Today’s Presenter
Lewis Hopkins
Senior Applications Consultant
Lewis has been working in governance, risk, and compliance for the last 12 years, providing solutions and guidance to over
200 Organizations. He is a Board Member of the Governance, Risk and Compliance User Group and regularly speaks at
industry events.
Smart ERP Security as a Service
Access and SoD Subscription
• Analysis of Security for efficiency
• Power User & Third-Party access
• Segregation of Duties
• PII and Sensitive Data Access
• Reports, Recommendations and Project
Management
Access Levels Evaluated
Users/OPRIDs Roles Permission
Lists
Components
Pages Buyers
User
Preferences
Workflow
Approval
Rules
• Over 140 Rules covering FSCM and HCM
• Can be tailored to each Organization
• Customizations can be incorporated
• Rules cover Components, Pages, User
Preferences, Workflow Approval (if needed)
Access and SoD Reporting as a Service
Extract Data
from PeopleSoft
Import into
Smart ERP
Run Analysis
No PII or Sensitive
Data is taken
Access and SoD Reporting
• Users and their SoD Violations
• Power User Access
• Sensitive Access
• PII Access
Reports and Remediation
Benefits
• Report on who has access to what in plain
‘English’
• Identify and Remediate Users with too
much access
• Enforce strong Data Security Policies
• Comply with legislation and reduce costs
Reporting and Data Security as it should be..
Exceptions
Sometimes Users need to break the rules…
VP’s, Power Users, Limited Staff, etc
All Exceptions are stored for future reference, and
Reports available
For More Information
info@smarterp.com
smarterp.com
smartonboarding.com
smarterpanalytics.com
smarttalentprocurement.com
smarteverify.com
925-271-0200 | Information: info@smarterp.com

3 steps to successfully analyzing your PeopleSoft Security for Segregation of Duty

  • 2.
    Today’s Presenter Lewis Hopkins SeniorApplications Consultant Lewis has been working in governance, risk, and compliance for the last 12 years, providing solutions and guidance to over 200 Organizations. He is a Board Member of the Governance, Risk and Compliance User Group and regularly speaks at industry events.
  • 3.
    Smart ERP Securityas a Service
  • 4.
    Access and SoDSubscription • Analysis of Security for efficiency • Power User & Third-Party access • Segregation of Duties • PII and Sensitive Data Access • Reports, Recommendations and Project Management
  • 5.
    Access Levels Evaluated Users/OPRIDsRoles Permission Lists Components Pages Buyers User Preferences Workflow Approval
  • 6.
    Rules • Over 140Rules covering FSCM and HCM • Can be tailored to each Organization • Customizations can be incorporated • Rules cover Components, Pages, User Preferences, Workflow Approval (if needed)
  • 7.
    Access and SoDReporting as a Service Extract Data from PeopleSoft Import into Smart ERP Run Analysis No PII or Sensitive Data is taken
  • 8.
    Access and SoDReporting • Users and their SoD Violations • Power User Access • Sensitive Access • PII Access Reports and Remediation
  • 9.
    Benefits • Report onwho has access to what in plain ‘English’ • Identify and Remediate Users with too much access • Enforce strong Data Security Policies • Comply with legislation and reduce costs Reporting and Data Security as it should be..
  • 10.
    Exceptions Sometimes Users needto break the rules… VP’s, Power Users, Limited Staff, etc All Exceptions are stored for future reference, and Reports available
  • 11.