SAP Analytics GRC 10.0 Access Control 10.0 Strata Fahri Batur

SAP Analytics GRC 10.0
Access Control 10.0
Strata
Fahri Batur
October 2013
SAP GRC 10.0 Clients
Organisation
Scope
GRC Lab - live sandpit & demo system
Live AC v10 RAR proof of concept
AC v10 RAR/SPM migration LIVE
AC v10 ARA, EAM : scoping, planning, design. Live July 2012
PC and AC v10 global transformation project
AC migration from v4 to v10 complete
AC v10 ARA, EAM
AC v10: provide consultancy to support partner
Migrate AC/PC v10 to complete PwC implementation
Europe’s first v10 proof of concept (pre ramp-up), AC/PC/RM
Agenda
Day 1
Who are Integrc
SAP GRC 10.0 - Overview
ARA Functionality – High Level
EAM Functionality – High Level
ARM Functionality – High Level
BRM Functionality – High Level
Questions
Agenda
ARM Creating a request High Level
ARM Processing a request High Level
ARA – Rule set maintenance
Background Synchronisation
Access control – configuration overview
Questions
SAP GRC 10.0 Overview
Governance, Risk & Compliance embraces (GRC) how processes,
controls, security and culture integrate to ensure the organisation has
integrity,
GRC is thus how an organisation manages risk whilst allowing the
organisation to meet its own objectives, yet remaining compliant with
external and internal standards.
SAP GRC 10.0 Overview
Technical Landscape overview
SAP GRC 10.0 Overview
What’s in a name
New Name
New Name
New Name
New Name
SAP GRC 10.0 Overview
SAP GRC 10.0 Overview
Technical Landscape overview
GRC Connects to the target system via an RFC
Internally GRC manages the flow of
data to and from the target system
which means there is only one RFC
connection made between GRC and
the target system
You have to install a GRC 10 plug-in into the target system
This contains the data extraction and integration programmes
These plug ins replace the AC 5.3 RTAs
SAP GRC 10.0 Overview
What’s new in AC 10
Transport
Mechanism
OSS Notes
& Support
Packs
Granular
Security
Common ABAP
Platform
SAP GRC 10.0 Overview
What’s new in AC 10
Standard ABAP core platform
GRC 10 now uses standard SAP ABAP platform
Standard Remote Connection (RFC’s) to SAP ABAP systems
Use of Greenlight connectors are supported for non SAP systems
Single use RFC’s for Access Control
Significantly Improved system response times compared with AC 5.3
Transportable core configuration
Configuration is maintained through SPRO
Configuration is transportable
Netweaver Business Client HTML frontend
NWBC is accessible from SAPGUI or directly via internal web address (URI)
SAP GRC 10.0 Overview
What’s new in AC 10
Integrated common user interface for Risk Management, Process
Control, Access Control
Integrated Master Data source
Access Control & Process Control & Risk Management now use the same
integrated master data
Organisation structures, Business Process and Business sub-Process
Centralised Emergency Access Management (Fire fighter)
Single point of log-in for all systems
Single point for assignment maintenance
single point of reporting
New workflows to enhance the firefighter log review process and provide
evidence of log review having been done
SAP GRC 10.0 Overview
What’s new in AC 10
Easier and quicker mitigation control assignment.
Mitigation can be assigned directly from the risk analysis report
Mitigations can be assigned to multiple users at once
Enhanced reporting tool
Access Risk Analysis, Access Request Management Emergency Access
Management and Business Role Management all benefit from improved reporting
functionality
All reports have multiple criteria for section and filtering
Enhanced drill down capability on graphical reporting for more effective
investigation of violations
Enhanced integration with SAP Identity Management
Agenda
Who are Integrc
SAP GRC 10.0 - Overview
ARA Functionality – High Level
EAM Functionality – High Level
ARM Functionality – High Level
BRM Functionality – High Level
Business Rule Framework (BRF) Plus - Overview
Questions
ARA Functionality – High Level
Access Risk Analysis - Overview
Access Risk Analysis [ARA]:This GRC component allows the
organisation to carry out detailed analysis of the access which the user
community has been assigned
ARA uses a Segregation of duties (SoD) matrix to create a set of rules
against which the analysis can be run. The main driver is to reduce the
ability for fraud to be committed or to go undetected or for a
misrepresentation of financial statements to occur
ARA Functionality – High Level
Access Risk Analysis - Overview
The SoD Matrix is a many to many relationship
In Access Risk Analysis
A ruleset contains a combination of each variation of the risks.
A risk is formed of two or more conflicting functions.
A function contains one or more transaction (or actions) and it’s associated
authorization objects.
A risk can be cross system. IE action in system A is in conflict with access in
system B.
Risk are classed as Critical, High, Medium, Low. These are defined
by the client and a high risk in one client may be a low risk at
another.
A Critical access risk is a transaction (or action) when performed by
itself is deemed to be a risk warranting either remediation or mitigation.
ARA Functionality – High Level
Standard reports ad-hoc risk analysis for Users Or Roles
Select Access Management
folder
Choose what you wish to report
on
Select User Level, Role Level
Several of the fields have
alternative logic that can be
applied
ARA Functionality – High Level
AC 10 vs AC 5.3 – Executive Summary report
The same reports are available
Executive Summary
Management summary
Summary
Detailed level
Reports can be exported to Excel
Reports can be filtered on screen
Reports can be sorted on screen
ARA Functionality – High Level
Ad-hoc reports run in foreground or background
When you execute the report you have a choice to run it in
foreground or background, same as AC 5.3 but in AC10 you can
schedule the same ad-hoc jobs to run periodically as well
ARA Functionality – High Level
Reporting – Management reports from Batch analysis
Select the Reporting and Analytics tab
Select the report to run
The report can be manipulated on screen
You can drill down to get the report data
ARA Functionality – High Level
Multiple Risk rule set
AC 5.3 also supported multiple risk rulesets but they could only be
used in ad-hoc risk analysis
In AC 10 we are able to set a default risk ruleset which can be used
by Risk Terminator or by default Access Request Management
We can schedule background (Batch) risk analysis to use a different
risk ruleset
We can select one or more risk rulesets in the ad-hoc reports
Also in Access Request Management we now have the functionality
to automatically select the risk ruleset to be used based on the
information in the access request
Agenda
Who are Integrc
SAP GRC 10.0 - Overview
ARA Functionality – High Level
EAM Functionality – High Level
ARM Functionality – High Level
BRM Functionality – High Level
Business Rule Framework (BRF) Plus - Overview
Questions
EAM Functionality – High Level
Emergency Access Management overview
Central point
for firefighter
access
Central point
for firefighter
configuration
Assign
criticality to
firefighter
IDs
Document
unplanned
activity
Consolidated
log report
Centralised
Emergency
Access
Sign-off for
log reports
EAM Functionality – High Level
Emergency Access Management overview
Emergency Access Management [EAM]: This GRC component is to provide
exceptional access in addition to the normal access for day to day activities. EAM
grants the user regulated temporary elevated access through the assignment of a
temporary ID called a firefighter ID or Role called a firefighter role.
AC 10 EAM has been enhanced to centrally control, monitor and report on all
firefighting activities in the connected target system(s)
AC 5.3 Super User Management [SPM] access needs to be disabled in the target
system
AC10 does not read the AC 5.3 SPM firefighter logs in the target systems
EAM Functionality – High Level
Emergency Access Management overview
EAM access can be granted by either one of two methods, it is
recommended to only use one method per installation at any one time
Firefighter ID: This is the most commonly used method. The firefighter ID exists in the target
system as a service user with superior access rights and is assigned to the fire fighter in the
central GRC AC 10 system. The fire fighter accesses the GRC AC 10 system and executes
the transaction GRAC_SPM where they will see the EAM cockpit and the firefighter ID’s that
are assigned to them and in which systems they are assigned
Firefighter role: The firefighter roles which are created in the target system are assigned to the
fire fighter in the AC 10 central system. The fire fighter logs-on directly to the target system
using their own ID and password, and is granted the additional access, from the firefighter
roles assigned in the central system
EAM Functionality – High Level
Enhanced monitoring
Emergency Access management has enhanced monitoring, it now
looks at the CDPOS & CDHDR tables and also retrieves data from
STAD, and the system logs SM20, SM21 and SM49
These are also referred to as the Transaction Log, Change Log, System Log,
Audit Log and OS Command Log
Not all change data is logged in CDHDR, table logging should still be
activated
EAM Functionality – High Level
Reason code, Fire Fighter ID’s
Firefighter usage Reason Codes are centrally maintained
Reason Codes can be assigned and used in multiple systems
Reason Codes can be assigned and used in single systems
Firefighter ID’s are centrally maintained
Firefighter ID’s can be assigned and used in multiple systems
Firefighter ID’s can be assigned and used in single systems
Firefighter ID’s and Fire fighter roles are locally created in the target systems
Firefighters only need to log-on to the one central system
Firefighter Controllers and Owners only need to log on to one central
system
EAM Functionality – High Level
Centralised Consolidated Log
The Consolidated Log gives you all the change records and action in
one report
The Consolidated Log is under the Reports and Analytics tab
EAM Functionality – High Level
Centralised Consolidated Log
The Log is updated by a scheduled background task which is
generally scheduled to run hourly, but it can also be run manually
directly from the Consolidated Log screen
The report selection screen is similar to the ARA report screens
You can select different logs from the drop down
EAM Functionality – High Level
Centralised Consolidated Log
Agenda
Who are Integrc
SAP GRC 10.0 - Overview
ARA Functionality – High Level
EAM Functionality – High Level
ARM Functionality – High Level
BRM Functionality – High Level
Business Rule Framework (BRF) Plus - Overview
Questions
ARM Functionality – High Level
Access Request Management - Overview
Access Request Management has changed significantly from 5.3 to
10
ARM uses the standard SAP workflow engine
ARM uses Multi Stage, Multi Path technology (MSMP)
All requests for access use one stream of the MSMP
ARM uses Business Rule Framework (BRF+) technology for decision
making
BRF+ allows you to route requests based on request content, select which of the
risk rulesets to use, who to send the request to (MSMP agent). Can also use SAP
HR changes to trigger requests
ARM uses SAP documents for email templates (text only no pictures)
ARM Functionality – High Level
Access Request Management – Overview
ARM includes new standard workflows for:Firefighter log review workflow for reviewing and confirmation of review of the
firefighters activity
Ruleset maintenance workflow to protect the ruleset, risks and functions from
unauthorised changes and provide an online approval mechanism for these
changes
ARM includes new configurable Request screen EUPs and templates
End User Provisioning (EUP) – configuration allows you to include or remove
fields from the request screen, default field values and set mandatory and non
mandatory fields
The request templates allow you to include default values for a template like a
default system or role
ARM Functionality – High Level
Under the Access Management tab, you can select the access
request options
Access Request Creation, Template based Request, Copy request, Model user
request
ARM Functionality – High Level
Out of the Box Workflows
AC 10.0 comes with the following workflow processes:
Each process comes with it’s own default workflow
Workflows are built and modified using the 7 step process at the top
of the screen
ARM Functionality – High Level
Global process specific settings
For key events in the
workflow process, specific
emails can be generated
and sent to specified
persons
In the event of a request
encountering either of
these conditions, the
request can be routed to a
specific path & stage
ARM Functionality – High Level
Workflow stage settings
Each stage in a
workflow is
individually
configured to allow
for the appropriate
level of functionality.
The order of the
stages is determined
in the workflow path
ARM Functionality – High Level
Notification: Out of the box emails
Every workflow event can trigger an email notification
ARM Functionality – High Level
Notification: Out of the box emails
Emails can be sent to recipients by means of ‘Agent Rules’
ARM Functionality – High Level
Notification: Out of the box emails
The standard emails can be copied and the copies modified to meet
your requirements (SE61)
Agenda
Who are Integrc
SAP GRC 10.0 - Overview
ARA Functionality – High Level
EAM Functionality – High Level
ARM Functionality – High Level
BRM Functionality – High Level
Business Rule Framework (BRF) Plus - Overview
Questions
BRM Functionality High level
Business Role Management Overview
Roles built
& modified
using
PFCG
Composite
CUA roles
compatible*
User level
impact
analysis
simulation
Analysis of
role usage
Business
Role
Management
RA
performed
against
Business
Roles
Business
Role
hierarchies
Role
content
certification
BRM Functionality High level
Business Role Management Overview
Fully integrated with ARA, ARM
Business roles concept adopted –
Business roles – Cross platform role groupings. Business role can include
composite roles, single roles, portal roles, from all systems BI, SRM, ECC etc
Enhanced role methodology –
Stream lines role definition and management
Role owner approvers for assignment and content can be different
people
Enforce role naming conventions
Supports build of Master and Derived roles
Integrates with PFGC, it does not replace it
BRM Functionality High level
Business Roles
BRM Functionality High level
Role Import
Role Import
Role Import has it’s own
step by step process
Role type is set here
Initial Attributes are
configured here
Upload templates
BRM Functionality High level
Roles in BRM
Once Uploaded Roles can be search for.
