Configure Security Checkpoints for Control Plan

Explanation

Security checkpoints can be configured for the following activities of control plans and analyses:

Prerequisites

Only a system administrator can access and configure the security checkpoints in the Security Checkpoints window.

System Effects

When the security checkpoint is active and turned on, end user will be presented with an extra authentication dialog box at the checkpoint. Successful security checkpoints are logged and can be viewed in the Security Checkpoints Log window.

Window

N/A

Related Window Descriptions

N/A

Procedure

  1. Populate the Security Checkpoints window and search for any of the following security checkpoints: QUAMAN_CANCEL_ANALYSIS, QUAMAN_CANCEL_DATA_POINT, QUAMAN_CHECKLIST_APPROVAL, QUAMAN_COMPLETE_DATA_POINT, QUAMAN_CONFIRM_ANALYSIS, QUAMAN_CONTROL_PLAN_APPROVAL, QUAMAN_CTRL_PLAN_TMPL_ACTIVATE, QUAMAN_ENTER_ATTRIBUTE_RESULTS, QUAMAN_ENTER_VARIABLE_RESULTS, QUAMAN_SO_CTRL_PLAN_APPROVAL, QUAMAN_TEMP_CHKLST_ITEM_APPRVL.
  2. Click the Active check box.
  3. Save when complete.