Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How will you mitigate a user against an authorization
object which is decided as sensitive by Business

Answer Posted / ernest

Hi,

create a mitigation control based on 'permission' level and
restrict the user based on that.

Rgds,
Ernest

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Support types of WOs you have faced?

2244


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1265


What are the uses of an authorization group?

1130


What is the difference between authorization object and authorization object class?

1081


What is sap internet transaction server?

1130


How to find out who has deleted users in the system?

1099


What does the account assessment category specify in a purchasing document in SAP Materials Management?

1335


how we do CUA configuration in Quality system

2367


What are su53 t-codes used for?

1274


Can you explain internet-level security?

1072


Can wildcards be used in authorizations?

1157


What is the difference between role and a profile?

1217


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2089


Can you explain transport system-level security?

1167


Can you explain document transfer-level security?

1072