|
Q1) Explain SOX security.
Step 1: Scan all the Single Role for SOD violations with a GRC Tool. Action:
Step 2: Scan all the composite Roles for SOD violations Action:
Step 3: If the policy is one composite role per user then transport all the compliance calibrator controls to production. Since all the Composite roles are mitigated or remediated all the users should be clean Step 4: If the roles are determined based on user. Then each user has to be analyzed by GRC tool when they are setup in the system. If they have SOD then mitigate the user in directly in the system. Tip:
Q2) In SOX, I need a secure channel for requests and replies. I would also like to authenticate who listens to broadcasts in addition to authentication of requestors of information. Are there any guide lines on how to apply SOX to a distributed messaging architecture? You can achieve SSL security by running an instance of
the Rendezvous Secure Daemon or the Rendezvous Secure Routing Daemon.
Connect the
You can secure the RV bus by running the network on secure hardware. |
|
Read also:
SAP Basis Reference Books:
Back to Basis Menu:
Return to :-
(c) www.gotothings.com All material on this site is Copyright.
|