The search can be exported
Additional search criteria can be added
Role Search
BRM Functionality High level
Role Certification
Allows the role owner to periodically review and certify the content of the role
Certification period is an attribute of each role (optional functionality)
Once the certification period has elapsed, an email is sent to the role owner
It is possible to customise the email template (SE61)
Agenda
Who are Integrc
SAP GRC 10.0 - Overview
ARA Functionality – High Level
EAM Functionality – High Level
ARM Functionality – High Level
BRM Functionality – High Level
Business Rule Framework (BRF) Plus - Overview
Questions
Business Rule Framework Plus
Business Rule Framework Plus
Business Rule Framework Plus
Initiator
Rules
• Determines the path upon
submission of the request
Routing
Rules
• Determines a detour routing
based upon an attribute of a
request (e.g. SoD violation)
Agent Rules
• Determines the recipients of a
stage and notification recipients
Business Rule Framework Plus
Initiator Rules
Routing Rules
Agent Rules
BRF Rules
X
X
X
BRF Flat
Rules
X
X
X
Functional
Modules
X
X
X
ABAP Class
X
X
X
Direct User
Mapping
X
User Group
Mapping
X
Role
Assignment
X
Business Rule Framework Plus
Business Rule Framework Plus
Decision Table – this is where you build your logic
If it’s not green, it won’t work (so highlight and click on ‘Activate’)
Function – this is linked to the Decision Table
If it’s not green, it won’t work (so highlight and click on ‘Activate’)
‘Activate’ Button – after editing the Decision Table, you must ‘Activate’
Decision Table & Function
‘Table Settings’ Button – this is where you select the fields to
populate the Decision Table
Agenda
ARM Creating a request High Level
ARM Processing a request High Level
ARA – Rule set maintenance
Background Synchronisation
Access control – configuration overview
Questions
ARM Functionality – High Level
Creating Requests: Request Types
Requester selects the type of request they wish to create
Each request type can be processed by one or more workflows, e.g.
several workflows to create New Accounts – the attributes of the
individual request will determine which of these workflow processes
the request uses.
ARM Functionality – High Level
Creating a Request:
It is possible to request access for yourself or for someone else or for
multiple people need identical access.
ARM Functionality – High Level
Creating a Request:
It is possible to request access to one or multiple systems
ARM Functionality – High Level
Creating a Request: Role Selection
Roles can also be
restricted by Business
Process
Create a request based
upon another user’s access
Multiple
attributes can
be assigned
to roles and
used for
searching
ARM Functionality – High Level
Creating a Request: Role Selection
You can review existing roles assignments, and you can choose to
remove them in the same request as requesting new ones
Agenda
ARM Creating a request High Level
ARM Processing a request High Level
ARA – Rule set maintenance
Background Synchronisation
Access control – configuration overview
Questions
ARM Processing a request High Level
Approvers Inbox
Once submitted, the request is routed
to the inbox of the first approver
ARM Processing a request High Level
Approvers Inbox
Risk analysis during the approving of the request
Processing a Request: Risk Analysis
Risk Analysis of a
request can be
made mandatory or
optional for specific
approval stages
ARM Processing a request High Level
Approvers Inbox
Audit log
The full audit trail is
available to each
approver within the
request.
It is also available
for review once the
request has
completed
Agenda
ARM Creating a request High Level
ARM Processing a request High Level
ARA – Rule set maintenance
Background Synchronisation
Access control – configuration overview
Questions
ARA – Rule set maintenance
Business Process and Business Sub - Process
This is one of the shared master data areas, it is mainly used by AC
but Process Control (PC) also uses it.
The Configuration is done in the IMG and is transportable
ARA – Rule set maintenance
Rule set-up
Rule set-up and Maintenance is done via the Frontend
Only administrators should have access to this area
ARA – Rule set maintenance
Functions
Click on the “Function” quick link to display the existing Functions
Click the Create button, a new window / tab will open
Click the Open button, a new window / tab will open
ARA – Rule set maintenance
Functions - Action
Enter the Function ID, the Business Process, Analysis Scope and a
Description
Click the Add button to add a transaction
Select the system, the transaction and set the status to active,
(repeat for all transaction) click save
ARA – Rule set maintenance
Functions - Permissions
To change the Permission click on the Permission tab
The default values are derived from table USOBT_C, in this case the
values from the AC 10 system, not the target system
Deactivate or activate them as required by the client
ARA – Rule set maintenance
Risk
Access (or SoD) Risks require two or more Functions
Click ‘Create’, a second window or tab will open
Enter the Risk ID, Risk Type, Business Process, Description, Risk
level, Status, Description and Control Objective
Click ‘Add’ in the Functions tab
ARA – Rule set maintenance
Ruleset – rule generation
Rules can be generated in the backend or in the frontend, They can
also generated in the foreground or the background.
Backend run transaction “GRAC_GENERATE_RULES”
Front end – in the function and risk screens you will find the
“Generate rules” button
ARA – Rule set maintenance
Ruleset – Mass maintenance and upload
The mass maintenance process is identical to AC 5.3, Ruleset is
downloaded, amended and uploaded.
Rules are connector, or logical system dependent
All files are required for the upload.
Files upload can either be an Overwrite – replace or Append – add to.
Rules need to be generated after upload
This task is carried out in the backend of the GRC system
Rulesets can be transported through landscape.,
This requires that the connectors and logical systems are identical through out
landscape
ARA – Rule set maintenance
Ruleset – Mass maintenance and upload
Always do a download of the ruleset first run transaction
GRAC_DOWNLOAD_RULES
Risk rules are allocated against a physical system or against a
Logical system group. Download all rules for all Logical groups and
physical systems.
Save the files by ruleset
ARA – Rule set maintenance
Ruleset – Mass maintenance and upload
The files can be manipulated in notepad, but it’s more common to
change them in MS Excel
The format for the saving of the file is very important, they should be
Text (Tab delimited) and saved with *.TXT extension
If the files are not in the correct format, then the data will not load or
you will get errors so
Do not add any extra columns
Do not add column headings
Do not add filters
ARA – Rule set maintenance
Ruleset – Mass maintenance and upload
Before you upload the new ruleset you need to carry out a few
prerequisites to comply with internal audit requirements and change
control.
Full role risk analysis against the affected “Logical systems”
Full user risk analysis against the affected “Logical systems”
Specific risk analysis to identify the reason for your change,
New risk, Change to the Action or Permission content
ARA – Rule set maintenance
Ruleset – Mass maintenance and upload
To upload the new ruleset run transaction “GRAC_UPLOAD_RULES”
The Rules are allocated against a physical system or against a Logical system
group
If you use append mode you only need to upload against the Logical /
Physical systems that you changed.
ARA – Rule set maintenance
Ruleset – Mass maintenance and upload
After the upload remember to generate the rulesets, run transaction
“GRAC_GENERATE_RULES”
Then repeat your test risk analysis, and compare the results to make
sure you have the desired results.
ARA – Rule set maintenance
Ruleset – Mass delete the rulesets
It is a best practice to take a full copy of the ruleset you currently
have before you do a deletion, this is to act as a back-out plan.
Run transaction “GRAC_RULE_DELETE”
Choose the Physical system, Logical system or Cross System, then
select the check box for the data to delete
ARA – Rule set maintenance
Ruleset – Transporting
Downloading and Uploading the ruleset was the previous way to
move the ruleset through the landscape, and this is still acceptable
but we can now transport them as well.
Run transaction “GRAC_RULE_TRANSPORT”, select the physical or
logical system. Remember the Logical systems and the physical
systems have to have the identical names throughout the landscape.
