HomeAboutBlog ContactSAPHTML SQLPython
🔐 SAP GRC · Governance · Risk · Compliance · 2026

SAP GRC Basics for Beginners - Everything You Need to Know, Explained Simply

2026 Guide Pramod Behera 30 min read SAP GRC · Access Control · SoD · Firefighter · Roles

🔐 What Is SAP GRC - and Why Should a Beginner Care?

Today we are discuss SAP GRC Basics.Let me tell you a story that happened at a real Indian manufacturing company. A purchase officer - let us call him Praju - had access to two things in SAP: he could create new vendors, and he could also approve payments to vendors. One day, Praju created a fake vendor with his cousin's bank account. Then he raised a purchase order to that fake vendor. Then he approved the payment himself. By the time the auditor noticed, ₹38 lakhs had walked out the door. Nobody caught it because the system never stopped him - he had all the access he needed to do the whole thing himself. That is exactly the problem SAP GRC solves. GRC stands for Governance, Risk, and Compliance - and in plain language it means: making sure the right people have access to the right things in SAP, that no single person can do something harmful from start to finish without anyone else noticing, and that the whole thing is documented well enough to satisfy an auditor. This tutorial or document Let’s break it down step by step in a clear, beginner-friendly way.

🏛️

What GRC Actually Is

SAP GRC is a suite of tools - not one single thing. We cover all four components and explain which one matters most for beginners to learn first.

🚦

Real SoD Conflicts

Three real Segregation of Duties conflicts explained using actual SAP transaction codes - the kind you will find in any real company audit.

🏭

Arjun Industries Scenario

A complete real-time scenario showing how GRC catches a risky access request before it reaches production - step by step.

Access Control (AC)
Risk Management (RM)
Process Control (PC)
Segregation of Duties
Firefighter Access
Access Certification

🗺️ SAP GRC - The Four Components Every Beginner Must Know

SAP GRC is not one tool - it is a four separate components, each solving a different problem. Most companies start with just one of them and add the others over time. For beginners, the most important one to learn is Access Control - it is used in virtually every SAP implementation that has a security or compliance team, and it is the component that handles Segregation of Duties, user access requests, and the Firefighter emergency access that comes up in almost every SAP interview.

Also Think of GRC like the security system in a large hospital. Access Control is the key card system that decides who can enter which room. Risk Management is the incident tracking system that logs when something goes wrong. Process Control is the daily checklist that nurses and doctors follow to make sure procedures are done correctly. Audit Management is the inspector who comes every year to verify that all three are working. SAP GRC does exactly the same thing - just for your SAP system instead of a hospital.

🔑
Access Control (AC)
The most important one for beginners

What it does: Manages who has access to what in SAP. Automatically detects when a user's roles create a Segregation of Duties conflict. Manages the workflow for requesting and approving new access. Provides Fire fighter IDs for emergency access. Runs periodic access certification reviews.

Who uses it: SAP Security consultants, GRC administrators, IT auditors, compliance managers, and business process owners who approve access requests.

The main T-Code area: Accessed via NWBC (NetWeaver Business Client) - not via the traditional SAP GUI menu. This surprises most beginners who expect SAP-style transactions.

⚠️
Risk Management (RM)
Enterprise-wide risk tracking

What it does: Creates and manages a central risk register for the entire company. Each risk has an owner, a possibility rating, an impact rating, and a list of controls that mitigate it. Tracks whether mitigating controls are working. Alerts management when risk levels cross thresholds.

Who uses it: Risk managers, internal audit teams, CFO and board-level reporting, compliance officers. Less commonly used by SAP functional consultants than Access Control.

In plain language: Imagine a spreadsheet of everything that could go wrong in your company - but smarter, with automated monitoring and escalation. That is Risk Management.

Process Control (PC)
Automated controls testing

What it does: Documents and tests internal controls - the rules and procedures a company uses to prevent errors and fraud. Connects directly to SAP to run automated tests: does every payment above Rs 10 lakhs have two approvals? Are all goods receipts matched to purchase orders? Produces evidence for SOX, Ind AS, and other compliance frameworks.

Who uses it: Internal audit, CFO office, compliance teams. Common in listed companies that must meet SOX (Sarbanes-Oxley) requirements or file with SEBI.

In plain language: It is the system that automatically checks every night whether the rules are being followed - so you do not have to check manually.

📋
Audit Management (AM)
End-to-end audit lifecycle

What it does: Manages the complete internal and external audit lifecycle - planning, fieldwork, findings, corrective actions, and closure. Creates an audit universe (every auditable area in the company). Tracks audit findings through to resolution. Provides evidence to external auditors. Links findings back to risks and controls in RM and PC.

Who uses it: Internal audit departments and external auditors who need to submit findings. The least commonly implemented component for beginners to encounter on their first GRC project.

In plain language: Everything the auditor does - from planning the audit to closing the final finding - lives here instead of on scattered Excel spreadsheets.

