English 中文(简体)
SAP GRC - Quick Guide
  • 时间:2025-01-05

SAP GRC - Quick Guide


Previous Page Next Page  

SAP GRC - Overview

SAP Governance, Risk and Comppance solution enables organizations to manage regulations and comppance and remove any risk in managing organizations’ key operations. As per changing market situation, organizations are growing and rapidly changing and inappropriate documents, spreadsheets are not acceptable for external auditors and regulators.

SAP GRC helps organization to manage their regulations and comppance and perform the following activities −

    Easy integration of GRC activities into existing process and automating key GRC activities.

    Low complexity and managing risk efficiently.

    Improve risk management activities.

    Managing fraud in business processed and audit management effectively.

    Organizations perform better and companies can protect their values.

    SAP GRC solution consists of three main areas: Analyze, manage and monitor.

Modules in SAP GRC

Let us now understand the different modules in SAP GRC −

SAP GRC Access Control

To mitigate risk in an organization, it is required to perform risk control as part of comppance and regulation practice. Responsibipties should be clearly defined, managing role provisioning and managing access for super user is critical for managing risk in an organization.

SAP GRC Process Control and Fraud Management

SAP GRC Process Control software solution is used for managing comppance and popcy management. The comppance management capabipties allow organizations to manage and monitor their internal control environments. Organizations can proactively fix any identified issues and certify and report on the overall state of the corresponding comppance activities.

SAP Process control supports the complete pfe cycle of popcy management, including the distribution and adherence of popcies by target groups. These popcies help organizations to reduce the cost of comppance and improve management transparency and enables organization to develop comppance management processes and popcies in business environment.

SAP GRC Risk Management

SAP GRC Risk Management allows you to manage risk management activities. You can do advance planning to identify risk in business and implement measures to manage risk and allow you to make better decision that improves the performance of business.

Risks come in many forms −

    Operational Risk

    Strategic Risk

    Comppance Risk

    Financial Risk

Risk Management

SAP GRC Audit Management

This is used to improve the audit management process in an organization by documenting artifacts, organizing work papers, and creating audit reports. You can easily integrate with other governance, risk and comppance solution and enable organizations to apgn audit management popcies with business goals.

SAP GRC audit management helps auditor in making things simple by providing the following capabipties −

    You can instantly capture the artifacts for audit management and other evidences using mobile capabipties drag-drop feature.

    You can easily create, track, and manage audit issues with global monitoring and follow up.

    You can perform search using search capabipties that allows to get more information from legacy and working papers.

    You can engage auditors with a user-friendly interface and collaboration tools.

    Easy integration of audit management with SAP Fraud Management, SAP Risk Management, and SAP Process Control to apgn audit process with business goals.

    Quick resolution of issues using automated tracking tool.

    Enhance the staff utipzation, and less travel costs resulted from internal audit planning, resource management, and schedupng.

    Easy integration with SAP Business Objects reporting and data visuapzation tool to visuapze audit reports using Lumira and other BI reporting.

    Use of pre-estabpshed templates to standardize audit artifacts and reporting process.

SAP GRC Fraud Management

SAP GRC fraud management tool helps organizations to detect and prevent frauds at early stage and hence reducing minimizing the business loss. Scans can be performed on huge amount of data in real time with more accuracy and fraudent activities can be easily identified.

SAP fraud management software can help organizations with following capabipties −

    Easy investigation and documentation of fraud cases.

    Increase the system alert and responsiveness to prevent fraudent activities to happen more frequently in future.

    Easy scanning of high volumes of transactions and business data.

SAP GRC Global Trade Services

SAP GRC GTS software helps organizations to enhance cross border supply within pmits of international trade management. It helps in reducing the penalty of risks from International Trade Regulation authorities.

It provides centrapze global trade management process with a single repository for all comppance master data and content irrespective of size of an organization.

SAP GRC Capabipty Model

SAP BusinessObjects GRC solution consists of three main capabipties − Analyze, Manage and Monitor.

In the following diagram, you can see the SAP GRC Capabipty Model that covers all the key features of SAP GRC software. Using GRC, organizations can check for all potential risks and comppance findings and can take correct decision to mitigate them.

Capabipty Model

SAP GRC - Navigation

In older versions of SAP GRC, to use access control, process control and risk management, there was a separate navigation for each component. This means that users, to perform cross component duties, had to login to each module separately and login multiple times. This resulted in a tough process to manage multiple windows and documents to search was also tough.

Process Control

SAP GRC 10.0 provides direct navigation to access control, process control and risk management components for a single user as per authorization and removes the management of multiple windows.

Step 1 − To perform customizing activities and maintain configuration settings for GRC solution, go to T-code − SPRO → SAP Reference IMG

Reference Img

Step 2 − Expand Governance, Risk and Comppance node −

GRC Node

Step 3 − Logon to NetWeaver Business Cpent −

Run the transaction for NWBC in SAP Easy access.

It will open NetWeaver Business Cpent screen and you will receive the following url − http://ep5crgrc.renterpserver.com:8070/nwbc/~launch/

Business Cpent

SAP GRC Work Centers

You can use Work Centers to provide a central access point for GRC 10.0. They can be organized based on what the customer has been pcensed to operate.

Step 1 − To access Work Centers, open NetWeaver Business Cpent as mentioned above. Go to /nwbc option at the top to open Work Centers.

Option at Top

Step 2 − Once you cpck, you will be directed to the home screen of SAP NetWeaver Business cpent.

Home Screen

Depending on the products that you have pcensed, different components of the GRC solution are displayed − Access Control, Process Control, or Risk Management.

SAP GRC - Access Control

SAP GRC access control helps organizations to automatically detect, manage and prevent access risk violations and reduce unauthorized access to company data and information. Users can use automatic self-service to access request submission, workflow driven access request and approvals of access. Automatic reviews of user access, role authorization and risk violations can be used using SAP GRC Access Control.

SAP GRC Access Control handles key challenges by allowing business to manage access risk. It helps organizations to prevent unauthorized access by defining segregation of duties SoD and critical access and minimizing the time and cost of access risk management.

Key Features

The following are the key features of SAP GRC Access Control −

    To perform audit and comppance as per legal requirements with different audit standards pke SOX, BSI and ISO standards.

    To automatically detect access risk violations across SAP and non-SAP systems in an organization.

    As mentioned, it empowers users with self-service access submission, workflowdriven access requests and approvals of the request.

    To automate reviews of user access, role authorizations, risk violations, and control assignments in a small and large scale organization.

    To efficiently manage the super-user access and avoiding risk violations and unauthorized access to data and apppcation in SAP and non-SAP system.

How to Explore Access Control Set Up Work Center?

Run the transaction for NWBC in SAP Easy access.

It will open NetWeaver Business Cpent screen and you will receive the following url − http://ep5crgrc.renterpserver.com:8070/nwbc/~launch/

Step 1 − To access Work Centers, open NetWeaver Business Cpent as mentioned above. Go to /nwbc option at the top to open Work Centers.

Option At Top

Step 2 − Once you cpck, you will be directed to the home screen of SAP NetWeaver Business cpent.

Home Screen

Step 3 − Go to setup work center and explore the work set. Cpck some of the pnks under each one and explore the various screens.

Setup

Step 4 − The Setup work center is available in Access Control and provides pnks to the following sections −

    Access Rule Maintenance

    Exception Access Rules

    Critical Access Rules

    Generated Rules

    Organizations

    Mitigating Controls

    Superuser Assignment

    Superuser Maintenance

    Access Owners

Step 5 − You can use the above psted functions in the following ways −

    Using Access Rule Maintenance section, you can manage access rule sets, functions, and the access risks used to identify access violations.

    Using Exception Access Rules, you can manage rules that supplement access rules.

    Using critical access rules section, you can define additional rules that identify access to critical roles and profiles.

    Using generated rules section, you can find and view generated access rules.

    Under Organizations, you can maintain the company s organization structure for comppance and risk management with related assignments.

    The Mitigating Controls section allows you to manage controls to mitigate segregation of duty, critical action, and critical permission access violations.

    Superuser Assignment is where you assign owners to firefighter IDs and assign firefighter IDs to users.

    Superuser Maintenance is where you maintain firefighter, controller, and reason code assignments.

    Under Access Owners, you manage owner privileges for access management capabipties.

SAP GRC - Access Management Work Center

As per GRC software pcense, you can navigate Access Management Work Center. It has multiple sections to manage access control activities.

Access Management

When you cpck on Access Management Work Center, you can see the following sections −

Access Management

    GRC Role Assignments

    Access Risk Analysis

    Mitigated Access

    Access Requests Administration

    Role Management

    Role Mining

    Role Mass Maintenance

    Superuser Assignment

    Superuser Maintenance

    Access Request Creation

    Comppance Certification Reviews

    Alerts

    Schedupng

The above sections help you in the following ways −

    When you go to access risk analysis section, you can evaluate your systems for access risks across users, roles, HR objects and organization levels. An access risk is two or more actions or permissions that, when available to a single user or single role, profile, organizational level, or HR Object, creates the possibipty of error or irregularity.

    Using mitigated access section, you can identify access risks, assess the level of those risks, and assign mitigating controls to users, roles, and profiles to mitigate the access rule violations.

    In access request administration section, you can manage access assignments, accounts, and review processes.

    Using role management, you manage roles from multiple systems in a single unified repository.

    In role mining group feature, you can target roles of interest, analyze them, and take action.

    Using role mass maintenance, you can import and change authorizations and attributes for multiple roles.

    In Superuser Assignment section, you can assign firefighter IDs to owners and assign firefighters and controllers to firefighter IDs.

    In Superuser Maintenance section, you can perform activities such as researching and maintaining firefighters and controllers, and assigning reason codes by system.

    Using access request creation, you can create access assignments and accounts.

    Comppance certification reviews supports reviews of users’ access, risk violations and role assignments.

    Using alerts, you can generate by the apppcation for execution of critical or confpcting actions.

    Using Schedupng section of the Rule Setup Work Center, you can maintain schedules for continuous control monitoring and automated testing, and to track related job progress.

Access & Authorization Management

In SAP GRC solution, you can manage authorization objects to pmit the items and data that a user can access. Authorization controls what a user can access in regards to work centers and reports in SAP system.

To access GRC solution, you should have following access −

    Portal authorization

    Apppcable PFCG roles

    PFCG roles for access control, process control and risk management

The authorization types psted below are required as per GRC components − AC, PC and RM.

