Professional Documents
Culture Documents
Security Management System: Temenos Education Centre
Security Management System: Temenos Education Centre
Warning: This document, is protected by copyright law and international treaties. No part of this
document may be reproduced or transmitted in any form or by any means, electronic or mechanical,
for any purpose, without the express written permission of TEMENOS Holdings NV Unauthorized
reproduction or distribution of this presentation or any portion of it, may result in severe civil and
Copyright © 2004 TEMENOS HOLDINGS NV
criminal penalties, and will be prosecuted to the maximum extent possible under applicable law.”
Information in this document is subject to change without notice.
Secrecy
Funds transferred correctly
Control
o Different functions (Maker – Checker)
o Individual users
o Different departments
Audit
o Internal & External
Reporting
o MIS and Statutory
TREASURY Authorizer
Audit
or
Authorizer Queries
Transaction Input
Security Management System
RDBMS
APPLICATION LOGIC
COB
Accruals
Validation Maturity Control
Reporting
AUTHORIZED Revaluation
UNAUTHORIZED
Static Data
Risk Management Messages/Clearing Accounting
Product
Interest Rates Credit Risk Print General Ledger
Commissions Market Risk Debits/Credits
SWIFT SID Interface
Currency
etc...
User profiles
Authorizations
System Control
Overrides
Application
Sign On Name
Function
User profile
Data
Password
Time
Sign On Name
Password
Sign on Name
Security
Violation
Password
Sign on Name
Security
Violation
Password
Sign on Name
Too
Security
many
Violation
attempts
Password
Security Administrator
PASSWORD.RESET
User Initiated
An Inactive Session
Hardware Failure
User ID
User Name
Sign On Name
Classification
Company Code
Department Code
Password Validity
Start time
End time
Attempts
Company restriction
Application
Version
Function
Field Number
Data Comparison
Data From
Data To
Security Mgmt L
Application Log
Function Id Log
Override class
Attributes
Login as the same user and check whether you are able to do a
auditor review
T2ITT – R05 – 1.0 Copyright © 2005 TEMENOS HOLDINGS NV 23
Workshop - 2
User1 Teller
User2 Teller
USER.SMS.GROUP
User3 Teller
User4 Teller
Non Blocking
Any user can approve the override
Blocking
Only users with proper authentication are allowed
to approve the override
After this, repeat the previous workshop and look at the Override.
Historical activity
Restricted access
to records of
Customer(s)
Restricted Access
to Branch,
Applications and
functionalities