SlideShare a Scribd company logo
1 of 29
Implementing Security and Controls
in PeopleSoft – Best Practices
Introductions
• Lewis Hopkins – working with Security and
Controls in Oracle Applications since 2003.
• Designing and implementing solutions for
Segregation of Duties, Sensitive Access and
Audit/Internal Controls
Security and Control
Points
Poll
Do you currently perform Security Analysis over PeopleSoft?
• We don’t
• Manual
• Query/SpreadSheet based
• Semi Automated
• Fully Automated
Cohesion
Communication – Typically Business Users don’t understand the
Application. Technical Users don’t understand the Risks.
Business Users Technical Users
Responsibility and Ownership
“Foxes watching the
Hen House”
‘Super User’ Access
• Don’t rely on PSADMIN or VP1 generic logins without controls
Options for management:
• Break Glass
• Individual User Logins
Individual User Logins
Employee’s request access to
Production, Sys Admin unlocks
their account and grants the
Roles required for diagnosis.
At the end of the process,
the User’s account is locked again.
One more thing…
Always worth Auditing User Profiles, Roles/Permission
Lists in PeopleSoft.
Low transaction, high impact
Role Assignments
Too many Roles = too many Risks/too difficult to answer who
has access to what
We’ve seen:
160+ Roles per User
12-24 months before Security is regarded as a
mess
Are Role Assignments going through a change request?
Access Definitions
Security too complex – not ‘Business friendly’
Ensure new/copied Security is easy to
read
Re-Use where possible, for example: Sign on process
Delivered Roles have Security issues and please secure ALLPAGES!!
Access Definitions – find the Navigation
Data Security
• Row Security limited in PeopleSoft
• What to do about PCI or PII?
• Field Security, Tokenization, restrict Fields in the Pages,
Database Level Security?
Poll
How do you report on Sensitive or Personal Information in
PeopleSoft?
• We don’t
• Manually
• Haven’t been able to
• Use Scripts to pull data
Is this a good or a bad thing to have?
Opportunities for Securing Data
For Query:
Create Roles/Permission Lists for accessing this Data
Secure them against the Fields you use & the Queries for accessing this information
• Pros: Accountability – track the Roles that have access
• Cons: Can leave out other data required from a table
For Access:
Use Database level Security to Secure or Obfuscate the Data
• Pros: Total Security at the Data level
• Cons: May need each User to have a DB level User
If one DB User, what about Self Service Users?
Production Do’s and Don’ts
• Data Mover and Configuration/Development processes–
secure them!
• Submission of Jobs
• Copy of Production for testing and simulation
– Who wants to refresh every day?
• Don’t rely on Auditing
– The Horse may have bolted already!
Production Do’s and Don’ts
• Separate Configuration from Transactions
• Segregation of Duties and Access Analysis
– OMB
– NIST
– SOX
Compliance is forcing Organizations to change their Approach to
ERP Security and Controls
Smart ERP Security as a Service
Access and SoD Subscription
• Analysis of Security for efficiency
• Power User & Third Party access
• Segregation of Duties
• PII and Sensitive Data Access
• Reports, Recommendations and Project
Management
Access Levels Evaluated
Users/OPRIDs Roles Permission
Lists
Components
Pages Buyers
User
Preferences
Workflow
Approval
Rules
CPA staff maintain ruleset and provide advisory
Rule Maintenance and Controls Assessment
through subscription
Access and SoD Reporting as a Service
Extract Data
from PeopleSoft
Import into
Smart ERP
Run Analysis
No PII or Sensitive
Data is taken
Access and SoD Reporting
• Users and their SoD Violations
• Power User Access
• Sensitive Access
• PII Access
Reports and Remediation
Benefits
• Report on who has access to what in plain
‘English’
• Identify and Remediate Users with too
much access
• Enforce strong Data Security Policies
• Comply with legislation and reduce costs
Reporting and Data Security as it should be..
Exceptions
Sometimes Users need to break the rules…
VP’s, Power Users, Limited Staff, etc
All Exceptions are stored for future reference, and
Reports available
Achieve Best-In-Class Security and Controls
Solutions
• Segregation of Duties/Access
Reporting
• Access Provisioning
• Transaction Monitoring
• Configuration Monitoring
Services
• Security and Configuration ‘Scans’
• Security Design and
Implementation
• Training & Review
For more information:
www.smarterp.com
Lewis.Hopkins@smarterp.com

