Security. Audit. Compliance. Mark Polino CPA.CITP.CFF, CGMA, Microsoft MVP Dynamics Credentialed Professional Naked and Afraid: Re-implementing.

Slides:



Advertisements
Similar presentations
Scott Shearer SharePoint Evangelist/Developer FlexPoint Technology
Advertisements

Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
IP ADDRESS MANAGEMENT [IPAM]
Microsoft Windows Server 2008 Software Deployment Chris Rutherford EKU Technology: CEN/CET.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
15.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Microsoft Dynamics GP 2013 R2 Identity Management SmartList Designer 2.0 Take Company Offline Azure Backup Ribbons on desktop client SQL Server.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Integrated Security Solutions © 2006 TK Consulting, LP realtime Confidential March 11, 2007 APM Demo.
Continuous Monitoring for Enterprise Applications: Real Needs, Real Solutions. November 22, th Continuous Assurance and Auditing Symposium Newark,
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Segregation of Duties for Infor-Lawson Software 1.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Data Integrity Lesson 12. Skills Matrix Maintaining Data Integrity Maintaining data integrity is your most important responsibility. –Performing backups.
Enterprise Security for Microsoft Dynamics GP Jeff Soelberg
Social Media Dashboard that allows you to connect to multiple social networks from one website.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Module 6 Securing Content. Module Overview Administering SharePoint Groups Implementing SharePoint Roles and Role Assignments Securing and Auditing SharePoint.
Chapter 8 Configuring and Managing Shared Folder Security.
Windows Role-Based Access Control Longhorn Update
SAP Identity Management 7.2 Implementation
Microsoft Management Seminar Series SMS 2003 Change Management.
All Partner Meeting A cloud-based Identity and Password Management solution used by MSPs to better manage their clients' passwords, increase security,
SPI NIGHTLIES Alex Hodgkins. SPI nightlies  Build and test various software projects each night  Provide a nightlies summary page that displays all.
Microsoft Dynamics NAV: Tips and tricks for security methodologies Andy Snook and Nate Boettcher Fastpath, Inc.
7 Customize your home page Navigation list used for approvals 8.
Authored by Frank Hamelly, Microsoft MVP Regional Chapters.
Tami Johnson Solution Architect
Security. Audit. Compliance.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
Liz Piteo Native Controls in a Microsoft Dynamics Environment.
Tips and Tricks: Stress Free Security in Dynamics AX Chris Haley, Microsoft.
BEST PRACTICES FOR DYNAMICS NAV ADMINISTRATION AND SECURITY Per Mogensen.
Understanding the Dynamics AX2012 Security Model 4/14/2014 AXUG User Group Meeting.
Sandy Wickman Senior GP Implementation Consultant, InterDyn BMI Making it work with Workflows in Dynamics GP.
Cloud Network Administrator, Njevity
SP Business Suite Deployment Kick-off
Andy Snook Fastpath gives you insights on your CRM data that would make the NSA jealous Andy.
Dynamics GP Security - A to Z
Best Practices for Dynamics NAV Administration and Security
Naked and Afraid: Re-implementing Dynamics GP Security
Dynamics GP SmartList and SmartList Designer
Security. Audit. Compliance.
Security Management: Successes and Failures
Shared Services with Spotfire
Human resource & Payroll news you can use
Get to know SQL Manager SQL Server administration done right 
2016 Citrix presentation.
Using Microsoft Identity Manger with SharePoint 2016 to fill the User Profile Sync Gap Max Fritz Senior Systems Consultant Now Micro.
How to improve how you use Microsoft Dynamics gp
Security. Audit. Compliance
Jim High, COO, Alba Spectrum
Hyper-V Cloud Proof of Concept Kickoff Meeting <Customer Name>
QAD Enterprise Edition Segregation of Duties
PSJA AUTOMATION WORKFLOW AND LESSONS LEARNED
FIM User Group BHOLD Eihab Isaac (FIM MVP) 11/14/2018
SharePoint Essentials Toolkit
Security. Audit. Compliance.
Security. Audit. Compliance.
Does your project have a
SharePoint Permissions Manager
Shawn Dorward – InterDyn Artis
Simplify Your Sales Process
Presentation transcript:

Security. Audit. Compliance. Mark Polino CPA.CITP.CFF, CGMA, Microsoft MVP Dynamics Credentialed Professional Naked and Afraid: Re-implementing Dynamics GP Security

Disclaimers Naked and Afraid. – It’s a Discovery Channel TV show – AND how many feel when told they are responsible for GP security. Despite the title, no one will be naked during this presentation. You are allowed to be afraid.

