SAP R/3 Security in the Sarbanes Oxley Era - 7 Steps for Better SOX Compliance
- 1.Provide users access on a need to know and need to do basis.
- 2.Adequately secure programs, transactions and tables.
- 3.All user accesses to SAP R/3 are properly authorized and approved.
- 4.Segregation of duties is maintained for all sensitive business transactions.
- 5.All controls and business processes are documented.
- 6.Anti-fraud preventive controls are in place to prevent & detect fraud before an audit.
- 7.User profiles and roles in SAP are secured and designed to meet business requirements.
It was so nice article.I was really satisified by seeing this article sap learning videos.
ReplyDeleteThank you. for wonderful article. It has more Information in Your Website sap learning video.
ReplyDeleteFabulous..!! Thank you.The information you provided is much useful information on sap tutorial videos.
ReplyDeleteThank you. for Sharing Great Information. It is Very Helpful Information on sapvideos.
ReplyDeleteThank you. It is such a wonderful post. it has great information it is very useful for sapvideos.
ReplyDeleteI am glad that I saw this post. It is informative blog for us and we need this type of blog thanks for share this blog, Keep posting such instructional blogs and I am looking forward for your future posts.
ReplyDeleteCyber Security Projects for CSE
JavaScript Training in Chennai
Project Centers in Chennai for CSE
JavaScript Training in Chennai
This comment has been removed by the author.
ReplyDelete