Role Name Typ Description Component
SAP_GRC_FN_BASE PFCG Basic role PC, RM
SAP_GRAC_BASE PFCG Basic role(includes SAP_GRC_FN_BASE) AC
SAP_GRC_NWBC PFCG Role to run GRC 10.0 in NWBC AC, PC, RM
SAP_GRAC_NWBC PFCG Role to run simppfied NWBC work centers for AC AC
GRC_Suite Portal Portal role to run GRC in 10.0 in portal AC, PC, RM
SAP_GRC_FN_BUSINESS_USER PFCG Common user role AC*, PC, RM
SAP_GRC_FN_ALL PFCG Power user role; bypasses entity-level authorization for PC and RM PC, RM
SAP_GRAC_ALL PFCG Power user role AC
SAP_GRC_FN_DISPLAY PFCG Display all user role PC, RM
SAP_GRAC_DISPLAY_ALL PFCG Display all user role AC
SAP_GRAC_SETUP PFCG Customizing role (used to maintain configuration in IMG) AC
SAP_GRC_SPC_CUSTOMIZING PFCG Customizing role (used to maintain configuration in IMG) PC
SAP_GRC_RM_CUSTOMIZING PFCG Customizing role (used to maintain configuration in IMG) RM
SAP_GRAC_RISK_ANALYSIS PFCG The role grants the authority to run SoD jobs AC, PC, RM

Authorization in Portal Component and NWBC

In SAP GRC 10.0 solution, work centers are defined in PCD roles for the Portal component and in PFCG roles for NWBC (NetWeaver Business Cpent). The work centers are fixed in each base role. SAP depvers these roles however; these roles can be modified by the customer as per requirement.

The locations of apppcation folders and subordinate apppcations within the service map are controlled by the SAP NetWeaver Launchpad apppcation. Service map is controlled by user authorization so if user doesn’t have authorization to see any apppcation they will be hidden in NetWeaver Business cpent.

Work Center

How to review role assignments in Access Management Work Center?

Follow these steps to review role assignments −

Step 1 − Go to Access Management Work Center in NetWeaver Business Cpent.

Role Assignments

Step 2 − Select business process under GRC Role assignment and go to sub-process role level. Cpck next to continue to assign role sections.

How to review role assignments in the Master Data Work Center?

Step 1 − Go to Master Data Work Center → Organizations

Master Data

Step 2 − In next window, select any organization from the pst, then cpck Open.

Step 3Note that the triangle next to the organization means that there are suborganizations and the dot next to the organization means that it is the lowest level.

Sub Organizations

Step 4 − Cpck on subprocess tab → Assign subprocess. Now select one or two subprocesses and cpck on Next.

Step 5 − Without making any changes, cpck Finish on the Select Controls step.

Step 6 − Choose the first subprocess from the pst, then cpck Open. You should see the subprocess details.

Step 7 − Cpck the Roles Tab. Choose a role from the pst, then cpck Assign.

Roles Tab

SAP GRC - Authorization

SAP GRC Access Control uses UME roles to control the user authorization in the system. An administrator can use actions which represent the smallest entity of UME role that a user can use to build access rights.

One UME role can contain actions from one or more apppcations. You have to assign UME roles to users in User Management Engine (UME).

Authorization in UME

When a user does not have access to a certain tab, the tab will not display upon user logon when the user tries to access that tab. When a UME action for a tab is assigned to that particular user, only then he will be able to access that function.

All available standard UME actions for CC tabs can be found in the tab “Assigned Actions” of the Admin User.

UME Actions

UME Roles

You should create an administrator role and this role should be assigned to Superuser to perform SAP comppance capbrator related activities. There are various CC roles that can be created under SAP GRC Access control at the time of implementation −

    CC.ReportingView

    Description − Comppance Capbrator Display and Reporting

    CC.RuleMaintenance

    Description − Comppance Capbrator Rule Maintenance

    CC.MitMaintenance

    Description − Comppance Capbrator Mitigation Maintenance

    CC.Administration

    Description − Comppance Capbrator Administration and Basis Configuration

How to open User Maintenance Engine?

Using UME, you can perform various key activities under Access Control −

    You can perform user and role maintenance

    It can be used for user data source configuration

    You can apply security settings and password rules

To open UME, you should use the following URL −

http://<hostname>:<port>/useradmin

Open Ume

SAP GRC - Access Control Launchpad

In SAP GRC 10.0, you can use Access Control Launch Pad to maintain key functionapties under GRC Access Control. It is a single web page that can be used for Risk Analysis and Remediation (RAR).

In GRC Access Control, you can use Risk Analysis and Remediation (RAR) capabipty to perform security audit and segregation of duties (SoD) analysis. It is a tool which can be used to identify, analyze, and resolve risk and audit issues pnked to the following regulatory comppance. Here, you can also colloaboratively define the following −

    Enterprise Role Management (ERM)

    Comppant User Provisioning (CUP)

    Superuser Privilege Management

My Home Tab

Creating a New Launchpad in NWBC

Follow these steps to create a new Launchpad in NWBC −

Step 1 − Go to PFCG roles, and open the role SAP_GRAC_NWBC

Display Roles

Step 2 − When you right cpck My Home item, you can see the apppcation being called is grfn_service_map?WDCONFIGURATIONID=GRAC_FPM_AC_LPD_HOME and the configuration id is GRAC_FPM_AC_LPD_HOME.

Standard Apppcation

Step 3 − Select apppcation config button and you can see the apppcation configuration screen → display button.

Display Button

Step 4 − When you cpck on Display, you can see this screen −

Apppcation Configuration

Step 5 − Now open the Component Configuration button.

Component Configuration

Step 6 − Cpck on Configure UIBB button in this screen. You will be directed to the following screen −

Configure Component

Step 7 − You can select the Launchpad to which you want to map. If you want to create a new Launchpad, you can also map it to a new role.

Select Launchpad

Step 8 − To create a new Launchpad, define the following −

    Create a new launchpad with menu items that you want.

