SAP Roles and Authorizations

April 10, 2017 | Author: Lý Bằng | Category: N/A
Share Embed Donate


Short Description

Download SAP Roles and Authorizations...

Description

SAP Authorizations and GRC

By: Ravi B Hemanth 1

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Objectives







2

Learn how a role is built up in SAP, what role-based access is and why it is important. Understand why security and Segregation of Duties (SoD) is important in SAP. Understand the business value and usage of the applications in the SAP GRC Access Control Suite.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Why is security important in SAP?



 

3

Data theft and espionage is a growing crime - several examples where millions have been lost in damages. Intruders target user profiles with extended authorizations. Long-term damages include financial damages, image loss declined stock, law suits and compliance violations.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Figures

U.S fraud cost were $52.6 billion in 2005

Intellectual property theft costs U.S. companies between $200 billion and $250 billion a year in sales

4

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Famous scandals





5

Worldcom  Lost $127 billion in market value.  24 000 people lost their jobs.  Share value $62 to $0.20 in less than 3 years. Enron  Lost $ 19 billion in market value.  5500 people lost their jobs.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Who are they?

Paul Sarbanes

6

Michael Oxley

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Sarbanes-Oxley (SOX)









7

In 2001/2002 large US companies like Enron or WorldCom went bankrupt. Their management had hidden and changed financial data and betrayed investors. In 2002 The Sarbanes-Oxley Act was made law to establish better controlling and accounting transparency. The strongest focus is on Internal Controls.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Why SOX?









10

All companies that are registred on the NYSE/NASDAQ stock market, must be compliant with SOX. Massive impact for large enterprises who had to take measures to ensure internal control. SOX has generated thousands and thousands of hours of consultant work! There will be a similar law within EU - "Euro SOX".

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Segregation of Duties





11

Definition: “Key duties and responsibilities in authorizing, processing, recording and reviewing official business transactions must be separated among individuals to reduce the risk of error or fraud”. Applied on our client: “One person should not control all stages of a process, a situation in which error or irregularities could occur without detection”.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

SAP Security Concept for Roles and Authorizations

12

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

SAP example

Materials Management

Finance and Controlling

Production Planning Sales and Distribution

Mr. Smith

Human Resources

As a Financial Accountant, Mr. Smith probably has job duties that involve accessing components of the Finance and Controlling module (FI/CO).

13

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Transactions

 





14

A user performs tasks in SAP by entering transaction codes. A transaction code is a command that takes the user to a certain program in the SAP system. The term ”transaction” is usually used to refer to the program that is run when the corresponding transaction code has been entered. For example, the user enters the transaction code FB02 to run the transaction/program that is used to change documents in the general ledger.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Example: FB02

15

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

FB02

16

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

FB02

17

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

FB02

18

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

SAP Security model overview

Authorization Profiles

Composite Profile User Master Record

or

Authorization

Simple Profile

Authorization field Authorization Object

19

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

User Master Record

Example of a User Master Record

User Name Initial User Password Group

21

User Type

Valid Dates Authorization Profiles

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Profiles

Composite Profile

Simple Profile A Allow Display access to documents Simple Profile B

Allow Change access to documents

22

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Authorization Object

Authorization Object

23

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Authorization field

Data Dictionary

Authorization field

Authorization Object

24

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Data Element

Authorizations

Object

Field name

Value

S_TCODE

TCD

FB02

S_TCODE

TCD

FB03

Authorization

Authorization

Authorization fields

Authorization Object EXAMPLE: S_TCODE

25

EXAMPLE: TCD

EXAMPLE: FB02 EXAMPLE: FB03

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Auth. Object check under transactions

Maintain Transaction Object

26

Activity Company Code

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Display Company Code value

FB02

28

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Authorization check

ABAP/4 Code AUTHORITY-CHECK OBJECT 'F_BKPF_BUK' ID 'BUKRS' FIELD s_bukrs ID 'ACTVT' FIELD '02'.

Authorization Object

IF sy-subrc 0. MESSAGE E002(ZI) WITH text-200 s_bukrs ENDIF.

29

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

ST01: Trace Display

30

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

SAP Access Role concept 





31

Historically, users were given SAP access by direct assignment of Profiles, but to facilitate a more business oriented access management, the role layer was added. Roles were added as an additional abstraction level, in order to facilitate authorization design. Compare to object-oriented programming instead of programming in machine language.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Hierarchy F

A A C

S P

A P

User

S

PP

V

A

F

F

A U = User S = Single role P = Profile A = Authorization object F = Field V = Value

V FB02

C = Composite role

32

V

A

S

FINANCIAL ACCOUNTANT GENERAL LEDGER JOURNALS MAINTAIN

V

F

A

C MR. SMITH

F

A

V

V

F $TCD $TCD $........... $........... $......... $....... $......... $........

A

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding S_TCODE any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

FB02 FB03 …… …… …… …… …… ……

Profiles 

Single roles hold a 1:1 mapping towards Profiles.

C

User

S P P S

MR. SMITH

PP

C FINANCIAL ACCOUNTANT

S GENERAL LEDGER JOURNALS MAINTAIN

33

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Single roles 

A Single Role corresponds to a Job task in the system, for example General Ledger Journals Maintain.

C

User

S

S

MR. SMITH

C FINANCIAL ACCOUNTANT

S

GENERAL LEDGER JOURNALS MAINTAIN

34

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Composite roles 





A Composite Role corresponds to a Job role in reality, for example Financial Accountant. All users in the SAP systems have at least one and usually several Composite Roles assigned to them. A Composite Role is a predefined collection of Single Roles that have a relation to each other, and that together give the necessary access for the user to fulfill a certain job role. User

MR. SMITH

Composite role

Composite role FINANCIAL ACCOUNTANT (TECHNICAL NAME: RMUS_01_CCC01_FIN:0013)

35

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

PFCG: Role Maintenance

The technical name for Financial Accountant.

36

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Single roles

37

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Display Authorization Data

38

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Display Authorization objects and values

39

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Summary 







40

User master records, profiles, transactions, objects etc. generic technical design in all SAP systems. Composite role/Single role concept - built-in possibilities in SAP that is used as best practice. How can the role concept be used to perform Segregation of duties? … to be SOX compliant?

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Sarbanes-Oxley (SOX) compliance and Segregation of Duties (SoD)

41

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Sarbanes-Oxley and Segregation of Duties 





The Sarbanes-Oxley act (SOX) is intended to ensure the correctness of US companies’ accounting One effect of SOX is referred to as the Segregation of Duties (SoD) directive The SoD directive stipulates that no person must control several key steps in a connected process Approve Purchase Order

42

Receive Goods

Authori Custod Record Control zation y

Enter Goods Receipt

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Clear Vendor

What is the impact of SOX and SoD on Roles and Authorizations in SAP?

43

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Control Systems Mandatory Access Discretionary Access Role Based Access Control (MAC) Control (DAC) Control (RBAC)  Access objects and  Access is granted by  Each user is able to users classified on a assigning each user pass on the linear security scale permissions he or she one or more access (E.g. Level 1, Level roles has to other users 2, ...)  A user is given access  Each user is given  If the user’s security access to the objects to an object if he or permission ”level” that his or her roles she has been given exceeds that of the specify access to it by  A user may be given object’s the user is another user granted access to access either by new  There is commonly that object roles or by changing a one user with irrevocable access to role that the user already has all access objects (E.g. root, Low maintenance High versatility administrator, ...) 44

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Based Access

Role Architecture  A library of roles must be built and maintained  Principles must be established and followed for the role library to remain consistent

Role Provisioning  Provisioning is the process by which users are given new roles  Slow provisioning costs money in lost productivity

SOX directives

45

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Architecture

46

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Architecture • No role must contain internal SoD risks - Control over several steps in a process would mean that no user could have this role

Permissions Enter Goods Receipt

Access Role

Permissions Clear Vendor

47

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Architecture

Role Based Access – Design Principles  Each

access role mapped to a job role  Global template roles define action level security – ”what”  Locally derived roles define data level security – ”where”

48

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Roles vs. Job Roles

49

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Architecture • An access role is a role defined in the system; a job role is a real-world role - An access role contains all permissions needed to perform the tasks needed to complete the job role - Permissions = Actions + Data Access

• Benefit: Access roles are free from internal SoD risks (as long as job roles are)

50

User

Access role

Permissions

(e.g. a financial accountant)

Financial Accountant

e.g. change G/L document, post G/L document

User

Access role

Permissions

(e.g. a sales assistant)

Sales Assistant

e.g. create sales orders, change sales orders

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Architecture

Action level security? Data level security?