More Related Content

What's hot

Sadhana Prasad_Resume_2016
Sadhana Prasad_Resume_2016Sadhana Prasad_Resume_2016
Sadhana Prasad_Resume_2016
Sadhana Prasad
 
staff_performance_formb
staff_performance_formbstaff_performance_formb
staff_performance_formb
Timothy Olson
 
Resume_Prachi_Rattan_2016
Resume_Prachi_Rattan_2016Resume_Prachi_Rattan_2016
Resume_Prachi_Rattan_2016
Prachi Rattan
 

What's hot (15)

Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
Sadhana Prasad_Resume_2016
Sadhana Prasad_Resume_2016Sadhana Prasad_Resume_2016
Sadhana Prasad_Resume_2016
 
Capturing Measurable Non Functional Requirements
Capturing Measurable Non Functional RequirementsCapturing Measurable Non Functional Requirements
Capturing Measurable Non Functional Requirements
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riport
 
Functional and non functional
Functional and non functionalFunctional and non functional
Functional and non functional
 
Eliciting Non-Functional Requirements
Eliciting Non-Functional RequirementsEliciting Non-Functional Requirements
Eliciting Non-Functional Requirements
 
Website's functional and non functional requirements
Website's functional and non functional requirementsWebsite's functional and non functional requirements
Website's functional and non functional requirements
 
Develop a process model
Develop a process modelDevelop a process model
Develop a process model
 
staff_performance_formb
staff_performance_formbstaff_performance_formb
staff_performance_formb
 
Se lec-uosl-8
Se lec-uosl-8Se lec-uosl-8
Se lec-uosl-8
 
Resume_Prachi_Rattan_2016
Resume_Prachi_Rattan_2016Resume_Prachi_Rattan_2016
Resume_Prachi_Rattan_2016
 
mEDC_Single
mEDC_SinglemEDC_Single
mEDC_Single
 
5 Ways to Keep Your Interface Projects Under Control
5 Ways to Keep Your Interface Projects Under Control5 Ways to Keep Your Interface Projects Under Control
5 Ways to Keep Your Interface Projects Under Control
 
Ehr usability
Ehr usabilityEhr usability
Ehr usability
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 

Similar to Segregation of Duties and Sensitive Access as a Service

Similar to Segregation of Duties and Sensitive Access as a Service (20)

SmartERP PeopleSoft Security
SmartERP PeopleSoft  Security SmartERP PeopleSoft  Security
SmartERP PeopleSoft Security
 
Segregation of Duties and Sensitive Access as a Service webinar
Segregation of Duties and Sensitive Access as a Service webinarSegregation of Duties and Sensitive Access as a Service webinar
Segregation of Duties and Sensitive Access as a Service webinar
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017
 
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus SolutionsAutomating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Sroaug  October 27 2017 Learn to Streamline User Provisioning in Oracle AppsSroaug  October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 
10-3 Clinical Informatics System Selection & Implementation
10-3 Clinical Informatics System Selection & Implementation10-3 Clinical Informatics System Selection & Implementation
10-3 Clinical Informatics System Selection & Implementation
 
Web Security Overview
Web Security OverviewWeb Security Overview
Web Security Overview
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Co p
Co pCo p
Co p
 
Co p
Co pCo p
Co p
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 published
 
Confessions of an Internal Auditor: IT Edition
Confessions of an Internal Auditor: IT EditionConfessions of an Internal Auditor: IT Edition
Confessions of an Internal Auditor: IT Edition
 
People soft risks and controls for educational institutions
People soft risks and controls for educational institutionsPeople soft risks and controls for educational institutions
People soft risks and controls for educational institutions
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Samyuktha Javangula
Samyuktha JavangulaSamyuktha Javangula
Samyuktha Javangula
 

More from Smart ERP Solutions, Inc.

Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2
Smart ERP Solutions, Inc.
 

