Upload
ryann-richarson
View
223
Download
0
Tags:
Embed Size (px)
Citation preview
Efficient, Productive Solutions
SECURITY SOLUTIONS for LAWSON SOFTWARE
Part o f our
R ISK MANAG EMENT SUITE FOR LAWSON S3
Thank you for taking the time to view our
presentation. I’ll be your guide on how our Security
Reporting can help your organization.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
AGENDA
Kinsey Background
Security Access Reports
Internal Audit Reports
Security Audit Reporting
Segregation of Duties Reporting
Our application will help you identify possible segregation if duty
violations, validate current security settings and track changes to your security
model.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
o Founded in 1983, Kinsey has provided soft ware sales, implementations, support and development for over 30 years.
o Lawson reseller and implementation partner since 1997.
o Lawson certified systems integrator partner.
o Lawson complementary soft ware partner.
o Lawson’s “Go to” implementation partner for public sector.
o Provide complementary Lawson soft ware products.
o Implemented solutions for over 120 Lawson accounts
B A C K G R O U N D
A little about us.
LAUA Auditing
Session Manager
Transaction Auditing
LAUA Segregation of Duties (SoD)
LS9 Segregation of Duties (SOD)
LS9 Auditing
LAUA ReportingLS9 Reporting
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
R I S K M A N A G E M E N T S U I T E
Our products look at many
different areas to help
evaluate risk.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
L S 9 R E P O R T I N G
S E C U R I T Y R E P O R T I N G
o Provides specific details on how your security model is built including all assignments for Users, Roles, Security Classes, Tokens and Attributes.
S E C U R I T Y A N A LY Z E R
o Built specifically for internal and external auditors, this MS Excel based reporting shows screen access by user in an easy to use format.
S E C U R I T Y A U D I T I N G
o The auditing feature reports on all changes to your security model utilizing Lawson’ security audit data.
Our dashboard includes multiple
security tools.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y D A S H B O A R D
Get a quick graphical view of
the number of changes made to
your security settings.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 R E P O R T I N G ( S e c u r i t y A d m i n i s t r a t o r s )FEATURES
o Report ono Userso Roleso Security Classeso Tokenso Attributeso Fieldso Groupso Tableso Programso Categories
o Hierarchical Drillso Role down to Security Classo Role up to Userso Security Class down to Tokenso Security Class up to Roles
o Dynamic Grouping
o On-the-fly Sorting
o On-the-fly Filtering
o Export to MS Excel
This list gives you an idea of what we provide with
our LS9 reporting.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 R E P O R T I N G
Our dashboard gives you access to a
variety of reports. Let’s take a look at the Role, Security
Class, Token report.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 R E P O R T I N G
ACCTRole | Security ClassUser | Role
AbsenceManagement1Role | Security ClassSecurity Class | Token
Your security information is displayed
in grid format from your browser. The drill icon will display your settings up and down the security branches.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 R E P O R T I N G
Add filters or sort your
results…
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 R E P O R T I N G
..or group your data by simply dragging and dropping a
column header for a summarized
view.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 R E P O R T I N G
Now I see a summarized list of my Roles and the
number of Security Classes in
each one.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 R E P O R T I N G
Drilling on the Role provides a detailed list of
assigned Security Classes. But wait,
there’s more….
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 R E P O R T I N G
Drilling on the Security Class reveals exact
access by token.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 R E P O R T I N G – M S E X C E L E X P O R T
Need to see it in MS-Excel, no problem.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 R E P O R T I N G – M S A C C E S S R E P O R T S
o 50 Prebuilt Querieso Roleso Security Classeso Userso Att ribute Setti ngso Rule Defi niti onso Identi ti eso Structureso Export to PDFo Export to MS Excelo Security Stati sti cs
As an added bonus we will
deliver a similar set of reports in
MS Access so you can work off-line
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 A N A LY Z E R ( A u d i t o r s ) And that was just the reporting for
your security administrators.