Agenda
ARM Creating a request High Level
ARM Processing a request High Level
ARA – Rule set maintenance
Background Synchronisation
Access control – configuration overview
Questions
Background Synchronisation
Background Synchronisation
Background Synchronisation
Authorization Synch
Authorization synch Used to update GRC with the USOBT &
USOBT_C data from the target systems
The Job is connector (target system) dependent and must be run for
each connector
The Sync options are
• Profile
• Profile & role
• Profile, Role & user
• Incremental
• Full Sync
Background Synchronisation
Repository Object – “The King of Syncs”.
The Sync options are
• Profile
• Profile & role
• Profile, Role & user
• Incremental
• Full Sync
Background Synchronisation
Repository Object – “The King of Syncs”.
This job is the equivalent to the 5.3 User, Role and Profile sync jobs
and should be run on a nightly basis (incremental mode) and weekly
(full mode)
It may be required to sync the users more frequently
If you experience any ARA or EAM problems, try running this job as
sometimes the job helps to resolve missing or inconsistent data in the
system.
The Job is connector (target system) dependent and must be run for
each connector
Background Synchronisation
Action & Role Usage Synch
These two jobs are used to copy the usage data from the target
system to GRC
These are used to populate the Usage reports
The Job is connector (target system) dependent and must be run for
each connector
Background Synchronisation
Firefighter log & Workflow Synch
The Firefighter Log sync collects the Firefighter ID / Role usage data
from the target system and updates the Logs.
This should be run hourly, more frequent running may be required in
Firefighter is used extensivly
The Firefighter Workflow synch, is run after the Log synch, this
populates the FF log review workflow Items and notifies the controller
to review them. – (Workflow must be ARM for this to work)
The Job is connector (target system) dependent and must be run for
each connector
Agenda
ARM Creating a request High Level
ARM Processing a request High Level
ARA – Rule set maintenance
Background Synchronisation
Access control – configuration overview
Questions
Access control – configuration overview
All the Access Control configuration is carried out in the back end
system in the IMG (SPRO)
The Configuration is transportable, but some configuration is also
done locally like the RFC connections and the number ranges.
Transportable configuration requires you to have consistent names
across the entire landscape.
These include, Fire fighter role name, Logical system names, connector names,
Organisational structure, connections to all target systems SAP and Non-SAP.
Not all configuration is required as some areas are specific to
individual use
Access control – configuration overview
Access Control – configuration location
Access control – configuration overview
Configuration parameters
The configuration is segregated into the following parameter groups:
For the latest version see the Maintaining Configuration Settings
Guide on https://service.sap.com/instguides >Analytics>Governance, Risk, and Compliance > Access
Control-> Release 10.0.
Access control – configuration overview
Configuration parameters
To create a new entry choose the parameter group from the drop
down, enter the parameter ID, enter the parameter value,
To update a parameter scroll down the list, locate your parameter,
and update the parameter value.
Access control – configuration overview
Connector settings
In the connector settings we maintain what type the connect is and
whether it’s activated for Password Self Service (PSS)
Access control – configuration overview
Maintain Access Risk Levels - Maintain Business Processes and
Subprocesses
Maintain Access Risk Levels, this
were we maintain the risk level
The Default values are contained in the BC
sets
Maintain Business Processes and
Subprocesses, are a shared
component now and are used across
ARA, ARM, BRM and Process Control
Every Business Process must have a
Sub process
Access control – configuration overview
Maintain Data Sources Configuration
Here we set-up the order
and the system that AC
uses to authenticate and
look up user data,
This can be
SAP system (SU01 record)
HR System (HR
Organisation)
LDAP (Network directory)
Access control – configuration overview
Logical groups
In AC 10 – the use of system groups has changed to Logical groups
Logical groups are grouping of systems that preform the same task..
ERP & ERP
BI & Bi
Basis – All Netweaver systems
The if you link two systems with different functions ERP & BI, then
depending on the order in the logical grouping you may find that the
transaction description is missing in the function.
Access control – configuration overview
Logical groups
We set these in SPRO
Governance, Risk and
Compliance>Common
Component Settings>Maintain
Connectors and Connection
Types
The name is your choice, but
SAP deliver some standard
ones, (in the BC sets)