You are on page 1of 1

What is Workday Security?

Workday is a cloud-based SaaS platform that delivers a one-window solution to


organizations seeking a consolidated solution for their financial management,
payroll processing, enterprise planning, and human capital management (HCM) needs.

Workday security defines what type of data different groups of people in an


organization can see in their Workday system, what level of access they have, such
as view only, view/write, etc., and what security measures are implemented for
protecting that data. To better understand it, let’s take a look at the different
concepts of security in Workday.

Workday Security Concepts


Workday Security Configurations
Security configurations define a set of security measures, such as data masking,
data encryption, multi-factor authentication, or access controls that allow security
experts to mitigate security and privacy risks and reduce vulnerabilities that could
lead to cyber threats, such as data theft, corporate espionage, etc.

Workday Security Groups


Security groups configuration defines who requires access to specific business
processes and objects. In Workday, groups are usually categorized into role-based,
user-based, and standard worker or process-maintained groups. Apart from the
delivered groups, administrators can also create custom groups.
Administrators can add users to the group by first creating a role and constraining
them with the Organizations that the role and responsibility fall within, such as
Supervisory Organization, Cost Center, Company, and Location.

Role-based Security
Most organizations create role-based security groups because they are usually
associated with a single Organization, such as a Location or Company. In a
role-based group, access is assigned to users based on their role or responsibility
in the organization, such as HR Partner, Manager, HR Contact.

Suppose a user switches job roles in the organization. In that case, their access
control is changed following the change in their job responsibility and the required
access to specific business processes. Similarly, when a user quits, their access
must be removed..

You might also like