SlideShare une entreprise Scribd logo
1  sur  25
Check Aud ®  for  SAP ®  Systems IBS Portfolio CheckAud ®   Objective Target groups Functions Analysis tree SoD Matrix References Ask us about our  Demo version !
[object Object],[object Object],[object Object],[object Object],[object Object],Check Aud ®  for  SAP ®  Systems IBS Portfolio CheckAud ®     Objective Target groups Functions Analysis tree SoD Matrix References
Authorization Chaos? Check Aud ®  Cleans it Up Revision  – Does the  SAP® System confrom to the requirements in regulation compliance? Administration  – Audit before your auditor arrives! Departments  – The data, or process owner supervises their own data, achieving transparency at a glance! Data protection –  Is personal data sufficiently protected?  Auditor  – The year-end closing. IBS Portfolio CheckAud ®   Objective    Target groups Functions Analysis tree SoD Matrix References
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Check Aud ®  for  SAP ®  Systems IBS Portfolio CheckAud ®   Objective Target groups    Functions Analysis tree SoD Matrix References
Functions in Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IBS Portfolio CheckAud ®   Objective Target groups    Functions Analysis tree SoD Matrix References
The Analysis Tree ,[object Object],[object Object],[object Object],[object Object],IBS Portfolio CheckAud ®   Objective Target groups Functions    Analysis tree SoD Matrix References
The Segregation of Duties Matrix IBS Portfolio CheckAud ®   Objective Target groups Functions Analysis tree    SoD Matrix References Number of risks Double click for details…
Critical Authorizations ,[object Object],[object Object],[object Object],[object Object],Functions   Authorizations Critical processes SoD Matrix BIW Audit User Analysis Simulation Automation References
Critical Authorizations For each user who is discovered to have authorization, the following details will be displayed: Functions   Authorizations Critical processes SoD Matrix BIW Audit User analysis Simulation Automation References ,[object Object],[object Object],[object Object],[object Object]
Critical Authorizations ,[object Object],[object Object],[object Object],[object Object],We would be glad to provide you with a demo version or to present the system to you live! Functions   Authorizations Critical processes SoD Matrix BIW Audit User analysis Simulation Automation References
Critical Business Operations Who can maintain vendors, create invoices / credit memos and start the payment run?  With one click, you will see the authorized users and the source of their rights. A traffic symbol indicates wheter the audit result has been deemed critical.  Functions Critical Authorizations    Critical Processes SoD Matrix BIW Audit User Analysis Simulation Automation References
Segregation of Duties Has there been a violation of the segregation of duties? Functions Critical Authorizations Critical Processes    SoD Matrix BIW Audit User Analysis Simulation Automation References Attribute of a risk -risk -risk group -risk description -compensating controls -description of the control -responsible persons
BIW-specific Authorizations ,[object Object],[object Object],[object Object],[object Object],[object Object],Functions Critical Authorizations Critical Processes SoD Matrix    BIW Audit User Analysis Simulation Automation References
Rights per User Which transactions can Ms. Teiler execute? Functions Critical Authorization Critical Processes SoD Matrix BIW Audit    User Analysis Simulation Automation References
Simulation of Modifications Will the changes made to authorizations lead to a desired result? Following the simulated deletion of a role, Ms. Teiler has only 5 of her original 44 authorizations. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis    Simulation Automation References
Fully-automated Report 1 A scheduler completes the analyses regularly and on its own. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis Simulation    Automation References Check Aud ®  Scan Ins Aud 1 Check Aud ®  CheckScan SAP - Scheduler 1 SAP 1 Time & Rotation Output Format  Reports SAP System & Logon Report n Report 2 Analysis Trees
Follow Up Audit – Delta  CheckAud ®  RoadMap 2010    Follow Up Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References Which changes have been made since the most recent audit?
Matrix Export ,[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits    Matrix Export Export Assistant Data Protection  2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References
Export Assistant ,[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export    Export Assistant Dataprotection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References
[object Object],[object Object],[object Object],[object Object],Advancements in Data Protection CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant    Data Security   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References
Assistant for CheckScanSAP  ,[object Object],[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection  2011 et seq .    Scan Assistant JAVA Authorizations LDAP Authorizations Database Security References
UME / LDAP Evaluations ,[object Object],[object Object],[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant    JAVA Authorizations LDAP Authorizations Database Security References
Database Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations    Database Security References
CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security    References Some of our well-known customers.
Contact ,[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Defining Segregation of Duties
Defining Segregation of DutiesDefining Segregation of Duties
Defining Segregation of Duties
Will Kelly
 
Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks Procedures
Inprise Group
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
hkodali
 

Tendances (20)

Seg dutieschecklist
Seg dutieschecklistSeg dutieschecklist
Seg dutieschecklist
 
Ey segregation of_duties
Ey segregation of_dutiesEy segregation of_duties
Ey segregation of_duties
 
Security & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSecurity & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoft
 
Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Defining Segregation of Duties
Defining Segregation of DutiesDefining Segregation of Duties
Defining Segregation of Duties
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
 
GRC_2016_US_Brochure
GRC_2016_US_BrochureGRC_2016_US_Brochure
GRC_2016_US_Brochure
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks Procedures
 
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus SolutionsAutomating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
 
SAP grc
SAP grc SAP grc
SAP grc
 
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programWebinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management program
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
Crafting an End-to-End Pharma GRC Strategy
Crafting an End-to-End Pharma GRC StrategyCrafting an End-to-End Pharma GRC Strategy
Crafting an End-to-End Pharma GRC Strategy
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
 
Building continuous auditing capabilities
Building continuous auditing capabilitiesBuilding continuous auditing capabilities
Building continuous auditing capabilities
 

Similaire à Casa engl

An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security features
Shazia_Sultana
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
wardell henley
 
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptxS4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
ITAdmin28
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC Framework
Harish Sharma
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
Amit Gatenyo
 

Similaire à Casa engl (20)

Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
 
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
 
SAP BI Security Features
SAP BI Security FeaturesSAP BI Security Features
SAP BI Security Features
 
An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security features
 
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PART I of III:  Advanced Authorization for SAP Global Deployments: September ...PART I of III:  Advanced Authorization for SAP Global Deployments: September ...
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
 
CSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 Brochure
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Summary Technical Presentation (General)
Summary Technical Presentation (General)Summary Technical Presentation (General)
Summary Technical Presentation (General)
 
Auditing Data Access in SQL Server
Auditing Data Access in SQL ServerAuditing Data Access in SQL Server
Auditing Data Access in SQL Server
 
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptxS4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
 
Test Automation Best Practices (with SOA test approach)
Test Automation Best Practices (with SOA test approach)Test Automation Best Practices (with SOA test approach)
Test Automation Best Practices (with SOA test approach)
 
Managing Suppliers in ISO 9001 Environment
Managing Suppliers in ISO 9001 EnvironmentManaging Suppliers in ISO 9001 Environment
Managing Suppliers in ISO 9001 Environment
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC Framework
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
BI Reporting Application Comparison
BI Reporting Application ComparisonBI Reporting Application Comparison
BI Reporting Application Comparison
 
E&E CV
E&E CVE&E CV
E&E CV
 
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
 
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
 
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

Casa engl

  • 1. Check Aud ® for SAP ® Systems IBS Portfolio CheckAud ® Objective Target groups Functions Analysis tree SoD Matrix References Ask us about our Demo version !
  • 2.
  • 3. Authorization Chaos? Check Aud ® Cleans it Up Revision – Does the SAP® System confrom to the requirements in regulation compliance? Administration – Audit before your auditor arrives! Departments – The data, or process owner supervises their own data, achieving transparency at a glance! Data protection – Is personal data sufficiently protected? Auditor – The year-end closing. IBS Portfolio CheckAud ® Objective  Target groups Functions Analysis tree SoD Matrix References
  • 4.
  • 5.
  • 6.
  • 7. The Segregation of Duties Matrix IBS Portfolio CheckAud ® Objective Target groups Functions Analysis tree  SoD Matrix References Number of risks Double click for details…
  • 8.
  • 9.
  • 10.
  • 11. Critical Business Operations Who can maintain vendors, create invoices / credit memos and start the payment run?  With one click, you will see the authorized users and the source of their rights. A traffic symbol indicates wheter the audit result has been deemed critical. Functions Critical Authorizations  Critical Processes SoD Matrix BIW Audit User Analysis Simulation Automation References
  • 12. Segregation of Duties Has there been a violation of the segregation of duties? Functions Critical Authorizations Critical Processes  SoD Matrix BIW Audit User Analysis Simulation Automation References Attribute of a risk -risk -risk group -risk description -compensating controls -description of the control -responsible persons
  • 13.
  • 14. Rights per User Which transactions can Ms. Teiler execute? Functions Critical Authorization Critical Processes SoD Matrix BIW Audit  User Analysis Simulation Automation References
  • 15. Simulation of Modifications Will the changes made to authorizations lead to a desired result? Following the simulated deletion of a role, Ms. Teiler has only 5 of her original 44 authorizations. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis  Simulation Automation References
  • 16. Fully-automated Report 1 A scheduler completes the analyses regularly and on its own. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis Simulation  Automation References Check Aud ® Scan Ins Aud 1 Check Aud ® CheckScan SAP - Scheduler 1 SAP 1 Time & Rotation Output Format Reports SAP System & Logon Report n Report 2 Analysis Trees
  • 17. Follow Up Audit – Delta CheckAud ® RoadMap 2010  Follow Up Matrix Export Export Assistant Data Protection 2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References Which changes have been made since the most recent audit?
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. CheckAud ® RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection 2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security  References Some of our well-known customers.
  • 25.