscape using SAP GRC and cybersecurity solutions.</SPAN></LI></UL><UL><LI><SPAN>Taking SAP GRC beyond out-of-the-box functionality to deliver smarter, more efficient, and more resilient governance, risk, and compliance processes with a chatbot for SAP Access Control to answer user queries on assigned and available access and a link-monitoring engine integrated with ticketing systems to automatically raise incidents for failed controls in SAP Process Control.</SPAN></LI></UL><UL><LI><SPAN>An exploration on what effective emergency access management looks like in a hybrid landscape, the pitfalls organisations face, and practical steps to strengthen control and compliance.</SPAN></LI></UL><UL><LI><SPAN>Why introducing SAP Enterprise Threat Detection, Cloud Edition helps close key security gaps. This presentation will include an overview of how the solution works and what it takes to move from project to stable operations.</SPAN></LI></UL><UL><LI><SPAN>How SAP Identity Access Governance automates workflows, streamlines user provisioning, accelerates onboarding while reducing manual effort and risk to create a security model that is not only stronger, but smarter and more scalable.</SPAN></LI></UL><UL><LI><SPAN>How to adopt a best-of-breed strategy across SAP, Microsoft, and specialized third-party tools to build a fully integrated and future-ready security and compliance framework.</SPAN></LI></UL><UL><LI><SPAN>How to navigate a complex SAP S/4HANA brownfield conversion while simultaneously building a future-proof security and compliance landscape.</SPAN></LI></UL><UL><LI><SPAN>How to reinforce resources in terms of time and investment dedicated to proactive security measures, recognizing that robust protection is a strategic imperative, not just a technical task.</SPAN></LI></UL><UL><LI><SPAN>Key challenges encountered during the migration and operation in a cloud-based landscape, the security measures implemented, and the best practices adopted for effective access control.</SPAN></LI></UL><P><SPAN> </SPAN></P><H2 id="toc-hId-1001772063"><STRONG><SPAN>Masterclasses</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>This year, we’ll also be innovating with GRC Masterclasses. A model already widely successful at other TAC Insights & SAP events where Partners and SAP experts from Product Management and Consulting, provide a deep dive into a particular technology or module from a solution. These supercharged and interactive sessions represent the perfect opportunity to take a deeper look at a specific topic of interest and then continue the discussion with the experts directly at their booth.</SPAN></P><P><SPAN> </SPAN></P><H2 id="toc-hId-805258558"><STRONG><SPAN>Networking breaks & evening event</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>This event is also a great opportunity to learn from other industries and geographies, recruit into your team and expand your professional network for future development.</SPAN></P><P><SPAN>And because this is easier done in an informal setting, networking and lunch breaks also planned to give you time to interact with your peers, but also with SAP experts all along the 2 days.</SPAN></P><P><SPAN>Finally, we will wrap up day one of the event with canape and drinks at the beautiful <A href="https://zuid-pool.nl/en/" target="_blank" rel="noopener nofollow noreferrer">Zuidpool</A> waterfront:</SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="203"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_3-1768397583293.jpeg" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/361361iD6C369C94008CF01/image-size/small/is-moderation-mode/true?v=v2&px=200" role="button" title="T_Frenehard_3-1768397583293.jpeg" alt="T_Frenehard_3-1768397583293.jpeg" /></span></TD><TD width="118"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_4-1768397583297.jpeg" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/361359iFCDCB2C8581E4481/image-size/small/is-moderation-mode/true?v=v2&px=200" role="button" title="T_Frenehard_4-1768397583297.jpeg" alt="T_Frenehard_4-1768397583297.jpeg" /></span></TD><TD width="208"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_5-1768397583304.jpeg" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/361360i3B279F747A6CFBFE/image-size/small/is-moderation-mode/true?v=v2&px=200" role="button" title="T_Frenehard_5-1768397583304.jpeg" alt="T_Frenehard_5-1768397583304.jpeg" /></span></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><H2 id="toc-hId-608745053"><STRONG><SPAN>Wait no more: joint us on March 3rd and 4th 2026 in Amsterdam!</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>As a next step, I would suggest a simple 4 phase approach:</SPAN></P><OL><LI><SPAN>Pick your sessions of interest in the <A href="https://eu1.hubs.ly/H0q0rh80" target="_blank" rel="noopener nofollow noreferrer">Agenda</A></SPAN></LI><LI><SPAN>Book your <A href="https://eu1.hubs.ly/H0pbRHj0" target="_blank" rel="noopener nofollow noreferrer">Tickets</A></SPAN></LI><LI><SPAN>Plan your travel to the <A href="https://tacinsights.events/events/sap-for-internal-controls-compliance-and-risk-management-conference/plan-your-visit-2/" target="_blank" rel="noopener nofollow noreferrer">Venue</A></SPAN></LI><LI><SPAN>Stay updated by joining the <A href="https://share-eu1.hsforms.com/1do6K-aG2QpORsUUDWLUwPw2e13kr?__hstc=238331423.921ae9bebe0ca45cb9170bb36578e9c4.1728547230894.1741759314420.1741853008992.253&__hssc=238331423.3.1741853008992&__hsfp=2864791567" target="_blank" rel="noopener nofollow noreferrer">Mailing List</A></SPAN></LI></OL><P><SPAN><div class="video-embed-center video-embed"><iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FUtBwYd-YIJ4%3Ffeature%3Doembed&display_name=YouTube&url=https%3A%2F%2Fwww.youtube.com%2Fshorts%2FUtBwYd-YIJ4&image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FUtBwYd-YIJ4%2Fhq2.jpg&type=text%2Fhtml&schema=youtube" width="200" height="150" scrolling="no" title="SAP for Internal Controls, Compliance and Risk Management Conference promotional video" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"></iframe></div></SPAN></P><P><SPAN>I hope to see you there and, in the meantime, feel free to add your thoughts and comments on this blog.</SPAN></P><P><SPAN>And if you are interested in learning more about SAP solutions for Governance, Risk, and Compliance, feel free to fill-in the <A href="https://www.sap.com/registration/request-demo.html?product=237150e2-6555-4a16-b49e-e93dbf1891da&productName=Governance%2C+Risk%2C+Compliance+%28GRC%29%2C+and+Cybersecurity&pageTitle=Cybersecurity+and+Governance%2C+Risk%2C+and+Compliance+Software&countryOfOrigin=en_au&refererPagePath=https%3A%2F%2Fwww.sap.com%2Faustralia%2Fproducts%2Ffinancial-management%2Fgrc.html&refererContentPath=%2Fcontent%2Fsapdx%2Flanguages%2Fen_gb%2Fproducts%2Ffinancial-management%2Fgrc&navTitle=Request+a+Demo" target="_blank" rel="noopener noreferrer">demo request form</A>!</SPAN></P>