Overview The world is an insecure place. Being responsible for GP security can be scary. Many companies don’t have confidence in their GP security setup. It can make you feel Naked and Afraid. Every firm can benefit from another look at security.

GP Security Overview GP security – Dynamics GP Security (GP) – SSRS (AD) – Management Reporter (AD) – GP Workflow (AD) – Web Client (AD + GP) – Other Products (?) (GP) – Dynamics GP Users, (AD) – Active Directory Users

Where to Start? Start with GP Security – It’s the most complicated. – It’s the core.

GP Security Review Role based. Access to windows, reports, posting, etc. are rolled up into tasks. Tasks are combined into Roles. Roles are assigned to users.

Security Process Design Review Apply Test Adjust

Process - Design Design Review Apply Test Adjust

Security Design Security is more comprehensive and less vulnerable when it is designed. Designed security is easier to audit. Security design can reduce audit costs by giving auditors a roadmap to test from.

What’s in a Role? Security often incorrectly starts by assigning users to roles. Roles with overlapping tasks are NOT recommended. Default Roles often have overlapping tasks. Default Roles and their tasks documentation. [Free]

Role Assignment

Recommendation: A Task Based Approach Take a task based approach to creating new roles. A task should be everything needed for a discreet operation. Default Tasks are generally well designed. Default Tasks generally include everything required for a specific operation. Need to be combined into new roles.

Task Assignment

Tasked Based Recommendations Use a tool to figure out what tasks should belong to each role. [Free] Add roles or tasks as required. Don’t use or modify existing roles or tasks. Assign roles to users. Can be phased.

GP Security Matrix

Power User Tips PowerUser is not a role. It’s is an override. Power Users DO NOT appear on GP reports. If you must have a power user, manually create a SuperUser role. [Free]

‘sa’ Tips ‘sa’ is really only required for installation. [Free] ’sa’ is not required to add users [Free]

Process - Review Design Review Apply Test Adjust

Review Look for segregation of duties issues in role creation. (Role Conflicts) Watch for segregation of duties issues when assigning multiple roles to a user. (User Conflicts) [Paid] Security matrix should have signoff

Process - Apply Design Review Apply Test Adjust

Set/Adjust Security Create new Roles. Apply Tasks to new Roles based on matrix. Assign Roles to users. Temporarily preserve existing roles. Can be phased.

Process - Test Design Review Apply Test Adjust

Test Use reporting to review that security Roles and User assignments match the matrix. If possible, test security in test environment. Phase security changes and test with subsets of users.

Process - Adjust Design Review Apply Test Adjust

Be prepared to provide support following a security change. Be prepared for delayed requests. Some operations only happen monthly. Have resources available to approve requests or alter procedures.

Security Tool GP Power Tools (Formerly Support Debugging Tool) [Paid] – Suite of GP utilities including security tools. – Helpful for figuring out fix when access is denied. portal/

GP Power Tools

Real Life Building/Rebuilding GP Security is not a fast process. Treat it as a project. If done well, maintenance and adjustments should be easy long term. It’s an investment against future pain. Dealing with Limited and Self Service users.

Security Process Design Review Apply Test Adjust

SSRS – Security tends to be more straightforward – Assign or remove access to report folders – For anything AD consider using AD Groups – GP provides SQL roles for access to underlying data.

Management Reporter Limit users who can create reports Use AD Users/Groups Other limited defined in Permission Granted section.

GP Workflow – Use AD Users/Groups – Limit managers – must be set at AD level

GP Workflow Security

GP Web Client AD Users/Groups to access Web Client. GP Users to control access. Web Client only users might not be SQL users.

Web Client Security

Fastpath Security and Compliance Products Continuous monitoring solution that tracks all changes to critical data Assure Risk based security access review and SOD analysis platform Audit Trail Request, review and approve Dynamics security without IT intervention Identity Manager Audit planning tool allows report design, assignment and scheduling Audit View Maintain user provisioning in Active Directory instead of the target system Config AD

Questions?