Compliant User Provisioning Role Factory Controls Management Audit Services

Size: px
Start display at page:

Download "Compliant User Provisioning Role Factory Controls Management Audit Services"

Transcription

1 Compliant User Provisioning Role Factory Controls Management Audit Services

2 Agenda Company Presentation wikima4 Interdependencies Operational Risks Security Areas Security Processes Security Reporting Security Framework Compliance /Access Controls Configuration Controls Incident Controls Process Controls Risk Mitigation Security Monitoring Role Mining and Optimisation Best Pratcise Template Roles for all areas rolebee: Smart SAP Mass Role Maintenance Role Factory SAP NetWeaver IDM ComplianceEngine FireFighter/AuditTicker Password Self Service Single Sign-On GoogleAppsConnector Enhanced IDM SAPLoginCracker SAP Audit Catalogue SAP Hacking Fraud Analysis and Detection Post Audit Support Audit Services

3 wikima4 AG Headquarters wikima4 AG Bahnhofstrasse 28, 6304 Zug Development Center wikima4 SA Rue du Torrent Vevey Representative wikima4 AG Scottsdale AZ/US wikima4, founded 2001, is one of the leading Swiss software and development companies for security, compliance, IT Governance, process optimization and Identity Management. Special Expertise in Identity Access Management (SAP, Siemens, Novell, Omada,...) Special Expertise in Governance, Risk & Compliance (SAP, mesaforte,...) Member of the SAP Global Security Alliance Certified for SAP NetWeaver: mesaforte Your SAP Control Management in a mouse click Head of IGSAP of ISACA Switzerland Chapter Head of SAP Roundtable Switzerland Chances and Risks in SAP Systems Head of IT-Governance Interest Group of the SwissICT Various lectureship for Swiss and German institution in the field of SAP Compliance, Security & Process Management

4 Recommendations is one of the pioneers in Switzerland recognizing the importance and the challenges in securing SAP systems. organized and educated the SAP user community in Switzerland and was able to take even influence in the security practice of the vendor. Giampaolo Trenta, Bank Julius Baer has brought state-ofthe-art knowledge and expertise to the table. consulting approach and the best-practices I could gain allowed an accelerated introduction of new concepts and the implementation of a secure and compliant system. Michael Bosshard, Zurich Financial Services I highly rate for professionalism and excellent technical knowhow. not only delivers very good concepts but also implements them on time and within budget against all odds and political difficulties! gave me the confidence to complete a challenging task in a difficult environment. Rudolf Walther, Winterthur Insurances has a unique combination of SAP-specific audit and security know-how and at the same time management understanding and leadership skills which allows to help SAP shops to tackle the most critical area when it comes to security: responsibility. Sachar Paulus, Chief Security Officer at SAP AG is both customer and detail-oriented, watches the balance sheet like a hawk, yet without losing sight of the strategic objectives. has a deep and detailed solid knowledge of SAP systems. Usama Abdelamid, Ciba Speciality Chemicals We are happy, that wikima4 provides consulting services to us. is probably the best authority on this field you can find! Jean-Luc Nottaris at OIZ It's always a pleasure to discuss issues and work with has a solid understanding of (SAP) information and IT-security as well as high professional competence. I have been highly satisfied with the work performed and the way worked with my staff on a joint audit. Rolf-Christian Andersen at Baloise Deep security expertise in the SAP environment Martin Frick at AVIS

5 mesaforte & rolebee Value Chain Compliance / SOD Security Intern/ Extern Mining / Prozess Optimierung Lizenz Optimierung Rollen Designer &Tuner Rulesets (IT Controls, SAP FI, SAP SD/MM, GMP, IKS, esox..) Datenschutz Berechtigungs- Analyse Nutzungsgerechte Verteilung Rollen Templates Kontinuierliche Prüfungen, Real time Schutz SLA Überwachung Risiko- Mitigation Prozess Zuordnung Organisatorische Kalibrierung Schutz vor Hacking Portfolio- Management Compliant Vertrags- Management Rollen Ableitung

6 Compliance Services for SAP Secure Software Development, Secure Change & Configuration Management Security Reviews, Security Concepts Services Risk Management, Regulatory Compliance, Roles and Authorizations Inter-Company Communication, Digital Signatures Authentication & SSO, Public Key Infrastructure, Trust Centre Services Secure Network Architecture

7 Agenda Company Presentation wikima4 Interdependencies Operational Risks Security Areas Security Processes Security Reporting Security Framework Compliance /Access Controls Configuration Controls Incident Controls Process Controls Risk Mitigation Security Monitoring Role Mining and Optimisation Best Pratcise Template Roles for all areas rolebee: Smart SAP Mass Role Maintenance Role Factory SAP NetWeaver IDM ComplianceEngine FireFighter/AuditTicker Password Self Service Single Sign-On GoogleAppsConnector Enhanced IDM SAPLoginCracker SAP Audit Catalogue SAP Hacking Fraud Analysis and Detection Post Audit Support Audit Services

8 SFW.Dependencies Business Continuity Planning Operation & Maintenance Non System Non System Availability Non System Recovery Authentication Identity Identity Theft OpRisks Network Communication Unautho- Unauthorized rized Access System System Damage Access Control Policy Framework Non Audit Ability Non-React- Ability Software Life Cycle Inflexibility Audit Trail Security Organisation Incident Monitoring

9 SFW.Complexity Developer Key User, Password, Fix-parameters Emergency Processes Emergency Concept and Roles Perimeter Server Centre walk in Printer, network setup Operating System Commands Table logging Client settings Emergency Process Server Configuration (Hardening) Backup- Media Profileparameter Standardusers System- Hardening Patch-level, Support- Packages SAP Gateway (secinfo, recinfo) Basicparameters/ Architecture Server Configuration (with OS-DB- Application) Network Security Services Port Policy, Network Architecture, DMZ Segregation of Critical Business duty conflicts in Authorisation in roles roles Segregation of Critical Systemauthorisation in duty conflicts in users roles Critical Systemauthorisation for user Data encryption Intrusion from internal/ external account Security Organization Process Credential- Management Security Organisation, Communication, Reporting Critical Business authorization for user Single Sign-On techniques Remote Policy/ Access rights allocation technique/ Autorisation Intrusion Detection Processes Security/Frame work Guidelines User provisioning Process System- Hygiene Monitoring of Log files Role- Maintenance Process User Management Process Standardisation state, Custom development rata Process- und Organisations- Transparency Role- Efficiency Concept and Process Monitoring Logging & Monitoring SAP GUI/ WebGui, Portal Development policies Change Management User Access Rights Administration Client Separation of Run and Build, ITIL- Conformity Service Level Agreements, Duties external Partner Authority Checks Operation Guidebook Backup- Concept Transport- Management- Process Support- Processes, First-, Second- &Third-Level- Support Code Inspection Operation Disaster- Recovery- Concept Backup & Recovery

10 SFW.Process Map Security & Compliance Identity Access Management Authentication User Provisioning Role Modification Secure System Management SAP Support Management System Sign-Off & Takeover System Monitoring & Performance Management System Maintenance Business Continuity Planning Secure Lifecycle Management Requirments Definition Change Request Management Test Management Transport Management System Replacement... Problem & Incident Management Incident Logging Incident Categorizing Incident Handling Desaster Management (Task Force) System Opening... Compliance Management Risk Management Attestation Audit & Review Forensic Analysis (ex post)......

11 Agenda Company Presentation wikima4 Interdependencies Operational Risks Security Areas Security Processes Security Reporting Security Framework Compliance /Access Controls Configuration Controls Incident Controls Process Controls Risk Mitigation Security Monitoring Role Mining and Optimisation Best Pratcise Template Roles for all areas rolebee: Smart SAP Mass Role Maintenance Role Factory SAP NetWeaver IDM ComplianceEngine FireFighter/AuditTicker Password Self Service Single Sign-On GoogleAppsConnector Enhanced IDM SAPLoginCracker SAP Audit Catalogue SAP Hacking Fraud Analysis and Detection Post Audit Support Audit Services

12 MFX.GRC and IT-Information Security Regulation and Targets Business Rules Business Roles Management Dashboard (Configuration, Compliance, Incidents) mesaforte SAP Control Management Authorisation Analysis Automated reaction Attestation Risk Mitigation ITSM (Governance) OpRisk (Risk) IAM (Compliance) SIEM (Incidents)

13 mesaforte ComplianceEngine: PDCA PLAN Establish the objectives and processes necessary to deliver results in accordance with the expected output. In mesaforte, Plan tab is where the Rule Sets, Rules, Filters and Planning jobs are prepared. mesaforte is based on the PDCA cycle. PDCA cycle is widely known as the underlying concept behind the ISO 9001 Quality Management standard. DO CHECK Implement the plan and execute the process. In mesaforte, the job previously defined is executed and data for charting and analysis is collected. Study the actual results and compare against the expected results to ascertain any differences. In mesaforte, the data can be analyzed, reports can be generated, tasks can be assigned. ACT Act in the PDCA cycle requests corrective actions on significant differences between actual and planned results. In mesaforte, the logged-in user can act upon violations by simply double-clicking the pending tasks on the list.

14 MFX.Risk Cycle to Process Area

15 MFX.Risk to Process Area

16 MFX.Risk to Conflicting Groups

17 MFX.Risk per User

18 Configuration Compliance Incidents MFX.Internal Controls System Status in respect to security elements Profile parameters Client settings Table Logging SAP Standard user Gateway etc. Segregation of duties and user authorisation monitoring Per role Per user Per profile aso. Analysis of critical events from the system logs Security Audit Log System Log Transaction Log etc.

19 MFX.mesaforte Control Directory

20 MFX.Justification Dialog

21 MFX.Integration Solution Manager

22 Plan: Define Systems, Rule Sets, Rules, Filters and Jobs

23 Plan: New Rules, Own Rules Create new, copy (and change) existing rules for ALL categories; wikima4 / client naming room

24 Do: Run Jobs, Collect Data No limits in checking system against different rulesets SIMULTANEOUSLY

25 Check: Analyze and Resolve Violations,... Run reports and export data

26 Check: Resolve... Resolutions can be defined or taken over for users/roles/servers in rules, rulesets or activations.

27 ...Justify Resolutions... ALL resolutions/ changes need to be justified

28 ...Or Assign Tasks...For all violations that should be corrected in the related system(s)

29 Check: Inform Responsible Persons A mail will be sent to the responsible person automatically

30 Act: Work on Tasks Assigned

31 Audit: Record All Changes and Resolutions

32 MF2.mesaforte Dashboard

33 MF3.mesaforte Dashboard

34 Real-time Dashboard

35 Agenda Company Presentation wikima4 Interdependencies Operational Risks Security Areas Security Processes Security Reporting Security Framework Compliance /Access Controls Configuration Controls Incident Controls Process Controls Risk Mitigation Security Monitoring Role & User Mining Best Practise Template Roles for all areas rolebee: SAP Role Design, Creation & Tuning Role Optimisation SAP NetWeaver IDM ComplianceEngine FireFighter/AuditTicker Password Self Service Single Sign-On GoogleAppsConnector Enhanced IDM SAPLoginCracker SAP Audit Catalogue SAP Hacking Fraud Analysis and Detection Post Audit Support Audit Services

36 SFW.Solution Architecture Access rights limitation ( get clean ) wikima4 SecurityFramework rolebee RoleDesigner/ RoleTuner mesaforte ComplianceEngine mesaforte RoleMining Monitoring & Controlling ( stay clean I ) mesaforte Your SAP Control in a Mouse Click Configuration, Compliance and Incident Controls Management Dashboard and Reporting Segregation of Duties ( stay clean II ) Implementation SAP NetWeaver Identity Management (IDM) plus mesaforte ComplianceEngine

37 RFY.Role Design Project Tasks Policies System Analysis Role Creation User Role Matrix User Provisioning Role Test (automated) Definition of Baselines Role Mining (Transaction & Role Usage) Implementation of Role Templates, Adoptions according Clients Request (e.g. Renaming) Assignment of Single to Composite Roles to Users; Transport in Q and P Creation of Test Users and Assignment of Roles Test Procedures Positive Testing Tracing of used Authorization Objects IDM IDM Role Derivation Role Documentation Role Test (User) Go-Live Preparation Go-Live Support Continuous Monitoring Derivation according Organizational Setup Short text, Description, Test Procedures Positive Testing Functionality Negative Test SoD Conflicts, Critical Rights Transport in Q and P, Assignment of Users to Roles Role Adoptions on request Monitoring und Review SoD Conflicts, Critical Rights IDM IDM supported by wikima4 mesaforte supported by wikima4 rolebee IDM Supported by SAP NetWeaver IDM

38 Policies Policies Definition of Baselines

39 SFW.Templates/Tools/Reporting Control Framework Identity Access Management Compliance and Governance Management Delivery & Operations Management Life-Cycle & Configuration Management Infrastructure & Perimeter Management mesaforte SAPIDM SAP SolMan SAP TMS Assessment Tool System Owner Internal Audit External Audit Privacy Officer Compliance Officer

40 System Analysis System Analysis Role Mining (Transactions & Role Usage)

41 RFY.Limitation to the necessary All Roles/assignments 6700 Reduction/removal of unused roles 1200 Reduction/removal of unused transactions/reports 120

42 RFY.RoleMining System Usage

43 RFY.RoleMining Role Usage

44 RFY.RoleMining Role Usage per user

45 RFY.RoleMining Independent role usage

46 RFY.RoleMining Role efficiency

47 Role Creation Role Creation Implementation of RoleTemplates, Modification acc. Customer needs

48 User Role Assignment User Role Matrix Assignment of Single to Composite Roles to Users; Transport in Q and P

49 Test User Provisioning and Testing Benutzer- Provisionierung Anlage Testbenutzer und Zuordnung Rollen, Favoriten IDM Rollen-Test (automatisiert) Testprozeduren Positiv-Test Tracing genutzte Berechtigungsobjekte

50 Role Documentation and Role Derivation Role Documentation Kurztext, Langbeschreibung, Menustrukturen Role Derivation Ableitung gemäss Organisationsmodell

51 Role Test (by Users) Role Test (User) Testprozeduren Positiv-Test Funktionalität Negativ-Test SoD-Konflikte Kritische Rechte

52 rolebee Supporting Tools mesaforte.rolemining rolebee.roledesigner rolebee.roletuner Analyse usage of transactions, reports Analyse role and role assignment effectiveness Analyse role healthiness Analyse segregation of duties conflicts Map used transactions and reports to wikima4 template roles Support role aggregations and assignment to users by pattern recognition Adapt role contents (objects, fields) and default values Mass derive, document, aggregate, rename, provide, delete, converse, screen, create roles according customer needs

53 RFY.RoleTuner rolebee - Features When rolebee has been created, client requirements, own research efforts, and lessons learnt out of daily project work have been taken into consideration. O M O O C C OrgSets: Define required organisation levels or upload workload from an external file. Derivation: Derive single or multiple single or composite roles automatically for one or multiple or upload workload from an external file. rolebee automates mass activities within the areas role creation and maintenance, which are not provided by SAP standard. rolebee reduces efforts, time and resources needed massively and eliminates sources of potential failures. In order to ensure all records are created same way as a manual maintenance rolebee is working like a normal SAP user. This guarantees the mandatory audit trail. R R S S U R R C R R Documentation: Edit short text and description easily per role and automatically update it in SAP or upload workload from an external file. Renaming: Rename multiple roles automatically or upload workload from an external file. rolebee automatically corrects assignments of single roles in composite roles. Aggregating: Aggregate automatically single roles to composite roles or upload workload from an external file. Provisioning: Create users and assign roles automatically or upload workload from an external file. This feature has been designed especially for the creation of test users. Deletion: Mass deletion of no longer needed roles or upload workload from an external file.

54 RFY.RoleTuner rolebee

55 rolebee Interaction Role Mining Role Designer Role Tuner Compliance Engine Transactions & Reports actually used Upload roles in SAP Update transactions to roles SAP Map transactions and reports to w4 template roles Map transactions and reports to SAP process steps Recognise patterns to aggregate roles Upload roles in SAP Synchronise info Synchronise info SAP Adapt wikima4 template roles Create new wikima4 template roles Aggregate composite and IDM roles SAP SAP SAP Check compliance of adapted or newly created wikima4 template roles, of composite and IDM roles of role assignments to users SAP Update OrgSet info Recognise patterns to derive roles Synchronise info Derive single & composite roles SAP

56 RFY.Challenge of SOD Conflicts All authorizations within a role Critical combination within a role Transaction ME21N Transaction MIGO Transaction MIRO Purchase Manager has the right to accept goods and to release purchase invoices Order ME21N Goods receive MIGO Invoice release MIRO Purchase Manager is simultaneously responsible for materials management and invoice procedure All roles that are given to one user Transaction ME21N Transaction MIGO Transaction MIRO Allocated critical rights Transaction ME21N Transaction ME21N Transaction MIGO Transaction MIGO Transaction MIRO Transaction MIRO

57 RFY.Risk-Mitigation workshops SoD-Risk- Statement evaluation Evaluation of System- Situation Evaluation of involved Reports and Processes Identify possible Authorization Values Establishment of controls via System- Configuration Logging of User activities Understand the Risk Is there really a risk? Role deletion or replacement Authorization Object limitation Definition of Key values for the approvers Establish User-Logs/ Justification Is access to a certain field critical? yes Is there a risk at all? non Could conflicts be spitted up? non Could critical values be eliminated? non Could controls be set via System? non Determination of Mitigating controls nein Justification missing criticality yes Description of Configuration yes Description of Role adjustment yes Description of value adjustment yes Description of Systemconfiguration

58 Agenda Company Presentation wikima4 Interdependencies Operational Risks Security Areas Security Processes Security Reporting Security Framework Compliance /Access Controls Configuration Controls Incident Controls Process Controls Risk Mitigation Security Monitoring Role & User Mining Best Practise Template Roles for all areas rolebee: Smart SAP Role Design, Creation & Tuning Role Optimization SAP NetWeaver IDM ComplianceEngine FireFighter/AuditTicker Password Self Service Single Sign-On GoogleAppsConnector. Enhanced IDM SAPLoginCracker SAP Audit Catalogue SAP Hacking Fraud Analysis and Detection Post Audit Support Audit Services

59 eidm.concept Requirements Organization Structure Operations Creation of roles and authorization concept Establishment of Support Organization for user management Compliance conform execution of the IT Audit requirements for the user management Request and approval for new authorizations Change of existing authorizations Re-setting of Passwords Management von Super User authorization Definition of efficient and effective processes in the User Management Definition and Communication of a support concept for the operative user Definition of a embedded approach and unified mythology of the user management / change of not transparent user access management (c) wikima4 (C) wikima

60 eidm.user Provisioning Processes Use cases Create user 1 Request new user Create user Master Data in HCM Import HCM-Data in SAP IDM Create user (manually) SAP IDM Create user credential in target System 2 De-provisioning Access rights provisioning 1 Request user access rights Allocation of rights in target system Request Rights (Group) Access right allocation (manually) SAP IDM Approval of access rights (Line Manager) 2 User deactivation 3 User deprovisioning requirement Approval of deprovisioning (Line Manager) User deletion in the target system 1 User deactivation due to elimination of roles 1 Systems SAP ABAP SAP Java AD... (C) wikima4 2010

61 eidm.possible savings Possible savings Increase productivity Administration User Mitigate Risk User Value drivers Create/delete users Add/delete access rights Problems with passwords Information to audit Non-productive time when entering company Non-productive time when changing roles Problems with passwords Abuse Sabotage

62 eidm.value Driver Calculation Pre-Requisites: FTE cost as of CHF, 650. CHF/day 1 Increase 8.5% (600), Fluctuation 5% (350), 3 days not productive 2 Change of Roles 5% (350), 1 day not productive 3 Password problems 5% (350), ½ day not productive 4 Increase 8.5% (600), Fluctuation 5% (350), 0.5h/system 5 Change of Roles 5% (350), 0.5h/system (15) 6 Problem with Password 5% (350), 1h 7 4 days per Audit (2)

63 eidm.add-ons for IDM solutions Compliance Engine SAP NetWeaver Identity Management Omada, Siemens, Novell, BMC FireFighter AuditTicker Compliant User Provisioning Reporting

64 eidm.complianceengine IDM Access Rights/role requirement mesaforte Risk Assessment/ Mitigation Role Delivery Role change requirement Control-/ Rule- Definition Change Request Closing Business Role/ technical Role Approval/ Justification Role Design/ maintenance Compliance- Check (SOD) Approval Workflow Compliance- Check (Role) Compliant Provisioning Compliant Auditing Compliant Role Delivery

65 eidm.complianceengine live

66 eidm.complianceengine: System Chart HCM Peoplesoft SAP Applications Active Directory Flat File Lotus People-soft JD Edwards Active Directory IDM System SAP IDM, Omada, Novell, Siemens, SAP ERP SAP Portal SAP CRM SAP CRM mesaforte Compliance Engine User ID information Check for conflicts during provisioning process Creation of User ID s, provisioning of roles Check for conflicts during role creation/ Continuous Monitoring for Conflicts

67 eidm.firefighter Code Orange is requested in emergency cases where normal authorizations are insufficient and normal work flows take too long Role is assigned automatically for a limited period of time

68 eidm.firefighter live

69 eidm.auditticker Request FireFighter role (here: CodeOrange) for a productive system via IDM standard or eidm. Automatic activation of the Security Audit Log for system, user and clients related to the requested FireFighter role. Automatic assignment of the FireFighter role (via IDM). Working with the extended access rights Automatic de-provisioning of the FireFighter role (via IDM). Automatic de-activation of the Security Audit Log. Reading-out data and copying in a separate database. Auditing, who applied when and for which system a FireFighter Role and what has been done with it.

70 eidm.auditticker live

71 eidm.reporting

72 Agenda Company Presentation wikima4 Interdependencies Operational Risks Security Areas Security Processes Security Reporting Security Framework Compliance /Access Controls Configuration Controls Incident Controls Process Controls Risk Mitigation Security Monitoring Role Mining and Optimisation Best Pratcise Template Roles for all areas rolebee: Smart SAP Mass Role Maintenance Role Factory SAP NetWeaver IDM ComplianceEngine FireFighter AuditTicker Password Self Service Single Sign-On Enhanced IDM SAPLoginCracker SAP Audit Catalogue SAP Hacking Fraud Analysis and Detection Post Audit Support Audit Services

73 SAC.SAPLoginCracker The SAP Gateway vulnerability has been known for years* but SAP users are still not actively taking steps to close this gap. To demonstrate what can be done if this vulnerability if it is not properly closed, wikima4 security experts decided to implement the SAPLoginCracker.. The SAPLoginCracker lets a user log in without specifying a password. It even works when passwords are disabled for the specified user name. There is no special knowledge required to operate the SAPLoginCracker". Its effects can be demonstrated visually. *see for example OSS-Note

74 Thank You! Priska Altorfer Managing Partner wikima4 AG Bahnhofstrasse 28 / 6304 Zug / Switzerland T: +41 (0) / F: +41 (0) [email protected] / Jörg Altmeier Managing Partner wikima4 AG Bahnhofstrasse 28 / 6304 Zug / Switzerland T: +41 (0) / F: +41 (0) [email protected] /

Jörg Altmeier Management Coach

Jörg Altmeier Management Coach Jörg Altmeier, born 1967, is working for over 17 years as a management consultant in the fields of knowledge, processes, quality, information systems and security. One of his major scopes is the integration

More information

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015 SAP Secure Operations Map SAP Active Global Support Security Services May 2015 SAP Secure Operations Map Security Compliance Security Governance Audit Cloud Security Emergency Concept Secure Operation

More information

Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT

Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT Compliance & SAP Security Secure SAP applications based on state-of-the-art user & system concepts Driving value with IT BO Access Control Authorization Workflow Central User Management Encryption Data

More information

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT Foreword by Prof. Wolfgang Lassmann... 15 Foreword by Dr. Sachar Paulus... 17 1 Introduction...

More information

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options

More information

SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned

SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned Executive Summary Organizations evaluating technology solutions to enhance their governance, risk and compliance

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance

More information

Cloud-based Managed Services for SAP. Service Catalogue

Cloud-based Managed Services for SAP. Service Catalogue Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...

More information

Minimize Access Risk and Prevent Fraud With SAP Access Control

Minimize Access Risk and Prevent Fraud With SAP Access Control SAP Solution in Detail SAP Solutions for Governance, Risk, and Compliance SAP Access Control Minimize Access Risk and Prevent Fraud With SAP Access Control Table of Contents 3 Quick Facts 4 The Access

More information

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement

More information

Cyber Security for NERC CIP Version 5 Compliance

Cyber Security for NERC CIP Version 5 Compliance GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Session 0804 Security Control Center by SAP Active Global Support Kristian Lehment, Senior Product Manager, SAP AG

Session 0804 Security Control Center by SAP Active Global Support Kristian Lehment, Senior Product Manager, SAP AG Orange County Convention Center Orlando, Florida June 3-5, 2014 Session 0804 Security Control Center by SAP Active Global Support Kristian Lehment, Senior Product Manager, SAP AG Abstract Running secure

More information

Oracle Role Manager. An Oracle White Paper Updated June 2009

Oracle Role Manager. An Oracle White Paper Updated June 2009 Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship

More information

SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH

SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH WWW.MANTRANCONSULTING.COM 25 Mar 2011, ISACA Singapore SOD SAS70 Project Controls Infrastructure security Configurable controls Change

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire Overview This pre-implementation questionnaire is designed to provide the Boston College Internal Audit Department with a general understanding

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions

More information

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Juan Perez-Etchegoyen [email protected] May 23 rd, 2012 HITB Conference, Amsterdam Disclaimer This publication is copyright 2012

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System

More information

SAP Identity Management Overview

SAP Identity Management Overview Identity Management Overview October 2014 Public Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

Governance, Risk & Compliance for Public Sector

Governance, Risk & Compliance for Public Sector Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment

More information

Enterprise Identity Management Reference Architecture

Enterprise Identity Management Reference Architecture Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture

More information

Identity and Access Management

Identity and Access Management Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

PUR1308/12 - Service Management Tool Minimum Requirements

PUR1308/12 - Service Management Tool Minimum Requirements PUR1308/12 - Service Tool Minimum Requirements No. General Requirements The Supplier organisation must have 10 years or more experience in 1. developing Service software. 2. 3. 4. 5. 6. 7. 8. The Supplier

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Data Handling in University Case Study- Information Security in University Agenda Case Study Background

More information

Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security

Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security Agenda Motivation SAP Threat Vectors / SAP Hack Solution Approach the 360 of agilesi Threat Detection Secenarios / SIEM use cases

More information

BSM for IT Governance, Risk and Compliance: NERC CIP

BSM for IT Governance, Risk and Compliance: NERC CIP BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................

More information

Overview Application Incident Management. David Birkenbach ALM Solution Management August 2011

Overview Application Incident Management. David Birkenbach ALM Solution Management August 2011 Overview Application Incident David Birkenbach ALM Solution August 2011 How the New SAP Solution Manager Supports Business & IT SAP Solution Manager 7.1 provides: Better coverage of the complete customer

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

SAP Standard for Security

SAP Standard for Security SAP Standard for E2E Solution Operations Document Version: 1.0 2014-12-12 SAP Solution Manager 7.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These

More information

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT Solution in Detail NetWeaver BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING NetWeaver IDENTITY MANAGEMENT Identity management today presents organizations with a host of challenges. System landscapes

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

IT Service Management by SAP Africa (ITSM) Dirk Smit ALM Engagement Manager

IT Service Management by SAP Africa (ITSM) Dirk Smit ALM Engagement Manager IT Service Management by SAP Africa (ITSM) Dirk Smit ALM Engagement Manager Optimize IT Operations Process Support Business Goals CIO CEO/CFO Reliable Business Support Changes to improve IT services are

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management

U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management Disclaimer These materials are subject to change without notice. SAP AG s compliance analysis with respect to SAP software

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

Take Control of Identities & Data Loss. Vipul Kumra

Take Control of Identities & Data Loss. Vipul Kumra Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees

More information

TRIPWIRE NERC SOLUTION SUITE

TRIPWIRE NERC SOLUTION SUITE CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering

More information

Introduction: ITIL Version 3 and the ITIL Process Map V3

Introduction: ITIL Version 3 and the ITIL Process Map V3 Introduction: ITIL Version 3 and the ITIL Process Map V3 IT Process Maps www.it-processmaps.com IT Process Know-How out of a Box IT Process Maps GbR, 2009-2 - Contents HISTORY OF ITIL... 4 The Beginnings...

More information

Integrity 10. Curriculum Guide

Integrity 10. Curriculum Guide Integrity 10 Curriculum Guide Live Classroom Curriculum Guide Integrity 10 Workflows and Documents Administration Training Integrity 10 SCM Administration Training Integrity 10 SCM Basic User Training

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management Solution in Detail NetWeaver Business-Driven, Compliant Identity Table of Contents 3 Quick Facts 4 Business Challenges Identity for the User Lifecycle 5 The Solution Supporting a Heterogeneous IT Landscape

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Obtaining Value from Your Database Activity Monitoring (DAM) Solution Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation

More information

C21 Introduction to User Access

C21 Introduction to User Access C21 Introduction to User Access Management Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What

More information

INFRASTRUCTURE AS A SERVICE BUYER S CHECKLIST

INFRASTRUCTURE AS A SERVICE BUYER S CHECKLIST INFRASTRUCTURE AS A SERVICE BUYER S CHECKLIST 2 CONTENTS SERVICE LEVELS 3 SERVICE AND SUPPORT 4 CERTIFICATIONS 4 MANAGED HOSTING 7 BILLING 8 SERVICE MANAGEMENT 8 TECHNOLOGY 9 GLOBAL, REGIONAL, LOCAL 10

More information

IBM Connections Cloud Security

IBM Connections Cloud Security IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application

More information

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed

More information

Information & Asset Protection with SIEM and DLP

Information & Asset Protection with SIEM and DLP Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

SAP Netweaver Application Server and Netweaver Portal Security

SAP Netweaver Application Server and Netweaver Portal Security VU University Amsterdam SAP Netweaver Application Server and Netweaver Portal Security Author: Nick Kirtley Supervisors: Abbas Shahim, Frank Hakkennes Date: 28-09-2012 Organization: VU University Amsterdam,

More information

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Passive Logging. Intrusion Detection System (IDS): Software that automates this process Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

ObserveIT User Activity Monitoring

ObserveIT User Activity Monitoring KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on

More information

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015 Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud

More information

Service Catalog. it s Managed Plan Service Catalog

Service Catalog. it s Managed Plan Service Catalog Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution

Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the

More information

Vodafone Total Managed Mobility

Vodafone Total Managed Mobility Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

How Accenture is taking SAP NetWeaver Identity Management to the next level. Kristian Lehment, SAP AG Matthew Pecorelli, Accenture

How Accenture is taking SAP NetWeaver Identity Management to the next level. Kristian Lehment, SAP AG Matthew Pecorelli, Accenture How Accenture is taking SAP NetWeaver Identity Management to the next level Kristian Lehment, SAP AG Matthew Pecorelli, Accenture In This Session You will receive an overview of the functionality that

More information

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL Identity & Access Management Gliding Flight Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL Agenda 1 General Concepts 2 Logical Components 3 Implementation Structure 4 5 Governance Web App Firewall

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

Fixes for CrossTec ResQDesk

Fixes for CrossTec ResQDesk Fixes for CrossTec ResQDesk Fixes in CrossTec ResQDesk 5.00.0006 December 2, 2014 Resolved issue where the list of Operators on Category was not saving correctly when adding multiple Operators. Fixed issue

More information

Global TAC Secure FTP Site Customer User Guide

Global TAC Secure FTP Site Customer User Guide Global TAC Secure FTP Site Customer User Guide Introduction This guide is provided to assist you in using the GTAC Secure FTP site. This site resides in the Houston Remote Services Center (RSC), and is

More information

Identity & Access Management new complex so don t start?

Identity & Access Management new complex so don t start? IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach

More information

Compliance Response Edition 07/2009. SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures. simatic wincc DOKUMENTATION

Compliance Response Edition 07/2009. SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures. simatic wincc DOKUMENTATION Compliance Response Edition 07/2009 SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures simatic wincc DOKUMENTATION Compliance Response Electronic Records / Electronic Signatures

More information

Document ID. Cyber security for substation automation products and systems

Document ID. Cyber security for substation automation products and systems Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

LogRhythm and NERC CIP Compliance

LogRhythm and NERC CIP Compliance LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate

More information

Adopting Cloud Computing with a RISK Mitigation Strategy

Adopting Cloud Computing with a RISK Mitigation Strategy Adopting Cloud Computing with a RISK Mitigation Strategy TS Yu, OGCIO 21 March 2013 1. Introduction 2. Security Challenges Agenda 3. Risk Mitigation Strategy Before start using When using 4. Policy & Guidelines

More information

Identity and Access. Management Services. HCL Information Security Practice. Terrorist Sabotage. Identity Theft. Credit Card Fraud

Identity and Access. Management Services. HCL Information Security Practice. Terrorist Sabotage. Identity Theft. Credit Card Fraud Terrorist Sabotage Theft Credit Card Fraud Theft Corporate Malfeasance HCL Information Security Practice Why to go for IAM? Terrorist sabotage. theft. Credit card fraud. Corporate malfeasance. Privacy

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

SAP: One Logon for All Systems SAP NetWeaver Single Sign-On

SAP: One Logon for All Systems SAP NetWeaver Single Sign-On SAP: One Logon for All Systems SAP NetWeaver Single Sign-On SAP AG applied its own best practices to enable employees to access the systems they need quickly, seamlessly, and invisibly, thanks to the SAP

More information

Intelligent Security Design, Development and Acquisition

Intelligent Security Design, Development and Acquisition PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New

More information

We Believe in Security with a Capital S

We Believe in Security with a Capital S Security Consulting by arvato Systems We Believe in Security with a Capital S The number of attacks on IT systems has increased dramatically in recent years, with the style and approach of such attacks

More information

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to

More information

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation Copyright, AlgoSec Inc. All rights reserved The Need to Ensure Continuous Compliance Regulations

More information

IBM Security Privileged Identity Manager helps prevent insider threats

IBM Security Privileged Identity Manager helps prevent insider threats IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged

More information

Best Practices Report

Best Practices Report Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general

More information

Security and Your SAP System When Working with Winshuttle Products

Security and Your SAP System When Working with Winshuttle Products Security and Your SAP System When Working with Winshuttle Products 2014 Winshuttle, LLC. All rights reserved. 2/14 www.winshuttle.com Background Companies running SAP systems are accustomed to configuring

More information

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress secure Identity and Access Management solutions user IDs and business processes Your business technologists. Powering progress 2 Protected identity through access management Cutting costs, increasing security

More information

Best Practices for PCI DSS V3.0 Network Security Compliance

Best Practices for PCI DSS V3.0 Network Security Compliance Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information