Answer Posted / gopi
Post Sarbanes Oxley, focus for corporations is more on compliance and security. Sarbanes Oxley has had a major impact on the organizations using SAP R/3 as their ERP. Some of the changes seen in the corporate landsacpe include identifying and documenting processes, implementing controls and safeguards, documenting user access approvals etc. In short, there has been a cultural shift in organizations post Sarbanes Oxley. Below, I have listed 7 major pointers which can help organizations towards better SAP security in the Sarbanes Oxley Era.
1. Provide users access on a need to know and need to do basis.
2. Adequately secure programs, transactions and tables.
3. All user accesses to SAP R/3 are properly authorized and approved.
4. Segregation of duties is maintained for all sensitive business transactions
5. All controls and business processes are documented.
6. Anti-fraud preventive controls are in place to prevent & detect fraud before an audit.
7. User profiles and roles in SAP are secured and designed to meet business requirements.
| Is This Answer Correct ? | 12 Yes | 1 No |
Post New Answer View All Answers
You want to remove a developer's and developer keys from a system. How would you do that?
What is audit information system?
How we Educated client personnel in R/3 Security and general Basis knowledge
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Which transaction code is used to display the user buffer?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
what is sod in sap security?
As a SAP security consultant what is the most challenged you faced in previous company?
How can sap security be improved?
what is hypercare and go live support?
Support types of WOs you have faced?
Can you explain network topology in sap systems?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?