SlideShare a Scribd company logo
1 of 22
Advanced Authorization for SAP Global Deployments Part 3:  SAP authorization model for secure Partner Collaboration Sandeep Chopra, Sr. Product Manager, NextLabs, Inc.
Agenda Objective Understand partner collaboration lifecycle for global SAP deployment Apply the Authorization Framework Identify authorization tools used in the solution Presentation Quick Recap of Part I and II The Partner Collaboration Lifecycle Partner Collaboration requirements for global SAP deployment Enterprise authorization considerations Question and Answers
Review of Part I Understanding Global Deployment Authorization Requirements and Challenges Introduction to the Authorization Toolbox Authorization Framework – Clear Separation of Authorization Dimensions Authorization Decision Map
Review of Part 2 Introduce Authorization Model Assessment Understand the requirements of Export Compliance in a global deployment Group business authorization into functional, data, and governance dimensions Example Authorization Decision Map for Export Compliance
The Authorization Framework Revisited 5. Choose the right tools for each layer 4. Develop Data Authorization Decision Map 3. Authorization Model Assessment  for Data Entitlements 2. Develop Functional Authorization Map 1. Separate Functional, Data and Governance Requirements
The Partner Collaboration Lifecycle Marketing Engineering Manu- facturing Logistics Sales Service
Partner Collaboration Authorizations Intellectual Property (IP) Licenses NDA, PIA, PIEA Patent Licenses Trade Secrets Third Party IP Licenses Contractual Obligations Classified, Top Secret, Need to Know
Securing Collaboration Multiple systems are involved throughout the IP Lifecycle Need to apply Authorization Framework to each system Need to develop a long term authorization strategy
ACME: A Global A&D Company Global Aerospace & Defense Company Headquartered in US Operations in 6 countries: US, UK, Germany, India, China, Australia Joint Ventures in Australia and UK 60,000 employees, 5000 suppliers worldwide Single Instance of SAP, Centralized IT management  in US Substantial number of materials are dual use or under ITAR jurisdiction  Global operations  IT management in US, operations in India  Design centers in US, UK, Germany, and Australia Manufacturing in US, UK, Australia, China
Business Authorization Dimensions Functional Access Determine the actions a user can perform Data Access Determine the data a user can see Governance Rules for access management Data Access Functional Access Governance
ACME’s Functional Authorization Map for SAP SAP Authorization Concept and ACC ,[object Object]
Define Transaction or Function Groups
Define Authorization Objects,[object Object]
Acme’s Authorization Decision Map for SAP SAP
Do not Forget Authorization Governance Classification Processes IP Classification (type, owner, license) Business classification (Program, project, product, customer) IP Publication Process for publishing IP to external facing applications External User Company and Project assignments Managing the creation of accounts for external users with accurate information for company and project assignment IP License Management Managing IP licenses established by legal Marking, Audit and Record Keeping
Acme’s Enterprise Authorization Decision Map SAP File Server PLM CAD System Sharepoint Custom App
What is the right Enterprise Authorization Strategy? Custom App CAD SAP/PLM SharePoint File Shares RBAC ABAC ABAC Custom ,[object Object]
Policy consistency?
Higher TCOIT
Externalize Authorization Custom App CAD SAP/PLM SharePoint File Shares Externalized Authorization Layer ,[object Object]
Policy consistency
Lower TCOIT

More Related Content

What's hot

Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online traininggrconlinetraining
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 trainingsuresh
 
Data Entitlement in an API-Centric Architecture
Data Entitlement in an API-Centric ArchitectureData Entitlement in an API-Centric Architecture
Data Entitlement in an API-Centric ArchitectureWSO2
 
Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperAxis Technology, LLC
 
34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactive34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactiveROMI Associates
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comArun Somu Panneerselvam
 
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Shaunak Gujjewar
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft MimarisiNuri Cankaya
 
Flex net manager for sap applications v9 1 presentation
Flex net manager for sap applications v9 1 presentationFlex net manager for sap applications v9 1 presentation
Flex net manager for sap applications v9 1 presentationNuno Alves
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qsPhong Ho
 
