Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services

Slides:



Advertisements
Similar presentations
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Advertisements

Is your company drowning in a sea of documents and regulations ? Quality Systems Integrators presents... TMSWeb Quality Management Compliance System.
Take the ‘dread’ out of your XA Security Audit Belinda Daub, Senior Consultant Technical Services
Enhancement Summary Moving Forward with XA IFM Enhancements R7.8 & R9.
Order Based Production Management
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Enhanced Security Management, Separation of Duties and Audit Support for XA Belinda Daub, Senior Consultant Technical Services
Using XA Browser/Power-Link Preferences to Improve Efficiency
Efficient, Productive, Time-Saving Solutions TRANSACTION AUDITING Part of our RISK MANAGEMENT SUITE FOR LAWSON S3 Thank you for taking the time to view.
Software Quality Assurance Plan
© Tally Solutions Pvt. Ltd. All Rights Reserved 1 Shoper 9 Implementation in Chain Store March 2010.
HORIZONT 1 ProcMan ® The Handover Process Manager Product Presentation HORIZONT Software for Datacenters Garmischer Str. 8 D München Tel ++49(0)89.
Security Controls – What Works
Monitoring Security With Standard SAP Tools Session Code 805 Sandi McKinney.
PAYMENTNET at the University of Pennsylvania New Purchasing Card Management Software Application February 7, 2007.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Computer Security: Principles and Practice
SAP An Introduction October 2012.
Complete Weekly Timesheets Select work. Add hours and comments Tell Mgr if ETC=0 and need more time. Tell Mgr if using someone else’s ETC. End week, change.
I n t u i t C o n f i d e n t i a l 1 Tech BizSolutions GovCalc™ System Solution Introduction 1/29/10 Mike Anderson, VP Marketing, ,
AgVantage IT Services Systems Management Team Partnered with You and IBM® Agenda Disaster Recovery Service Disaster Recovery Service IT Visors IT Visors.
An Overview of IFM R9 “Who moved my Stuff……..” IFM at R9 CISTECH Tuesday Education Session Series Jim Boyer CISTECH – Sr. XA Consultant.
Time & Labor Management Solutions. Who is Time America? Arizona-based provider of Time and Labor Management solutions Over 17 years experience bringing.
The Harris-MSI Report Navigator Webinar. 2 The Harris/MSI Report Navigator “Learn about the details of the Harris/MSI Report Navigator. This exciting.
XA R7.8 Upgrade Process and Technical Overview Ruth Anne Pharr Sr. IT Consultant, CISTECH Inc.
The FlexTraining Total E-Learning Solution
ENVIROTRAC: A Premier Chamber Monitoring and Data Acquisition System Envirotrac A Guided Tour.
The Islamic University of Gaza
Denise Luther Senior IT Consultant Practical Technology Enablement with Enterprise Integrator.
Elliott eOrders.Net Edward M. Kwang, President Rachel R. Locklair, Project Lead.
This presentation is the property of Paradigm Information Systems It is confidential to the intended recipient for the purpose of evaluating FMS Any other.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
R7 Integrator and Enterprise Integrator: Look at everything you can do with XA!!! Denise Luther, Senior Consultant Technical Services.
Automate your Backups with iSeries Operator Belinda Daub CISTECH Senior Technical Consultant
Segregation of Duties for Infor-Lawson Software 1.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Phone No: / Id: Web : /
Product Development Chapter 6. Definitions needed: Verification: The process of evaluating compliance to regulations, standards, or specifications.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
XA R7.8 Link Manager Belinda Daub Sr. Technical Consultant 1.
Plan Design Analyze Develop Test Implement Maintain Systems Development Life Cycle MAT Dirtbikes.
1 Thank you for visiting our site and welcome to the “Introduction to ISO 22000” Presentation that you requested. For more information.
Software Quality Assurance
普 华 永 道 Phase 1: Project Preparation Phase 1: Project Preparation Phase Overview Phase Overview.
Managing a MAPICS R7/R9 PowerLink Environment (704)
Project Management Methodology Development Stage.
Topics Covered Phase 1: Preliminary investigation Phase 1: Preliminary investigation Phase 2: Feasibility Study Phase 2: Feasibility Study Phase 3: System.
Enterprise Integrator CISTECH R7.8 SERIES Denise Luther Senior Consultant, Technical Services
R7 Integrator and Enterprise Integrator: You won’t believe this is XA… Deborah Vermillion, VP Consulting Services, CPIM, CIRM Belinda Daub, Senior Consultant.
Canadian Payroll and HR Presented By: Diane Lee Sousa.
Flexible Registration for Community Education Dottie Marron Delivery Center Manager Student Administrative Services Consulting Center.
TAXCO BUSINESS SERVICES INC. Division of Des-Dawn Corporation BOOKKEEPING | PAYROLL | TAX FILING | TAX PLANNING | CONSULTING INTRODUCING TAXCO BILL PAY.
Implementing Multicurrency in an Existing Dynamics GP Environment Rod O’Connor 20-NOV-2014.
Authored by Frank Hamelly, Microsoft MVP Regional Chapters.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Review of IT General Controls
Principles of Information Systems Eighth Edition
Information Security Policy
Automating Accounts Payable
QAD Browses.
Jitasa Overview.
Security Management: Successes and Failures
Data Virtualization Demoette… CIS Rights
2017 Features Released Marsha Sapino AAP, BSACS
Introduction to Projects
System Review – The Forgotten Implementation Step
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
Today’s Agenda Dealing with Vendors Consultants Contracts
Presentation transcript:

Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services

1.Introduction to Enhanced Security 2.Implementing a Security Model 3.Advanced Analysis and Testing 4.Auditing and Reporting 5.Prerequisites 6.Coming Enhancements 7.Related Security Services Agenda

Why is it necessary? SOX Requirement for public companies Documented security policy Documented procedures Formal approval for security rights to be assigned Regular auditing and monitoring  Private Companies Are also addressing these requirements Protects investors, employees, community Enhanced Security for XA

Why is it necessary? CAS Security Green Screen interface Difficult to determine how user has access to tasks Reports are massive No auditing capability Risk to productivity when policy changes are made Enhanced Security for XA

How can it help? Add-on application written using Integrator Implemented by environment Three Components: Security Modeling and Planning Advanced Analysis and testing Routine Auditing and reporting Enhanced Security for XA

Power and Flexibility of the XA Client architecture: –Create views and subsets –Export to Excel Add-on Application using Integrator

Install in each environment Manage users for separate environments Includes all CAS tasks (if assigned to an area) Auditing for each environment Implemented by environment

Security Model Create and finalize a new security model Security Audits Review security changes for validity or breaches Current Environment View security and user authorities in the current environment Enhanced Security Application Card

Provides for implementation of new plan –Import users, groups, areas, and tasks from CAS files –Decide what you want to lock –Create groups and authorize to tasks –Assign users to groups –View current and planned authorities for users Note: this is all done in the model – not the live environment Security Modeling and Planning

Import from the current environment: –Users –Groups –Areas and tasks –Group Authorities –Private Authorities You don’t have to start from scratch! 1. Import Security Components

Subsets –Unlocked –Application –Type Mass Change Model Template It’s Easy! 2. Decide what you want to lock

Subsets Views Mass Change R7 –Quick Change –Append subsets Model Template Piece of Cake! 3. Create groups and assign to tasks

Validation Subsets –User Groups –Group members Templates Return-to-create Your model is almost ready! 4. Assign users to groups

Current and planned authorities A. User being reviewed B. Tasks the user is granted C. How access was granted Private (user id) Group (group id) Not locked (blank) A B C 5. View authorities for users

View tasks user will no longer have access to View tasks user could not do before Final Adjustments to the model Export files to a test environment for user testing and acceptance Benefits –Reduce risk of affecting user productivity at go live –Resolve issues quickly after plan is implemented Advanced Analysis and Testing

Rights Revoked: If users need any of these rights to do their jobs, they will be adversely affected when the plan is implemented. Enhanced Security lets you make sure this won’t happen. Advanced Analysis

Rights Granted: SOX requires that all access be reviewed by authorizing manager. With Enhanced Security, you can export user rights to standard forms for management approval. Advanced Analysis

Testing is critical to ensure users are not affected by the new plan. Users from every group Formal test plan Enhanced Security provides an export process for moving user rights from the model to an XA environment on the same or different iSeries. Validation stamps generated No re-keying Testing

SOX requires regular review of changes to security authorizations Enhanced Security provides: Detailed Transaction History Security Change Audit Conflicting Task Authorities Regular Audit Reports Security Auditing and Reporting

Freeze the Plan –Saves an image of the model –Triggers are activated on the XA security files –Changes in user rights begin to be written to a transaction file Routine Auditing and Reporting

Customize views, subsets, and sorts View or Host Print Determine how a user has gained access to a task Quickly identify the area(s) where changes need to be made Detailed Transaction History

Net Changes only (compared to last run or when model frozen) Navigate to Detailed Transactions that resulted in the change View or Print Report Security Change Audits

Schedule regular Auditor reports Set Audit Options Regular Reporting – Scheduled Job

Summarize authority granted to users for the reporting period From last run date (monthly changes) From date that the plan was frozen Security Audit Report

Users who have authority for tasks that SOX defines as conflicting, for example: Create a purchase order Generate an AP check Security Audit Reports High-Risk Authority Conflicts

IFM Security iSeries User Security CAS security maintenance XA Menu inquiry (where tasks are used) Coming Enhancements

Integrator (R6 or R7) –R6 requires new business objects created at installation OS V5R1 or higher All functions to be secured must be set up in CAS as tasks and assigned to an area Prerequisites

Enhanced Security <P30 $6,500 License P30+ $9,500 Implementation R6(3 days) * $3600 and Training R7(2 days) $2400 Annual License Fees none And the cost for ES…

Conference call and demo to address your specific areas of interest Purchase the software and schedule implementation and training Start with a Security Audit Select other related services to help you meet your SOX requirements Interested?

Security Audit Objective review of your iSeries and XA security configuration Typically 2 to 3 days (single XA environment) Review Security Settings –iSeries security configuration –iSeries User Profiles and environment access –XA Profiles and task authorities Risk Assessment and Recommendations (deliverable) Typical results –Estimate that 80% of companies need some improvements in Security –Security Policy not sufficient to protect unauthorized access to the system –XA security configuration is not optimized CISTECH Security Services

Security Planning Assistance –XA Security Policy –iSeries Security Policy –Documented Plan and Procedures –Change Management and Environment Standards for Customizations Related Security Services

Thank you! Questions?