1. Check Aud ® for SAP ® Systems IBS Portfolio CheckAud ® Objective Target groups Functions Analysis tree SoD Matrix References Ask us about our Demo version !
2.
3. Authorization Chaos? Check Aud ® Cleans it Up Revision – Does the SAP® System confrom to the requirements in regulation compliance? Administration – Audit before your auditor arrives! Departments – The data, or process owner supervises their own data, achieving transparency at a glance! Data protection – Is personal data sufficiently protected? Auditor – The year-end closing. IBS Portfolio CheckAud ® Objective Target groups Functions Analysis tree SoD Matrix References
4.
5.
6.
7. The Segregation of Duties Matrix IBS Portfolio CheckAud ® Objective Target groups Functions Analysis tree SoD Matrix References Number of risks Double click for details…
8.
9.
10.
11. Critical Business Operations Who can maintain vendors, create invoices / credit memos and start the payment run? With one click, you will see the authorized users and the source of their rights. A traffic symbol indicates wheter the audit result has been deemed critical. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis Simulation Automation References
12. Segregation of Duties Has there been a violation of the segregation of duties? Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis Simulation Automation References Attribute of a risk -risk -risk group -risk description -compensating controls -description of the control -responsible persons
13.
14. Rights per User Which transactions can Ms. Teiler execute? Functions Critical Authorization Critical Processes SoD Matrix BIW Audit User Analysis Simulation Automation References
15. Simulation of Modifications Will the changes made to authorizations lead to a desired result? Following the simulated deletion of a role, Ms. Teiler has only 5 of her original 44 authorizations. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis Simulation Automation References
16. Fully-automated Report 1 A scheduler completes the analyses regularly and on its own. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis Simulation Automation References Check Aud ® Scan Ins Aud 1 Check Aud ® CheckScan SAP - Scheduler 1 SAP 1 Time & Rotation Output Format Reports SAP System & Logon Report n Report 2 Analysis Trees
17. Follow Up Audit – Delta CheckAud ® RoadMap 2010 Follow Up Matrix Export Export Assistant Data Protection 2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References Which changes have been made since the most recent audit?
18.
19.
20.
21.
22.
23.
24. CheckAud ® RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection 2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References Some of our well-known customers.