13.07.2015 Views

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 8: Scheduled Annual TasksOtherTask Where Chapter Procedure Checkoff/InitialPerform disaster recovery. 2 & 3 Restore entiresystem to disasterrecovery test systemTest businessresumptionProblem Action ResolutionIn chapters 4–8, we have included a list of transactions like the one below. This list containsbasic information about the transactions in the checklist. For additional information on thesetransactions, see the chapter referenced in each checklist.All users who have left the company should have their R/3 access terminated immediately.By locking or deleting these user IDs, you limit access to only those users who should haveaccess to R/3. Periodic review assures the task of locking or deleting has been completed.Proper audit control requires that a user who no longer has a valid business need to accessR/3 should not be allowed to keep that access.Deleting or locking these user IDs also prevents anyone who had been using the terminateduser ID from accessing the system under that ID.There are switches that prevent changes from being made in the system. In the productionsystem, these should be set to Not modifiable.8–4Release 4.6A/B

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!