SlideShare a Scribd company logo
Check Aud ®  for  SAP ®  Systems IBS Portfolio CheckAud ®   Objective Target groups Functions Analysis tree SoD Matrix References Ask us about our  Demo version !
[object Object],[object Object],[object Object],[object Object],[object Object],Check Aud ®  for  SAP ®  Systems IBS Portfolio CheckAud ®     Objective Target groups Functions Analysis tree SoD Matrix References
Authorization Chaos? Check Aud ®  Cleans it Up Revision  – Does the  SAP® System confrom to the requirements in regulation compliance? Administration  – Audit before your auditor arrives! Departments  – The data, or process owner supervises their own data, achieving transparency at a glance! Data protection –  Is personal data sufficiently protected?  Auditor  – The year-end closing. IBS Portfolio CheckAud ®   Objective    Target groups Functions Analysis tree SoD Matrix References
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Check Aud ®  for  SAP ®  Systems IBS Portfolio CheckAud ®   Objective Target groups    Functions Analysis tree SoD Matrix References
Functions in Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IBS Portfolio CheckAud ®   Objective Target groups    Functions Analysis tree SoD Matrix References
The Analysis Tree ,[object Object],[object Object],[object Object],[object Object],IBS Portfolio CheckAud ®   Objective Target groups Functions    Analysis tree SoD Matrix References
The Segregation of Duties Matrix IBS Portfolio CheckAud ®   Objective Target groups Functions Analysis tree    SoD Matrix References Number of risks Double click for details…
Critical Authorizations ,[object Object],[object Object],[object Object],[object Object],Functions   Authorizations Critical processes SoD Matrix BIW Audit User Analysis Simulation Automation References
Critical Authorizations For each user who is discovered to have authorization, the following details will be displayed: Functions   Authorizations Critical processes SoD Matrix BIW Audit User analysis Simulation Automation References ,[object Object],[object Object],[object Object],[object Object]
Critical Authorizations ,[object Object],[object Object],[object Object],[object Object],We would be glad to provide you with a demo version or to present the system to you live! Functions   Authorizations Critical processes SoD Matrix BIW Audit User analysis Simulation Automation References
Critical Business Operations Who can maintain vendors, create invoices / credit memos and start the payment run?  With one click, you will see the authorized users and the source of their rights. A traffic symbol indicates wheter the audit result has been deemed critical.  Functions Critical Authorizations    Critical Processes SoD Matrix BIW Audit User Analysis Simulation Automation References
Segregation of Duties Has there been a violation of the segregation of duties? Functions Critical Authorizations Critical Processes    SoD Matrix BIW Audit User Analysis Simulation Automation References Attribute of a risk -risk -risk group -risk description -compensating controls -description of the control -responsible persons
BIW-specific Authorizations ,[object Object],[object Object],[object Object],[object Object],[object Object],Functions Critical Authorizations Critical Processes SoD Matrix    BIW Audit User Analysis Simulation Automation References
Rights per User Which transactions can Ms. Teiler execute? Functions Critical Authorization Critical Processes SoD Matrix BIW Audit    User Analysis Simulation Automation References
Simulation of Modifications Will the changes made to authorizations lead to a desired result? Following the simulated deletion of a role, Ms. Teiler has only 5 of her original 44 authorizations. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis    Simulation Automation References
Fully-automated Report 1 A scheduler completes the analyses regularly and on its own. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis Simulation    Automation References Check Aud ®  Scan Ins Aud 1 Check Aud ®  CheckScan SAP - Scheduler 1 SAP 1 Time & Rotation Output Format  Reports SAP System & Logon Report n Report 2 Analysis Trees
Follow Up Audit – Delta  CheckAud ®  RoadMap 2010    Follow Up Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References Which changes have been made since the most recent audit?
Matrix Export ,[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits    Matrix Export Export Assistant Data Protection  2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References
Export Assistant ,[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export    Export Assistant Dataprotection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References
[object Object],[object Object],[object Object],[object Object],Advancements in Data Protection CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant    Data Security   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References
Assistant for CheckScanSAP  ,[object Object],[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection  2011 et seq .    Scan Assistant JAVA Authorizations LDAP Authorizations Database Security References
UME / LDAP Evaluations ,[object Object],[object Object],[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant    JAVA Authorizations LDAP Authorizations Database Security References
Database Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations    Database Security References
CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security    References Some of our well-known customers.
Contact ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Ey segregation of_duties
Ey segregation of_dutiesEy segregation of_duties
Ey segregation of_duties
Indrani Bhattacharya
 
Security & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSecurity & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoft
Smart ERP Solutions, Inc.
 
Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
Anywhere Gondodza SAP.GRC.FI.B.COM.ACC.HONS (MSU)
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
TLI GrowthSession
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
Mahesh Patwardhan
 
Defining Segregation of Duties
Defining Segregation of DutiesDefining Segregation of Duties
Defining Segregation of DutiesWill Kelly
 
SAP GRC
SAP GRC SAP GRC
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
hkodali
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
Latha Kamal
 
Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks ProceduresInprise Group
 
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus SolutionsAutomating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Smart ERP Solutions, Inc.
 
SAP grc
SAP grc SAP grc
SAP grc
smadhu29
 
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programWebinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management program
Flexera
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grchkodali
 
Crafting an End-to-End Pharma GRC Strategy
Crafting an End-to-End Pharma GRC StrategyCrafting an End-to-End Pharma GRC Strategy
Crafting an End-to-End Pharma GRC Strategy
Cognizant
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
Axis Technology, LLC
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
AuditBot SAP Security Audit
 
Building continuous auditing capabilities
Building continuous auditing capabilitiesBuilding continuous auditing capabilities
Building continuous auditing capabilities
Wafaa N. AbuSadah
 

What's hot (20)

Seg dutieschecklist
Seg dutieschecklistSeg dutieschecklist
Seg dutieschecklist
 
Ey segregation of_duties
Ey segregation of_dutiesEy segregation of_duties
Ey segregation of_duties
 
Security & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSecurity & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoft
 
Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Defining Segregation of Duties
Defining Segregation of DutiesDefining Segregation of Duties
Defining Segregation of Duties
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
 
GRC_2016_US_Brochure
GRC_2016_US_BrochureGRC_2016_US_Brochure
GRC_2016_US_Brochure
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks Procedures
 
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus SolutionsAutomating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
 
SAP grc
SAP grc SAP grc
SAP grc
 
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programWebinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management program
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
Crafting an End-to-End Pharma GRC Strategy
Crafting an End-to-End Pharma GRC StrategyCrafting an End-to-End Pharma GRC Strategy
Crafting an End-to-End Pharma GRC Strategy
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
 
Building continuous auditing capabilities
Building continuous auditing capabilitiesBuilding continuous auditing capabilities
Building continuous auditing capabilities
 

Similar to Casa engl

Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
NextLabs, Inc.
 
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
googleservice3
 
An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security featuresShazia_Sultana
 
SAP BI Security Features
SAP BI Security FeaturesSAP BI Security Features
SAP BI Security Features
dw_anil
 
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PART I of III:  Advanced Authorization for SAP Global Deployments: September ...PART I of III:  Advanced Authorization for SAP Global Deployments: September ...
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
NextLabs, Inc.
 
CSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 Brochure
CSI tools
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Summary Technical Presentation (General)
Summary Technical Presentation (General)Summary Technical Presentation (General)
Summary Technical Presentation (General)
DonGlass
 
Auditing Data Access in SQL Server
Auditing Data Access in SQL ServerAuditing Data Access in SQL Server
Auditing Data Access in SQL Server
Antonios Chatzipavlis
 
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptxS4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
ITAdmin28
 
Test Automation Best Practices (with SOA test approach)
Test Automation Best Practices (with SOA test approach)Test Automation Best Practices (with SOA test approach)
Test Automation Best Practices (with SOA test approach)
Leonard Fingerman
 
Managing Suppliers in ISO 9001 Environment
Managing Suppliers in ISO 9001 EnvironmentManaging Suppliers in ISO 9001 Environment
Managing Suppliers in ISO 9001 Environment
sundaybizsys
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC FrameworkHarish Sharma
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
Guang Ying Yuan
 