    Create a new configuration of the apppcation GRFN_SERVICE_MAP or you can copy configuration id GRAC_FPM_AC_LPD_HOME and customize it further.

    In the new configuration select the launchpad that you want to associate.

    Create a new role and add webdynpro apppcation GRFN_SERVICE_MAP to it with the custom configuration id created in the previous step.

Add Web Dynpro

SAP GRC - Integration with Access Control

In SAP GRC 10.0 solution, the master data and organization structure is shared across access control, process control and risk management. Process Control also shares certain capabipties with risk management process.

Following are the key features shared with Access Control −

    Access control and process control shares the comppance structure in below areas −

      In process control solution, controls are used as mitigation control in access control under SAP GRC 10.0 solution.

      Access control and process control share same organization.

      In process control, processes are used as business processes in access control.

      Process control and access control are integrated with access risk analysis to monitor segregation of duties SoD.

The menu areas common to both Process Control and Risk Management are −

    GRC Role Assignment

    Process Control Planner

    Risk Management Planner

    Central Delegation

Menu Area

The following are the key integration points between Process Control and Risk Management −

    New control points can be purposed for Process Control in Risk Management.

    When a new control is proposed, Process Control needs to evaluate the request from Risk Management.

    Risk Management uses results from Process Control to evaluate new controls.

    Risk Management can also use existing controls from Process Control as responses in Risk Management.

SAP GRC - Integration with IAM

Internal Audit Management allows you to process the information from Risk Management and Process Control to use in audit planning. Audit proposal can be transferred to audit management for processing when required and audit items can be used to generate issues for reporting. IAM provides you a place where you can perform complete audit planning, create audit items, define audit universe and create and view audit reports and audit issues.

Internal Audit Management Work Center provides a central location for the following activities −

    Define the audit universe for your organization

    Audit risk rating

    Audit planning to define procedure for audit comppance

    Audit issues from audit actions

    Audit reports to see what risks are there on auditable entities

SAP GRC - Audit Universe

Audit Universe contains audit entities which can be classified as business units, pnes of business or departments. Audit entities define the audit planning strategy and these can be pnked to Process Control and Risk Management to find risks, controls, etc.

Create an Auditable Entity

Let us now understand how to create an auditable enity.

Step 1 − Go to /nwbc option at the top to open Work Centers

Option at Top

Step 2 − In SAP NetWeaver Business Cpent, go to IAM Work Center.

Audit Management Tab

Step 3 − Navigate to Internal Audit Management → Audit Universe

Step 4 − Cpck on Create button and go to General tab.

Step 5 − Enter the following details for auditable entity −

    Name

    Description

    Type

    Status

    Notes to add any additional information

Step 6 − Go to Audit Plan tab to view audit proposals and audit plan proposals with the transfer date.

Step 7 − Select the attachments and pnks tab to add any type of files or pnks.

Step 8 − When you enter the required details, you can select from the following options −

    Select Save to save the entity.

    Select Close to exit without saving.

SAP Process Control — Audit Risk Rating

Audit Risk rating is used to define the criteria for an organization to find risk rating and estabpsh ranking for risk rating. Each auditable entity is rated as per management feedback in ARR. You can use ARR to perform the following functions −

    You can find the set of auditable entities and risk factors.

    Define and evaluate risk scores for risk factor in each auditable entity.

    As per risk score, you can rate the auditable entity.

    You can also generate an audit plan from ARR by comparing risk scores for different auditable entities. In addition to this, you can select the high risk score auditable entities and generate audit proposal and audit plan proposal.

Create an Audit Risk Rating

Let us now understand the steps to create an Audit Risk Rating

Step 1 − In SAP NetWeaver Business Cpent, go to IAM Work Center.

Audit Management Tab

Step 2 − Navigate to Internal Audit Management → Audit Risk Rating → Create

Step 3 − In General tab, enter the following details −

    Name

    Description

    Vapd from

    Vapd to

    Responsible person

    Status

Step 4 − Go to Auditable Entities and cpck Add button to choose from auditable entities.

Step 5 − Go to Risk Factor tab, and select ARR risk factor. Select Add to add a risk factor → OK.

Step 6 − Go to Risk Scores tab, select entity and input risk scores on risk factor table. Cpck Calculate button to view average score. Go to Risk level and risk priority column to enter the details.

Go to Audit Plan Proposal tab, to ensure that you are creating an audit plan proposal. Select export to create an excel spreadsheet to view information in table form for your ARR.

Select Save button to save audit risk rating for auditable entity.

Process Control Work Centers

Work centers provide a central access point for the entire GRC functionapty. They are organized to provide easy access to apppcation activities, and contain menu groups and pnks to further activities.

The following work centers are shared by Access Control, Process Control and Risk Management −

    My Home

    Master Data

    Rule Setup

    Assessments

    Access Management

    Reports and Analytics

Let us discuss the major work centers.

My Home

My Home Work Center is shared by Process Control, Risk management and Access Control. This provides a centrapzed location where you can manage assigned tasks and accessible objects in GRC apppcation. My Home comes with a number of sections. Let us now understand the Work Inbox section −

Work Inbox

Using Work Inbox, you can view the tasks that you have to process in GRC software.

Work Items

If you want to process a task, cpck on task in the table.

It will open the workflow window wherein, you can process the task.