2026-02-03T07:30:00.016000+01:00
https://community.sap.com/t5/financial-management-blog-posts-by-sap/what-s-new-in-sap-cloud-identity-access-governance/ba-p/14321051
What’s New in SAP Cloud Identity Access Governance
2026-02-03T23:52:32.042000+01:00
ElyasAhmed
https://community.sap.com/t5/user/viewprofilepage/user-id/1886529
<P><STRONG>Strengthening Access Visibility, Automation, and Governance</STRONG></P><P>As organizations continue to modernize their system landscapes, access governance must adapt to increasing complexity. Managing users, roles, groups, and entitlements across hybrid and cloud environments calls for clearer visibility, smarter integration options, and dependable audit support.</P><P>The <STRONG>Q4 2025</STRONG> updates to <STRONG>SAP Cloud Identity Access Governance (IAG) i</STRONG>ntroduce a fresh set of enhancements spanning application integrations, APIs, job management, and reporting. These additions bring more flexibility, improved insight into access data, and expanded options for governing access. As a result, this helps teams work more efficiently as their environments grow and evolve.</P><P>Let’s take a closer look at what’s new in this release!</P><P> </P><P><STRONG>Seamless Application Integration with SAP HANA Cloud</STRONG></P><P>SAP Cloud Identity Access Governance now supports deeper integration with SAP HANA Cloud, enabling synchronization of users, groups, and group authorizations. This integration lays the foundation for consistent access governance by supporting risk assessment, user provisioning with group assignments, and certification processes, all from a centralized governance layer.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_0-1770158616210.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368710iFB1EA40B5F119714/image-size/medium?v=v2&px=400" role="button" title="ElyasAhmed_0-1770158616210.png" alt="ElyasAhmed_0-1770158616210.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/e12d8683adfa4471ac4edd40809b9038/3c7e891872a547b182587c4814b2d783.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P> </P><P><STRONG>User Filter Support Across All Applications</STRONG></P><P>User filter functionality is now extended to all SAP Cloud Identity Access Governance integration scenarios. This enhancement allows customers to exclude users who do not need to be governed, ensuring governance efforts remain focused and effective.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_1-1770158667498.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368711i768A9697FE4C18E6/image-size/medium?v=v2&px=400" role="button" title="ElyasAhmed_1-1770158667498.png" alt="ElyasAhmed_1-1770158667498.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/e12d8683adfa4471ac4edd40809b9038/cdf3eee6159c4e48aad7833e5a442211.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P> </P><P><STRONG>Enhanced Access Request API for Greater Flexibility</STRONG></P><P>The Access Request API has been enhanced by removing the mandatory domain field and introducing flexible user identification options. Users can now be retrieved using identifiers such as email, global user ID, or a universal search parameter.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_2-1770158714433.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368712iADC8CC12E6D81F84/image-size/medium?v=v2&px=400" role="button" title="ElyasAhmed_2-1770158714433.png" alt="ElyasAhmed_2-1770158714433.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/83f383d3123c4f57b036d2707ec2e730/6e1721dfad2344a4b70d6d73d322a13b.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P> </P><P><STRONG>Manage Jobs - Change History Visibility</STRONG></P><P>A new change history capability has been introduced in the Manage Jobs application. Administrators can now view updates made to jobs, including pause and resume actions, as well as the users responsible for those changes.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_3-1770158752324.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368713iF3C472B5ED5B072B/image-size/medium?v=v2&px=400" role="button" title="ElyasAhmed_3-1770158752324.png" alt="ElyasAhmed_3-1770158752324.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/9621f10c676c497a8355b7e36053e837/993181201218426db2319e876bf92b9f.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P> </P><P><STRONG>Business Role Coverage Report</STRONG></P><P>The new Business Role Coverage Report provides clear insights into how user roles are mapped within business roles. With smart filters, intuitive selection tools, and easy download options, administrators can quickly identify gaps and ensure proper role coverage.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_4-1770158785078.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368714i27B4A1C3CFBECE9F/image-size/medium?v=v2&px=400" role="button" title="ElyasAhmed_4-1770158785078.png" alt="ElyasAhmed_4-1770158785078.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/96f4b1ec2df9455492adaec07e6029f4/0690d9da060b452f92f6628376e7f56d.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P> </P><P><STRONG>Unassociated Access Report</STRONG></P><P>Embedded within the Business Coverage Report, the Unassociated Access Report helps administrators identify roles and groups that are not linked to any business roles. Users can drill down into details and refine searches using smart filters to pinpoint specific unassociated accesses.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_5-1770158826506.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368715iA448A3C632794958/image-size/medium?v=v2&px=400" role="button" title="ElyasAhmed_5-1770158826506.png" alt="ElyasAhmed_5-1770158826506.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/96f4b1ec2df9455492adaec07e6029f4/540abcfcb8e44a5ca5251832a72f6f27.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P> </P><P><STRONG>Access Report</STRONG></P><P>The Access Report provides a comprehensive view of all users along with their assigned and unassigned accesses. It also shows how accesses relate to business roles, making it easier to validate access origins and appropriateness.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_6-1770158872132.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368716i3BA20A7792EE2FED/image-size/medium?v=v2&px=400" role="button" title="ElyasAhmed_6-1770158872132.png" alt="ElyasAhmed_6-1770158872132.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/96f4b1ec2df9455492adaec07e6029f4/48ffa3fca6c54a18b4f406e6f0a049a7.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P> </P><P><STRONG>Access Usage Report</STRONG></P><P>The new Access Usage Report combines the functionality of the previously separate Unused Access and Actively Used Access reports into a single unified view. It supports on-premise and ABAP-based systems, including SAP HANA on-premise and SAP ERP.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_7-1770158904053.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368717i86C413A17ADB066D/image-size/medium?v=v2&px=400" role="button" title="ElyasAhmed_7-1770158904053.png" alt="ElyasAhmed_7-1770158904053.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/96f4b1ec2df9455492adaec07e6029f4/52812dfd4b304dba8a7f4bb31279c2fd.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P><STRONG> </STRONG></P><P><STRONG>Closing Thoughts</STRONG></P><P>These enhancements mark another strong step forward for <STRONG>SAP Cloud Identity Access Governance</STRONG>, bringing greater clarity, flexibility, and control to how organizations manage access across increasingly complex landscapes. From deeper integrations and APIs to unified reporting and stronger audit transparency, this release is designed to help teams govern access with confidence, efficiency, and precision.</P><P>As access governance continues to evolve alongside cloud and hybrid environments, SAP Cloud Identity Access Governance remains committed to delivering practical, scalable innovations that reduce risk, simplify operations, and support compliance at every stage. We’re excited to see how these capabilities help you strengthen your governance processes, and we look forward to continuing this journey with you as even more improvements arrive in upcoming releases.</P><P data-unlink="true">For more details and configuration guidance, please refer to the <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE?version=CLOUDFOUNDRY" target="_self" rel="noopener noreferrer">SAP Help Portal</A> documentation for SAP Cloud Identity Access Governance.</P>
2026-02-03T23:52:32.042000+01:00
https://community.sap.com/t5/technology-blog-posts-by-sap/empty/ba-p/14323803
Empty
2026-02-08T22:38:38.247000+01:00
SalvatorePulvirenti
https://community.sap.com/t5/user/viewprofilepage/user-id/1921425
<P><STRONG>Empty</STRONG></P>
2026-02-08T22:38:38.247000+01:00
https://community.sap.com/t5/financial-management-blog-posts-by-sap/grc-tuesdays-unleashing-artificial-intelligence-for-regulatory-insights/ba-p/14318502
GRC Tuesdays: Unleashing Artificial Intelligence for Regulatory Insights with SAP
2026-02-17T07:00:00.092000+01:00
T_Frenehard
https://community.sap.com/t5/user/viewprofilepage/user-id/215222
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_0-1769766915328.jpeg" style="width: 501px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367330iDF4D4B6508205904/image-dimensions/501x281/is-moderation-mode/true?v=v2" width="501" height="281" role="button" title="T_Frenehard_0-1769766915328.jpeg" alt="T_Frenehard_0-1769766915328.jpeg" /></span></P><P><SPAN>You may recall a GRC Tuesdays blog released some time ago (cf. <A href="https://community.sap.com/t5/financial-management-blogs-by-sap/grc-tuesdays-implications-of-ai-in-the-field-of-regulatory-compliance/ba-p/13934633" target="_blank">Implications of AI in the field of Regulatory Compliance</A>) where I mentioned a Customer Influence program investigating the use of artificial intelligence in the area of regulatory intelligence and internal control. </SPAN></P><P><SPAN>Well, I have good news: Engineering teams from </SPAN><SPAN>across SAP have come together for an end-to-end compliance platform and have now released a new <STRONG>SAP Business Technology Platform service for regulatory insights</STRONG> natively integrated with <STRONG>SAP Process Control</STRONG> for end-to-end regulatory intelligence.</SPAN></P><P><SPAN> </SPAN></P><H2 id="toc-hId-1788780256"><STRONG><SPAN>Why the need for an automated service?</SPAN></STRONG></H2><P><STRONG><SPAN> </SPAN></STRONG></P><P><SPAN>According to analysts, there are over 300 regulatory changes every day. Of course, not all these updates will impact your organization, but you may still need to check them to assess the (lack of) impact. In many organizations, this is done manually internally or outsourced to specialized 3rd party providers. And there is therefore a cost in monitoring these updates. Especially since the business impact assessment is usually performed by legal subject matter experts. </SPAN></P><P><SPAN>Furthermore, the identified regulatory changes then need to be reflected into your internal control framework or gaps can occur between the regulation and the controls being tested… which would be problematic.</SPAN></P><P><SPAN>As a result, digitalization becomes a key objective for compliance surveillance to reduce the cost, but also to increase the efficiency and resiliency of the control framework itself to ensure legal requirements are continuously met, and that nothing falls through the cracks.</SPAN></P><P> </P><H2 id="toc-hId-1592266751"><SPAN> Regulatory Compliance</SPAN></H2><P> </P><P><SPAN>Jointly leveraging multiple artificial intelligence areas such as text mining, natural language processing and large language models, the new service for regulatory insights automatically analyses and highlights risk and control changes in legal texts, best practice procedures or policies and suggests updates to existing controls or even new control definitions if needed. It also offers analytical insights into control coverage and gap analysis as well as recommendations to reduce the gap.</SPAN></P><P><SPAN> </SPAN></P><H2 id="toc-hId-1395753246"><STRONG><SPAN>How does it work?</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>Unlike a magician that never reveal its tricks, there is no magic here – and Regulatory Insights certainly doesn’t function as a black box. So it is transparent and more importantly auditable.</SPAN></P><P> </P><TABLE width="609"><TBODY><TR><TD width="211"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_1-1769766915330.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367329iCB4190D2F8A38D9C/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_1-1769766915330.png" alt="T_Frenehard_1-1769766915330.png" /></span></TD><TD width="398"><P><STRONG><SPAN>Upload document & automatic parsing</SPAN></STRONG></P><P><SPAN>User uploads relevant document (regulatory framework or control standard, internal policy, etc.) which gets parsed and stored.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE width="609"><TBODY><TR><TD width="211"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_2-1769766915331.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367328i1DEE72E3E20B4070/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_2-1769766915331.png" alt="T_Frenehard_2-1769766915331.png" /></span></TD><TD width="398"><P><STRONG><SPAN>Automatically detect & extract control definitions</SPAN></STRONG></P><P><SPAN> </SPAN><SPAN>Regulatory Insights automatically detects and extracts control definitions into a structured format.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE width="609"><TBODY><TR><TD width="211"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_3-1769766915333.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367331iD94E2EAC99B15706/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_3-1769766915333.png" alt="T_Frenehard_3-1769766915333.png" /></span></TD><TD width="398"><P><STRONG><SPAN>Document red-line analysis & control delta analysis</SPAN></STRONG></P><P><SPAN> </SPAN><SPAN>Control definitions are compared between versions to flag, add, subtract and/or change deltas.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE width="609"><TBODY><TR><TD width="211"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_4-1769766915336.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367333i0C188142C3B9C018/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_4-1769766915336.png" alt="T_Frenehard_4-1769766915336.png" /></span></TD><TD width="398"><P><STRONG><SPAN>Control mapping </SPAN></STRONG><SPAN>(not in scope of 1st release but coming soon)</SPAN></P><P><SPAN> </SPAN><SPAN>New control definitions are mapped to any similar existing ones to empower joint implementation.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE width="609"><TBODY><TR><TD width="211"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_5-1769766915338.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367332iA64A7014C9B56380/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_5-1769766915338.png" alt="T_Frenehard_5-1769766915338.png" /></span></TD><TD width="398"><P><STRONG><SPAN>Dashboard with Gap & Coverage Analytics </SPAN></STRONG><SPAN>(not in scope of 1st release but coming soon)</SPAN></P><P><SPAN> </SPAN><SPAN>Analytics dashboard for gaps and coverage of (mapped) controls are visualized together with action recommendations.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE width="609"><TBODY><TR><TD width="211"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_6-1769766915342.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367336i2B09CB4793EAA919/image-size/medium?v=v2&px=400" role="button" title="T_Frenehard_6-1769766915342.png" alt="T_Frenehard_6-1769766915342.png" /></span></TD><TD width="398"><P><STRONG><SPAN>Updated content in SAP Process Control</SPAN></STRONG></P><P><SPAN> </SPAN><SPAN>Thanks to dedicated SAP Fiori applications, information from regulatory insights can be leveraged in SAP Process Control to create, map and adjust the internal controls. Simply select the Regulatory Insights Framework, the associated Regulation in SAP Process Control and create new controls or map to existing ones! This ensures a seamless flow from the regulatory intelligence to the control operations.</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><H2 id="toc-hId-1199239741"><STRONG><SPAN>Unlock business benefits</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>In summary, Regulatory Insights enables companies to automatically detects changes in regulatory documents, maps changes to controls, and suggests recommendations to mitigate risks for non-compliance. With this service, organizations can: </SPAN></P><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="463"><P><STRONG><SPAN>Mitigate and reduce risk</SPAN></STRONG><SPAN> of non-compliance, business disruption and reputational loss​</SPAN></P></TD><TD width="138"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_7-1769766915342.png" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367335iC3003CDECB5A4E2C/image-size/small/is-moderation-mode/true?v=v2&px=200" role="button" title="T_Frenehard_7-1769766915342.png" alt="T_Frenehard_7-1769766915342.png" /></span></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="94"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_8-1769766915342.png" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367334i2D719D818CF9F85B/image-size/small/is-moderation-mode/true?v=v2&px=200" role="button" title="T_Frenehard_8-1769766915342.png" alt="T_Frenehard_8-1769766915342.png" /></span></TD><TD width="507"><P><STRONG><SPAN>Boost efficiency</SPAN></STRONG><SPAN> and speed up time-to-action by <STRONG>lowering the cost and effort</STRONG> for regulatory compliance</SPAN></P></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><TABLE><TBODY><TR><TD width="463"><P><STRONG><SPAN>Make informed business decisions</SPAN></STRONG><SPAN> by leveraging smart technologies</SPAN></P></TD><TD width="138"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_9-1769766915343.png" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367337i049497B194A9FF90/image-size/small/is-moderation-mode/true?v=v2&px=200" role="button" title="T_Frenehard_9-1769766915343.png" alt="T_Frenehard_9-1769766915343.png" /></span></TD></TR></TBODY></TABLE><P><SPAN> </SPAN></P><H2 id="toc-hId-1002726236"><STRONG><SPAN>More to come!</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>This release already supports a variety of regularory frameworks </SPAN><SPAN>– including various versions of CELEX, SAP Security Baseline Template, COSO, ESRS, C5, COBIT, FitSM, GHB, MaRisk, NIST Security & Privacy (NIST SP 800-53), IT Act, SOX, and <EM>Experimental</EM> - which allows end users to upload and test requirement extraction on additional regulations that are not yet officially supported. But the team is continuously evaluating further frameworks and working towards a generic solution to extract compliance requirements from a larger variety of document sources.</SPAN></P><P><SPAN> </SPAN></P><H2 id="toc-hId-806212731"><STRONG><SPAN>Interested in learning more?</SPAN></STRONG></H2><P><SPAN> </SPAN></P><P><SPAN>If you’d like to dive a little deeper here and hear more about it before it’s in general availability, I recommend the following resources: </SPAN></P><UL><LI><SPAN>Blog: <A href="https://community.sap.com/t5/financial-management-blog-posts-by-sap/compliance-in-the-age-of-ai-how-sap-grc-s-regulatory-insights-is-redefining/ba-p/14180565" target="_blank">Compliance in the Age of AI: How SAP GRC’s Regulatory Insights is Redefining Risk Management</A></SPAN></LI><LI><SPAN>Webcast: <A href="https://gateway.on24.com/wcc/eh/4322431/lp/5098832/sap_grc_2026_deep_dive_regulatory_insights_in_sap_grc/?partnerref=on24seo" target="_blank" rel="noopener nofollow noreferrer">SAP GRC 2026 Deep Dive: Regulatory Insights in SAP GRC</A></SPAN></LI></UL><P><SPAN>Finally, if you would like to participate as a customer to the Early Adopter Care program, feel free to register. The campaign is open until June 23rd 2026: <A href="https://influence.sap.com/sap/ino/#campaign/4095" target="_blank" rel="noopener noreferrer">Smarter Regulatory Analysis with AI : SAP Regulatory Insights Early Adopter Launch</A></SPAN></P><P><A href="https://influence.sap.com/sap/ino/#campaign/4095" target="_self" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="T_Frenehard_10-1769766915353.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367338i4BCFF302F3139ACE/image-size/large?v=v2&px=999" role="button" title="T_Frenehard_10-1769766915353.png" alt="T_Frenehard_10-1769766915353.png" /></span></A></P><P><SPAN>What about you, how does your organization manage regulatory surveillance? I look forward to reading your thoughts and comments on this blog.</SPAN></P><P><SPAN>And if you are interested in learning more about SAP solutions for Governance, Risk, and Compliance, feel free to fill-in the <A href="https://www.sap.com/registration/request-demo.html?product=237150e2-6555-4a16-b49e-e93dbf1891da&productName=Governance%2C+Risk%2C+Compliance+%28GRC%29%2C+and+Cybersecurity&pageTitle=Cybersecurity+and+Governance%2C+Risk%2C+and+Compliance+Software&countryOfOrigin=en_au&refererPagePath=https%3A%2F%2Fwww.sap.com%2Faustralia%2Fproducts%2Ffinancial-management%2Fgrc.html&refererContentPath=%2Fcontent%2Fsapdx%2Flanguages%2Fen_gb%2Fproducts%2Ffinancial-management%2Fgrc&navTitle=Request+a+Demo" target="_blank" rel="noopener noreferrer">demo request form</A>!</SPAN></P>
2026-02-17T07:00:00.092000+01:00
https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/grc-trade-and-tax-in-sap-cloud-erp-2602/ba-p/14311711
GRC, Trade and Tax in SAP Cloud ERP 2602
2026-02-19T14:07:53.164000+01:00
Hiruni
https://community.sap.com/t5/user/viewprofilepage/user-id/1383197
<P><SPAN>Hello Experts,</SPAN></P><P><SPAN>I'm excited to share the update regarding our latest release - GRC, Trade and Tax in SAP Cloud ERP 2602. This update highlights many significant innovations from SAP Risk and Assurance Management, SAP Watch List Screening, SAP Document and Reporting Compliance, as well as SAP Cloud Identity Access Governance.</SPAN></P><P><SPAN>For a quick overview of the top release highlights for GRC with 2602, y</SPAN><SPAN>ou can watch the video below.</SPAN></P><P><div class="video-embed-center video-embed"><iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fh1HRAAEgBZg%3Ffeature%3Doembed&display_name=YouTube&url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dh1HRAAEgBZg&image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fh1HRAAEgBZg%2Fhqdefault.jpg&type=text%2Fhtml&schema=youtube" width="600" height="337" scrolling="no" title="Governance, Risk, and Compliance in SAP Cloud ERP 2602 | Release Highlights" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"></iframe></div></P><P><FONT color="#000000"><EM>Video 1. Release Highlight Video for GRC, Trade and Tax in SAP Cloud ERP 2602</EM></FONT></P><P>This blog covers the following innovations:</P><H3 id="toc-hId-1917656390"><SPAN>SAP Document and Reporting Compliance</SPAN></H3><UL><LI><SPAN>AI-assisted trend analysis and summary for reports (beta)</SPAN></LI><LI>Embedded analytics to facilitate VAT adjustments</LI><LI><SPAN>E- verify and Automated Handling of Draft VAT Returns from Authorities</SPAN></LI><LI>Enabling Electronic Invoices Through KSeF 2.0 for Poland​</LI></UL><H3 id="toc-hId-1721142885"><SPAN>SAP Risk and Assurance Management</SPAN></H3><UL><LI>Extended analytical and reporting capabilities: new reporting dashboards with SAP Analytics Cloud, enterprise edition</LI></UL><H3 id="toc-hId-1524629380"><SPAN>SAP Enterprise Threat Detection </SPAN></H3><UL><LI>Intelligent alert handling and investigation recommendations</LI><LI>Management-focused monitoring dashboard</LI></UL><H3 id="toc-hId-1328115875"><SPAN>SAP International Trade</SPAN></H3><UL><LI>Export declaration for plants abroad in the context of Registration for Indirect Taxation Abroad (RITA)</LI></UL><H3 id="toc-hId-1131602370"><SPAN>​SAP Watchlist Screening</SPAN></H3><UL><LI>Delta Screening​</LI></UL><H3 id="toc-hId-935088865"><SPAN>SAP Document and Reporting Compliance</SPAN></H3><H4 id="toc-hId-867658079"><SPAN>AI-assisted trend analysis and report summary</SPAN></H4><P><SPAN>Tax accountants often spend significant time validating data by comparing current tax figures with previous returns. To accelerate this process, we introduce AI-assisted trend analysis for VAT returns. This feature helps tax experts by automatically uncovering hidden trends, flagging outliers, and detecting root causes for discrepancies. It provides intelligent summaries that can be used to simplify the approval process and support future audits. This innovation allows the team to move from reactive validation to proactive analysis.</SPAN></P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AI-assisted trend analysis and report summary.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/374296iF9FB0758273F4B07/image-size/large?v=v2&px=999" role="button" title="AI-assisted trend analysis and report summary.jpg" alt="AI-assisted trend analysis and report summary.jpg" /></span></SPAN></P><P><FONT size="3"><EM>Picture 1. AI-assisted trend analysis and report summary</EM></FONT></P><H5 id="toc-hId-800227293">Value Proposition​</H5><UL><LI>R<SPAN>educe the time needed to interpret VAT data across periods, leading to faster reviews, quicker approvals, and shorter reporting cycles.</SPAN></LI><LI><SPAN>Accuracy is improved and compliance risk is reduced. This helps identify anomalies early, minimizing manual errors and lowering the risk of incorrect filings.</SPAN></LI><LI>Easy to make clear and informative data-driven decisions.</LI></UL><H5 id="toc-hId-603713788"><STRONG>Capabilities</STRONG></H5><UL><LI>The analysis highlights key trends, fluctuations, and irregularities, and flags values that help to identify potential errors or compliance risks. ​</LI><LI>Provide concise summary of key VAT insights to support faster reviews, approvals, and decision-making.​</LI></UL><H3 id="toc-hId-149034845"><SPAN>Embedded analytics to facilitate VAT adjustments</SPAN></H3><P><SPAN>During the preparation of statutory reports, tax experts require deep visibility into their data to ensure accuracy. With the 2602 release, the 'Manage Tax Items' activity within SAP Document and Reporting Compliance is enhanced with a powerful ''analyze data" option. </SPAN></P><P><SPAN>This provides tax experts with additional fields and the flexibility to analyze tax data to identify anomalies. Now you can easily see how invoices are mapped to your VAT returns and pinpoint any documents that might have been excluded, enabling seamless adjustments integrated directly with accounting. To further tailor the solution, you can now use extensibility to plug in your own custom analytics CDS views, allowing you to choose between standard SAP-delivered queries or your own defined views for analysis.</SPAN></P><P><A href="https://community.sap.com/source-Ids-list" target="1_zgz1s9po" rel="nofollow noopener noreferrer"> </A></P><P><EM><FONT color="#000000">Video 2. </FONT>Embedded analytics to facilitate VAT adjustments</EM></P><H5 id="toc-hId--709516043"><SPAN>Value Proposition</SPAN>​</H5><UL><LI>Advances the VAT review and adjustment by integrating analytics.</LI><LI>Improves accuracy and strengthens compliance through data-driven decisions.</LI><LI>Reduces manual effort and reliance on offline analysis and external tools​.</LI><LI>Enhances analytical transparency and enables faster and more confident decision-making.​</LI></UL><H5 id="toc-hId--906029548"><SPAN>Capabilities</SPAN><STRONG> </STRONG>​</H5><UL><LI>Embedded analytics within the Manage Tax Items for Legal Reporting application​</LI><LI>Direct access to detailed VAT tax line-item records with added data points​</LI><LI>Interactive analytical views with charts, filters, and drill-down capabilities​</LI><LI>Trend analysis and comparisons across multiple VAT dimensions​</LI><LI>Identification of documents for inclusion in or exclusion from VAT returns​</LI><LI>Analysis at the point of action without switching applications​</LI><LI>Support for efficient VAT reconciliation and compliance preparation​</LI></UL><P><SPAN>For more information, see: <A class="" href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/4de200b26d5d42bbacae69c6bf6b9923/0a50b7fec5594e738568b1808f02625e.html?version=2602.VAL" target="_blank" rel="noopener noreferrer"><SPAN class=""><SPAN class="">Manage Tax Items for Legal Reporting | SAP Help Portal</SPAN></SPAN></A></SPAN></P><H3 id="toc-hId--515737039">E- <SPAN>verify and Automated Handling of Draft VAT Returns from Authorities</SPAN></H3><P><SPAN>A growing number of tax authorities are providing pre-populated, or draft, tax returns based on real-time transactional data. Our latest update helps you automate the handling of these draft returns, ensuring consistency with your company's books. With this feature, you can pull auto-populated returns from an authority's portal and automatically compare them with the returns prepared in your ERP system to identify any mismatches. </SPAN></P><P><SPAN>Based on the reconciliation results, you can then process actions such as submitting a delta file, accepting, or rejecting the draft. This streamlines the entire process, from review and correction to the submission of the final return.</SPAN></P><P><A href="https://community.sap.com/source-Ids-list" target="1_l4ip7tjh" rel="nofollow noopener noreferrer"> </A></P><P><FONT color="#000000"><EM>Video 3. </EM></FONT><EM>E- verify and Automated Handling of Draft VAT Returns from Authorities</EM></P><H3 id="toc-hId--712250544"><SPAN>Enabling electronic invoices through KSeF 2.0 for Poland<BR /></SPAN></H3><P><SPAN>With the Polish Ministry of Finance enforcing the use of electronic invoices through the KSeF 2.0 platform beginning in February 2026, we are equipping you to meet this mandate head-on. SAP Document and Reporting Compliance now enables you to generate B2B e-invoices in the required XML format from both Finance (FI) and Sales & Distribution (SD), including tax invoices, correction invoices, down-payment invoices, and self-billing invoices. You can submit these invoices interactively to KSeF 2.0, visualize them in a human-readable PDF format with a QR code, and retrieve supplier invoices for automated posting.</SPAN></P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Enabling electronic invoices through KSeF 2.0 for Poland.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/374303iB697B8ECB027F569/image-size/large?v=v2&px=999" role="button" title="Enabling electronic invoices through KSeF 2.0 for Poland.jpg" alt="Enabling electronic invoices through KSeF 2.0 for Poland.jpg" /></span></SPAN></P><P><SPAN><EM><FONT size="3">Picture 2. </FONT>Enabling electronic invoices through KSeF 2.0 for Poland</EM></SPAN></P><H2 id="toc-hId--615361042"><SPAN>SAP Risk and Assurance Management</SPAN></H2><H3 id="toc-hId--1105277554"><SPAN>Extended analytical and reporting capabilities: new reporting dashboards with SAP Analytics Cloud, enterprise edition</SPAN></H3><P><SPAN>We are introducing the new Risk and Compliance Cockpit, an SAP Analytics Cloud story that gives you an instant, comprehensive overview of your organization's compliance landscape. </SPAN></P><P><SPAN>This dashboard empowers compliance managers to identify process inefficiencies by visualizing compliance issues organized by type and status, with charts showing trends over time. It makes it easy to compare current performance against historical data, highlight long-term trends, and identify deviations. With insights into average issue resolution times and year-to-year analysis, this single source of truth helps you prioritize critical unresolved issues and improve operational efficiency.