More from Smart ERP Solutions, Inc. (20)

Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2
 
Transforming Financial Insights with Oracle EPM
Transforming Financial Insights with Oracle EPMTransforming Financial Insights with Oracle EPM
Transforming Financial Insights with Oracle EPM
 
Maximize your Oracle Cloud Investment and Drive Innovation
 Maximize your Oracle Cloud Investment and Drive Innovation Maximize your Oracle Cloud Investment and Drive Innovation
Maximize your Oracle Cloud Investment and Drive Innovation
 
SmartERP Oracle Capabilities 2023.pptx
SmartERP Oracle Capabilities 2023.pptxSmartERP Oracle Capabilities 2023.pptx
SmartERP Oracle Capabilities 2023.pptx
 
Best Practices to Modernizing your Oracle Applications
Best Practices to Modernizing your Oracle ApplicationsBest Practices to Modernizing your Oracle Applications
Best Practices to Modernizing your Oracle Applications
 
Manufactures whats keeping you up
Manufactures   whats keeping you upManufactures   whats keeping you up
Manufactures whats keeping you up
 
The Fully Automated Enterprise (RPA)
The Fully Automated Enterprise (RPA)The Fully Automated Enterprise (RPA)
The Fully Automated Enterprise (RPA)
 
Smart erp solutions oracle cloud services overview - 2021 - 2022
Smart erp solutions   oracle cloud services overview - 2021 - 2022Smart erp solutions   oracle cloud services overview - 2021 - 2022
Smart erp solutions oracle cloud services overview - 2021 - 2022
 
PeopleSoft Webinar - Configure vs. Customize Page and Field Configurator
PeopleSoft Webinar - Configure vs. Customize Page and Field ConfiguratorPeopleSoft Webinar - Configure vs. Customize Page and Field Configurator
PeopleSoft Webinar - Configure vs. Customize Page and Field Configurator
 
Alert framework2021
Alert framework2021Alert framework2021
Alert framework2021
 
No One Size Fits All - Form I-9 and E-Verify presentation from the DHS
No One Size Fits All - Form I-9 and E-Verify presentation from the DHSNo One Size Fits All - Form I-9 and E-Verify presentation from the DHS
No One Size Fits All - Form I-9 and E-Verify presentation from the DHS
 
E-Verify for PeopleSoft - Streamline and automate your Employment Authorizati...
E-Verify for PeopleSoft - Streamline and automate your Employment Authorizati...E-Verify for PeopleSoft - Streamline and automate your Employment Authorizati...
E-Verify for PeopleSoft - Streamline and automate your Employment Authorizati...
 
Pre-board Your New Hires for PeopleSoft - Streamline and automate your pre-bo...
Pre-board Your New Hires for PeopleSoft - Streamline and automate your pre-bo...Pre-board Your New Hires for PeopleSoft - Streamline and automate your pre-bo...
Pre-board Your New Hires for PeopleSoft - Streamline and automate your pre-bo...
 
Configure Versus Customize: Using PeopleSoft Page and Field Configurator
Configure Versus Customize: Using PeopleSoft Page and Field ConfiguratorConfigure Versus Customize: Using PeopleSoft Page and Field Configurator
Configure Versus Customize: Using PeopleSoft Page and Field Configurator
 
Managed Services - Small, Medium, or Large - what's the best fit for your org...
Managed Services - Small, Medium, or Large - what's the best fit for your org...Managed Services - Small, Medium, or Large - what's the best fit for your org...
Managed Services - Small, Medium, or Large - what's the best fit for your org...
 
Convert manual paper-based business processes into automated paperless
Convert manual paper-based business processes into automated paperlessConvert manual paper-based business processes into automated paperless
Convert manual paper-based business processes into automated paperless
 
3 steps to successfully analyzing your PeopleSoft Security for Segregation of...
3 steps to successfully analyzing your PeopleSoft Security for Segregation of...3 steps to successfully analyzing your PeopleSoft Security for Segregation of...
3 steps to successfully analyzing your PeopleSoft Security for Segregation of...
 
Alert Framework - Alert your organization to errors, changes, and stalled tra...
Alert Framework - Alert your organization to errors, changes, and stalled tra...Alert Framework - Alert your organization to errors, changes, and stalled tra...
Alert Framework - Alert your organization to errors, changes, and stalled tra...
 
The 6 Biggest Trends for AP Leaders in 2021
The 6 Biggest Trends for AP Leaders in 2021The 6 Biggest Trends for AP Leaders in 2021
The 6 Biggest Trends for AP Leaders in 2021
 
Temporary Policy Changes to Form I-9 and E-Verify due to COVID-19 - Remote an...
Temporary Policy Changes to Form I-9 and E-Verify due to COVID-19 - Remote an...Temporary Policy Changes to Form I-9 and E-Verify due to COVID-19 - Remote an...
Temporary Policy Changes to Form I-9 and E-Verify due to COVID-19 - Remote an...
 

