Preview

Risk Management Case Study

Better Essays
Open Document
Open Document
1564 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk Management Case Study
RISK MITIGATION STRATEGIES
Michael Johnson

Information Technology Risk Management

Case Study 3

RISK MITIGATION STRATEGIES

This document is intended to provide your organization with a set of strategies to mitigate the current risks that exist in regards to Oracle EBS database governance. All strategies and rules have been tested and proven to efficiently reduce current and prevent future SOD violations in relation user access with the enforcement efforts of Application Access Controls Governor (AACG), effectively track current, past and future system transactions processed in core oracle financial modules, prevent future and notify management of current duplicate suppliers, split payments and invoices, duplicate payments and invoices and any other transaction that may violate rules set by configured controls with the presence of Transaction Controls Governor. These applications are combined in one GRC web based application (AACG) and all preferred controls have been configured and provided along with deliverables.

To effectively utilize the AACG application, some key concepts must be understood. First and foremost, Access Points will be explained. In AACG, Access Point is an object in a business management module that enables any user that has been granted access, allows him/her to complete his/her daily duties. Groups of access points may compose a single entitlement. In Oracle EBS an access point include responsibilities, menus, submenus and functions. The next key concept is Access Entitlements. Access Entitlements are used to compile related access points. This develops a series of ways to gain access to functions in EBS.

Access Models in AACG specify access points in business applications that conflict with one another which are also known as segregation of duties or SOD violations. In most cases Access Models will require remediation before they are converted into permanent controls also referred to as AACG. An access model



References: Unknown (March 21, 2013) “RBAC and AACG Integration” http://oraclegrcexpress.com/blog/category/grc-implementation-method-grcim/ Steve Sullivan (n.d.) “Optimization Services” http://www.navillusllc.com/index.php?cID=218 Unknown (n.d.) “Oracle Enterprise Governance, Risk, and Compliance Manager” http://www.oracle.com/us/solutions/corporate-governance/grc-manager/index.html Unknown (n.d.) “Integrating Oracle Applications Access Control Governor with Oracle® Hyperion Financial Management, Fusion Edition 11.1.1” http://www.oracle.com/webfolder/technetwork/tutorials/obe/hyp/HFM11.1.1_GRC/HFM_GRC.htm

You May Also Find These Documents Helpful

  • Satisfactory Essays

    iii.Install water saving devices such as native plants, tank, dual flush toilet systems, 5-6 star (WELS) dishwasher.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    b) Access control lists (ACL): Include restrictions on inbound and outbound connections, as well as connections between LAN segments internal to the site/enclave.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Role Based Access Controls allows companies to assign roles to users within the same department that need access to the same data. For example, roles can…

    • 892 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    CASE STUDY ANALYSIS

    • 559 Words
    • 5 Pages

    CASE STUDY ANALYSIS LEARNING TEAM C ALLISON CARINCI, AMIE HOUGHEN, BRENDA COTHRAN, JESSICA BUNCH, KARA VISATHEP, AND LAKISHA CHESTER APRIL 26, 2015 UNIVERSITY OF PHOENIX HCS/449 RENEE GORBY INTRODUCTION  Analyze the challenges faced by the health care organization in the case study.  Analyze the role each stakeholder has in the strategies to address the challenges of the health care organization in the case study.…

    • 559 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Baum, David and others. “Oracle 25 Years of Technology Innovation.” Oracle Magazine, November/December, 2001, pp. 65-82.…

    • 26520 Words
    • 107 Pages
    Good Essays
  • Satisfactory Essays

    JOURNAL OF PALLIATIVE MEDICINE Volume 12, Number 9, 2009 ª Mary Ann Liebert, Inc. DOI: 10.1089=jpm.2009.0089…

    • 2691 Words
    • 11 Pages
    Satisfactory Essays
  • Powerful Essays

    Case Study Analysis

    • 2352 Words
    • 10 Pages

    In 1993, a number of employees in Sierra Design decided to start their own outdoor apparel company. They capitalized on their expertise in the field and with the support of an investor, Ian Cummings they established Mountain Hardwear. Built as an ultra-premium brand focused on elite high altitude mountaineers that would promise uncompromising performance, the company captured a niche market over the next few years. Mountain Hardwear is a classic example of a company that has used various elements of the marketing mix in synergy to build a strong brand. (Spitzer, 2006)…

    • 2352 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    Sidpers

    • 2831 Words
    • 12 Pages

    Afyouni, Hassan, Database Security and Auditing, Protecting Data Integrity and Accessibility, 2006 Thomson Course Technology…

    • 2831 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Risk Management

    • 786 Words
    • 4 Pages

    Pizza rush is a large take-away company in Australia with a total of to take-away stores scattered in all major cities nationwide…

    • 786 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Expected Rate of Return: (.15 x .06) + (.30 x .09) + (.40 x .1) + (.15 x .15)…

    • 400 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Case Study Analysis

    • 781 Words
    • 4 Pages

    For most of us, a new job or career is very taxing. The transition a new employee makes and the new employee training received is crucial. A new career needn’t be traumatic. If you know your job responsibilities, make a plan and then do your appropriate daily follow-up, your transition into a new workplace will be that much less demanding.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Risk Management Questions

    • 1197 Words
    • 5 Pages

    develop a methodology for quantifying risks, or should each situation be addressed individually? Can we have both a quantitative and qualitative risk evaluation system in place at the same time?…

    • 1197 Words
    • 5 Pages
    Better Essays