i
Capgemini
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via LinkedIn and was interviewed in Jul 2021. There was 1 interview round.
To add an object to a custom T code in SAP Security & GRC, you need to follow these steps:
Identify the custom T code where you want to add the object
Access the transaction code SE93 to maintain the T code
Enter the T code and click on the 'Create' button
Provide a short description and select the appropriate program type
In the 'Objects' tab, click on the 'Add Object' button
Enter the object name and description
Save the ch...
posted on 20 Dec 2022
I applied via LinkedIn and was interviewed in Nov 2022. There were 2 interview rounds.
SU22 is used to maintain authorization defaults, SU24 is used to maintain authorization checks, and SU25 is used to maintain the upgrade of authorization objects.
SU22 is used to set default values for authorization fields
SU24 is used to maintain authorization checks for transactions and reports
SU25 is used to maintain the upgrade of authorization objects during system upgrades
All three transactions are used in SAP to m
To troubleshoot GRC ARM request submission issue, follow these steps:
Check if the user has the necessary authorization to submit the request
Verify if the request is complete and all mandatory fields are filled
Check if there are any system errors or connectivity issues
Review the GRC logs to identify any errors or warnings
If the issue persists, escalate to the GRC support team for further investigation
MSMP workflow is a tool for defining and executing approval processes in SAP systems. BRF+ is an application used to create business rules.
MSMP workflow is used to define and execute approval processes for various business scenarios in SAP systems.
It allows for the creation of complex approval workflows with multiple levels of approval and parallel processing.
BRF+ is an application used to create business rules that ca...
Roles can be imported in GRC using the Role Upload functionality.
Navigate to Access Management > Role Upload
Select the system and upload the role file in CSV format
Map the fields and validate the data
Submit the job for import
Risk analysis for custom tcodes can be done using SAP GRC Access Control.
Create custom roles and assign tcodes to them
Run risk analysis using SAP GRC Access Control
Analyze the results and mitigate any identified risks
Regularly review and update custom roles and tcodes
Consider using SAP GRC Access Control's continuous compliance monitoring feature
Expert mode in PFCG allows advanced customization of authorization roles.
Expert mode provides access to additional tabs and fields for fine-tuning roles.
It allows for more complex authorization logic and the ability to add custom fields.
Expert mode should only be used by experienced users as it can be complex and difficult to troubleshoot.
Examples of advanced customization include restricting access to specific transac
Centralized EAM system has a single database while Decentralized EAM system has multiple databases.
Centralized EAM system is easier to manage and maintain.
Decentralized EAM system provides more flexibility and autonomy to individual departments.
Preference depends on the organization's size, structure, and requirements.
I applied via Referral and was interviewed in Oct 2022. There were 2 interview rounds.
T code maintenance involves customizing transaction codes in SAP system.
T code maintenance is done using transaction code SE93.
It involves creating, modifying or deleting transaction codes.
Customization can be done by changing the screen layout, adding fields, etc.
Authorization checks can also be added to the transaction code.
Examples of customized transaction codes are ZMM01 for creating material master data and ZFI01
CUA configuration allows central management of users across multiple systems.
CUA stands for Central User Administration
It allows for central management of user accounts across multiple systems in a landscape
Users can be created, modified, and deleted from a central location
Password policies can be enforced across all systems
Example: A company with multiple SAP systems can use CUA to manage user accounts across all syst
EAM component is used in GRC for managing access to critical assets.
EAM stands for Enterprise Asset Management
EAM component in GRC helps in managing access to critical assets
It enables organizations to identify, track, and manage access to assets such as servers, databases, and applications
EAM component also helps in identifying and mitigating risks associated with these assets
For example, EAM can be used to manage acc...
I applied via Recruitment Consulltant and was interviewed in Oct 2022. There was 1 interview round.
For example, a ₹10 LPA CTC could mean an in-hand salary of ₹70,000–₹75,000 per month, depending on deductions and benefits.
✨ 𝗣𝗿𝗼 𝗧𝗶𝗽: Always request a detailed salary structure during negotiations—it’s your roadmap to making informed decisions
𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!
We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
I applied via Walk-in and was interviewed in Dec 2024. There were 4 interview rounds.
About my Background and my job
About my physical experience
Confirm the job on my capabilities
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Security refers to measures taken to protect people, property, and information from harm or unauthorized access.
Security involves implementing procedures, technologies, and personnel to prevent and respond to threats
Examples include surveillance cameras, access control systems, security guards, and cybersecurity measures
Security measures can vary depending on the specific needs and risks of a particular environment or
Security officers are essential in the industry to protect people, property, and assets from potential threats and ensure a safe environment.
Prevent unauthorized access to facilities
Monitor surveillance cameras and alarms
Respond to emergencies and incidents
Enforce safety and security policies
Provide a visible deterrent to potential criminals
Vehicles are checked before entering the gate by security officers for safety and security purposes.
Check for valid identification and authorization to enter the premises
Inspect the vehicle for any suspicious items or signs of tampering
Verify the purpose of the visit and destination within the premises
Use mirrors to check the undercarriage of the vehicle for any hidden objects
Check the trunk and interior of the vehicle
Vehicles are checked at the gate by security officers for safety and security purposes.
Security officers visually inspect vehicles for any suspicious items or behavior
Security officers may use mirrors to check the undercarriage of vehicles for hidden items
Security officers may use metal detectors to check for weapons or other prohibited items
Security officers may ask drivers to open trunks or other compartments for ins
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
SAP Security involves protecting SAP systems from unauthorized access and ensuring data integrity.
SAP Security involves setting up user roles and authorizations to control access to sensitive data
It includes implementing security measures such as encryption, authentication, and monitoring
Regular security audits and updates are essential to maintain a secure SAP environment
GRC stands for Governance, Risk, and Compliance. It is used to manage regulations and policies within an organization.
GRC helps organizations align their operations with regulatory requirements and internal policies.
It provides a framework for managing risks and ensuring compliance with laws and regulations.
GRC solutions often include tools for policy management, risk assessment, and compliance monitoring.
Examples of G...
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Vulnerability management in cloud environment involves identifying, prioritizing, and mitigating security weaknesses.
Regularly scan cloud infrastructure for vulnerabilities
Patch and update software to address vulnerabilities
Implement access controls and encryption to protect data
Utilize security tools like intrusion detection systems and firewalls
Monitor and analyze security logs for suspicious activity
Storage maintenance in Azure involves monitoring, optimizing, and managing storage resources to ensure performance and availability.
Regularly monitor storage usage and performance metrics
Optimize storage by implementing tiered storage and data archiving
Manage access controls and permissions to prevent unauthorized access
Implement backup and disaster recovery strategies for data protection
Update storage configurations a
based on 14 reviews
Rating in categories
Consultant
55.2k
salaries
| ₹5.2 L/yr - ₹18 L/yr |
Associate Consultant
50.9k
salaries
| ₹2.9 L/yr - ₹11.8 L/yr |
Senior Consultant
45.9k
salaries
| ₹7.5 L/yr - ₹25 L/yr |
Senior Analyst
21k
salaries
| ₹2 L/yr - ₹9 L/yr |
Senior Software Engineer
20.1k
salaries
| ₹3.5 L/yr - ₹12.3 L/yr |
Wipro
Accenture
Cognizant
TCS