Recently uploaded

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Recently uploaded (20)

Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 

Segregation of Duties and Sensitive Access as a Service

  • 1. Implementing Security and Controls in PeopleSoft – Best Practices
  • 2.
  • 3.
  • 4. Introductions • Lewis Hopkins – working with Security and Controls in Oracle Applications since 2003. • Designing and implementing solutions for Segregation of Duties, Sensitive Access and Audit/Internal Controls
  • 6. Poll Do you currently perform Security Analysis over PeopleSoft? • We don’t • Manual • Query/SpreadSheet based • Semi Automated • Fully Automated
  • 7. Cohesion Communication – Typically Business Users don’t understand the Application. Technical Users don’t understand the Risks. Business Users Technical Users Responsibility and Ownership “Foxes watching the Hen House”
  • 8. ‘Super User’ Access • Don’t rely on PSADMIN or VP1 generic logins without controls Options for management: • Break Glass • Individual User Logins
  • 9. Individual User Logins Employee’s request access to Production, Sys Admin unlocks their account and grants the Roles required for diagnosis. At the end of the process, the User’s account is locked again.
  • 10. One more thing… Always worth Auditing User Profiles, Roles/Permission Lists in PeopleSoft. Low transaction, high impact
  • 11. Role Assignments Too many Roles = too many Risks/too difficult to answer who has access to what We’ve seen: 160+ Roles per User 12-24 months before Security is regarded as a mess Are Role Assignments going through a change request?
  • 12. Access Definitions Security too complex – not ‘Business friendly’ Ensure new/copied Security is easy to read Re-Use where possible, for example: Sign on process Delivered Roles have Security issues and please secure ALLPAGES!!
  • 13. Access Definitions – find the Navigation
  • 14. Data Security • Row Security limited in PeopleSoft • What to do about PCI or PII? • Field Security, Tokenization, restrict Fields in the Pages, Database Level Security?
  • 15. Poll How do you report on Sensitive or Personal Information in PeopleSoft? • We don’t • Manually • Haven’t been able to • Use Scripts to pull data
  • 16. Is this a good or a bad thing to have?
  • 17. Opportunities for Securing Data For Query: Create Roles/Permission Lists for accessing this Data Secure them against the Fields you use & the Queries for accessing this information • Pros: Accountability – track the Roles that have access • Cons: Can leave out other data required from a table For Access: Use Database level Security to Secure or Obfuscate the Data • Pros: Total Security at the Data level • Cons: May need each User to have a DB level User If one DB User, what about Self Service Users?
  • 18. Production Do’s and Don’ts • Data Mover and Configuration/Development processes– secure them! • Submission of Jobs • Copy of Production for testing and simulation – Who wants to refresh every day? • Don’t rely on Auditing – The Horse may have bolted already!
  • 19. Production Do’s and Don’ts • Separate Configuration from Transactions • Segregation of Duties and Access Analysis – OMB – NIST – SOX Compliance is forcing Organizations to change their Approach to ERP Security and Controls
  • 20. Smart ERP Security as a Service
  • 21. Access and SoD Subscription • Analysis of Security for efficiency • Power User & Third Party access • Segregation of Duties • PII and Sensitive Data Access • Reports, Recommendations and Project Management
  • 22. Access Levels Evaluated Users/OPRIDs Roles Permission Lists Components Pages Buyers User Preferences Workflow Approval
  • 23. Rules CPA staff maintain ruleset and provide advisory Rule Maintenance and Controls Assessment through subscription
  • 24. Access and SoD Reporting as a Service Extract Data from PeopleSoft Import into Smart ERP Run Analysis No PII or Sensitive Data is taken
  • 25. Access and SoD Reporting • Users and their SoD Violations • Power User Access • Sensitive Access • PII Access Reports and Remediation
  • 26. Benefits • Report on who has access to what in plain ‘English’ • Identify and Remediate Users with too much access • Enforce strong Data Security Policies • Comply with legislation and reduce costs Reporting and Data Security as it should be..
  • 27. Exceptions Sometimes Users need to break the rules… VP’s, Power Users, Limited Staff, etc All Exceptions are stored for future reference, and Reports available
  • 28. Achieve Best-In-Class Security and Controls Solutions • Segregation of Duties/Access Reporting • Access Provisioning • Transaction Monitoring • Configuration Monitoring Services • Security and Configuration ‘Scans’ • Security Design and Implementation • Training & Review