51

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Architecture

• Action level security defines access to activities - In SAP, actions level security can be thought of as access to transactions

• Action level security is specified on a global level - A financial accountant has the same access irrespectively of in which country he or she works

52

Access role template

Permissions

Financial Accountant

TCODE: FB01

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Architecture

Data level security

53

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Architecture • Data level security defines access to data - Access to display/maintain certain company codes, sales organizations, plants, etc.

• Locally derived roles define data access Global Template Role e.g. Financial Accountant_Template TCODE: FB01 ACTVT: BUKRS: -

Local Role e.g. Financial Accountant_Sweden TCODE: FB01 ACTVT: 01 BUKRS: 4200

54

Local Role e.g. Financial Accountant_China TCODE: FB01 ACTVT: 01 BUKRS: 6200

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Provisioning

55

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Provisioning 

No person must be given roles that give access to several steps in a connected process  Segregation is possible by process or geography Access role Security Advisor Sweden

OK

Access role Financial Accountant Sweden

56

Access role Billing Administrator Sweden

Mr. Smith

OK

Process separation

SoD Risk

Access role Billing Administrator Norway

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Geographic separation

Role Provisioning

Traditional

Role Based Access

 User

 Role

admin team grants access based on line manager demands  Access applied for on an asneeded basis  User admin team responsible for security while business is trying to operate

57

provisioning flow controlled entirely by business  Access applied for on a job role basis  Business is responsible for maintaining security and operational effectiveness

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Provisioning

Role provisioning process

58

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Provisioning 



Role provisioning flow controlled entirely by business  Business is responsible for maintaining both security and operational effectiveness Access applied for on a job role basis

Application Business approval

59

Security approval

Assignment

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Provisioning

Why is a business approval needed?

60

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Provisioning 

SOX requires that a valid business reason for the order must exist  Verify that the requested role match actual personal identity and job role  Verify that the end-user has a need to know of the information that will be available via the role

Business approval

61

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Provisioning

Security approval

62

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Provisioning



The security approval checks that no SoD risks appear for the user  Verify that no SoD risks appear for the user  Verify that user is not given access to unnecessary critical actions (create users, change roles, etc.)  Verify that user is not given access to display sensitive data (financial statements etc.) Security approval

63

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

SOX audits

64

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

SOX Audits

   

65

What SoD risks do you have? Do you have proof that all access is properly authorized? How do you ensure the consistency of your roles? How are sensitive activities monitored?

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

SAP GRC Suite

66

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

VIRSA systems 

  





 

67

In April 2006, SAP bought VIRSA systems and started transforming the VIRSA suite into SAP GRC VIRSA stands for “Versatile Innovative Risk and Security Administration” US company, founded in 1996 Today more than one million end users are subject to compliance at more than 170 customers worldwide Major references (Vodafone, IBM, Unilever, Panasonic, BASF, Boeing, Burger King, Sony, Nortel, Siemens, Gillette) Virsa provides the only solutions that monitor and enforce business controls in real time across enterprise systems Virsa is the global leader in cross-enterprise compliance solutions The company is privately funded with venture investment from SAP Ventures, Kleiner Perkins Caufield & Byers, and Lightspeed Venture Partners.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

GRC Suite

68

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

SAP GRC Suite overview

Online ordering tool

Access Enforcer

Access in FireFighter

SAP

Compliance Calibrator

FireFighter logs

69

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

connection is = possible

Role Expert

GRC Suite Cross Enterprise Risk Management Enterprise Portals Risk Manager

Provisioning

Superuser access control

Fail-safe risk prevention

Role management

Risk Terminator

Firefighter

Access Enforcer

Role Expert

SoD analysis, critical transaction monitoring, & preventive simulation

SAP Compliance Calibrator by Virsa Systems

70

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Compliance Calibrator

71

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Compliance Calibrator

/VIRSA/ZVRAT

72

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Compliance Calibrator

  

 

73

Part of the SAP GRC Suite Core application of the suite Uses the ERP Risk Framework (within ”Rule Architect” for SoD risk analysis of users SAPgui based (4.0, current version) Web based NetWeaver (5.2, release Q3 2007)

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Compliance Calibrator



74

Compliance Calibrator  Source of ERP risk framework used for all SOD analysis  Is used to monitor users, roles, risks and mitigation controls  Compliance Calibrator increases visibility regarding SoD and assists in managing risks and users

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Compliance Calibrator

Risk Definition

75

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Compliance Calibrator Rule Architect

76

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Compliance Calibrator Selection Screen (Cockpit)

77

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Compliance Calibrator User Analysis

Risk definition 1

Function A

Function B

Function C

Transaction Transaction . .

Transaction Transaction . .

Transaction Transaction . .

Risk

User X

78

Risk definition 2

No risk

User Y

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Compliance Calibrator Risk Report

79

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Enforcer

80

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Enforcer: Purpose 





81

Used primarily to perform segregation of duty (SoD) analysis before roles are approved and allocated to users. Reduction of lead-times for roles allocation leads to significant business improvements. The user administration will be fully automated. The tool will enforce the role approval process, secure that SoD checks are performed and that potential risks are mitigated - all prior to role allocation.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Enforcer: Business value 



 



82

Facilitate the SOX compliance from an SAP security perspective. Increase the accuracy of SAP user authorizations and adhere the GAC principles. Reduce maintenance costs for the SAP user administration. Reduce lead-times for roles allocation - leads to significant business improvements. Reduce security audit costs for SAP environments.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Enforcer: User administration process 



83

The purpose of a User Administration Process is to assign/remove roles from SAP user accounts. An online ordering tool and Access Enforcer ensure that the proper approval for every request is done and that all assigned roles are compliant to the security policy.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Enforcer: Order process

All orders for access to IT applications are managed via a tool for ordering online.

84

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Enforcer: Requests for approval 

85

The first approver in the workflow receives the requests that was ordered in the online ordering tool.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Enforcer: Roles included in the order

86

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Enforcer: Risk Analysis 





87

When the approver clicks Risk Analysis, Access Enforcer runs an analysis on the user's current roles in combination with the new roles that were ordered. In fact, Access Enforcer makes a call to Compliance Calibrator, where the SoD risk framework is stored. Compliance Calibrator runs the analysis and returns the result.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Enforcer: Risk Analysis result

88

The risks are listed with a Risk ID, Risk Description and Status.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

SoD risk: FB01 and ME21

89

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Enforcer: Risk simulation



90

Now we can uncheck Financial Accountant and Simulate the risks without that role.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Access Enforcer: Risk Analysis result

91

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Expert: First approval step finished

93

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

What is Role Expert?

   

94

Tool for documenting roles and authorizations. Web based application. Automates creation and management of role definitions. RE enforces (sve. upprätthåller, genomdriver) best practice to ensure that role definitions, development, testing and maintenance is consistent through the implementation.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Expert functionality

     

95

Track progress during role implementation. Monitor the overall quality of the implementation. Perform risk analysis at role design time. Set up a workflow for role approval. Provide an audit trail for all role modifications. Maintain roles after they are generated to keep role information current.

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Expert: Search screen

Enter TMUS*. (Technical name for single roles in the system called MUS).

96

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Expert: Search results

97

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Expert: Role definition

98

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Expert: Add transactions

99

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Role Expert: Company mapping

100

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

FireFighter

101

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

FireFighter

102

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

Summary SAP uses a complex structure The Sarbanes-Oxley act (SOX) to manage authorizations: imposes requirements on  Fields companies’ management of  Objects roles and authorizations:  Profiles  Segregation of Duties (SoD)  Roles  Business approvals  Audit trails Role Based Access (RBAC) is To manage compliance SAP required to fulfil the roles offers the GRC Suite:  Compliance Calibrator (SoD) and authorization  Access Enforcer (Role requirements of large organizations: provisioning)  Globally governed role  FireFighter (Critical access)  Role Expert (Role architecture  Business controlled role architecture) provisioning 103

Department | 8/24/2010 | © Robert Bosch Engineering and Business Solutions Limited 2010. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF