Database Reference
In-Depth Information
Extract to Excel : Results can be extracted to Excel for further analysis. The access
path is broken out into individual columns that represent each access point in the
path. These columns can be used to create pivots in Excel to easily view who has
access to what and how. The following screenshot shows an example of this
Excel analysis:
Remediation plan : Initial viewing of results from a model may result in immediate
visibility to obvious areas that require remediation in the business system. You can
determine if you require permanent incidents to be generated before any clean up in
the business system happens, or you may choose to do some house cleaning before
deploying your model as a control.
In addition, you may find it appropriate to add some global and path conditions
to exclude obvious false positives noticed while viewing model results, or adjust
the model logic as necessary before deployment as a control. Access model false
positives are incidents that occur when the security configuration in the ERP system
does not actually grant access to the access point in the model. For example, end
dated users and responsibilities in Oracle EBS.
 
Search WWH ::




Custom Search