💡

Which Component to Focus on First: If you are a beginner going for an SAP GRC job, learn Access Control first. It is implemented in almost every company that runs SAP, it comes up in every security and audit interview, and the concepts - Segregation of Duties, role management, access requests, Firefighter IDs - are the foundation for everything else. Risk Management and Process Control are important but they appear more in large enterprises and consulting practices. Audit Management is the most niche of the four.

⚔️ Segregation of Duties - The Concept That Explains Everything

Segregation of Duties - SoD for short - is the single most important concept in SAP GRC. Everything else builds on it. The idea is simple: no one person should have the ability to do something harmful from beginning to end, all by themselves, without anyone else being involved. Every step of a risky process should require a different person, so that fraud or error cannot happen without at least two people being complicit.

The classic real-world example is cash. In a small shop, the same person who receives cash also keeps the books. That is an SoD conflict - one person has full control with no check. In a large company, the person who receives cash is different from the person who records it, who is different from the person who reconciles the bank statement, who is different from the person who approves expenditure. That is proper Segregation of Duties - each person only sees one part of the picture, so nobody can steal without at least one other person noticing.

In SAP, SoD conflicts happen when one user has roles that give them access to perform two or more functions that should always be done by different people. Here are three of the most common and most dangerous SoD conflicts you will find in real SAP implementations:

SoD RISK: MM-FI-001
Create Vendor + Approve Vendor Payment - The Classic Fraud Risk
🔴 Critical
Module: MM + FI
Risk Level: Critical
Regulatory: SOX, Ind AS, GDPR
The Two Conflicting Functions
FK01 - Create Vendor
F110 - Run Payment Program
Why It Is Dangerous

If the same person can create a vendor AND approve or trigger payments to vendors, they can create a imaginary vendor with their own bank account, raise invoices from that vendor, and pay themselves - all without anyone else's involvement. This is not a theoretical risk. It is the most common fraud pattern in SAP environments world-wide. At the Pune manufacturing company mentioned at the start of this guide, this exact conflict was the root cause of the Rs 38 lakh fraud.

How SAP GRC Catches It

GRC's risk ruleset contains this conflict as a predefined rule. The moment someone requests a new role that includes FK01 (or XK01 - create vendor in MM), GRC automatically runs a risk analysis against that user's existing roles. If the user already has F110 access - or any role containing RFFOUS_T (the payment program) - GRC flags this as a Critical SoD conflict and either blocks the access request or routes it for special senior management approval.

Conflicting T-Codes: FK01 / XK01 (create vendor) · F110 / RFFOUS_T (payment run) · F-53 (manual payment) · Review via GRC risk analysis
SoD RISK: FI-AP-002
Post Vendor Invoice + Release Payment Block - Double Control Bypass
🟠 High
Module: FI-AP
Risk Level: High
Regulatory: Internal Audit, SOX
The Two Conflicting Functions
MIRO - Post Vendor Invoice
FBRA - Reset Cleared Items / Release Block
Why It Is Dangerous

In a well-controlled process, when a vendor invoice is posted it goes through an approval process before payment is released. A payment block is set automatically, and a different person must review and release it. If the same person who posts the invoice can also remove the payment block, they can post a fraudulent or inflated invoice and immediately release it for payment - bypassing the approval control that was put in place specifically to catch this kind of thing. The control only works when two different people are involved.

How SAP GRC Catches It

GRC's risk ruleset maps the authorisation objects behind MIRO (MR_EINZEL for invoice entry) against the objects behind FBRA (F_BKPF_BUK for document change). When a user has both, GRC flags the conflict. The typical mitigation is a compensating control - a monthly report showing all invoices where the poster and the block-remover are the same user, reviewed by a manager.

Conflicting: MIRO (post invoice) · FBRA (reset items / release block) · Also: FB60 vs F-44 · Mitigating control: monthly dual-role exception report
SoD RISK: SD-FI-003
Create Sales Order + Create Customer + Billing - Full Revenue Cycle Control
🟡 Medium
Module: SD + FI-AR
Risk Level: Medium
Regulatory: Internal Audit
The Two Conflicting Functions
VD01 - Create Customer
VF01 - Create Billing Document
Why It Is Dangerous

If the same person can create customers in the system AND raise billing documents against those customers, they could manipulate revenue - creating fictitious customers to inflate sales figures, or adjusting customer credit limits and billing addresses to divert payments. In a listed company reporting under Ind AS 115 (Revenue from Contracts with Customers), any manipulation of the customer creation and billing process carries serious regulatory risk beyond just financial fraud.

How SAP GRC Catches It

This conflict is rated Medium because the fraud potential is somewhat less direct than the vendor payment conflict - there are more steps involved and more people who would see the customer in reports. GRC flags it, but many companies accept it with a compensating control: a weekly report of all billing documents where the billing user also has customer master change access, reviewed by the sales manager.

Conflicting: VD01 (create customer) · VA01 (create sales order) · VF01 (billing) · Compensating: weekly exception report reviewed by sales director

The Four Ways to Handle an SoD Conflict: When GRC finds an SoD conflict, there are exactly four options - and only four. (1) Remove the access: take one of the conflicting roles away from the user. This is the cleanest solution but not always practical. (2) Redesign the roles: split the conflicting transactions into separate roles that are never assigned to the same person. (3) Accept with a mitigating control: keep both accesses but implement a compensating control - usually a regular report that flags when one person did both sides of the conflict, reviewed by a senior person. (4) Accept the risk formally: business justifies why this conflict is acceptable given the company's size, controls, and risk appetite, and documents it. Only option 1 and 2 actually fix the conflict - options 3 and 4 manage it, but the risk remains.

📝 How Access Requests Work in SAP GRC - Step by Step

The most common thing a GRC administrator does every day is handle access requests. Someone needs a new role in SAP - maybe they got promoted, maybe they moved to a new department, maybe they are a new joiner. Instead of just handing out access, GRC runs an automated check to see whether the new role would create an SoD conflict. If it does, a workflow kicks in for human review. Only after appropriate approvals does the access actually get assigned. This whole process is called the Access Request Management workflow, and it leaves a complete audit trail of who asked for what, who approved it, when, and why.

🙋
User
Submits
Request
🤖
GRC Runs
Risk
Analysis
👔
Manager
Approves
Request
🔒
Security
Reviews
SoD Risk
Role
Assigned
in SAP
REAL SCENARIO

Arjun Industries Ltd - New Accounts Payable Executive Gets Access Request Flagged

Pooja Sharma joined Arjun Industries Ltd as an Accounts Payable Executive on 7 April 2026. Her manager, Suresh Rao, submits an access request for her in SAP GRC. He requests two roles: Z_FI_AP_INVOICE (vendor invoice posting - MIRO) and Z_MM_VENDOR_MASTER (vendor master maintenance - FK01/FK02). This is exactly what Priya needs to do her job - she will post vendor invoices and maintain vendor details. Here is exactly what happens next in the GRC system.

1
Step 1 - Suresh Submits the Access Request in GRC

Suresh logs into the GRC NWBC portal (the NetWeaver Business Client - the web-based interface for GRC, not the traditional SAP GUI). He goes to Access Management → Access Request → New Request. He enters Priya's user ID PSHARM001, selects the two roles, and types a business justification: "New AP Executive - needs vendor master maintenance and invoice posting access for daily AP operations starting 10-Apr-2026." He sets a validity period: 10-Apr-2026 to 31-Mar-2027 (end of financial year). He submits the request. Request number GRC-REQ-2026-00445 is created.

GRC Portal: NWBC → Access Management → Access Request · Request ID: GRC-REQ-2026-00445 · Validity: 10-Apr-2026 to 31-Mar-2027
2
Step 2 - GRC Runs Automatic Risk Analysis in Real Time

The moment Suresh submits the request, GRC automatically runs a risk analysis - checking whether the combination of Z_FI_AP_INVOICE + Z_MM_VENDOR_MASTER creates any SoD conflicts. GRC compares the authorisation objects in these two roles against the risk ruleset. It finds a match: Z_FI_AP_INVOICE contains access to MIRO (post vendor invoice) and Z_MM_VENDOR_MASTER contains access to FK01 (create vendor). This combination matches SoD Risk Rule MM-FI-001 - the Critical conflict between vendor master maintenance and vendor payment processing. GRC flags the request with a Critical SoD risk. The request does not get auto-approved - it is routed to a special security review step.

GRC Risk Analysis: real-time check at request submission · Ruleset: SAP_GRC_RULESET (standard) · Risk found: MM-FI-001 (Critical) · Routing: escalated to Security team
3
Step 3 - Manager Approval with Risk Acknowledgment

GRC sends an email notification to Suresh: "Your access request GRC-REQ-2026-00445 has been flagged with a Critical SoD risk. Please review and provide business justification for the risk." Suresh logs back into the GRC portal, reviews the risk description, and realises that giving Priya both vendor master and invoice posting access is genuinely risky - even for normal daily operations. He consults the Finance Controller, Priya Mehta. They decide to split the access: Priya will have invoice posting (Z_FI_AP_INVOICE) but vendor master changes will be handled by a senior AP executive, Rakesh Kumar, who has no payment access. Suresh updates the request: removes Z_MM_VENDOR_MASTER and resubmits.

Manager action: GRC portal → My Inbox → Request GRC-REQ-2026-00445 → Review Risk → Modify Request → Remove conflicting role → Resubmit
4
Step 4 - Second Risk Analysis Passes Clean

The modified request - now only requesting Z_FI_AP_INVOICE - goes through GRC's risk analysis again. This time no SoD conflicts are found. The role gives Priya access to MIRO, MIR4, and FBL1N (vendor line item display) - all within the accounts payable posting function, with no access to vendor master creation or payment approval. Risk analysis result: No Risks Found. The request automatically moves to the next step: manager approval. Suresh confirms the approval and adds the business justification. The request moves to the Security team for technical provisioning.

Re-analysis result: No SoD conflicts found · Role: Z_FI_AP_INVOICE · Contains: MIRO, MIR4, FBL1N, FB03 (display only) · No conflicting functions
5
Step 5 - Security Team Provisions the Role in SAP

The GRC Security team receives the approved request. They verify the role contents against the business justification - do the transactions in Z_FI_AP_INVOICE match what an AP Executive actually needs? Yes: MIRO for posting, MIR4 for displaying invoices, FBL1N for checking vendor balances. They confirm provisioning. GRC automatically assigns role Z_FI_AP_INVOICE to user PSHARM001 in SAP with validity 10-Apr-2026 to 31-Mar-2027. Priya receives an email: "Your SAP access has been provisioned. You may now log in using your user ID PSHARM001." The entire process - from request submission to provisioning - took 4 hours on a same-day basis because the conflict was caught and resolved cleanly.

Provisioning: GRC → SU01 automated assignment · Role: Z_FI_AP_INVOICE · User: PSHARM001 · Validity: 10-Apr-2026 to 31-Mar-2027 · Full audit trail in GRC request log
💡

Why the Audit Trail Matters More Than the Approval: Many beginners think the point of the GRC access request workflow is the approval - getting a manager to say yes. But the real value is the audit trail. Every request in GRC is permanently logged: who requested it, what business justification they gave, which risks were found, who approved it, when, and what compensating controls were noted. Six months later when an external auditor asks "why does Priya have invoice posting access and who approved it?", the answer is in GRC in two clicks. Without GRC, that answer involves digging through emails - if they still exist - or just saying "we do not know." Auditors do not like "we do not know."

🚒 Firefighter IDs - Emergency Access Done Right

Sometimes something breaks in production at 2am on a Sunday and the only person who can fix it is a developer or a Basis engineer - neither of whom should normally have access to the production system. You cannot wait until Monday to restore the database. You cannot leave the system broken. But you also cannot just give that person permanent admin access - that is exactly the kind of unrestricted access that auditors flag as a major control deficiency.

This is what the Firefighter ID solves - and it is one of the most elegant things in SAP GRC. A Firefighter ID (sometimes called Emergency Access Management) is a special privileged SAP user account that can be used temporarily in emergencies. Every action taken while logged in as a Firefighter ID is completely and automatically logged - every T-code executed, every table changed, every document posted. After the session, an owner reviews the log and either confirms the activity was legitimate or raises an alert if something unexpected happened.

🚒 How a Firefighter Session Works - Real Example
1
Emergency happens: Sunday 2:14am - the month-end payment run (F110) in production is failing with a Basis-level profile error. The payment needs to go out by 6am. Suresh Mehta (Basis engineer) cannot log in with his normal ID - he has no production access.
2
Firefighter request: Suresh logs into the GRC NWBC portal and requests Firefighter ID FF_BASIS_PROD_01. He selects the reason code "Payment Run Emergency" and types the justification: "F110 job failing - profile parameter error blocking payment for 2,400 vendors. Month-end deadline 06:00 IST." He selects the expected duration: 4 hours.
3
Approver notified instantly: GRC sends an SMS and email to the Firefighter Controller - the IT Manager, Rajesh Patel, who is the designated approver for emergency production access. Rajesh gets the notification at 2:16am, reviews the justification on his phone, and approves via the GRC mobile portal. The approval takes 4 minutes.
4
Session begins - everything logged: Suresh logs into production SAP using Firefighter ID FF_BASIS_PROD_01. Every T-code he runs is captured by GRC: SM59, RZ10, SM21, F110. Every profile parameter he changes is logged with the old value and the new value. If he accidentally ran something he should not have - say, deleted a table entry - that would be in the log too.
5
Payment run completes, session ended: Suresh fixes the profile parameter issue at 3:45am, re-runs F110, the payment job completes successfully for all 2,400 vendors. He closes the Firefighter session in the GRC portal at 3:52am. Total session time: 1 hour 36 minutes.
6
Log review - the control that makes this safe: On Monday morning, Rajesh Patel opens the GRC Firefighter log for session FF_BASIS_PROD_01 dated 13-Apr-2026. He reviews every T-code Suresh executed. Everything is legitimate - only Basis transactions related to the payment run fix. Rajesh approves the log with a note: "All activity related to F110 emergency fix - verified and approved." The session is now permanently documented. The auditor will see this in the next review and have a complete, clean record of why an engineer had production access for 96 minutes on a Sunday.
SAP GRC Firefighter - Key Roles and Responsibilities
RoleWho This Person IsWhat They Do in FirefighterGRC Permission
FirefighterThe person who needs emergency access - typically a Basis engineer, ABAP developer, or senior consultantRequests the Firefighter session, performs the emergency task, closes the session and documents what was doneCan request and use assigned Firefighter IDs only - cannot approve their own sessions
Firefighter ID OwnerSenior IT person responsible for a specific Firefighter ID - usually the IT Manager or Application ManagerApproves or rejects the request to use the Firefighter ID in real time. Reviews the activity log after the session and approves or raises an alert.Can approve requests for IDs they own. Receives email/SMS alert immediately when their ID is requested.
Firefighter ControllerThe compliance or audit person who owns the overall Firefighter programme - often the GRC Administrator or Internal AuditorMonitors all Firefighter sessions across all IDs. Reviews logs that the ID Owner has not reviewed within the SLA. Generates audit reports. Escalates unusual activity.Sees all Firefighter sessions regardless of which ID they belong to. Cannot approve individual sessions - that is the ID Owner's job.
GRC AdministratorThe SAP GRC system administrator - manages the GRC tool itselfCreates and maintains Firefighter IDs. Assigns Firefighters to IDs. Sets validity periods. Configures notification rules. Generates compliance reports for auditors.Full GRC administrative access - can see everything in the GRC system

