Professional Documents
Culture Documents
Security Model
Workshop
24 August 2021
Security Model Workshop Agenda
Agenda Understand your security modeling requirements
and strategy.
Basics & Security Model Overview
Q&A
The Role of Success by Design
In Scope Out of Scope
• Provide findings and • Define security model
recommendations following the • Train configurators or system
workshop presentation administrators
• Highlight technical risks and
issues (including unrealistic
product expectations)
• Point out best practices
Customer slide (please
update)
Security model overview
Add info
Customer slide (please
update)
Security model overview
Add info
Customer slide (please
update)
Basics
*By “security pattern”, we mean the different security configurations you want to implement to answer the requirements
e.g. X will use the standard use of user / business unit / security role, Y will use a combination of X and Manager Hierarchy, Z will only use Access Team… etc.
Customer slide (please
update)
Basics
Do you really need to restrict access to data, or do you want Yes/No
to filter access to data?
Are the security roles being created at the root BU level or the
Yes/No
child level?
Apps? Yes/No
Dashboards? Yes/No
Forms? Yes/No
Do you have the security matrix Excel sheet with access levels
Yes/No
and privileges defined by your Business/customer?
Do you have test cases around the security matrix for all the
Yes/No
security roles?
What are the steps you have taken to ensure compliance with
legal requirements applying to your implementation?