Isms Implementation Iso 27003

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 5

SAP Business Process and Controls SAP Authorization and Infrastructure

SAP Utilization review


review review
 SAP functionality and SAP processes • Understand and review the • Review SAP security and
utilization review for each business organization structure mapped in SAP authorizations administration process
process and MIS report  Review business blueprint to assess  Review transaction combinations that
 Identify functions or processes not optimal / practical mapping of cause conflicts in segregation-of-
used adequately processes compared to SAP duties
 Understand and evaluate the functionalities available  Review access rights to critical
business process gaps  Review of the SAP control business transactions.
 Identify and recommends the new configuration with respect to  Evaluate the security controls
functionality and futures for the Business process associated with the IT Infrastructure
performance improvements  Review and recommended SAP  Review risk related to the existing IT
 Review and recommendation of all control customization and identify an infrastructure architecture
the modules to access data quality opportunity for improving processes  Review the types of access (including
using SAP remote access, if any) to the web
server/ database server
 Review existing Security Architecture
and monitoring capability
 Review of various IT processes and IT
General controls related to IT
Infrastructure
 Review critical BASIS security
parameters such as
• Password Complexity
• Jobs scheduling and monitoring
process
• Enabling of logs
• Backup and restoration process
• Data Center operations
• Infrastructure Sizing
1 2 3
Text

Text

Text

PwC | July 2014


14/05/2012 14/06/2012

xxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xx

25/05/2012 25/05/2012

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xx
xxxxxxxxxxxxxxxxxxxxxx

26/05/2012

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
x

18/05/2012 01/06/2012 19/07/2012

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxx xxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx

18/06/2012

10/05/2012
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxx

KEY

Team A Team B Team C Team D Team E Team F Team G

PwC | July 2014 4


01 02
Heading
Mauris consectetuer ullamcorper quam. Morbi Mauris consectetuer ullamcorper quam. Morbi
tincidunt mi ut diam ultricies non, hendrerit tincidunt mi ut diam ultricies non, hendrerit
quis, pellentesque a, eros. quis, pellentesque a, eros.

Infrastructure Security
& Application Code
Audit

03 04
Heading Heading
Mauris consectetuer ullamcorper quam. Morbi Mauris consectetuer ullamcorper quam. Morbi
tincidunt mi ut diam ultricies non, hendrerit tincidunt mi ut diam ultricies non, hendrerit
quis, pellentesque a, eros. quis, pellentesque a, eros.

PwC | July 2014

You might also like