7月内审审计计划培训,最好关于SAP系统审计方面,哪里好

君,已阅读到文档的结尾了呢~~
广告剩余8秒
文档加载中
2014年公司内审人员SAP系统应用培训
扫扫二维码,随身浏览文档
手机或平板扫扫即可继续访问
2014年公司内审人员SAP系统应用培训
举报该文档为侵权文档。
举报该文档含有违规或不良信息。
反馈该文档无法正常浏览。
举报该文档为重复文档。
推荐理由:
将文档分享至:
分享完整地址
文档地址:
粘贴到BBS或博客
flash地址:
支持嵌入FLASH地址的网站使用
html代码:
&embed src='/DocinViewer--144.swf' width='100%' height='600' type=application/x-shockwave-flash ALLOWFULLSCREEN='true' ALLOWSCRIPTACCESS='always'&&/embed&
450px*300px480px*400px650px*490px
支持嵌入HTML代码的网站使用
您的内容已经提交成功
您所提交的内容需要审核后才能发布,请您等待!
3秒自动关闭窗口浙江省内部审计协会关于印发2017年度内部审计培训计划的通知——工作交流——杭州市余杭区审计局
站内搜索:
当前位置:
浙江省内部审计协会关于印发2017年度内部审计培训计划的通知
发布者: 杜肖霞 来源:
发布日期:【】 访问次数:142次 [字号:
各市内审协会,省直分会,省直有关单位:
&&&&& 为贯彻落实《浙江省人民政府关于进一步加强内部审计工作的意见》精神,提高广大内部审计人员审计专业能力和水平,浙江省内部审计协会结合中国内部审计协会《内部审计人员后续教育办法(试行)》和浙江内部审计工作实际情况,制订了2017年度内部审计培训计划,具体事项通知如下。
&&&&& 一、培训内容及对象
&&&&& 2017年,浙江省内审协会将分行业、分层次安排岗位能力培训、业务知识培训和CIA后续教育共3大类13个专题16期
培训班,与地市内审协会联合举办内部审计主审人员培训班、农村及乡镇内部审计培训班、审计技术方法与实务案例培训班等4期培训班,培训班名称与期数如下:
&&&&& 1.审计技术方法与实务案例培训班(3期)
&&&&& 2.内部审计主审人员培训班(3期)
&&&&& 3.企业内部审计培训班(1期)
&&&&& 4.投资审计业务知识培训班(1期)
&&&&& 5.舞弊审计方法及案例分析培训班(1期)
&&&&& 6.行政事业单位内部审计培训班(1期)
&&&&& 7.经济责任审计培训班(1期)
&&&&& 8.内部审计高层论坛(1期)
&&&&& 9.内部审计质量评估培训班(1期)
&&&&& 10.信息系统审计及案例分析培训班(1期)
&&&&&&11.风险管理与内部控制培训班(1期)
&&&&& 12.内部审计人员自我能力提升培训班(1期)
&&&&& 13.CIA继续教育培训班(2期)
&&&&& 14.农村及乡镇内部审计培训班(2期)
&&&&& 内部审计人员后续教育培训班类别、培训时间、培训地点、培训费标准、适宜参加培训的人员、主要授课内容详见附件。
&&&&& 二、组织方式
&&&& (一)2017年内部审计培训班由浙江省内审协会、浙江省审计学会、宁波市内审协会、丽水市内审协会、嘉兴市内审协会、湖州市内审协会联合举办,各市内审协会、审计学会、省直分会和省直会员单位要认真做好培训的宣传和组织工作。
&&&& (二)鼓励各市内审协会自主举办各类内审业务培训,办班前需将培训具体方案报省内审协会备案审批,包括培训时间、地点、对象、内容、师资情况等。
&&&&& 三、报名入学及结业
&&&& (一)报名交费。内部审计人员后续教育培训班报名者请在2017年3月10日前登录(浙江内部审计网站)“培训报名”栏报名(每人限报一个班次),同时网上缴纳培训费,不接受邮箱报名,单位集体报名请统一录入网站“培训报名”栏,参加地市主办培训班学员在接到“入学通知”后再按通知要求缴费。
&&&& (二)通知确认。协会按照学员所报班次及缴费情况提前20天发送短信或邮件给学员,学员按通知书规定的回执时间在报名邮箱确认后报到(“浙江省审计科研所”微信公众平台同时发布相关信息,请各学员关注)。
&&&& (三)培训结业。学员修完规定课程,由省内审协会颁发培训班结业证书,并统一录入内审人员后续教育管理系统,作为内部审计人员后续教育证明。
&&&&& 四、其他
&&&&& 培训费收费标准见《浙江省内部审计协会2017年度培训计划表》(附件),食宿费及相关费用按当期培训班标准执行。
&&&&& 浙江省内部审计协会地址:杭州市体育场路555号;
&&&&& 邮编:310007;
&&&&& 联系人:苏炬明,99;朱轶君,19;
&&&&& 浙江内部审计网站:;
&&&& “浙江省审计科研所”微信公众平台:zjsjkys;
&&&&& 电子邮箱:。
&&&&& 附件:浙江省内部审计协会2017年度培训计划表
浙江省内部审计协会
详见附件:
杭州市余杭区审计局 版权所有 浙ICP备号
地址:杭州市余杭区临平龙皇塘路78号 邮编:311100 公开电话:6
杭州网尽信息科技有限公司设计制作和技术支持
建议使用 IE6.0 浏览随笔 - 589&
文章 - 0&评论 - 113&trackbacks - 5
基本语法:CREATE AUDIT POLICY &policy_name& AUDITING &audit_status_clause&
&audit_actions& LEVEL &audit_level&&语法元素: &policy_name& ::= &identifier&
&audit_status_clause& ::= SUCCESSFUL | UNSUCCESSFUL | ALL
&audit_actions& ::= ACTIONS FOR &user_name&[, &user_name&]
| &audit_action_list& [FOR &user_name&[, &user_name&]]
| &target_audit_action_list& [FOR &user_name&[, &user_name&]...]
&user_name& ::= &simple_identifier&
&audit_action_list& ::= &audit_action_name&[, &audit_action_name&]...
&target_audit_action_list& ::= &target_audit_action_name&[, &target_audit_action_name] ON &object_name&[, &object_name&]
&audit_action_name& ::= GRANT PRIVILEGE
| REVOKE PRIVILEGE
| GRANT STRUCTURED PRIVILEGE
| REVOKE STRUCTURED PRIVILEGE
| GRANT APPLICATION PRIVILEGE
| REVOKE APPLICATION PRIVILEGE
| GRANT ROLE
| REVOKE ROLE
| GRANT ANY
| REVOKE ANY
| CREATE USER
| DROP USER
| CREATE ROLE
| DROP ROLE
| ENABLE AUDIT POLICY
| DISABLE AUDIT POLICY
| CREATE STRUCTURED PRIVILEGE
| DROP STRUCTURED PRIVILEGE
| ALTER STRUCTURED PRIVILEGE
| SYSTEM CONFIGURATION CHANGE
| SET SYSTEM LICENSE
| UNSET SYSTEM LICENSE
| ALTER USER
| REPOSITORY_ACTIVATE