SAP GRC 10.1 ONLINE - KNACK IT TRAINING
SAP GRC 10.1 ONLINE - KNACK IT TRAININGSAP GRC 10.1 ONLINE - KNACK IT TRAINING
SAP GRC 10.1 ONLINE - KNACK IT TRAININGKnack IT Training
 
Webinar Siebel CRM - The most common license compliance issues seen
Webinar Siebel CRM - The most common license compliance issues seenWebinar Siebel CRM - The most common license compliance issues seen
Webinar Siebel CRM - The most common license compliance issues seenb.lay
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...NextLabs, Inc.
 
Coexist: Your current purchasing solution together with Oracle Fusion Procure...
Coexist: Your current purchasing solution together with Oracle Fusion Procure...Coexist: Your current purchasing solution together with Oracle Fusion Procure...
Coexist: Your current purchasing solution together with Oracle Fusion Procure...Infosys
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2NextLabs, Inc.
 
Case Study: McKesson
Case Study: McKessonCase Study: McKesson
Case Study: McKessonForgeRock
 

What's hot (20)

Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
 
Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
 
Data Entitlement in an API-Centric Architecture
Data Entitlement in an API-Centric ArchitectureData Entitlement in an API-Centric Architecture
Data Entitlement in an API-Centric Architecture
 
Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White Paper
 
34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactive34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactive
 
Casa engl
Casa englCasa engl
Casa engl
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.com
 
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft Mimarisi
 
Flex net manager for sap applications v9 1 presentation
Flex net manager for sap applications v9 1 presentationFlex net manager for sap applications v9 1 presentation
Flex net manager for sap applications v9 1 presentation
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qs
 
SAP GRC 10.1 ONLINE - KNACK IT TRAINING
SAP GRC 10.1 ONLINE - KNACK IT TRAININGSAP GRC 10.1 ONLINE - KNACK IT TRAINING
SAP GRC 10.1 ONLINE - KNACK IT TRAINING
 
Erp
ErpErp
Erp
 
Erp
ErpErp
Erp
 
Webinar Siebel CRM - The most common license compliance issues seen
Webinar Siebel CRM - The most common license compliance issues seenWebinar Siebel CRM - The most common license compliance issues seen
Webinar Siebel CRM - The most common license compliance issues seen
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
 
Coexist: Your current purchasing solution together with Oracle Fusion Procure...
Coexist: Your current purchasing solution together with Oracle Fusion Procure...Coexist: Your current purchasing solution together with Oracle Fusion Procure...
Coexist: Your current purchasing solution together with Oracle Fusion Procure...
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2
 
Case Study: McKesson
Case Study: McKessonCase Study: McKesson
Case Study: McKesson
 

Viewers also liked

Authorization objects a simple guide
Authorization objects   a simple guideAuthorization objects   a simple guide
Authorization objects a simple guideAlbert Shumov
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP SecurityNasir Gondal
 
SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important QuestionsRagu M
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseNextLabs, Inc.
 
sap security interview_questions
sap security interview_questionssap security interview_questions
sap security interview_questionssumitmsn2
 
CSI tools SAP Authorization Presentation TROOPERS 2014
CSI tools SAP Authorization Presentation TROOPERS 2014CSI tools SAP Authorization Presentation TROOPERS 2014
CSI tools SAP Authorization Presentation TROOPERS 2014CSI tools
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIINextLabs, Inc.
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0Latha Kamal
 
Basic settings Of SAP Fi
Basic settings Of SAP FiBasic settings Of SAP Fi
Basic settings Of SAP FiLav Kumar
 
Summarisation levels in SAP COPA
Summarisation levels in SAP COPASummarisation levels in SAP COPA
Summarisation levels in SAP COPARajesh Shanbhag
 
SAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data securitySAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data securitySven Ringling
 
Co product costing detailed trng
Co product costing detailed trngCo product costing detailed trng
Co product costing detailed trngVenkat Reddy
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infosapdocs. info
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access ControlNasir Gondal
 

Viewers also liked (20)

Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
Authorization objects a simple guide
Authorization objects   a simple guideAuthorization objects   a simple guide
Authorization objects a simple guide
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important Questions
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
sap security interview_questions
sap security interview_questionssap security interview_questions
sap security interview_questions
 
Pensum adm
Pensum admPensum adm
Pensum adm
 
CSI tools SAP Authorization Presentation TROOPERS 2014
CSI tools SAP Authorization Presentation TROOPERS 2014CSI tools SAP Authorization Presentation TROOPERS 2014
CSI tools SAP Authorization Presentation TROOPERS 2014
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of III
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
 
Basic settings Of SAP Fi
Basic settings Of SAP FiBasic settings Of SAP Fi
Basic settings Of SAP Fi
 
Summarisation levels in SAP COPA
Summarisation levels in SAP COPASummarisation levels in SAP COPA
Summarisation levels in SAP COPA
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
SAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data securitySAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data security
 
Co product costing detailed trng
Co product costing detailed trngCo product costing detailed trng
Co product costing detailed trng
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.info
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
 
Copa implementation
Copa implementationCopa implementation
Copa implementation
 

Similar to Secure Partner Collaboration for Global SAP Deployments

Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIINextLabs, Inc.
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIINextLabs, Inc.
 
Coghead Overview 21 Aug08
Coghead Overview 21 Aug08Coghead Overview 21 Aug08
Coghead Overview 21 Aug08Tomoaki Sawada
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCAST
 
Organizing for faster innovation - People, process, culture, and technology
Organizing for faster innovation - People, process, culture, and technologyOrganizing for faster innovation - People, process, culture, and technology
Organizing for faster innovation - People, process, culture, and technologyTom Laszewski
 
Product Development in the Cloud
Product Development in the Cloud Product Development in the Cloud
Product Development in the Cloud Amazon Web Services
 
ENT206 Product Development in the Cloud
ENT206 Product Development in the CloudENT206 Product Development in the Cloud
ENT206 Product Development in the CloudAmazon Web Services
 
Forum Presentation
Forum PresentationForum Presentation
Forum Presentationallaboutsyed
 
Monitoring for Operational Outcomes and Application Insights: Best Practices ...
Monitoring for Operational Outcomes and Application Insights: Best Practices ...Monitoring for Operational Outcomes and Application Insights: Best Practices ...
Monitoring for Operational Outcomes and Application Insights: Best Practices ...Amazon Web Services
 
Product Development in the Cloud - ENT206 - Chicago AWS Summit
Product Development in the Cloud - ENT206 - Chicago AWS SummitProduct Development in the Cloud - ENT206 - Chicago AWS Summit
Product Development in the Cloud - ENT206 - Chicago AWS SummitAmazon Web Services
 
Corporate Presentation Sigma Infosolutions
Corporate Presentation Sigma InfosolutionsCorporate Presentation Sigma Infosolutions
Corporate Presentation Sigma InfosolutionsSigma Infosolutions, LLC
 
Ireland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs SlideshareIreland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs SlideshareTibbs Pereira
 
Estuate EDM Checklist
Estuate EDM ChecklistEstuate EDM Checklist
Estuate EDM ChecklistEstuate, Inc.
 
Converge Leveraging Identity With Professional Open Source Final
Converge   Leveraging Identity With Professional Open Source FinalConverge   Leveraging Identity With Professional Open Source Final
Converge Leveraging Identity With Professional Open Source FinalGonow
 
Sudheer_SAP_ABAP_Resume
Sudheer_SAP_ABAP_ResumeSudheer_SAP_ABAP_Resume
Sudheer_SAP_ABAP_ResumeSudheer babu
 

Similar to Secure Partner Collaboration for Global SAP Deployments (20)

Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of III
 
Coghead Overview 21 Aug08
Coghead Overview 21 Aug08Coghead Overview 21 Aug08
Coghead Overview 21 Aug08
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST Highlight
 
Organizing for faster innovation - People, process, culture, and technology
Organizing for faster innovation - People, process, culture, and technologyOrganizing for faster innovation - People, process, culture, and technology
Organizing for faster innovation - People, process, culture, and technology
 
Red7 Product Management Software Tools Overview
Red7 Product Management Software Tools OverviewRed7 Product Management Software Tools Overview
Red7 Product Management Software Tools Overview
 
Product Development in the Cloud
Product Development in the Cloud Product Development in the Cloud
Product Development in the Cloud
 
ENT206 Product Development in the Cloud
ENT206 Product Development in the CloudENT206 Product Development in the Cloud
ENT206 Product Development in the Cloud
 
Forum Presentation
Forum PresentationForum Presentation
Forum Presentation
 
BA Resume
BA  ResumeBA  Resume
BA Resume
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
Business Intelligenze Corporate
Business Intelligenze CorporateBusiness Intelligenze Corporate
Business Intelligenze Corporate
 
Monitoring for Operational Outcomes and Application Insights: Best Practices ...
Monitoring for Operational Outcomes and Application Insights: Best Practices ...Monitoring for Operational Outcomes and Application Insights: Best Practices ...
Monitoring for Operational Outcomes and Application Insights: Best Practices ...
 
Product Development in the Cloud - ENT206 - Chicago AWS Summit
Product Development in the Cloud - ENT206 - Chicago AWS SummitProduct Development in the Cloud - ENT206 - Chicago AWS Summit
Product Development in the Cloud - ENT206 - Chicago AWS Summit
 
Corporate Presentation Sigma Infosolutions
Corporate Presentation Sigma InfosolutionsCorporate Presentation Sigma Infosolutions
Corporate Presentation Sigma Infosolutions
 
Ireland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs SlideshareIreland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs Slideshare
 
Software as a Service
Software as a ServiceSoftware as a Service
Software as a Service
 
Estuate EDM Checklist
Estuate EDM ChecklistEstuate EDM Checklist
Estuate EDM Checklist
 
Converge Leveraging Identity With Professional Open Source Final
Converge   Leveraging Identity With Professional Open Source FinalConverge   Leveraging Identity With Professional Open Source Final
Converge Leveraging Identity With Professional Open Source Final
 
Sudheer_SAP_ABAP_Resume
Sudheer_SAP_ABAP_ResumeSudheer_SAP_ABAP_Resume
Sudheer_SAP_ABAP_Resume
 

More from NextLabs, Inc.

Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights ManagementNextLabs, Inc.
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security NextLabs, Inc.
 
eGRC for Information Export Control
eGRC for Information Export ControleGRC for Information Export Control
eGRC for Information Export ControlNextLabs, Inc.
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC NextLabs, Inc.
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...NextLabs, Inc.
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...NextLabs, Inc.
 
Preview Of Gary Stanley 10 Commandments
Preview  Of Gary Stanley 10 CommandmentsPreview  Of Gary Stanley 10 Commandments
Preview Of Gary Stanley 10 CommandmentsNextLabs, Inc.
 
Preview of Heaney On ITAR Controls
Preview of Heaney On ITAR ControlsPreview of Heaney On ITAR Controls
Preview of Heaney On ITAR ControlsNextLabs, Inc.
 

More from NextLabs, Inc. (10)

Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
eGRC for Information Export Control
eGRC for Information Export ControleGRC for Information Export Control
eGRC for Information Export Control
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
 
NextLabs Internships
NextLabs InternshipsNextLabs Internships
NextLabs Internships
 
Preview Of Gary Stanley 10 Commandments
Preview  Of Gary Stanley 10 CommandmentsPreview  Of Gary Stanley 10 Commandments
Preview Of Gary Stanley 10 Commandments
 
Preview of Heaney On ITAR Controls
Preview of Heaney On ITAR ControlsPreview of Heaney On ITAR Controls
Preview of Heaney On ITAR Controls
 

Recently uploaded

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Recently uploaded (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Secure Partner Collaboration for Global SAP Deployments