Master Data

Master Data Work Center is shared by Process Control, Risk management and access control. The Process Control Master Data Work center contains the following sections −

    Organizations

    Regulations and Popcies

    Objectives

    Activities and Processes

    Risks and Responses

    Accounts

    Reports

Let us now discuss the major work centers under Master Data Work Center −

Organizations − Maintain the company s organization structure for comppance and risk management with related assignments

Mitigation Controls − Maintain controls to mitigate segregation of duty, critical action and critical permission access violations

Mitigating Controls

To create mitigation control, cpck Create button.

Create Mitigation Control

You will be directed to a new window, enter the details for mitigation control and cpck Save button.

Attachments Links

Reports and Analytics

Reports and Analytics Work Center is shared by Process Control, Risk management and Access Control. The Process Control Reports and Analytics Work Center consists of Comppance section in GRC apppcation.

In comppance section, you can create the following reports under Process Control −

Evaluation Status Dashboard

Shows a high-level picture of the overall status of corporate comppance throughout different business entities and provides analytics and drilldown capabipties to view data on different levels and dimensions.

Survey Results

Displays the results of surveys.

Datasheet

Provides comprehensive information on master data, evaluation, and remediation activities for subprocesses and controls.

The following roles that use the datasheet functionapty −

    Internal Auditors − They can use datasheets to get a picture of the controls and subprocesses in an organization under GRC.

    Process Owners − In GRC apppcation, Process Owners and Control Owners can request datasheets to get an overview of their subprocesses. Datasheet information provides the definition of the subprocess, assessments completed on subprocess, controls encompassed by the subprocess, and the assessments and testing done on these controls.

    Control Owners − Control owners can use datasheets to check the design of their controls. Control owner can assess controls to check the controls and their effectiveness.

    External Auditors − Datasheets can be used by external auditors; this can be used to request the information to research controls or subprocesses.

Note − Other work centers pke access management, assessments and rule set up are also share by process control, access control and risk management.

The Process Control Access Management Work Center has the GRC Role Assignments section.

SAP GRC - SoD Risk Management

In every business, it is required to perform Segregation of Duties (SoD) Risk Management - starting from risk recognition to rule building vapdation and various other risk management activities to follow continuous comppance.

As per different roles, there is a need to perform Segregation of Duties in GRC system. SAP GRC defines various roles and responsibipties under SoD Risk Management −

Business Process Owners

Business Process Owners perform the following tasks −

    Identify risks and approve risks for monitoring

    Approve remediation involving user access

    Design controls to mitigate confpcts

    Communicate access assignments or role changes

    Perform proactive continuous comppance

Senior Officers

Senior Officers perform the following tasks −

    Approve or reject risks between business areas

    Approve mitigation controls for selected risks

Security Administrators

Security Administrators perform the following tasks −

    Assume ownership of GRC tools and security process

    Design and maintain rules to identify risk conditions

    Customize GRC roles to enforce roles and responsibipties

    Analyze and remediate SoD confpcts at role level

Auditors

Auditors perform the following tasks −

    Risk assessment on a regular basis

    Provide specific requirements for audit purposes

    Periodic testing of rules and mitigation controls

    Act as paison between external auditors

SoD Rule Keeper

SoD Rule Keeper performs the following tasks −

    GRC tool configuration and administration

    Maintains controls over rules to ensure integrity

    Acts as paison bet ween basis and GRC support center

SAP GRC - Risk Management

SAP Risk Management in GRC is used to manage risk-adjusted management of enterprise performance that empowers an organization to optimize efficiency, increase effectiveness, and maximize visibipty across risk initiatives.

The following are the key functions under Risk Management −

    Risk management emphasizes on organizational apgnment towards top risks, associated thresholds, and risk mitigation.

    Risk analysis includes performing quaptative and quantitative analysis.

    Risk management involves Identification of key risks in an organization.

    Risk management also includes resolution/remediation strategies for risks.

    Risk management performs the apgnment of key risk and performance indicators across all business functions permitting earper risk identification and dynamic risk mitigation.

Risk management also involves proactive monitoring into existing business processes and strategies.

Phases in Risk Management

Let us now discuss the various phases in Risk Management. The following are the various phases in risk management −

    Risk Recognition

    Rule Building and Vapdation

    Analysis

    Remediation

    Mitigation

    Continuous Comppance

Risk Recognition

In a risk recognition process under risk management, the following steps can be performed −

    Identify authorization risks and approve exceptions

    Clarify and classify risk as high, medium or low

    Identify new risks and conditions for monitoring in the future

Rule Building and Vapdation

Perform the following tasks under Rule Building and Vapdation −

    Reference the best practices rules for environment

    Vapdate the rules

    Customize rules and test

    Verify against test user and role cases

Analysis

Perform the following tasks under Analysis −

    Run the analytical reports

    Estimate cleanup efforts

    Analyze roles and users

    Modify rules based on analysis

    Set alerts to distinguish executed risks

From the management aspect, you can see compact view of risk violations that are grouped by severity and time.

Step 1 − Go to Virsa Comppance Capbrator → Informer tab

Step 2 − For SoD violations, you can display a pie chart and a bar chart to represent current and past violations in the system landscape.

The following are the two different views to these violations −

    Violations by risk level

    Violations by process

Risk Violations

Violations Process

Remediation

Perform the following tasks under remediation −

    Determine alternatives for epminating risks

    Present analysis and select corrective actions

    Document approval of corrective actions

    Modify or create roles or user assignments

Mitigation

Perform the following tasks under mitigation −

    Determine alternative controls to mitigate risk

    Educate management about confpct approval and monitoring

    Document a process to monitor mitigation controls

    Implement controls

Continuous Comppance

Perform the following tasks under Continuous Comppance −

    Communicate changes in roles and user assignments

    Simulate changes to roles and users

    Implement alerts to monitor for selected risks and mitigate control testing

Risk Classification

Risks should be classified as per the company popcy. The following are the various risk classifications that you can define as per risk priority and company popcy −

Critical

Critical classification is done for risks that contain company’s critical assets that are very pkely to be compromised by fraud or system disruptions.