What the Auditor Looks for in Firefighter: An external auditor reviewing SAP GRC will check three specific things about Firefighter. First: are all Firefighter sessions approved before the session starts - or are people using Firefighter IDs without approval? Second: are the session logs being reviewed within the SLA (typically 5 business days) - or are logs sitting unreviewed for weeks? Third: are the activities in the log consistent with the stated justification - or did someone use an emergency access request to do routine work they should not normally be able to do? If all three are clean, the auditor sees a well-run privileged access management programme. If any one fails, it is a finding.

🧱 SAP Roles and the GRC Risk Ruleset - How They Connect

To really understand GRC Access Control, you need to understand the relationship between SAP roles and the GRC risk ruleset. SAP roles are the building blocks of access - they contain authorisation objects that give users permission to run specific transactions. The GRC risk ruleset is the library of rules that define which combinations of authorisations are dangerous. When GRC checks for SoD conflicts, it is comparing the authorisation objects inside a user's roles against the rules in the ruleset. If a user's combined authorisations match a risky combination defined in a rule, GRC flags the conflict.

Understanding SAP Roles - From Single Role to User Assignment

SAP Role Hierarchy - From Authorisation Object to User Assignment
LevelObjectWhat It IsReal Example at Arjun IndustriesT-Code
1 - Authorisation Object Auth Object The most granular level. Defines a specific permission - which activity (create/change/display/delete) on which object (document type/company code/plant). Everything in SAP security is built from authorisation objects. F_BKPF_BUK: allows posting (activity 01) to FI documents in company code 1000. Without this object, MIRO is completely inaccessible to the user. SU21 (display auth objects)
2 - Authorisation Profile Profile A collection of authorisation objects bundled together. Profiles are assembled by SAP automatically when roles are generated - you usually do not build profiles manually anymore, but they exist in the background. Profile T-AP001P0 contains 12 authorisation objects that together give access to the accounts payable invoice posting process. SU02 (display profiles)
3 - Single Role Role (PFCG) A named collection of T-codes and their underlying authorisation objects. This is what gets assigned to users. A good role is designed around one business function - one person's job in one process. In GRC's language, a role that maps to one business function is called a "Function". Z_FI_AP_INVOICE: contains MIRO, MIR4, FB03, FBL1N - all the T-codes a vendor invoice entry clerk needs and nothing more. PFCG (role maintenance)
4 - Composite Role Composite Role A role that contains other single roles. Used to bundle multiple single roles into a package that can be assigned together. In GRC, composite roles make risk analysis more complex - GRC must look through the composite role into the single roles to find the actual authorisation objects. Z_FI_AP_EXECUTIVE: a composite role containing Z_FI_AP_INVOICE + Z_FI_DISPLAY_REPORTS + Z_FI_GL_DISPLAY. Assigned to AP Executives so they get all three single roles in one assignment. PFCG (composite role tab)
5 - User Assignment SU01 / GRC The final step - assigning a role to a specific user with a validity period. In a GRC-managed environment, this should NEVER be done directly in SU01 - it should always go through the GRC access request workflow so there is an approval and audit trail. User PSHARM001 (Pooja Sharma) assigned role Z_FI_AP_INVOICE with validity 10-Apr-2026 to 31-Mar-2027 via GRC request GRC-REQ-2026-00445. SU01 (direct) or GRC (preferred)

The GRC Risk Ruleset - How SAP Knows What Is Risky

The GRC risk ruleset is the heart of the SoD engine. SAP ships a standard ruleset called SAP_GRC_RULESET containing hundreds of predefined rules covering the most common SoD conflicts across all SAP modules. Most companies customise this ruleset to remove rules that do not apply to their industry and add rules that are specific to their business processes. A rule in the ruleset has five components:

Structure of a GRC Risk Rule - MM-FI-001 Explained in Full
Rule ComponentWhat It ContainsExample: MM-FI-001
Risk IDUnique identifier for the rule - used in reports, audit findings, and risk sign-off documentsMM-FI-001
Risk NameHuman-readable name describing the conflict"Create Vendor Master and Process Vendor Payments"
Risk LevelCritical / High / Medium / Low - drives the severity of the flag and the approval workflow requiredCritical - maximum scrutiny, requires CFO-level sign-off to accept
Function 1 (conflicting side A)The first function in the conflict - a named group of authorisation objects that together represent a business capabilityFunction: VENDOR_CREATE - contains auth objects for FK01, XK01, MK01 (create vendor in FI, MM Purch., MM Invoice)
Function 2 (conflicting side B)The second function in the conflict - when a user has BOTH Function 1 and Function 2, the risk firesFunction: PAYMENT_PROCESS - contains auth objects for F110 (payment program), F-53 (manual payment), F-58 (payment order)
Mitigating Control IDIf the risk is accepted with a compensating control, this links to the control definition in GRC Process ControlMC-AP-001: "Monthly report of all users with both VENDOR_CREATE and PAYMENT_PROCESS functions - reviewed by CFO"
⚠️

The Ruleset Tuning Problem Most Beginners Miss: SAP's standard GRC ruleset has a lot of rules in it - more than 1,500 in some versions. Many of these rules are relevant for specific industries (oil and gas, banking, pharma) and not at all relevant for a manufacturing company like Arjun Industries. If you activate the full standard ruleset without customising it, GRC will flag hundreds of conflicts that are not real risks for your business. The result: users lose trust in GRC because every access request comes back with 15 "risks" that everyone knows are not real risks. Tuning the ruleset - activating only the rules that are genuinely relevant to your business processes - is one of the most important and least glamorous tasks in a GRC implementation.

📋 Access Certification - Because Roles Accumulate Like Clutter

Here is something that happens in every SAP system without GRC: people change jobs, get promoted, move to different departments - and nobody ever removes their old access. The procurement manager who used to be an AP clerk still has Z_FI_AP_INVOICE from four years ago. The warehouse supervisor who rotated through the finance team for three months in 2023 still has Z_FI_GL_POSTING. Over time, users accumulate roles they no longer need, and the SoD landscape gets progressively worse - not because anyone added risky access intentionally, but because nobody cleaned up the old access that people stopped needing.

SAP GRC Access Certification solves this with a formal periodic review process. Every quarter or every year, GRC automatically generates a review campaign. Each manager receives a list of every role their team members currently hold. The manager must review each assignment and either certify it (yes, this person still needs this access for their job) or revoke it (no, this person no longer needs this access). Any access that the manager revokes - or that the manager fails to certify within the deadline - is automatically removed from the user.

CERTIFICATION

Arjun Industries - Quarterly Access Review: What Suresh Finds in His Team

On 1 April 2026, GRC automatically launches the Q1 2026 Access Certification campaign. Suresh Rao, Finance Manager at Arjun Industries, receives an email: "You have 8 access certifications requiring your review by 15-April-2026." He logs into the GRC NWBC portal and sees his team's current access assignments. Here is what he finds:

1
Ananya Patel - Role She No Longer Needs

Ananya was transferred from AP to AR (Accounts Receivable) six months ago. Her current roles show Z_FI_AP_INVOICE (accounts payable invoice posting) - her old AP role - and Z_FI_AR_BILLING (AR billing role) - her new role. She does not use the AP role anymore. Suresh clicks "Revoke" on Z_FI_AP_INVOICE and adds the note: "Ananya transferred to AR in September 2025 - AP role no longer required." GRC will automatically remove this role from her user at the end of the campaign.

Action: Revoke Z_FI_AP_INVOICE from APATEL001 · Reason: role transfer · GRC will execute SU01 removal at campaign close on 15-Apr-2026
2
Rakesh Kumar - A Role He Still Needs But With a High SoD Risk

Ramesh is a senior AP executive. His certification shows a High SoD Risk flag on his current access: he has both Z_MM_VENDOR_MASTER (vendor master changes) and Z_FI_PAYMENT_APPROVAL (payment approval in workflow). This is a High SoD conflict - the same pattern that Suresh was careful to avoid when onboarding Priya. Suresh realises this risk has existed on Ramesh's access for over a year - nobody caught it because there was no regular review. He escalates to the GRC administrator to investigate whether to remove Z_FI_PAYMENT_APPROVAL or implement a compensating control for Ramesh.

Finding: Existing SoD risk on RKUMAR001 - Z_MM_VENDOR_MASTER + Z_FI_PAYMENT_APPROVAL = Risk FI-MM-004 (High) · Escalated to GRC admin for remediation
3
Pooja Sharma - New Joiner, Certified Immediately

Priya joined on 10-Apr-2026 with Z_FI_AP_INVOICE only - no SoD risks. Suresh reviews her assignment and certifies it: "Yes, Priya is my new AP Executive and needs invoice posting access." He confirms the role is appropriate for her job. Certification complete for PSHARM001 - valid for the next 12 months until the next campaign.

Action: Certify Z_FI_AP_INVOICE for PSHARM001 · No SoD risks · Next review: Q1 2027 campaign

By the end of this one certification campaign, Arjun Industries has: removed one stale role (Ananya's old AP access), identified one hidden SoD conflict that had been sitting undetected for a year (Ramesh's vendor + payment combination), and confirmed that all other access is still appropriate. This is what a mature access management process looks like - not just controlling access when it is granted, but continuously verifying it is still appropriate as the business changes.