| DROP TABLE
&target_audit_action_name& ::= INSERT | UPDATE | DELETE | SELECT | EXECUTE
&audit_level& ::= EMERGENCY | ALERT | CRITICAL | WARNING | INFO
&object_name& ::= &table_name& | &view_name& | &procedure_name&
&table_name&
::= [&schema_name&.]&identifier&
&view_name&
::= [&schema_name&.]&identifier&
&procedure_name&
::= [&schema_name&.]&identifier&
&schema_name&
::= &identifier&&
Description
The CREATE AUDIT POLICY statement creates a new audit policy. This audit policy can then be enabled and will cause the auditing of the specified audit actions to occur. Only database users having the system privilege AUDIT ADMIN are allowed to create an audit policy. The specified audit policy name must be unique not match the name of an existing audit policy. An audit policy defines which audit actions will be audited. Audit policies need to be enabled for auditing to occur happen. One audit policy can contain one of the following:
non-restricted auditing for n (&=1) users
auditing for actions not restricted to objects
auditing for actions which are restricted to objects.
For the last two alternatives listed, an optional restriction for user(s) is available.
The &audit_status_clause& defines if successful, unsuccessful or all executions of the specified audit actions are audited. The table below contains the available audit actions. They are grouped in several groups. Audit actions in the same group can be combined into one audit policy. Audit actions of different groups can not be combined into the same audit policy.
Audit Action Name
Group Number
Audit Operation
GRANT PRIVILEGE
granting of privileges to users or roles
REVOKE PRIVILEGE
revoking of privileges from users or roles
GRANT STRUCTURED PRIVILEGE
granting of structured/analytical privileges to users or roles
REVOKE STRUCTURED PRIVILEGE
revoking of structured/analytical privileges from users or roles
GRANT APPLICATION PRIVILEGE
granting of application privileges to users or roles
REVOKE APPLICATION PRIVILEGE
revoking of application privileges from users or roles
GRANT ROLE
granting of roles to users or roles
REVOKE ROLE
revoking of roles from users or roles
granting of privileges, structured privileges or roles to users or roles
REVOKE ANY
revoking of privileges, structured privileges or roles from users or roles
CREATE USER
creation of users
dropping of users
ALTER USER
altering of users
CREATE ROLE
creation of roles
dropping of roles
creation of a user connection to the database
SYSTEM CONFIGURATION CHANGE
changes to the system configuration (e.g. INIFILE)
ENABLE AUDIT POLICY
activation of audit policies
DISABLE AUDIT POLICY
deactivation of audit policies
CREATE STRUCTURED PRIVILEGE
creation of structured/analytical privileges
DROP STRUCTURED PRIVILEGE
destruction of structured/analytical privilege
ALTER STRUCTURED PRIVILEGE
change of structured/analytical privilege
SET SYSTEM LICENSE
installation of a system license
UNSET SYSTEM LICENSE
deletion of licenses
DROP TABLE
deletion of database tables
REPOSITORY ACTIVATE
activation of repository design time objects
use of insert/replace/upsert statements on tables and views
allows specification of target objects
use of update/replace/upsert statements on tables and views
allows specification of target objects
deletion of rows from tables/views and truncation of tables
allows specification of target objects
use of select statements on tables and views
