<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security strategy in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-strategy/m-p/1900088#M375968</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you all for your inputs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security document is in fact a part of functional / management team responsibility in which you help them with your inputs and thoughts as it varies with business processes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again.&lt;/P&gt;&lt;P&gt;TJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: &lt;/P&gt;&lt;P&gt;        Tee Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Feb 2007 21:49:29 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2007-02-06T21:49:29Z</dc:date>
    <item>
      <title>security strategy</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-strategy/m-p/1900084#M375964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi SAP Gurus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have multiple questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first, let me explain situation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- New implementation of NW04S + ECC5&lt;/P&gt;&lt;P&gt;- Used are BI7 only , GL,FI/CO,TR ( all financial products)&lt;/P&gt;&lt;P&gt;- Small-medium size company with 3-4  company codes.&lt;/P&gt;&lt;P&gt;- SOX is a big issue but no Versa.&lt;/P&gt;&lt;P&gt;- CUA implemented, (don't know why land scape is very small)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need a security strategy template to out line a security strategy.&lt;/P&gt;&lt;P&gt;If some on have an example that I can follow, will appreciate it, other wise if I can be pointed in right direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What should be my security design strategy, any suggestions in this kind of situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;T.Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 20:56:46 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-strategy/m-p/1900084#M375964</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-01-30T20:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: security strategy</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-strategy/m-p/1900085#M375965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Security strategy is company specific and its company property. &lt;/P&gt;&lt;P&gt;2. Design your self.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes. SOX is a big issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first be specific about the job roles(positions) and gather required transactions.&lt;/P&gt;&lt;P&gt;then create roles or you can copy predefined roles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then find out the critical and conflict transactions across the business roles, and try to exclude them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it s not that much easy to prepare and implement, but it s possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Praveen.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2007 15:21:32 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-strategy/m-p/1900085#M375965</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-01-31T15:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: security strategy</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-strategy/m-p/1900086#M375966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi TJ,&lt;/P&gt;&lt;P&gt;Check this info ..can be helpful...&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.sapsecurityonline.com/sox_sod/sod_matrix_fi.htm" target="test_blank"&gt;http://www.sapsecurityonline.com/sox_sod/sod_matrix_fi.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Br,&lt;/P&gt;&lt;P&gt;Sri&lt;/P&gt;&lt;P&gt;Award points for helpful answers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2007 16:25:30 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-strategy/m-p/1900086#M375966</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-01-31T16:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: security strategy</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-strategy/m-p/1900087#M375967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some of the following links would give you an over view.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.auditnet.org/sapaudit.htm" target="test_blank"&gt;http://www.auditnet.org/sapaudit.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_erp2005vp/helpdata/en/3f/857e41564c020de10000000a1550b0/frameset.htm" target="test_blank"&gt;http://help.sap.com/saphelp_erp2005vp/helpdata/en/3f/857e41564c020de10000000a1550b0/frameset.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.law.uc.edu/CCL/SOact/toc.html" target="test_blank"&gt;http://www.law.uc.edu/CCL/SOact/toc.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.auditnet.org/sarbox.htm" target="test_blank"&gt;http://www.auditnet.org/sarbox.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.isaca-kc.org/doc/Segregation%20of%20Duties.pdf" target="test_blank"&gt;http://www.isaca-kc.org/doc/Segregation%20of%20Duties.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try to share more info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Soma&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2007 23:37:56 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-strategy/m-p/1900087#M375967</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-01-31T23:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: security strategy</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-strategy/m-p/1900088#M375968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you all for your inputs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security document is in fact a part of functional / management team responsibility in which you help them with your inputs and thoughts as it varies with business processes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again.&lt;/P&gt;&lt;P&gt;TJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: &lt;/P&gt;&lt;P&gt;        Tee Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Feb 2007 21:49:29 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-strategy/m-p/1900088#M375968</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-02-06T21:49:29Z</dc:date>
    </item>
  </channel>
</rss>

