Hermosa Beach Consulting Group
HOMEABOUT USSERVICESOPPORTUNITIESCONTACT USRESOURCES
Services
Application Security Implementatiion Services
 

The Hermosa Beach Consulting Group utilizes a best practices methodology to involve the Business Data Owners in security design.  Fundamental to our success is the integration of technical security within defined business processes.  Our consultants have deep knowledge of both technical security and business processes.  This expertise allows for better, more applicable solutions when addressing gaps between functional requirements and technical feasibility.

Security Project Team Leadership and Staffing

The Hermosa Beach Consulting Group is an organization of seasoned consultants contributing years of Big-4 or SAP America experience.  Our consultants have been involved with multiple projects and have a wide breadth of industry experience.  Our project leads have leadership experience with some of the largest and most complex global SAP implementations to date.

Training and Education

Each of our consultants is a technical expert in his or her field and has cross functional experience.  We provide specialized training catered to your company’s particular application security requirements.  Our staff has experience in leading technical security workshops, one-on-one training, as well as sessions for business process data owners to explain the authorization concept.  All of our implementation engagements include Knowledge Transfer to appropriate parties.

Best Practices Security Implementation Methodology

Our implementation methodology is adaptable to fit with any System Integrator’s approach and is scalable to the requirements of any size implementation.  We utilize a least privilege role design approach.  This ensures end users can only access what is required for their daily responsibilities.  The methodology is self-documenting and encourages client staff involvement, promoting Knowledge Transfer and handover to client security staff for on-going support.

The Hermosa Beach Consulting Group designs security to fit or improve client business process requirements without compromising the maintenance of a secure environment.  We help clients understand risk exposure, and through our least privilege design methodology, assist with strengthening business process controls.

Security Governance Policies and Procedures

Sound change management policies and procedures are an important part of maintaining a secure system environment.  Security Governance involves business ownership of the controls environment to ensure compliance with company policies and procedures.  The Hermosa Beach Consulting Group has industry best practice experience in the design and implementation of governance procedures to fit business requirements.  Policies and procedures are designed to ensure proper approval, communication, testing, and documentation are maintained before any changes are made within the secure environment.  Our consultants have experience in implementing both manual and workflow-driven governance solutions.

Technical and Business Process Expertise for Core R/3 Modules

Our methodology employs a least privilege security role design strategy.  The idea is to grant users only the access required to perform their jobs, while protecting sensitive data and maintaining compliance with legal regulations such as the Sarbanes-Oxley Act, ITAR, and other government or contractual obligations.  Least privilege role design empowers businesses to control access to information and functionality within a flexible and manageable environment.

Our approach requires our consultants to be experts in the technical aspects of SAP security as well as have a strong working knowledge of the business processes they are working to secure.  Each SAP module is secured by its own particular authorizations.  We work with our clients to assist in the creation of a security model which offers maximum protection with minimal on-going support requirements.

Technical and Business Process Expertise for SAP HR

Introducing HR data into a centralized ERP instance presents its own data security concerns.  With regulations around individuals’ privacy ever increasing, companies need to develop comprehensive data protection for personal information.  Our consultants are familiar with HR data security issues and best practices for securing data within the SAP application.

We can assist with the implementation of Manager Self-Service (MSS) and Employee Self-Service (ESS).  Our consultants are well experience with Structural Authorizations and the implications of their use.

Also, the implementation of the HR module allows security to be assigned to users based upon the HR Organizational Structure.  This method of security role assignment can greatly reduce overhead of on-going Security Production Support., as it allows users to be assigned appropriate access automatically, based upon where they belong in the Organizational Structure.

Technical Expertise for SAP Component Systems

Many companies implement additional SAP component systems in conjunction with R/3.  The Hermosa Beach Consulting Group has experience with securing all of the component systems.  Our methodology covers any component systems which may be implemented as we encourage our clients to standardize their security model across all component systems.  Users should be consistently restricted across any system to which they logon.  Each of the component systems is unique in its security requirements.  We have in-depth experience with the following systems:

  • Enterprise Portal (EP)
  • Business Warehouse (BW)
  • Strategic Enterprise Management (SEM)
  • Enterprise Buyer Professional (EBP)
  • Customer Relationship Management (CRM)
  • Business Consolidations System (both BCS and SEM-BCS)
  • Workplace (WP)

Application Security Evaluation Services

During an implementation, many companies have found that it is a good idea to have an independent quality review of their methodology, design, and implementation strategy.  We have assisted several companies throughout their implementations by evaluating their security and making recommendations for improvement or areas in which to focus.

Site Map | Privacy Statement | Terms of Use