allows specification of target objects
procedure calls
allows specification of target objects
all actions above
typically used for specific users
Only objects of type table, view, and procedure can be specified in the &target_audit_action_list&. Synonyms and sequences cannot be selected as objects for audit policies. Furthermore only those &target_audit_action_name&s can be combined with an object. The following table shows an overview of auditable actions on objects.
Each audit policy is assigned to an audit level. The possible levels, in decreasing order of importance, are: EMERGENCY, ALERT, CRITICAL, WARNING, INFO. To make auditing occur, audit policies have to be created and enabled. Also the configuration parameter global_auditing_state (see below) has to be set to true.
Configuration Parameter
Currently the configuration parameter for auditing are stored in global.ini, in the auditing configuration section and are the following: global_auditing_state ( 'true' / 'false' ) to activate / deactivate auditing globally, no matter how many audit policies are available and enabled. The default is false, meaning: no auditing will occur. default_audit_trail_type ( 'SYSLOGPROTOCOL' / 'CSVTEXTFILE' ) to specify, how to store the auditing results. SYSLOGPROTOCOL is the default. CSVTEXTFILE should be used only for testing purposes. default_audit_trail_path to specify where to store the audit file, in the case that CSVTEXTFILE has been selected. As for all configuration parameters, these parameters can be selected in view M_INIFILE_CONTENTS, if the current user has the required privilege to do so. These parameters will only be seen in case they have been explicitly set.
System and Monitoring Views
AUDIT_POLICY: shows all audit policies and their states M_INIFILE_CONTENTS: shows the configuration parameter concerning auditingOnly database users with system privilege CATALOG READ, DATA ADMIN or INIFILE ADMIN can view information in the M_INIFILE_CONTENTS view. For other database users this view will be empty.
Your create a new audit policy named priv_audit that will audit successful granting and revoking of privileges and roles. The audit policy has the medium audit level CRITICAL. This policy has to be enabled explicity
to make the auditing of the audit policy occur.
CREATE AUDIT POLICY priv_audit AUDITING SUCCESSFUL GRANT PRIVILEGE, REVOKE PRIVILEGE, GRANT ROLE, REVOKE ROLE LEVEL CRITICAL;
You create a new audit policy named object_audit that will audit the inserts into the existing table MY_SCHEMA.MY_TABLE. This policy has to be enabled explicity to make the auditing of the audit policy occur. This policy is restricted to user FRED and uses the audit level INFO.
CREATE USER FRED PASSWORD Initial_1;
CREATE SCHEMA MY_SCHEMA OWNED BY
CREATE TABLE MY_SCHEMA.MY_TABLE (first_col int);
GRANT INSERT ON MY_SCHEMA.MY_TABLE to FRED;
CREATE AUDIT POLICY OBJECT_AUDIT AUDITING SUCCESSFUL INSERT ON MY_SCHEMA.MY_TABLE FOR FRED LEVEL INFO
-- create audit policyCREATE AUDIT POLICY policyAdministratePrincipals AUDITING ALL CREATE ROLE, DROP ROLE, CREATE USER, DROP USER LEVEL C
--disable audit policyALTER AUDIT POLICY policyAdministrateP
--enable audit policyALTER AUDIT POLICY policyAdministrateP
--query audit policyselect * from "PUBLIC"."AUDIT_POLICIES"
阅读(...) 评论()}

我要回帖

更多关于 审计和内审 的文章

更多推荐

版权声明:文章内容来源于网络,版权归原作者所有,如有侵权请点击这里与我们联系,我们将及时删除。

点击添加站长微信