https://store-images.s-microsoft.com/image/apps.8375.78d82c35-4bfe-4f4a-8d84-cd909c490434.c972f7e1-8c9d-4478-a7ee-4c389c480edc.17320b2b-83ac-4599-8eba-b896f456ff04

Microsoft Dynamics 365 Iterative Security Assessment - 12 Week Assessment

Protiviti

Develop and maintain an integral and conflict-free security design of the Microsoft Dynamics 365 Finance & Supply Chain environment.

Protiviti has been consistently delivering on Security and Compliance Solutions within Dynamics 365. With our extensive background in Internal Audit – we are experts in developing and maintaining an integral and conflict-free security design of the Dynamics 365 Finance and Supply Chain environment. We provide Segregation of Duties and Security Access, enabling organizations to identify and mitigate the risks associated with user access. We also provide further understanding of the overall security within the Dynamics 365 system. 

Objectives:

  • Identify and document mitigating controls for all high-risk user SoD conflicts resulting from required role combinations.
  • Maintain the integrity and conflict-free design of the Dynamics 365 Finance & Supply Chain environment by reviewing and refining security processes around user provisioning and role change management
  • Establish processes and ownership for maintaining the organization’s rulesets
  • Establish clear organizational roles and responsibilities around security governance

Activities to be Completed:

The following steps provide a brief overview of the approach when building security. As part of the security and controls team, we work with the project team by providing timely assessments to make sure roles are risk free and user assignment minimizes risk as much as possible.

Role Level Analysis

  • Build Roles
  • Run SoD Analysis

User Analysis

  • User Mapping
  • SoD Analysis and Document Mitigating Controls

UAT and Production Migration

  • User Acceptance Testing
  • Migrate to Production

Deliverables:

  • An SoD and Sensitive Analysis of Dynamics 365 Finance & Supply Chain Security Access
  • User Mapping and Analysis Report
  • Sensitive Access rulesets and risk ranking definitions
  • Custom Roles with SoD Analysis
  • Executive Summary Readout with observations and recommendations
  • Road map detailing next steps

The cost associated with the activity is highly dependent on number of users and roles – and can only be truly determined on case-to-case basis.

Trumpa apžvalga

https://store-images.s-microsoft.com/image/apps.50284.78d82c35-4bfe-4f4a-8d84-cd909c490434.c972f7e1-8c9d-4478-a7ee-4c389c480edc.2280b34d-c2e2-408d-b939-8d9296116385
https://store-images.s-microsoft.com/image/apps.58491.78d82c35-4bfe-4f4a-8d84-cd909c490434.c972f7e1-8c9d-4478-a7ee-4c389c480edc.44a98673-38c1-4e68-b999-dc582561d020
https://store-images.s-microsoft.com/image/apps.2378.78d82c35-4bfe-4f4a-8d84-cd909c490434.c972f7e1-8c9d-4478-a7ee-4c389c480edc.cebd08bc-2592-4da3-9619-c8a6a04da6a6
https://store-images.s-microsoft.com/image/apps.12787.78d82c35-4bfe-4f4a-8d84-cd909c490434.c972f7e1-8c9d-4478-a7ee-4c389c480edc.f3eb5516-01f9-445a-8708-fb6f087ee951
https://store-images.s-microsoft.com/image/apps.8984.78d82c35-4bfe-4f4a-8d84-cd909c490434.68ba2bfd-c37c-4e3c-9090-182539f31b46.0e4029bb-85e2-4620-b2ba-8319d779e79e