JDE World Security- IT Controls SOX

KCurley13

Member
I would like to request from other companies what best practices you have
implemented as it relates to the administrative and procedural processes for
maintaining JDE World Security. We have been asked to document a reporting
and approval process for security requests in light of Sarbanes Oxley IT
internal controls. I was asked to benchmark with other companies and
validate our own process and enhance it if needed.

How do you control security requests? To what level to do approve authority
requests the system, menu, program, file or data level? The desire here is
to go to the data field level, but that does not seem possible or easy to
implement. If you have any processes or guidance you can share contact me
directly or post a response. If you have tools or software you have used
to assist with JDE security adm. that would also be helpful. We just want
to see what others are doing and if we are on the right track. Any help
would be appreciated.

Karen Curley
NJ Resources Service Corporation
Mgr., Enterprise Software Development
Phone: (732) 938-1013
Fax: (732) 919-1784
[email protected] < mailto:[email protected]
WWW.njliving.com < http://www.njliving.com/ <http://www.njliving.com/> >
 
Karen,

How many users?
How many developers?
Centralised vs. Distributed?
How many languages?

Thanks,

Nick
 
Back
Top