</SPAN></P><P><A href="https://community.sap.com/source-Ids-list" target="1_eotqbtls" rel="nofollow noopener noreferrer"> </A></P><P><EM>Video 4. Extended analytical and reporting capabilities: new reporting dashboards with SAP Analytics Cloud, enterprise edition</EM></P><H5 id="toc-hId--1888597073"><STRONG>Value Proposition</STRONG>​</H5><UL><LI>Get an instant overview of compliance issues, organized by type and status​</LI><LI>Improved operational efficiency supported by trend and year-to-year analysis​</LI><LI>Charts visualize trends over time​</LI><LI>Overview of what to prioritize by highlighting critical unresolved issues​</LI></UL><H5 id="toc-hId--2085110578">​<STRONG>Capabilities </STRONG>​</H5><UL><LI>Identify inefficiencies in organizations' processes​</LI><LI>Instant overview of compliance issues​</LI><LI>Filter business data to examine specific categories of compliance issues​</LI><LI>Visual and comparative analysis of data​</LI><LI>Compare current performance while highlighting long-term trends and deviations</LI></UL><P><SPAN>For more information, see: <A class="" href="https://help.sap.com/docs/risk-and-assurance-management/admin-guide-risk-and-assurance-management/sap-grc-ram-compliancereporting" target="_blank" rel="noopener noreferrer"><SPAN class=""><SPAN class="">Risk and Compliance Cockpit</SPAN></SPAN></A></SPAN></P><H2 id="toc-hId--1401415062"><SPAN>SAP Enterprise Threat Detection</SPAN></H2><H3 id="toc-hId--1891331574">Intelligent alert handling and investigation recommendations</H3><P><SPAN>In SAP Enterprise Threat Detection, cloud edition, investigations are the central hub for examining security incidents. This new capability automates and enhances this critical process.<BR /><BR />The primary value of this feature is to decrease the manual effort required by SAP monitoring agents and increase their overall efficiency. When an agent prepares an investigation to send to a customer, they are now supported with automatic, case-specific response and mitigation recommendations.<BR /><BR />This helps teams by automatically compiling investigation results and formulating suggestions for customers on how to address the alerts. The system intelligently generates these recommendations based on the standard operating procedure of the specific pattern that created the alert, further enhanced by predefined value lists and machine learning functionality. This ensures that the advice provided is both highly relevant and immediately actionable, allowing your security teams to move from detection to resolution faster and more effectively.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Hiruni_1-1769504112128.png" style="width: 906px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/365554iF4645919CDC36586/image-dimensions/906x455/is-moderation-mode/true?v=v2" width="906" height="455" role="button" title="Hiruni_1-1769504112128.png" alt="Hiruni_1-1769504112128.png" /></span></P><P><EM><FONT size="3">Picture 3. </FONT>Intelligent alert handling and investigation recommendations</EM></P><P><SPAN>For more information, see: <A class="" href="https://help.sap.com/docs/SAP_ENTERPRISE_THREAT_DETECTION_CLOUD_EDITION/c9c37b5475c04357a782816cd5d7b1b8/317e8c4129524f49a7cc8b2cdfe58dc2.html" target="_blank" rel="noopener noreferrer"><SPAN class=""><SPAN class="">Generating Investigation Recommendations</SPAN></SPAN></A></SPAN></P><H3 id="toc-hId--1919661388"><SPAN>Management-focused monitoring dashboard</SPAN></H3><P><SPAN>We are introducing a powerful new monitoring dashboard within SAP Enterprise Threat Detection, cloud edition, specifically designed for management roles. In today's complex security landscape, having a clear, high-level view of your organization's cyberhealth is not just an advantage; it is a necessity. This new dashboard is for all managers and security leaders who need to quickly understand current security events, alerts, and ongoing investigations to make informed, timely decisions.</SPAN></P><P><SPAN>It facilitates a deeper understanding of complex security data by offering a comprehensive picture of your system's cyberhealth and protection status. The dashboard also shows the distribution of security events by various criteria, effectively highlighting the most affected systems, patterns, and users to help you focus resources where they are needed most. </SPAN></P><P><SPAN>To ensure the information is tailored to your specific needs, you can also create your own personalized monitoring pages with a selection of charts that are most relevant to your responsibilities..</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Hiruni_0-1769504079112.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/365553i2B03863EBAC856FD/image-size/large/is-moderation-mode/true?v=v2&px=999" role="button" title="Hiruni_0-1769504079112.png" alt="Hiruni_0-1769504079112.png" /></span></P><P><EM><FONT size="3">Picture 4. </FONT>Management-focused monitoring dashboard</EM></P><P><SPAN>For more information, see: <A class="" href="https://help.sap.com/docs/SAP_ENTERPRISE_THREAT_DETECTION_CLOUD_EDITION/8d46a172bc28425aa9bae21e946d9b02/2ad4946123f7480aaee45826e1bf8c9a.html" target="_blank" rel="noopener noreferrer"><SPAN class=""><SPAN class="">Using the Monitoring Dashboard</SPAN></SPAN></A></SPAN></P><H2 id="toc-hId--1822771886"><SPAN>SAP International Trade</SPAN></H2><H3 id="toc-hId-1982278898">Export declaration for plants abroad in the context of Registration for Indirect Taxation Abroad (RITA)</H3><P><SPAN>For businesses operating with plants abroad, ensuring the correct export declaration is crucial. In a plant abroad scenario, this feature ensures that the country of the delivering plant, rather than the country of the company code, determines the correct foreign trade organization for the customs declaration. This enhancement improves compliance with international trade regulations for businesses leveraging the "Registration for Indirect Taxation Abroad" (RITA) scope.</SPAN></P><H5 id="toc-hId-1198959379"><STRONG>Value Proposition </STRONG></H5><UL><LI>Enhance compliance with trade regulations by ensuring the correct foreign trade organization is used for export declarations.</LI></UL><H5 id="toc-hId-1002445874"><STRONG>Capabilities </STRONG></H5><UL><LI>Manage your export declaration in SAP Global Trade Services using the foreign trade organization within the country of the plant abroad.</LI><LI>Identify plants abroad on pro forma invoice line items by considering countries where registration for indirect taxation (RITA) is enabled.