https://store-images.s-microsoft.com/image/apps.8375.f16aa406-3c6e-43ca-990c-56c1506423c4.287c2b42-c2e1-4903-9c16-9c26271a3472.1ff74cc9-b6c4-409e-a910-fe09009cf98e

Microsoft Dynamics 365 Finance & Supply Chain Security - 4 Week Assessment

Protiviti

Develop and maintain an integral and conflict-free security design of the Microsoft Dynamics 365 Finance & Supply Chain environment.

Robust Security Design is a key factor when it comes to ensuring compliance – and keeping auditors happy. As auditors continue to increase scrutiny of Segregation of Duties (SoD) and Sensitive Access risks, it is important that organizations implement a strong application security design to meet compliance requirements.

Protiviti has been consistently delivering on Security and Compliance solutions within Microsoft Dynamics 365. With our extensive background in Internal Audit, we are experts in developing and maintaining an integral and conflict-free security design of the Dynamics 365 Finance and Supply Chain environment.

We provide Segregation of Duties and Security Access, enabling organizations to identify and mitigate the associated risks. We also provide further understanding of the overall security within the Microsoft Dynamics 365 system.

Assessment Objectives:

  • Define the organization’s Segregation of Duties (SoD) and Sensitive Access ruleset which will serve as the foundation of the security assessment
  • Define a risk-ranking framework to ensure all stakeholders are aligned on risk levels and definitions within Dynamics 365
  • Identify and document mitigating controls for all high-risk user SoD conflicts resulting from required role combinations

Activities to be completed:

  • Receive and input data into Protiviti Fastpath tool
  • Gain a quick understanding of the client's Dynamics 365 Finance and Supply Chain environment
  • Perform SoD and Sensitive Access analysis
  • Validate findings with the team
  • Present observations and recommendations

Deliverables:

  • A SoD and Sensitive Analysis of Dynamics 365 Finance and Supply Chain Security Access
  • Executive summary readout with observations and recommendations
  • Roadmap detailing next steps

*The cost associated with the activity is highly dependent on number of users and roles and can only be truly determined on case-to-case basis.

In uno sguardo

https://store-images.s-microsoft.com/image/apps.62242.f16aa406-3c6e-43ca-990c-56c1506423c4.35a11e53-3794-465f-a84b-362b2996eebb.810ea422-194c-47f4-8ffa-f654083efe69
https://store-images.s-microsoft.com/image/apps.37951.f16aa406-3c6e-43ca-990c-56c1506423c4.35a11e53-3794-465f-a84b-362b2996eebb.a805f191-83c8-4094-8f93-c010aba516a9
https://store-images.s-microsoft.com/image/apps.31409.f16aa406-3c6e-43ca-990c-56c1506423c4.287c2b42-c2e1-4903-9c16-9c26271a3472.2d180d3a-9038-4a3e-a3da-62cb6b8ee9e1
https://store-images.s-microsoft.com/image/apps.44378.f16aa406-3c6e-43ca-990c-56c1506423c4.35a11e53-3794-465f-a84b-362b2996eebb.ef3e1e27-f9af-440c-9eb8-132986ed40ec
https://store-images.s-microsoft.com/image/apps.8984.f16aa406-3c6e-43ca-990c-56c1506423c4.287c2b42-c2e1-4903-9c16-9c26271a3472.b75d72cc-5b08-4fee-a57b-0ea93962b707