× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Leigh,

We use the reports available from the CAS Security menu and make the "Business Process Owners" verify and sign the report every 6 months. Auditors are fine with that method. Also you'll need a form to add new users/access between the semi-annual review.
Get lots of signatures.... auditors love signatures.

Greg

-----Original Message-----
From: leigh_madden@xxxxxxxxxx [mailto:leigh_madden@xxxxxxxxxx]
Sent: Wednesday, January 30, 2008 6:00 AM
To: mapics-l@xxxxxxxxxxxx
Subject: [MAPICS-L] MAPICS Security Audit

Hello,

Is anyone aware of any tools that provide an audit of MAPICS application authourities, (as in who has access for what), we got beaten up a little by our new auditors, and are looking to improve control in this area

Thanks


Best regards / Mit freundlichen Grüßen / Cordialement / Cordiali saluti /
此致敬意

=============================
Leigh Madden
Manager - Information Technology

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.