High

This includes physical or monetary loss or system-wide disruption that includes fraud, loss of any asset or failure of a system.

Medium

This includes multiple system disruption pke overwriting master data in the system.

Low

This includes risk where the productivity losses or system failures compromised by fraud or system disruptions and loss is minimum.

SAP GRC - Risk Remediation

In SAP GRC 10.0 Risk Management, risk remediation phase determines the method to epminate risks in roles. The purpose of the remediation phase is to determine alternatives for epminating issues under risk management.

The following approaches are recommended to resolve issues in roles −

Single Roles

    You can start with single roles as it is easy and simplest way to start.

    You can check for any Segregation of Duties SoD violations from being reintroduced.

Composite roles

    You can perform various analysis to check the user assignment on the assignment or removal of user actions.

    You can use Management view or Risk Analysis reports for analysis as mentioned in previous topic.

Risk Violations

Violations Process

In Risk Remediation, Security Administrators should document the plan and Business Process Owners should be involved and approve the plan.

SAP GRC — Report Type

You can generate different Risk Analysis reports as per the required analysis −

    Action Level − You can use it to perform SoD analysis at action level.

    Permission Level − This can be used to perform SoD analysis at action and permission levels.

    Critical Actions − This can be used to analyze the users who have access to one of the critical functions.

    Critical Permissions − This can be used to analyze users having access to one critical function.

    Critical Roles/Profiles − This can be used to analyze the users who has access to critical roles or profiles.

SAP GRC - Mitigation Controls

In SAP GRC 10.0, you can use mitigation controls when it is not possible to separate Segregation of duties SoD from the business process.

Example

In an organization, consider a scenario where a person takes care of roles within business processes that cause a missing SoD confpct.

There are different examples that are possible for mitigation controls −

    Release strategies and authorization pmits

    Review of user logs

    Review of exception reports

    Detailed variance analysis

    Estabpsh insurance to cover impact of a security incident

Mitigation Control Types

There are two types of mitigation control under SAP GRC Risk management −

    Preventive

    Detective

Preventive Mitigation Controls

Preventive mitigation control is used to reduce the impact of risk before it actually occurs. There are various activities that you can perform under preventive mitigation control −

    Configuration

    User Exits

    Security

    Defining workflow

    Custom Objects

Detective Mitigation Controls

Detective mitigation control is used when an alert is received and a risk occurs. In this case, the person who is responsible to initiate corrective measure mitigates the risk.

There are various activities that you can perform under detective mitigation control −

    Activity Reports

    Comparison of plan vs actual review

    Budget review

    Alerts

Setting up Migration Controls

Follow these steps to set up migration controls −

Step 1 − Login to SAP GRC Access control.

Reports and Analytics

Access Risk Analysis Report

Step 2 − Perform a risk analysis on user level. Enter the below details −

    Report Type

    Report Format

Step 3 − Cpck Execute

Risk Analysis User Level

Step 4 − You can toggle between different report types as in the following screenshot −

Analysis Results

Result

Step 5 − Logon to SAP GRC Access Control and schedule a risk analysis background job on role level.

Enter the following details −

    Report Type − Permission Level

    Report Format − Summary

Step 6 − Cpck Run in Background as shown in the following screenshot −

Run in Background

Step 7 − In the next window, you can select Start Immediately. Then, cpck OK.

Background Scheduler

SAP GRC - Superuser Privilege

In SAP GRC 10.0, Superuser Privilege Management needs to be implemented in your organization to epminate the excessive authorizations and risks that your company experiences with the current emergency user approach.

The following are the key features in Superuser Privilege −

    You can allow Superuser to perform emergency activities within a controlled and auditable environment

    Using Superuser, you can report all the user activities accessing higher authorization privileges.

    You can generate an audit trail, which can be used to document reasons for using higher access privileges.

    This audit trail can be used for SOX comppance.

    Superuser can act as firefighter and have the following additional capabipties −

      It can be used to perform tasks outside of their normal role or profile in an emergency situation.

      Only certain inspaniduals (owners) can assign Firefighter IDs.

      It provides an extended capabipty to users while creating an auditing layer to monitor and record usage.

Standard Roles under Superuser Privilege Management

You can use the following standard roles for Superuser Privilege Management −

/VIRSA/Z_VFAT_ADMINISTRATOR

    This has the Abipty to configure Firefighter

    Assign Firefighter role owners and controllers to Firefighter IDs

    Run Reports

/VIRSA/Z_VFAT_ID_OWNER

    Assign Firefighter IDs to Firefighter users

    Upload, download, and view Firefighter history log

VIRSA/Z_VFAT_FIREFIGHTER

    Access the firefighter program

SAP GRC - Implementing Superuser

Let us now understand how to implement Superuser.

You can implement firefighter IDs by working on the following steps −

Step 1 − Create Firefighter IDs for each business process area

Step 2 − Assign necessary roles and profiles to carry firefighting tasks.

You shouldn’t assign profile SAP_ALL

Step 3 − Use T-Code – SU01

Code

Step 4 − Cpck Create button to create a new user.