Certification Campaign Best Practice: Set your campaign deadline to 15 days - not 30. Managers always push until the last day and 30-day campaigns typically see 80% of certifications submitted in days 28-30. A 15-day window creates appropriate urgency. Also: send automated reminders at Day 5, Day 10, and Day 13 - the GRC system can do this automatically. Any manager who does not certify by the deadline should have their team's access automatically suspended until they complete the review. That consequence is unpopular but it is the only thing that ensures 100% completion rates.

🎯 SAP GRC Interview Questions for Beginners - Real Questions, Real Answers

These are the questions you will actually get asked in an SAP GRC job interview - whether you are applying for an SAP Security consultant role, a GRC administrator position, or an internal audit role at a company that uses SAP. The answers here are written the way a candidate with 1–2 years of GRC experience would answer - confident, specific, and grounded in real examples.

SAP GRC Basics - Interview Questions with Strong Beginner-Level Answers
QuestionStrong Answer for Beginners
What does GRC stand for and what does SAP GRC do? GRC stands for Governance, Risk, and Compliance. SAP GRC is a suite of four tools: Access Control (manages who has what access in SAP and prevents SoD conflicts), Risk Management (tracks enterprise-wide risks), Process Control (tests internal controls automatically), and Audit Management (manages the audit lifecycle). For most companies and most job roles, Access Control is the one that matters most. It prevents fraud by ensuring no single person has the ability to perform two conflicting activities - like creating a vendor and approving payments to that vendor.
What is Segregation of Duties and can you give a real example? SoD means that conflicting activities - activities that together could enable fraud or serious error - must be performed by different people. The classic example: the same person should not be able to create a vendor in SAP (FK01) AND approve payments to that vendor (F110). If one person can do both, they could create a fake vendor and pay themselves. In a well-designed system, the person who creates vendors never has payment approval access, and vice versa. SAP GRC enforces this by checking every role assignment against a ruleset of known SoD conflicts and flagging any that are found.
What is a Firefighter ID in SAP GRC? A Firefighter ID is a special privileged SAP user account used only in emergencies - when someone needs temporary access to do something critical that their normal role does not allow, like a Basis engineer fixing a production system failure at 2am. Every action performed using a Firefighter ID is fully logged by GRC. After the session, the Firefighter ID Owner reviews the log and approves or flags it. This gives companies emergency flexibility while maintaining complete auditability. The key thing auditors check: are logs being reviewed within the SLA, and are sessions being approved before they start?
What is the GRC Access Request workflow? When someone needs a new role in SAP, they raise an access request in the GRC portal (NWBC). GRC automatically runs a risk analysis to check whether the requested role - combined with the user's existing roles - creates an SoD conflict. If a conflict is found, the request is flagged and routed for additional approval. If no conflict exists, it goes through the standard workflow: manager approval, then security team provisioning. The whole process leaves an audit trail: who requested what, what risks were found, who approved it, and when the role was assigned. This trail is what auditors look for.
What is an access certification in SAP GRC? Access certification is a periodic review - usually quarterly or annual - where each manager reviews all the SAP roles assigned to their team members and certifies whether each one is still appropriate. If a role is no longer needed, the manager revokes it. If an SoD risk exists, it is flagged for remediation. Any role the manager does not certify within the deadline is automatically removed. Certification solves the "role accumulation" problem - people changing jobs but keeping all their old access indefinitely. Without certification, SoD risk grows worse over time even when the initial access was clean.
What is the GRC risk ruleset? The risk ruleset is GRC's library of SoD conflict rules. Each rule has: a Risk ID, a description, a risk level (Critical/High/Medium/Low), and two conflicting functions - a function being a set of authorisation objects representing one business capability. SAP ships a standard ruleset called SAP_GRC_RULESET with hundreds of predefined rules. Companies customise this by activating only rules relevant to their industry and adding company-specific rules. Tuning the ruleset is critical - activating too many rules creates "ruleset noise" where every access request flags 15 conflicts and users stop trusting the system.
How is GRC connected to the SAP production system? GRC connects to the production SAP system (and other systems - ECC, S/4HANA, BW) via RFC (Remote Function Call) connectors configured in SM59. These connections allow GRC to read user master data (SU01 data), role assignments, and authorisation objects from the connected systems. The connections are read-only for risk analysis but need write access to provision roles during access request fulfilment. GRC can connect to multiple SAP systems simultaneously - one GRC can manage access across an entire SAP landscape of 5 or more systems from a single point of control.
💡

The Interview Answer That Always Stands Out: When asked about GRC, most candidates give a textbook definition. The answer that gets you the job connects GRC to a real fraud scenario - like the vendor creation + payment approval conflict that results in fictitious vendor payments. Interviewers - especially those from audit backgrounds - have usually seen this exact fraud pattern in real life, and when you describe it confidently with the actual SAP T-codes involved (FK01, F110) they know immediately that you understand the real-world problem GRC solves, not just the product features.

