Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Can anybody explain (short n simple) about SOX & SoDs with 3
examples for each functional module? n ur experience on SoDs.

Answer Posted / parixit

SoX is serbian & Oxley, it is an ACT in US, this ACT should
be liable for buisness.

SoD is Segeration of Duties, Division of power in different
position. it gives power as per the designation.

Is This Answer Correct ?    5 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Which transaction code is used to display the user buffer?

1239


Can you explain internet-level security?

1187


Tell me about derived role?

1122


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2408


What is stad?

1215


Why is it important to delete sap-new profile? What steps will you take to do this?

1177


What are su53 t-codes used for?

1435


How do we test security systems.

1152


what is the main difference between the derived role and a single role?

1199


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2631


what is use of copy data in derived role and when we use this one ???

1858


How to insert missing authorization?

1205


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1188


How to find out who has deleted users in the system?

1238


What are pfud t-codes used for?

1328