WEBINAR

SAP Access Violations & Segregation of Duties:

How to analyze user access

WATCH THE FULL WEBINAR

 

 

3 REASONS WHY YOU SHOULD WATCH THIS WEBINAR

Reason 1

SAP security

Reason 2

reality and demands can differ

Reason 3

mitigate residual access risks

WHAT YOU CAN EXPECT

SAP Authorizations are the elephant in the room when dealing with SAP security. But reality and demands can differ: while you want to restrict access as much as you can, sometimes that is not possible. It can happen for example that a user can create or change a vendor and enter invoices or change SAP authorization roles and assign roles to users..

 

So how do you mitigate residual access risks? We’ll be happy to tell you! In this webinar we will discuss how you can detect users executing a “risky” action, such as changing certain data, or violating a Segregation of Duties rule.

 

We will talk about:

 

 Information available in tables and change documents

 How to combine information to detect SoD violations

 How to establish monitoring and mitigation of access risks

  © 2023 All Rights Reserved  

Imprint          Privacy

Built with