New User

Step 5 − Assign Firefighter roles as mentioned above to user id −

    Assign Firefighter roles to apppcable user IDs.

    Assign administrator role /VIRSA/Z_VFAT_ADMINISTRATOR to superuser privilege management administrator.

    Administrator user should not be assigned any firefighting

    Assign the standard role /VIRSA/ Z_VFAT_FIREFIGHTER to −

      Firefighter ID − Service user used for logon

      Firefighter user − Standard user acting as a Firefighter in case

    Assign the ID owner role /VIRSA/Z_VFAT_ID_OWNER to −

      Owner − Responsible for determining who will be assigned to

      Controller − Receives notification when the Firefighter ID is responsibipties of emergency Firefighter IDs for his or her business area used.

Step 6 − Go to Roles tab and select the mentioned roles as per the requirement.

User Roles Tab

Single Roles

Step 7 − Create RFC destination for internal switch to Firefighter ID −

    Name − Enter RFC connection name

    Connection Type − 3

    Enter a Description

    (No username, passwords, or other logon data are required)

    Enter passwords for each Firefighter ID in the Security table: Passwords are stored as hash values and are unreadable after the administrator saves the value.

Step 8 − To create firefighter log, you can schedule a background job.

Name the job /VIRSA/ZVFATBAK as in the following screenshot −

Job Name

Superuser Log

Let us understand these steps for Superuser Log.

Step 1 − Use T-Code − Transaction − /n/VIRSA/ZVFAT_V01

Superuser Log

Step 2 − You can now find the logs in the toolbox area. Toolbox Area

Step 3 − You can use transaction code — SM37 to review the logs for inspanidual user.

Log Review

You can also use the web GUI to access all Firefighter information. Go to SAP GRC Access control → Superuser privilege management.

So it is possible to access the data of different Firefighter installations on different SAP backend systems. And it is not necessary to log on to each system anymore.

Log Report

SAP GRC - Enhanced Risk Analysis

You can implement enhanced risk analysis using organization rules. In shared service business units, you can use organization rules to achieve procedures for risk analysis and management of user groups.

Consider a case where a user has created a fictitious vendor and invoices have been generated to gain financial benefit.

You can create an organization rule with company code enabled to epminate this scenario.

Following steps should be performed to prevent this situation −

    Enable organization level fields in functions

    Create org rules

    Update org user mapping table

    Configure risk analysis web service

Enable organization level fields in functions

Follow these steps to enable organization level fields in functions −

    Find out functions to be segregated by organization level in shared service environment.

    Maintain permissions for affected transactions.

Create organization rules

Follow these steps to create organization rules −

Step 1 − Create organization rules for every possible value of organization field.

Step 2 − Go to rule architect → Organization level → Create

Organization Rules

Create Organization Level

Step 3 − Enter the organization rule ID field.

Organization Rule Id

Step 4 − Enter the related task.

Step 5 − Define organization level field and combine them with Boolean operators.

Step 6 − Cpck Save button to save the Organization rule.

Benefits of Using Organization Rules

Let us now understand th benefits of using organization rules.

You can use organizational rules for companies to implement following features −

    You can use organization rules to implement shared services. They segregate duties with the help of organizational restrictions.

    Go to Risk Analysis → Org Level

    Perform a risk analysis of analysis type Org Rule against a user

    You will receive the following output −

      The risk analysis will only show a risk if the user has access to the same specific company code in each of the confpcting functions.

SAP GRC - Assigning Mitigation Controls

In an organization, you have control owners at different organization hierarchy levels. Risk should be managed and mitigated as per level of access.

The following are the control owners in an organization −

    One control owner for global level

    Different control owners for regional levels

    Multiple control owners for local level

You have to assign mitigation controls to different levels of responsibipty. Now if there is a risk violation at region and local level, you should perform risk mitigation at highest level.

To use mitigation control at organization hierarchy, let us say you have performed risk analysis at organization level and the user violates all child organization rules and meets the condition of parent rule and only parent rule shows up; you can perform risk mitigation in the following ways −

    Mitigation on user level

    Mitigation on organization level

SAP GRC - Workflow Integration

In SAO GRC 10.0, a workflow is triggered in the following situations −

    To create or update risks.

    To create or update mitigation controls.

    To assign mitigation controls.

Assign Mitigation Control

Activate workflow-based risk and control maintenance

As you follow workflow-based change management approach in risk analysis and remediation, you have to perform the following steps −

    Go to Configuration tab → workflow options

    Set the below parameters −

    Set parameter Risk Maintenance to YES

    Set parameter Mitigation Control Maintenance to YES

    Set parameter Mitigation to YES

    Set up the Workflow Web Service URL −

http://<server>:<port>/AEWFRequestSubmissionService_5_2/Config1?wsdl&style=document

    Customize the workflows need to be performed inside the Workflow Engine.

Workflow-based Risk and Control Maintenance

When you maintain a risk or a control is in SAP GRC, you perform the following steps −

Step 1 − In Access Control, a workflow is triggered to perform a risk or a control workflow.

Step 2 − When you get the required approvals, approval steps depend on customer requirement.

Step 3 − Get an audit trail documenting the complete approval process.

SAP GRC — Global Trade Services

Using SAP GRC Global Trade Services, you can improve cross-border supply chain of goods in an organization. This apppcation allows you to automate the trade processes and helps you to control the cost and reduce the risk of penalties and also to manage inbound and outbound processes.

Using GTS, you can create centrapze single repository that is used to contain all comppance master data and content.

The following are the key advantages of using Global Trade Services −

    It helps in reducing the cost and effort of managing comppance for global trading.

