Our specialist consultants & tools help you manage your business security model

Securities and Permissions can be difficult to manage, a problem which can lead to conflicting segregation of duties and pose a security risk to your company.

This problem only increases the more users and functionality your system has. Moreover, understanding your current security model and updating it to fall in line with best practice and Sarbanes-Oxley compliance can be a long and complex process.

At Cooper Software we have the expertise and tools to simplify the process and help you create robust and well managed segregation of duties that ensure your system remains secure at all times.

Using our Segregation of Duties template and Security Toolkit we follow a common sense approach to define End User roles based on business function, while giving you an adaptable user interface which reflects user permissions and ensure end use.

Click here to download the Security Toolkit flyer

Our Approach

We follow industry standard best practice to help split your permissions into two categories: End-User Roles and Functional Roles. One or more Functional Roles are then added to each End-User Role.

Our Segregation of Duties template approach is used to complete the analysis of User and Functional roles. This simplifies and expedites the time it takes to complete these projects.

Once analysis is complete and the appropriate security model has been designed, our Segregation of Duties utility simply and quickly builds the necessary permissions against users. This is reviewed using our Permission Set Analysis Application with the client and approved before implementing.

Once correct, it can then migrate these permissions across multiple ERP environments in one-click using our Permission Set Manager Application – dramatically speeding up the time it takes to make changes to your permission sets.

The final step in the process is to deliver the full security model, such as Sarbannes-Oxley, and the reporting to ensure the governance and maintenance of permissions and User roles are both correct and easily managed.

Permissions are managed on an on-going basis through use of our template-based approval form, to provide the framework for change approval.

Benefits to this approach include:

  • More easily maintainable security model.
  • Single functional role can be utilised across multiple end user roles easily.
  • Functional roles can be amended as single entity and inherited across parent end user roles.
  • Better aligned to organisational structure and business process.
  • Easier to automate and transfer between environment

Security Toolkit Applications

Access is also granted to Cooper Software tools and support, as well as a User Guide offering step-by-step instructions on how to manage securities and permissions on your ERP system.

The tools available to support and maintain your security model include:

  • Analysis App
    Review and re-design of ERP end-user roles and functional roles to ensure system privileges assigned to each role
  • Permission Set Manager
    Re-implementation of ERP end-user roles and functional roles are as narrow as possible
  • Fire Fighter Application
    Allows the temporary extension of users access rights normally out with their role
  • Compensating Controls Application
    Provides a mechanism to implement and record compensating controls for any particular segregation of duties
  • History Logging Application
    Historical logging, monitoring and notification of changes to key master data (essential for audit purposes).

> Contact Us for more information

{module ShareThis}

Close Menu