whts the differents between SoX ,SoD??????wht kind of work
Sox do as wel .....SoD do?
whts is virsa??????? and VRAT,,,,VFAT,, how it workin
security.
Answer Posted / ranjeet kumar
Segaration of duty, as a security principle, has as its
primary objective the prevention of fraud and errors. This
objective is achieved by disseminating the tasks and
associated privileges for a specific business process among
multiple users. This principle is demonstrated in the
traditional example of separation of duty found in the
requirement of two signatures on a cheque.With the concept
of SoD, business critical duties can be categorized into
four types of functions: authorization, custody, record
keeping, and reconciliation.
Is This Answer Correct ? | 3 Yes | 0 No |
Post New Answer View All Answers
Can you explain secure store and forward?
when performing client copies what steps you need to take from CUA point of view?
Can you explain document transfer-level security?
What is the difference between usobx_c and usobt_c?
What are pfud t-codes used for?
Explain x-glueb and its use in sap security.
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
What is sap cryptographic library?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What does the item category specify in a purchasing order in SAP Materials Management?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Can you explain protecting public keys?
What are su56 t-codes used for?
what is hypercare and go live support?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects