Mitigating controls – is this a cure for “all evil” in redundant authorizations in SAP?
Part #5/5: Summary and conclusions The fifth and the last part of the article summarizes the topic. In this section, we will gather all the information and answer the questions: Why the topic of access risk and SoD control is important? and Why it is worth dealing with in? We will suggest a correct sequence of […]