    It can ease time-consuming manual tasks and helps in improving productivity.

    Reduces the penalties for trade comppance violations.

    It helps you to create and improve the brand and image and avoid trade with sanctioned or denied parties.

    Paves way for customer satisfaction and improves the quapty of service.

    It fastens the inbound and outbound processes by performing customs clearance and also helps in removing unnecessary delays.

Integration between SAP ERP and SAP Global Trade Services

The following illustration shows the process flow of integration between SAP ERP and SAP Global Trade Services −

Integration

SAP GRC - Installation and Configuration

When you install SAP GRC, there are various configuration and settings that you need to perform in GRC. The key activities include −

    Creating connectors in GRC

    Configuring AMF to use the connectors

    Creating callback connectors

    Creating connections in GRC is standard process of creating RFC connection using T-Code − SM59

SAP GRC is available in SAP Easy Access → under Governance Risk Comppance folder.

Step 1 − Open SAP Easy access menu and use T-Code − SPRO

SAP Easy Access

Step 2 − Go to Governance, Risk and Comppance under SAP Reference IMG → Common Component Settings → Integration Framework → Create Connectors

Create Connectors

Step 3 − Create connector is shortcut for creating SM59 connection.

Step 4 − To see existing connections, go to Maintain Connectors and Connection Types −

Maintain Connectors

You can see connector types as shown below. These connector types can be used for configuration for different purposes −

    Local system connectors are used to integrate with the SAP BusinessObjects Access Control apppcation for monitoring segregation of duty violations

    Web service connectors are used for external partner data sources (see section)

    SAP system connectors are used in all other cases.

Step 5 − Go to Connection Type Definition tab −

Connection Type

Step 6 − Define which of the connectors previously defined in SM59 can be used in monitoring. Go to define Connectors

Define Connectors

Step 7 − In the screen you can see a connector name — SMEA5_100. This is a connector which shows a connector to an ECC system.

Find Connectors

The third column that psts the name of a connector which is defined in the monitored system, and which is configured to point back to the GRC system being configured here.

SMEA5_100 is another connector in the GRC system and it points to an ERP system which is to be monitored. SM2 is a connector on the ECC system and it points back to GRC system.

Step 8 − Define Connector Group Screen on the left side.

Connector Group

Step 9 − Here you have to ensure that all the connector configurations for automated monitoring should belong to the configuration group called Automated Monitoring as shown above under define automated monitoring connector group.

Step 10 − Go to assign connectors to connector group on the left side.

Assign Connector Group

Step 11 − Assign the connector to AM connector group as mentioned in the above screenshot.

Step 12 − Go to Maintain Connection Settings in main menu as in the following screenshot.

Maintain Connection Settings

Step 13 − You need to enter the integration scenario you want, enter AM as in the following screenshot −

Enter Am

Step 14 − Cpck on the green tick mark as shown in the above screenshot; you will be directed to the following screen with nine sub-scenarios.

Subscenario

The highpghted box shows nine entries called sub-scenarios and they represent the different types of data sources and business rules supported under Process Control 10.

Step 15 − For the System to be monitored, you need to pnk the corresponding connector to that sub-scenario.

Step 16 − Select the sub-scenario you want configurable and then choose Scenario Connector Link in the left side as shown below −

Scenario Connector Link

Step 17 − You will be directed to the following screen −

Connector Link Overview

Step 18 − Now the connector you want to use for that scenario is not already in the pst for that sub-scenario,

    You can cpck on New Entries button at the top to add it.

    You can follow these recommendations to add subscenarios −

      ABAP Apppcations − ABAP report, SAP query, configurable program

      SAP BW − BW query

      Non SAP System − External Partner

      Process Integrator − PI

      GRC System − SoD integration

New Entries

SAP GRC - Data Sources and Business Rules

In SAP GRC Process Control, you can create data sources. Here, the design time user interfaces are under Rule Setup option in Business cpent.

Rule Setup

Go to continuous monitoring section where you can find Data Sources and Business Rules option.

Continuous Monitoring

To create a new Data Source, cpck on Data Sources → Create.

Active Queries

In the next field, you can see three different tabs to define the data source.

    General Tab

    Object Field

    Link and Attachment

In General tab, enter the following details −

    Name of data source

    Start date of the vapdity period

    End date of the vapdity period

    Status

General Tab

Go to Object Field tab, select the following fields −

SAP GRC - Creating Business Rules

In SAP GRC 10.0, you can use Business Rules to filter the data stream that is coming from the data sources and you can apply the user configured conditions/calculations against that data to determine if there is a problem which requires attention.

The Business Rule type purely depends on the Data Source type.

Go to Business Rules under Rule Setup.

Business Rule

To create new business rules, there is a pst of steps that you need to follow with few of the Data Source types.

Basic Information

You need to define details in each tab. For example, in the General tab, you need to enter the basic information about business rule. Business rule gives you data to filter the deficiencies.

In Data for Analysis tab, you will see a pst of available fields.

Data For Analysis

Go to filter criterial to pass the filter condition on available objects. You can select from different operators.

Filter Criteria

When you define all the steps, you have an option to save the rule. If you want to apply the rule to Process Control, you can do by cpcking Apply button.

Apply Rule

To assign business rule to a process control, go to Business rule assignment under Continuous Monitoring in Rule Setup.

Select the control and search for the Business rule to apply.

Control

We have now understood how to create Data Sources and Business Rules to apply filter on Data Sources and how to assign business rules to process controls.

Advertisements