📋 SAP GRC - Complete Beginner Reference

SAP GRC - All Key Terms, T-Codes, Tables, and Concepts in One Place
Term / T-CodeCategoryWhat It IsWhere Beginners Encounter It
GRCConceptGovernance, Risk, and Compliance - SAP's suite of four tools for managing access, risk, controls, and auditsEvery GRC conversation and every interview
SoDConceptSegregation of Duties - no single user should have access to perform two conflicting activities that could enable fraudThe core concept behind all of GRC Access Control
Access Control (AC)GRC ComponentManages user access, SoD checks, access requests, Firefighter IDs, and access certifications in SAPThe first component beginners learn - used in virtually every implementation
Risk Management (RM)GRC ComponentEnterprise risk register with risk owners, likelihood ratings, impact ratings, and control linkageLarger enterprises and listed companies with formal risk management frameworks
Process Control (PC)GRC ComponentDocuments and automatically tests internal controls - connects to SAP to verify controls are workingSOX-compliant companies and those with strong internal audit functions
Audit Management (AM)GRC ComponentManages the complete internal/external audit lifecycle from planning to finding closureInternal audit teams replacing Excel-based audit tracking
NWBCInterfaceNetWeaver Business Client - the web-based portal used to access SAP GRC (not the traditional SAP GUI)Every GRC user - this is how you log into and use GRC
Risk RulesetGRC ConfigThe library of SoD conflict rules - SAP ships SAP_GRC_RULESET as a starting point for customisationGRC implementation and configuration projects
FunctionGRC ConfigA named group of authorisation objects that together represent one business capability (e.g., VENDOR_CREATE)Building and customising the GRC risk ruleset
Risk IDGRC ConfigUnique identifier for an SoD rule (e.g., MM-FI-001) - used in reports, findings, and remediation trackingEvery risk analysis report and audit finding
Access RequestGRC ProcessThe formal workflow for requesting and approving new SAP role assignments - logged in GRC for audit trailDaily GRC operations - the most common activity for GRC administrators
Firefighter IDGRC ProcessSpecial privileged temporary access account - all activity logged, reviewed by ID Owner after sessionEmergency production support situations and SOX/audit reviews of privileged access
Firefighter ControllerGRC RolePerson responsible for monitoring all Firefighter sessions and ensuring logs are reviewed within SLAGRC programme management and audit reviews
Access CertificationGRC ProcessPeriodic manager review of team access - certify (keep) or revoke (remove) each role assignmentQuarterly or annual compliance reviews
Mitigating ControlGRC ConceptA compensating control that reduces the risk of an SoD conflict that cannot be removed - e.g., a monthly exception report reviewed by a managerWhen SoD conflicts cannot be eliminated due to small team size or business requirements
PFCGSAP T-CodeRole Maintenance - create, change, and display SAP single and composite roles and their authorisation objectsAny work involving role design or troubleshooting role-related access issues
SU01SAP T-CodeUser Maintenance - create, change, display user master records including role assignments (use GRC workflow instead)User administration - but in GRC environments, direct SU01 changes should be minimised
SU53SAP T-CodeDisplay last failed authorisation check - run this immediately after an access error to see exactly which auth object is missingTroubleshooting access errors and role-building activities
FK01 / XK01SAP T-CodeCreate Vendor (FI) / Create Vendor (MM) - the most common Function 1 in vendor-related SoD conflictsAppears in almost every SoD conflict discussion involving Accounts Payable
F110SAP T-CodeAutomatic Payment Program - runs batch vendor payments. Highly sensitive - always part of payment-related SoD rulesAP and treasury processes - critical to separate from vendor master access
SM59SAP T-CodeRFC Destinations - where GRC connections to SAP systems are configured (Type 3 ABAP connections)GRC system setup and troubleshooting connectivity between GRC and connected systems
USR02SAP TableUser master table - stores user IDs, password status, login data. GRC reads this to understand current users.User administration and GRC data extraction
AGR_USERSSAP TableRole-to-user assignment table - maps which roles are assigned to which users with validity dates. Core data for GRC risk analysis.GRC risk analysis, access certification, and SoD reporting
AGR_1251SAP TableRole authorisation values - stores the actual authorisation object values within each role. GRC reads this to determine what a role actually allows.Role analysis and SoD rule matching in GRC risk engine

📘 Related SAP Tutorials

SAP FI · All Modules

SAP Real Scenarios - End-to-End

Complete business process walkthroughs across P2P, O2C, R2R, H2R, and PP - with T-codes, tables, and ABAP examples at every step.

Read Tutorial
SAP Testing

How to Track SAP Testing Issues

Complete defect lifecycle from New to Closed - severity classification, real defect examples, and UAT sign-off process.

Read Tutorial
SAP FI · Validations

SAP Validation Sequence Explained

The six-layer validation sequence from field entry to database commit - OB28, GGB0, user exits, and BAdIs with real scenarios.

Read Tutorial