Skip to main content

Role Design

Organizations often address security and controls toward the end of their ERP implementation, which results in constrained time lines and resources. As a result, a consistent and sustainable security strategy and structure may not be in place, which can lead to post go-live access issues, noncompliance, and excessive SoD and sensitive access violations.

Our Security Role Design Services

Focal Point has developed an assessment methodology that identifies opportunities for improvement in sustainability, compliance considerations, and operational effectiveness. Our approach allows companies to gain greater visibility to pain points within the existing design and gain an understanding of how their security posture aligns to comparable organizations.

This methodology leverages the organization’s GRC solution and security master data to identify opportunities for improvement. Our professionals leverage analytical solutions to perform data analysis on the security role structure, user to role assignments, security strategy, and assess the sustainability of the existing design. This comprehensive approach allows our professionals to provide visibility to root causes of issues and develop a roadmap to help the organization address the challenges that have been identified.

Our approach is to:

  • Leverage existing GRC analysis results, export security tables, and import data into our Security Design Assessment database
  • Perform a master data analysis of existing security design
  • Evaluate security structure and strategy (based on business risks or industry best practices)
  • Identify proposed remediation actions and the path to compliance
  • Develop a recommended project plan including project objectives and cost
  • Prepare a prioritized remediation plan and proposed solutions

Benefits of a Role Design Assessment

A security role design assessment provides your organization with an independent evaluation of your current security strategy and expert recommendations for improvement. Additional benefits include:

  • Prioritization of security role design remediation needs
  • Remediation recommendations based on organization-specific data
  • An objective assessment to the alignment of security design with business objectives

contact Focal Point

tweets by @FocalPointDR

Loading Tweets...
VIEW MORE TWEETS >
 

popular WHITEPAPERS

VIEW MORE WHITEPAPERS >