×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
We use the reports available from the CAS Security menu and make the "Business Process Owners" verify and sign the report every 6 months. Auditors are fine with that method. Also you'll need a form to add new users/access between the semi-annual review.
Get lots of signatures.... auditors love signatures.
Greg
-----Original Message-----
From: leigh_madden@xxxxxxxxxx [mailto:leigh_madden@xxxxxxxxxx]
Sent: Wednesday, January 30, 2008 6:00 AM
To: mapics-l@xxxxxxxxxxxx
Subject: [MAPICS-L] MAPICS Security Audit
Hello,
Is anyone aware of any tools that provide an audit of MAPICS application authourities, (as in who has access for what), we got beaten up a little by our new auditors, and are looking to improve control in this area
Thanks
Best regards / Mit freundlichen Grüßen / Cordialement / Cordiali saluti /
此致敬意
=============================
Leigh Madden
Manager - Information Technology
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
[javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.