<output id="qn6qe"></output>

    1. <output id="qn6qe"><tt id="qn6qe"></tt></output>
    2. <strike id="qn6qe"></strike>

      亚洲 日本 欧洲 欧美 视频,日韩中文字幕有码av,一本一道av中文字幕无码,国产线播放免费人成视频播放,人妻少妇偷人无码视频,日夜啪啪一区二区三区,国产尤物精品自在拍视频首页,久热这里只有精品12

      SAP Role Matrix

      SAP Role Matrix

      Segregation of Duties can be represented over a role matrix. Role Matrix is a two dimensional matrix.

      All the roles responsibilites and functions/processes in an enterprise are recognized and they are represented over each axis of matrix.

      Then it is identified by putting a flag, across each set of roles/responsibilities and function/processes, over x and y - axis, whether they are conflicting or not.

      Here is a sample role matrix. This role matrix has been identified for a set six processes and a set of six responsibilities, one for each process.

      image-20240611120725895

      X-Exisktence of Conflict

      SOX is an US Accounting law that deals with the financial accounting of the companies. In order to comply with SOX requirements, it is required that there should be well documented IT Processes. Over each of the IT Processes there should be well designed and documented internal controls and these controls should be well implemented and tracked and monitored. There should be effective controls over the key security and financial processes.

      The SOX IT audit tries to identify that there are processes and controls in place and are being followed and tracked. In case of large and geographical organizations, it is not adequate for manual or paper-based processes and controls to be sufficient. There needs to be a proof that these processes are well followed and tracked.

      In oder to comply with section 404 of SOX, we should:

      • Identify and document processes and SoD controls across key IT Security and financial processes.
      • Design mitigating controls and document then, where appropriate SoD cannot be implemented.
      • Design monitoring controls for critical processes and critical roles.
      • Implement SoD and mitigating controls
      • Ensure continuous compliance by monitoring and tracking of controls.

      SoD Implementation

      For implementing SoD Controls across an enterprise, we need to do a heavy exercise. Therefore implementation SoD is done in form of a project. The implementation can be done by outlining the following steps as described below:

      • Identify what is the objective of organizaion, hierarchy and nature of Organizaion, and job profiles in the organization, by doing an Organizaton scan.
      • Identify the processes that are being followed in organization.
      • Identify the current state of roles/responsibilities and authorization in the enterprise.
      • Create the Role Matrix. Mark roles on one axis of Matrix and functions on other axis. Identify will there be any SoD conflict if role access to particular function is given to a single individual. Yes or No, flag the position in matrix accordingly, clearly.
      • After analyzing the SoD conflict from role matrix, discuss with management and make the required changes in order to resolve SoD conflicts.
      • In role matrix at position where SoD Conflicts cannot be resolved, designed the mitigating controls.
      • According to findings in role matrix, generate the roles and mitigating controls within the enterprise system.
      • Create a document that will well-define the changes required in a simple and organized manner.
      • Document various roles, processes and mitigating controls for auditing and reporting.
      • Inform and report the changes required to management and as well as to those affected, to make sure changes are implemented in well organized and smooth manner.

      SoD is critical in helping managing risks. SoD issues and controls come up frequently when there are audits and reviews. SoD controls can be use as step to measure and resolve the risks associated with different roles and access to functions. To resolve he conflicts, we can design roles as per the business needs of various function/processes being executed in enterprise.

      posted @ 2024-12-08 09:15  晨風_Eric  閱讀(4)  評論(0)    收藏  舉報
      主站蜘蛛池模板: 欧洲中文字幕一区二区| 男人扒女人添高潮视频| 国产综合色在线精品| 日本一卡二卡3卡四卡网站精品| 国产av无码专区亚洲av软件| 亚洲精品岛国片在线观看| 久久久av男人的天堂| 日韩高清砖码一二区在线| 国产精品v欧美精品∨日韩| 国产香蕉九九久久精品免费| 台湾省| 欧美日韩中文字幕久久伊人| 蜜桃无码一区二区三区| 亚洲国产av剧一区二区三区 | 亚洲av成人无码天堂| 国产偷人爽久久久久久老妇app| 人妻少妇| 天天做日日做天天添天天欢公交车| 泽库县| 国产免费无遮挡吸奶头视频| 国产精品无码无卡在线播放| 欧洲亚洲精品免费二区| 97se亚洲国产综合自在线观看| 人与禽交av在线播放| 午夜爽爽爽男女污污污网站| 成人网站免费在线观看| 日本熟妇XXXX潮喷视频| 成人啪精品视频网站午夜| 韩国三级网一区二区三区| 阿合奇县| 亚洲区一区二区激情文学| 国产男女猛烈无遮挡免费视频| 国产亚洲一区二区三区av| 亚洲欧美一区二区三区图片| 亚洲综合黄色的在线观看| 国内精品无码一区二区三区| 老熟妇乱子交视频一区| 一本精品99久久精品77| 亚洲美女av一区二区| 香港日本三级亚洲三级| 一区二区三区精品偷拍|