kalido
8th April 2002, 05:14
Hi:
My company just completed the Baan distribution module implementation. The IT department created some usernames for our customers as they required. By using those usernames, our customers can log on to certain sessions of our Baan system via the internet.
Our customers have concerns of the BaaN security when access over the internet, and may hire some professional IT auditing companies to conduct an audit on our internet Baan security control.
What do we need to consider for this security control. And what can we say to them to improve their confidence on this. Or could you provide some links that have the Baan internet security control documentations.
I sent inquiries to Baan, and they relied me some PDF files with theories only. While, what I actually need is the detailed steps - what should we perform to pass the audit.
Thanks in advance.
My company just completed the Baan distribution module implementation. The IT department created some usernames for our customers as they required. By using those usernames, our customers can log on to certain sessions of our Baan system via the internet.
Our customers have concerns of the BaaN security when access over the internet, and may hire some professional IT auditing companies to conduct an audit on our internet Baan security control.
What do we need to consider for this security control. And what can we say to them to improve their confidence on this. Or could you provide some links that have the Baan internet security control documentations.
I sent inquiries to Baan, and they relied me some PDF files with theories only. While, what I actually need is the detailed steps - what should we perform to pass the audit.
Thanks in advance.