Take the ‘dread’ out of your XA Security Audit. Belinda Daub, Senior Consultant Technical Services email@example.com 704-814-0004. Agenda. Concepts, best practices, and tools to meet requirements for internal controls: Separation of Duties Routine User Access Review
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Belinda Daub, Senior Consultant Technical Services
Concepts, best practices, and tools to meet requirements for internal controls:
Even if legislation were not enforcing these controls,
we should implement them ourselves.
By protecting our company,
we also protect ourselves, our families
and all those who have a vested interest
in the company’s future.
POR COPY Procurement PO Copy
POR CREATE Procurement PO Create
AM6M1001 Purchasing Enter/Edit Pos
AM6M1013 Purchasing Create POs from Offline files
View current user rights in the environment
A. User being reviewed
B. Tasks the user is granted
Useful for cleaning up user authority to tasks they do not use
iSeries User Profiles – Power Users
Tools are available to help you effectively manage Security Audit requirements: