Jeff Hare, ERP Risk Advisors
Lewis Hopkins, Seecuring
In this session, we’ll look at the Security Access model in Oracle’s SaaS Applications. We’ll compare how the setup of Users and Roles differs as you move to these Applications, and discuss the key considerations and lessons learned. We’ll cover the best practices for Role design and the areas that should be avoided to ensure a successful Comparing the Security model from EBS to Cloud Role design best practice. We’ll also look at the Auditing capabilities in the Applications for ensuring compliance on key Configuration changes to processes.
Attendees will walk away with new Security Access model knowledge in SaaS, helping you to maximize your work in these applications.
Presented by the OATUG Governance, Risk & Compliance SIG