Reconnect Envision 2021 Presentation
3 Steps to successfully analyzing your PeopleSoft Security for Segregation of Duty conflicts. In this session we will cover the elements that make a successful review of your Separation of Duties in the PeopleSoft Application, considering Users, Role, Permission Lists, Pages, and more. Analyzing User’s access should not be so hard!
3 steps to successfully analyzing your PeopleSoft Security for Segregation of Duty
1.
2. Today’s Presenter
Lewis Hopkins
Senior Applications Consultant
Lewis has been working in governance, risk, and compliance for the last 12 years, providing solutions and guidance to over
200 Organizations. He is a Board Member of the Governance, Risk and Compliance User Group and regularly speaks at
industry events.
4. Access and SoD Subscription
• Analysis of Security for efficiency
• Power User & Third-Party access
• Segregation of Duties
• PII and Sensitive Data Access
• Reports, Recommendations and Project
Management
6. Rules
• Over 140 Rules covering FSCM and HCM
• Can be tailored to each Organization
• Customizations can be incorporated
• Rules cover Components, Pages, User
Preferences, Workflow Approval (if needed)
7. Access and SoD Reporting as a Service
Extract Data
from PeopleSoft
Import into
Smart ERP
Run Analysis
No PII or Sensitive
Data is taken
8. Access and SoD Reporting
• Users and their SoD Violations
• Power User Access
• Sensitive Access
• PII Access
Reports and Remediation
9. Benefits
• Report on who has access to what in plain
‘English’
• Identify and Remediate Users with too
much access
• Enforce strong Data Security Policies
• Comply with legislation and reduce costs
Reporting and Data Security as it should be..
10. Exceptions
Sometimes Users need to break the rules…
VP’s, Power Users, Limited Staff, etc
All Exceptions are stored for future reference, and
Reports available