sap grc risk analysis and remediation

38
SAP GRC RISK ANALYSIS AND REMEDIATION Overview

Upload: shiva-kumar

Post on 25-Oct-2015

321 views

Category:

Documents


11 download

DESCRIPTION

zz

TRANSCRIPT

SAP GRC RISK ANALYSIS AND REMEDIATION

Overview

Introduction SAP GRC Access Control RAR Overview Informer tab Mitigation tab Rule Architect tab Configuration tab

AGENDA

INTRODUCTION I like teaching and I’m a Microsoft Certified Trainer

You can view my transcript by going to:-

http://www.microsoft.com/learning/mcp/transcripts• Transcript ID 685386• Access Code 20131370

AGENDA

Introduction SAP GRC Access Control RAR Overview Informer tab Mitigation tab Rule Architect tab Configuration tab

SAP GRC Access Control

• SAP GRC Access Control is a suite of capabilities that monitor, test, and enforce access and authorization controls across the enterprise.

• SAP GRC Access Control helps companies to comply with regulatory mandates such as Sarbanes-Oxley

• SAP GRC Access Control includes the following capabilities:Risk Analysis and Remediation (RAR) formerly Virsa Compliance

CalibratorCompliant User Provisioning (CUP) formerly Virsa Access EnforcerEnterprise Role Management (ERM) formerly Virsa Role ExpertSuperuser Privilege Management (SPM) formerly Virsa Firefighter

SAP GRC ACCESS CONTROL

SAP GRC Access Control

DEV GRC

ECC Client

Client 150

BI Client

Client 100

ECC Client

Client 220

Configured for ECC

GRC Components

RAR

CUP

SPM

DEV BW

BI Client

Client 200

SYS TEST BW

System Test Portal

DEV ECC SYS TEST ECC

TEST2 OU

SAP GRC ACCESS CONTROL

AGENDA

Introduction SAP GRC Access Control RAR Overview Informer tab Mitigation tab Rule Architect tab Configuration tab

RISK ANALYSIS AND REMEDIATION

Risk Analysis and Remediation (RAR)RAR is used to manage SoD in the organizationRAR allows one to define Risk for SoDs, use control to mitigate risks, and use alert messages.

RAR Application Menu

InformerContains various reports

Rule ArchitectDefines rules for business process SoD

Mitigation Monitors identified risks for users, roles and profiles

Alert MonitorProvides an overview of Conflicting, Critical actions and Control Monitoring

ConfigurationContains configuration settings

AGENDA

Introduction SAP GRC Access Control RAR Overview Informer tab Mitigation tab Rule Architect tab Configuration tab

INFORMER Informer

Includes the following types of reports:-Management ViewRisk AnalysisAudit ReportsSecurity Reports

INFORMER Management View

Shows SoD information based on the information collected by the Management Report job in graphical overview as well as in detailed reports

Risks Violation (Informer Management View Risk Violation)Provides overview of Risk violation for all SAP application

Management ViewUser Analysis (Informer Management View User Analysis)

Shows SoD violation for a specific user group in a specific system

INFORMER

Management ViewComparisons (Informer Management View Comparisons)

Shows the number of SoD violations per user or role per month or quarter in the interval

INFORMER

Management ViewRule Library (Informer Management View Rule Library)

Shows an overview of the SoD rules for which risks have been identified

INFORMER

Management ViewControl Library (Informer Management View Control Library)

Shows how many Control for mitigation have been set up

INFORMER

Risk Analysis

• A Risk is defined as two or more actions or permissions that, when available to a single user, single role, or profile, create the possibility of error or irregularity.

• The Risk Analysis contains reports that identify Risks• When a risk is found in a report, it can be resolved, or remediated, by either

removing it or by applying a mitigating control.• To identify the risks produced in the Risk Analysis reports, you need to know

the combinations of actions and permissions that represent conflicts in your organization. The combinations are processed in the Rule Architect tab

INFORMER

Risk Analysis• Contains report that can show user, role, or HR object that have access

rights that causes for SoD to be violated• To get a report of all the users in NAD that have SOD issue, click User

Level and search by user group NA00_ALL• Once you get the

Report, you can Mitigate the risks from the report

INFORMER

Risk Analysis− To get a report of all the users in NAD that have SOD issue, click User Level

and search by user group NA00_ALL− Once you get the Report, you can Mitigate the risks from the report− The following report shows a high level risk due to transactions ME22N and

MIGO− To view the roles that have these transactions, click Display Detail Report

button

INFORMER

Risk AnalysisThe summary report shows that ME22N from PO Processor role and MIGO

from GR Processor are causing this SoD

INFORMER

Risk AnalysisTo mitigate this Risk, click the Risk DescriptionOn the Risk Resolution screen, select Mitigate Risk and click continueOn the Risk Mitigation screen, specify the mitigation control and the

Mitigation monitor and then click Save to apply the mitigation

INFORMER

AGENDA

Introduction SAP GRC Access Control RAR Overview Informer tab Mitigation tab Rule Architect tab Configuration tab

MITIGATION Mitigation

• Mitigation tab can be used to respond to SoD violations• Mitigation controls are required when it is not possible to segregate duties

within the business process• The Mitigation tab contains the following key options

• Control Library• Administrators• Business Units• Mitigation Controls• Mitigation Monitors• Mitigated users

Control LibraryProvides an overview of the controls that have been establishedThe upper part of the report shows the number of controls set up

MITIGATION

MITIGATION Administrators

Administrator rights for managing controls must be configured before a mitigation can be applied

An administrator creates mitigation controls and assigns the mitigation monitor and the manager, who can approve the mitigation

You cannot delete an administrator who is assigned to a mitigating control, business unit, or other object.

MITIGATION Business Unit

All the controls in a business unit can be displayed by the business unit manager

MITIGATION Mitigation Control

Mitigation controls must be defined before they can be assigned to Users, Roles, or Profiles, to mitigate a Risk.

To define a mitigation control, Mitigation Control ID, Business Unit and the Management Approver who will approve the mitigation control is required

All risk IDs associated with a control can be mitigated with one control

MITIGATION Creating a mitigation control

To create a mitigating control:Navigate to  Mitigation Mitigating Controls Create .The Create Mitigating Controls screen opens.In the Mitigating Control ID field, enter a unique alphanumeric identification for the

mitigating control ID.In the Short Description field, enter a short description for the mitigating control.In the Business Unit dropdown list, select a business unit. The dropdown list displays all

business units that you previously created with the Business Units screen.In the Management Approver field, select the appropriate approver.. The dropdown list

displays the approvers that are associated with the business unit you entered in the preceding step.

In the Associated Risks tab, choose the plus icon to add a risk ID to the mitigating control.

In the Monitors tab, choose the plus icon to add monitors to the mitigating control. The dropdown list displays the monitors that are associated with the business unit.

AGENDA

Introduction SAP GRC Access Control RAR Overview Informer tab Mitigation tab Rule Architect tab Configuration tab

RULE ARCHITECT Overview

Rule Architect provides a comprehensive combination of FUNCTIONS and associated rules for the SoDs

Rule Architect can be used to define rules according to which SAP GRC Access Control identifies risks for SoD violations

RulesRule are established based on if-then principleIf an employee has authorization to create a vendor master record and initiate

payment of the vendor invoice then this is a high riskRisk

A risk identifies functions that should be separated Function

A function is a combination of activities. In SAP term, it is a collection of t-codesActivities

SAP transaction codes

RULE ARCHITECT

Risk P059

Function PR02Maintain Purchase Order

Function PR04Approve Purchase Order

ME 21+ Auth Object

ME 21N+ Auth Object

ME 22+ Auth Object

ME 22N+ Auth Object

ME 28+ Auth Object

ME 2N+ Auth Object

T-Code n+ Auth Object

T-Code n+ Auth Object

Risk Rule P059001

Risk Rule P059002

Risk Rule P05900n

RULE ARCHITECT Risk Rule

RULE ARCHITECT Business Processes

In Risk Analysis and Remediation, business processes are attributes that you can use to categorize rules, functions, and risks

When the default rules are installed, the installation process automatically creates a default set of business processes

Business processes can be used to differentiate collections of objects. When a new risk is defined, a business process attribute for the risk is specified. This attribute creates an association between this risk and all other risks that share the same business process attribute

RULE ARCHITECT Risk Management

A risk identifies functions that should be separated Risk Type

Segregation of Duties (SoD) riskA combination of two or more actions or permissions that, when assigned to a single

employee, create a vulnerabilityCritical Action risk

Certain actions are risky. Any employee who has permission to perform one of these actions automatically poses a risk. Defining a critical action risk ensures that any employee assigned this action is identified by the risk analysis process. You can define a critical action to include both the action and the corresponding permissions that allow the user to perform the critical action

This risk can have only one function.Critical Permission risk

Defining a critical permission risk ensures that risk analysis identifies any employee who has been assigned a potentially risky permission. You can use this feature if the permission has been enabled but has no actions.

This risk can have only one function

AGENDA

Introduction SAP GRC Access Control RAR Overview Informer tab Mitigation tab Rule Architect tab Configuration tab

CONFIGURATION Configuration Overview

Configuration is required: After a new installation of Risk Analysis and Remediation After an upgrade of Risk Analysis and RemediationTo conduct routine administrative tasks

Configuration can be used to:Specify default settings for users who perform risk analysis with the

Informer tab Tune the system to optimize your usage and network environmentsDetermine how data is used in Risk Analysis and Remediation reportsAccess the functions of the Configuration tab through its navigation menu.

36

• Options available under Risk Analysis on the Configuration tab

Default Report TypeDefault Rule SetExclude Mitigated Risks

Default Risk LevelExclude Locked Users

Default User TypeExclude Expired Users

Batch Size for UserSynchronizationRFC Time-out for Web Services / Threads

Number of Web Services Worker ThreadsConsider Organizational Rules

Number of Background Job Worker ThreadsConvert Users, Roles and Profiles to Upper Case

Ignore Critical Roles and ProfilesEnable Offline Risk Analysis

Show Composite Role in UserAnalysis

Use SoD Supplementary Table for Analysis

Risk Maintenance Mitigation Control Maintenance

Mitigation

Default Values:

Performance Tuning:

Additional Config Options:

Mitigating Controls:

CONFIGURATION

CONFIGURATION Default Values

Default Report TypeDefault Risk LevelDefault User TypeExclude Locked UsersExclude Expired Users

Connectors for Risk Analysis and RemediationEach client requires a separate JCo connection to be connected to RAR

Logical Systems A logical system is two or more physical systems grouped together to

allow you to maintain rules against one system grouping instead of each physical system. Logical systems reduce the time and system resources required to maintain rule sets by avoiding identical rule sets for multiple systems

CONFIGURATION Background Jobs

Background Jobs can be used to schedule synchronization with back-end systems, batch risk analyses, generation of management reports, and generation of alerts

User/Role/Profile Synchronization This background job pulls the users data (user ids and user names), role and profile data

(technical role/profile names) from the selected backend systems and stores them Batch Risk Analysis

This job performs SOD risk analysis on the users/roles/profiles stored with the system. During the execution of batch risk analysis for users, the application selects one user from the database, fetches the actions/authorizations of the user from the backend system and performs risk analysis using the rules stored in Access Control. The resulting SOD violations are stored. Access Control then selects the next user and performs the steps above for the new user. The batch risk analysis job for roles and profiles also follow similar steps

Management Report This job uses the results of batch risk analysis job to abstract the high level data to be

presented in graphical formats in the informer tab