Let’s take a look at what we provide your auditors.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 A N A LY Z E R ( A u d i t o r s )
Our Security Analyzer exports
your security settings by User
to MS Excel.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y A N A LY Z E R – S C R E E N A C C E S S
By lining up your users side by side it’s easy to review security settings
by screen.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y A N A LY Z E R – S C R E E N A C C E S S
The header row will report the least
restrictive access.
Need more detail? Expand
the group to see Roles and
Security Classes.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y A N A LY Z E R – TA B L E A C C E S S
Did I mention that we also provide table
access….
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y A N A LY Z E R – P R O G R A M C O D E A C C E S S
and Programs….
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y A N A LY Z E R – F I E L D L E V E L A C C E S S
and Field Level security….
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y A N A LY Z E R – F I E L D C O N D I T I O N S
even Field Conditions.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y A N A LY Z E R – F U N C T I O N C O D E L E G E N D
Plus, did you even wonder what all those function
codes mean? We’ll give you a legend!
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y 9 C H A N G E A U D I TFEATURES
o Utilizes Lawson Security 9 change audit files
o Export to MS Excel
o Create PDF
o Scheduled Email Notifications
o Report Favorites
That pretty much does it for security reporting, so let’s
take a look at auditing.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
L S 9 S E C U R I T Y C H A N G E A U D I TTRACKS CHANGES
o User Attributes
o User Assignments
o Role Assignments
o Security Class Assignments
o Token Assignments
o Function Code changes
o Conditional Logic
o Field Level Security
Using Lawson’s security audit tables we can report on any
of these types of changes.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
L S 9 S E C U R I T Y A U D I T I N G
We took a different approach on how to display your data.
Notice how we show you before
and after settings.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
L S 9 S E C U R I T Y A U D I T I N G
Our advance search makes it easy to find any
change.
S E G R E G AT I O N O F D U T I E S ( S O D )o Policy Violati ons by Usero Browser Basedo HTML Outputo 192 Policies Providedo Over 2,000 Ruleso Email Noti fi cati onso Policy Rati ngso Policy Testi ngo Role Testi ngo Saved Reportso Create Unlimited Policies
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
That covers reporting and
auditing so let’s jump to
segregation of duties reporting.
S E G R E G AT I O N O F D U T I E S D E F I N I T I O N
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3Our dashboard
gives you a quick snapshot of
where you have violations.
S E G R E G AT I O N O F D U T I E S D E F I N I T I O N
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
Easily add, edit, rate or disable any policy to fit
your organization.
L A U A S E G R E G AT I O N O F D U T I E S R E P O R T
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
Our LAUA reports show violations by
Security Class….
L S 9 S E G R E G AT I O N O F D U T I E S R E P O R T
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
And our LS9 report shows violations by
User.
L S 9 S E G R E G AT I O N O F D U T I E S R E P O R T
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
Did I mention that you can save, schedule and
automatically email your reports as
needed.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
Setup by Security Classo Browser Basedo MS Excel Outputo Screen Accesso Table Accesso Conditi onal Logico Data Security o User Profi les
L A U A S E C U R I T Y A N A LY Z E R
We have LAUA reports too.
Easily review all of your settings
by Security Class.
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
L A U A S E C U R I T Y A N A LY Z E R
Similar to the LS9 Analyzer only now
we line up your classes side by side.
Security Changes by Typeo Browser Basedo HTML Outputo Historicalo User Assignmentso Prod Lineso System Codeso Tableso Screenso Functi on Codeso Fieldso Printer Groupso User Groups
S E C U R I T Y A U D I T I N G - L A U A
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
And if you still need to audit
LAUA we can do that too!
S E C U R I T Y S O L U T I O N S F O R L A W S O N S 3
S E C U R I T Y A U D I T I N G - L A U A
All changes are kept historically
for you to review.
Guy Henson
V.P. of Business Development
Kinsey & Kinsey, Inc
26. N Park Boulevard
Glen Ellyn, Illinois 60137
630-858-4866
Visit us at: www.kinsey.com
C O M P L I A N C E S O L U T I O N S F O R L A W S O N S 3
That pretty much does it. You have seen how we can do
security reporting, security auditing and check for
segregation of duty violations in both LAUA and LS9. Call us if you would like a presentation.