BI Reporting Application Comparison
BI Reporting Application ComparisonBI Reporting Application Comparison
BI Reporting Application Comparison
Scott Mitchell
 
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
Siva Pradeep Bolisetti
 
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Bohdan Maherus
 
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
Akshay Shah
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewAmit Gatenyo
 

Similar to Casa engl (20)

Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
 
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
 
An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security features
 
SAP BI Security Features
SAP BI Security FeaturesSAP BI Security Features
SAP BI Security Features
 
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PART I of III:  Advanced Authorization for SAP Global Deployments: September ...PART I of III:  Advanced Authorization for SAP Global Deployments: September ...
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
 
CSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 Brochure
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Summary Technical Presentation (General)
Summary Technical Presentation (General)Summary Technical Presentation (General)
Summary Technical Presentation (General)
 
Auditing Data Access in SQL Server
Auditing Data Access in SQL ServerAuditing Data Access in SQL Server
Auditing Data Access in SQL Server
 
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptxS4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
 
Test Automation Best Practices (with SOA test approach)
Test Automation Best Practices (with SOA test approach)Test Automation Best Practices (with SOA test approach)
Test Automation Best Practices (with SOA test approach)
 
Managing Suppliers in ISO 9001 Environment
Managing Suppliers in ISO 9001 EnvironmentManaging Suppliers in ISO 9001 Environment
Managing Suppliers in ISO 9001 Environment
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC Framework
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
BI Reporting Application Comparison
BI Reporting Application ComparisonBI Reporting Application Comparison
BI Reporting Application Comparison
 
E&E CV
E&E CVE&E CV
E&E CV
 
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
 
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
 
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
 

Recently uploaded

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Casa engl

  • 1. Check Aud ® for SAP ® Systems IBS Portfolio CheckAud ® Objective Target groups Functions Analysis tree SoD Matrix References Ask us about our Demo version !
  • 2.
  • 3. Authorization Chaos? Check Aud ® Cleans it Up Revision – Does the SAP® System confrom to the requirements in regulation compliance? Administration – Audit before your auditor arrives! Departments – The data, or process owner supervises their own data, achieving transparency at a glance! Data protection – Is personal data sufficiently protected? Auditor – The year-end closing. IBS Portfolio CheckAud ® Objective  Target groups Functions Analysis tree SoD Matrix References
  • 4.
  • 5.
  • 6.
  • 7. The Segregation of Duties Matrix IBS Portfolio CheckAud ® Objective Target groups Functions Analysis tree  SoD Matrix References Number of risks Double click for details…
  • 8.
  • 9.
  • 10.
  • 11. Critical Business Operations Who can maintain vendors, create invoices / credit memos and start the payment run?  With one click, you will see the authorized users and the source of their rights. A traffic symbol indicates wheter the audit result has been deemed critical. Functions Critical Authorizations  Critical Processes SoD Matrix BIW Audit User Analysis Simulation Automation References
  • 12. Segregation of Duties Has there been a violation of the segregation of duties? Functions Critical Authorizations Critical Processes  SoD Matrix BIW Audit User Analysis Simulation Automation References Attribute of a risk -risk -risk group -risk description -compensating controls -description of the control -responsible persons
  • 13.
  • 14. Rights per User Which transactions can Ms. Teiler execute? Functions Critical Authorization Critical Processes SoD Matrix BIW Audit  User Analysis Simulation Automation References
  • 15. Simulation of Modifications Will the changes made to authorizations lead to a desired result? Following the simulated deletion of a role, Ms. Teiler has only 5 of her original 44 authorizations. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis  Simulation Automation References
  • 16. Fully-automated Report 1 A scheduler completes the analyses regularly and on its own. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis Simulation  Automation References Check Aud ® Scan Ins Aud 1 Check Aud ® CheckScan SAP - Scheduler 1 SAP 1 Time & Rotation Output Format Reports SAP System & Logon Report n Report 2 Analysis Trees
  • 17. Follow Up Audit – Delta CheckAud ® RoadMap 2010  Follow Up Matrix Export Export Assistant Data Protection 2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References Which changes have been made since the most recent audit?
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. CheckAud ® RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection 2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security  References Some of our well-known customers.
  • 25.