  • 1. Advanced Authorization for SAP Global Deployments Part 3: SAP authorization model for secure Partner Collaboration Sandeep Chopra, Sr. Product Manager, NextLabs, Inc.
  • 2. Agenda Objective Understand partner collaboration lifecycle for global SAP deployment Apply the Authorization Framework Identify authorization tools used in the solution Presentation Quick Recap of Part I and II The Partner Collaboration Lifecycle Partner Collaboration requirements for global SAP deployment Enterprise authorization considerations Question and Answers
  • 3. Review of Part I Understanding Global Deployment Authorization Requirements and Challenges Introduction to the Authorization Toolbox Authorization Framework – Clear Separation of Authorization Dimensions Authorization Decision Map
  • 4. Review of Part 2 Introduce Authorization Model Assessment Understand the requirements of Export Compliance in a global deployment Group business authorization into functional, data, and governance dimensions Example Authorization Decision Map for Export Compliance
  • 5. The Authorization Framework Revisited 5. Choose the right tools for each layer 4. Develop Data Authorization Decision Map 3. Authorization Model Assessment for Data Entitlements 2. Develop Functional Authorization Map 1. Separate Functional, Data and Governance Requirements
  • 6. The Partner Collaboration Lifecycle Marketing Engineering Manu- facturing Logistics Sales Service
  • 7. Partner Collaboration Authorizations Intellectual Property (IP) Licenses NDA, PIA, PIEA Patent Licenses Trade Secrets Third Party IP Licenses Contractual Obligations Classified, Top Secret, Need to Know
  • 8. Securing Collaboration Multiple systems are involved throughout the IP Lifecycle Need to apply Authorization Framework to each system Need to develop a long term authorization strategy
  • 9. ACME: A Global A&D Company Global Aerospace & Defense Company Headquartered in US Operations in 6 countries: US, UK, Germany, India, China, Australia Joint Ventures in Australia and UK 60,000 employees, 5000 suppliers worldwide Single Instance of SAP, Centralized IT management in US Substantial number of materials are dual use or under ITAR jurisdiction Global operations IT management in US, operations in India Design centers in US, UK, Germany, and Australia Manufacturing in US, UK, Australia, China
  • 10. Business Authorization Dimensions Functional Access Determine the actions a user can perform Data Access Determine the data a user can see Governance Rules for access management Data Access Functional Access Governance
  • 11.
  • 12. Define Transaction or Function Groups
  • 13.
  • 15. Do not Forget Authorization Governance Classification Processes IP Classification (type, owner, license) Business classification (Program, project, product, customer) IP Publication Process for publishing IP to external facing applications External User Company and Project assignments Managing the creation of accounts for external users with accurate information for company and project assignment IP License Management Managing IP licenses established by legal Marking, Audit and Record Keeping
  • 16. Acme’s Enterprise Authorization Decision Map SAP File Server PLM CAD System Sharepoint Custom App
  • 17.
  • 20.
  • 23. Leverage Common Authorization Model SAP File Server PLM CAD System Sharepoint Custom App
  • 24. An Authorization Strategy for ACME Near Term: Use the Best authorization model for each Application to meet the control objective LongTerm: Develop strategy to externalize authorization leveraging common authorization model
  • 25. Mapping Requirements to Authorization Understand the requirements of Secure Collaboration in a global deployment Group business authorization into functional, data, and governance dimensions Authorization Decision Map for Secure Collaboration for each application Enterprise Authorization considerations
  • 26. Co-organized by NextLabs and SAP NextLabs Overview Policy-driven, information risk management software for Global 5000 enterprises. Help companies achieve safer and more secure internal and external collaboration Ensure proper access to applications and data Facts Locations HQ: San Mateo, CA New York, NY Hangzhou, PRC Malaysia 25+ Patent Portfolio Major go-to-market Partners: IBM, SAP, Microsoft “We allow companies to preserve confidentiality, prevent data loss and ensure compliance across more channels and more points with a single unified solution with unmatched user acceptance and total cost of ownership.” - Keng Lim, Chairman and CEO
  • 27.
  • 28. Get the whitepaper on Protecting IP in Collaborative Manufacturing
  • 29. Request a meeting to find out about our end to end information risk protection for SAP customers