Configure your organization in F&O - Plant and Implement Security (Section 3) Flashcards

1
Q

Types of Securities?

A

Role
Duty
Privilege
Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Role based security?

A

Aligned with the structure of business. Users are assigned to security roles based on their responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where can you assign roles to users?

A

System Admin -> Security

-> Assign users to roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Duties?

A

Correspond to parts of a business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privileges?

A

Can be assigned directly to roles.

Specifies the level of access that is required to perform a job, solve a problem, or complete an assignment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Permissions?

A

Represent access to individual securable objects, such as menu items and tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Segregation of duties?

A

Set up rules to separate tasks that must be performed by different users,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Segregation of Duties do?

A

Helps reduce the risk of fraud, helps detect errors or irregularities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Regulatory requirements list?

A

Sarbanes-Oxley (SOX)
International Financial Reporting Standards (IFRS)
United States Food and Drug Administration (FDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where to find and resolve conflicts in segregation of rules?

A

System administration -> Security -> Segregation of duties -> Verify compliance of user-role assignments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Where to find and run security reports?

A

System Administration -> Inquiries -> Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

XDS?

A

Extensible Data Security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does XDS do?

A

Allows developers to supplement role-based security by restraining access to table records based on security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Security policy components?

A
Constrained tables
Primary table
Policy Query
Context
Role Context
Application Context
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Constrained Tables?

A

Table(s) from which data is filtered or secured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Primary Tables?

A

Used to secure the content of the related constrained table.

17
Q

Policy Query?

A

Used to secure the constrained tables content using a range condition on the primary table components. (Range)

18
Q

Context?

A

Controls the conditions under which a policy is applicable.

19
Q

Types of Context?

A

Role Context

Application Context

20
Q

Role Context?

A

Based on the roles that the user is assigned.

21
Q

Types of Role Context?

A

RoleName - Security is only applied to the application user assigned to the role equal to the value of RoleName

RoleProperty - Value is used in combination with the ContextString property to specify multiple user roles context.

22
Q

Application Context?

A

Applied if the context string set by the application using the XDS::SetContext API is the same as the value defined in the Context String field for the policy. In the Application Object Tree (AOT), policies and their components are displayed under Security > Policies.

23
Q

Where is policy query added to?

A
WHERE
ON
SELECT
UPDATE
DELETE
INSERT