</LI></UL><P><FONT size="3" color="#000000">In SAP Cloud ERP, a billing document exists where goods delivery is performed via a foreign plant, for example, the plant country is different from the country of the company code.</FONT></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Hiruni_2-1769504803664.png" style="width: 924px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/365667i3BF912ADDCB30B5E/image-dimensions/924x390?v=v2" width="924" height="390" role="button" title="Hiruni_2-1769504803664.png" alt="Hiruni_2-1769504803664.png" /></span></P><P><EM><FONT size="3">Picture 5. </FONT>Export declaration for plants abroad in the context of Registration for Indirect Taxation Abroad (RITA)</EM></P><P>In SAP GTS, Edition for SAP HANA, the FTO of the corresponding export declaration is now determined based on the legal unit corresponding to the foreign plant used in the billing document.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Hiruni_3-1769504851682.png" style="width: 942px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/365680i47483AE2B209BC25/image-dimensions/942x378?v=v2" width="942" height="378" role="button" title="Hiruni_3-1769504851682.png" alt="Hiruni_3-1769504851682.png" /></span></P><P><SPAN><EM><FONT size="3">Picture 6. </FONT>Export declaration for plants abroad in the context of Registration for Indirect Taxation Abroad (RITA)</EM></SPAN></P><P><SPAN>For more information, see: <A class="" href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/ee9ee0ca4c3942068ea584d2f929b5b1/b57337eb6ea04cd2af2e016173648292.html?version=2602.00" target="_blank" rel="noopener noreferrer"><SPAN class=""><SPAN class="">Enablement of Plants-Abroad for Export Processing</SPAN></SPAN></A><SPAN class=""><SPAN class=""> and </SPAN></SPAN><A class="" href="https://help.sap.com/docs/CENTRAL_BUSINESS_CONFIGURATION/55c9333eed324cd284f6c4e5dab8462f/017ec064e3274ddd901350da411cebf4.html" target="_blank" rel="noopener noreferrer"><SPAN class=""><SPAN class="">Foreign Plant</SPAN></SPAN></A><SPAN class="">​</SPAN></SPAN></P><H3 id="toc-hId-1392738383"><SPAN>Delta screening with SAP Watch List Screening and manual release of blocked document items</SPAN></H3><P><SPAN>Continuous compliance with sanction party lists is critical. Screening requests sent to SAP Watch List Screening will now remain active for delta screening for up to one month. This means the system automatically performs delta screenings against any changes to watch lists and updates the status of your business partners and documents accordingly, providing automatic coverage without requiring new manual screenings. </SPAN></P><P><SPAN>Additionally, for situations requiring manual intervention, the "Manage Documents - Trade Compliance" Fiori app now allows authorized users to manually release a trade compliance document item that is blocked. This creates a simple, straightforward, and auditable overrule process to comply with legal requirements while ensuring business continuity.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Hiruni_4-1769504994609.png" style="width: 940px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/365691i9078799F38B0E02E/image-dimensions/940x738?v=v2" width="940" height="738" role="button" title="Hiruni_4-1769504994609.png" alt="Hiruni_4-1769504994609.png" /></span></P><P><EM><FONT size="3">Picture 7. </FONT>Delta screening with SAP Watch List Screening and manual release of blocked document items</EM></P><P><SPAN>For more information, see: <A class="" href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/6dd96f68c48e4c139cda7b1bac5599b1/1c99a758dd014bd7ad3fd0eaf0ac6f54.html?version=2602.VAL" target="_blank" rel="noopener noreferrer"><SPAN class=""><SPAN class="">Integration with SAP Watch List Screening</SPAN></SPAN></A><SPAN class=""><SPAN class=""> and </SPAN></SPAN><A class="" href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/ee9ee0ca4c3942068ea584d2f929b5b1/26fdb0797d18458ab410fd5ea2241620.html?version=2602.00" target="_blank" rel="noopener noreferrer"><SPAN class=""><SPAN class="">Delta </SPAN></SPAN><SPAN class=""><SPAN class="">Screening in SAP Watch List Screening</SPAN></SPAN></A></SPAN></P><H3 id="toc-hId-312537643" id="toc-hId-1196224878"><SPAN><STRONG>Watch the replays of our SAP Cloud ERP 2602 Early Release Series!</STRONG></SPAN><SPAN> </SPAN></H3><P><SPAN>From January 12-16, we hosted a series of 22 expert-led live sessions to highlight the exciting innovations shipped with the SAP Cloud ERP 2602 release. Missed the live sessions? We've got you covered! Take advantage of the entire series or pick and choose the sessions most relevant to you. You will find the recording and presentation for Artificial Intelligence as well as 21 other topics of interest. Don't miss this chance and watch them on demand–anywhere, anytime.</SPAN></P><H3 id="toc-hId-284207829" id="toc-hId-999711373"><SPAN><STRONG>Find all our assets</STRONG></SPAN><SPAN> </SPAN></H3><P><SPAN>We at Cloud ERP and SCM Product Success offer a service as versatile as our product itself. Check out the numerous offerings our team has created for you below:</SPAN><SPAN> </SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Hiruni_0-1771357258695.jpeg" style="width: 432px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/373618i43B3989627E88072/image-dimensions/432x433?v=v2" width="432" height="433" role="button" title="Hiruni_0-1771357258695.jpeg" alt="Hiruni_0-1771357258695.jpeg" /></span></P><P class="lia-align-left" style="text-align : left;"><SPAN class="">Don’t hesitate to leave a comment and check out our<SPAN> </SPAN></SPAN><A class="" href="https://pages.community.sap.com/topics/s4hana-cloud" target="_blank" rel="noreferrer noopener"><SPAN class="">community page</SPAN></A><SPAN class=""><SPAN> </SPAN>to ask your questions and engage with the experts. Follow the<SPAN> </SPAN></SPAN><A class="" href="https://community.sap.com/t5/tag/PSCC_Enablement/tg-p/board-id/erp-blog-sap" target="_blank"><SPAN class="">PSCC_Enablement</SPAN></A><SPAN class=""><SPAN> </SPAN>tag to stay up to date with our latest blog posts.</SPAN><SPAN class=""> </SPAN></P><P data-unlink="true"><SPAN>Follow us on</SPAN><SPAN> </SPAN><SPAN><A href="https://twitter.com/sap" target="_blank" rel="noopener nofollow noreferrer">@SAP</A></SPAN><SPAN> </SPAN><SPAN>and #S4HANA, and myself on </SPAN><SPAN><A href="https://www.linkedin.com/in/hiruni-arunodhi-badulle-9535b322a/" target="_self" rel="nofollow noopener noreferrer">Hiruni Arunodhi Badulle | LinkedIn</A>.</SPAN></P>
2026-02-19T14:07:53.164000+01:00