Presented at INFOCUS 22
Session ID: 101880
Join GSI as we deliver some insights to a successful security assessment that will form the foundations of a risk based, best practice security model for your company.
Leave this session with a plan for your security assessment and how to effectively design and implement a best practice security model.
Topics covered will include:
• What is a Security assessment and why do I need one?
• Health Check of current security
• Security integrities over users, roles, and security tables
• Identify users, and related user security that can be removed
• Identify roles, and related role security that can be removed
• Document security clean-up activities
• Remove “Orphaned records”
• Remove Redundant security details (This may correct many of your role sequencing issues)
• SoD, not just for publicly traded companies
• Best Practices
• Redesign Menu access for process-based vs job-based roles
• Opened to Closed security model
• Fine Cut / Menu Filtering
• Do I need a 3rd party tool for SoD?
Speaker: David Biles
Security Practice Manager
GSI