SlideShare une entreprise Scribd logo
1  sur  48
SAP GRC Process Control
Process Control Automated
Monitoring
SAP Process Control
SAP Business Objects Process Control is an enterprise software solution
for compliance and policy management. The compliance management
capabilities enable organizations to manage and monitor its internal
control environment. This provides the ability to proactively remediate
any identified issues, and then certify and report on the overall state of the
corresponding compliance activities.
Business Scenario
• Basic business processes necessary for running any business are purchasing, sales,
hiring and promotion, etc. SAP Business Objects Governance, Risk and Compliance
(GRC) solutions provide an overview of such processes from a risk and compliance
point of view, and help customers measure risks and monitor compliance.
• Automated monitoring of backend systems and processes are part of the Process Control
10.0 application (PC 10). Customers of GRC use automated monitoring for
configurations, master data and transactions.
• The following figure depicts how GRC fits into the corporate IT landscape, and into a
corporate governance and compliance strategy.
• Automated (or semi-automated) monitoring can also help individuals perform the
control function. For instance, a person responsible for reviewing and approving
purchases might want to look at background information on the requester, vendor,
pricing trends, etc. before making a decision. Workflow can route the requisition itself
to his or her inbox, but PC automated monitoring can provide the additional information
needed to actually reach good decisions.
The term “technical experts” refers to software professionals who understand
databases, queries, web service configurations, or programming. Implementation
experts‖ are professionals who know the PC product well, they will be responsible for
installing and configuring it, or upgrading from previous releases.
Automated Monitoring Overview
• To monitor any system in your IT landscape, PC first has to be able to extract data from
it. The data could be anything: configurations, master data, transactions, usage logs, or
any structured information which the monitored system can provide on demand.
• The monitoring methods available to PC customers fall into one of two broad classes:
query-driven or event-driven.
1. PC initiates query-driven monitoring, typically via the
scheduler. This is why some practitioners also call it
schedule-driven monitoring. The common characteristic
of these monitoring methods is that the monitored
system is passive—all action is initiated from the PC
side. The data might come from a query, a report, a
function invocation, or from any other technical source,
but the semantics are those of a query.
2. Event-driven monitoring, by contrast, is not initiated by
PC. An external system decides when something is
significant enough to be communicated to PC, and
initiates data transfer by raising an event. PC treats such
events as data sources much the same as a query-driven
data source, and makes the event details available to
business rules for further evaluation
• PC can pull data from remote backend systems by multiple mechanisms. To
keep track of these, rule designers create objects called Data Sources, which
store the information about the actual sources of data on remote systems which
they will invoke when a monitoring rule runs.
• Monitored systems are backend applications such as SAP ERP, CRM, etc. For
legal reasons, this document uses only SAP applications in examples of
monitored systems, although PC 10.0 can be-- and is–used to monitor a wide
selection of non-SAP backend applications.
• Data sources are objects in PC which tell PC how to extract data from
backend systems being monitored.
• Business rules encode the actual monitoring logic the rule designer wants. A
business rule is designed to work against one data source. That‘s because the
rule engine needs to know which fields are available for building the rule, and
that depends on the data source being used.
• Systems Installation and Activation
The PC 10.0 installation guide available on SAP Service Marketplace gives details about
installation and configuration of PC 10.0. The rest of this section addresses configurations
unique to automated monitoring.
• Post-installation Configurations:
• Creating RFC destinations (called ―connectors in GRC) is standard NetWeaver
functionality, accessed via transaction code SM59. With such connectors, you then
configure PC to know which connectors it should use for automated monitoring.
The following figure shows the transaction SPRO in the PC system
Use the path Governance, Risk
and Compliance > Common
Component Settings > Integration
Framework.
The first of the links in the
highlighted box, Create
Connectors, is a shortcut to SM59
for creating or maintaining
connectors.
The next link, Maintain Connectors and Connection Types, takes you to the following
screen.
The three highlighted connector
types are of interest in
automated monitoring.
 Local system connectors are
used to integrate with the SAP
Business Objects Access
Control application for
monitoring segregation-of-duty
violations.
 Web service connectors are used
for external partner data sources.
 SAP system connectors are used
in all other cases.
The next step is to define which of the connectors previously defined in
SM59 can be used in monitoring.
SMEA5_100 is a connector to an ECC system. Note in particular the third
column that lists the name of a connector which is defined in the monitored
system, and which is configured to point back to the GRC system being
configured here. That is, in the highlighted row, SMEA5_100 is a connector in
the GRC system, and it points to an ERP system which is to be monitored. SM2
is a connector on the (remote) ECC system, which points back at this GRC
system.
Define Connector Group screen, as shown in the following figure.
All the connector configurations for automated monitoring should belong to the
configuration group called Automated Monitoring (shown highlighted).
Now, Choose the link Assign
Connectors to Connector Groups
to the AM connector group.
Next choose Maintain Connection Settings, as shown in the following figure.
A screen displays, asking
which Integration Scenario
you want. Choose AM for
automated monitoring. the
following page displays.
The highlighted box shows nine entries called sub-scenarios these are different types of
data sources and business rules supported in PC.
To create a specific data source type (say, configurable) for a system to be monitored, the
corresponding connector must be linked to that sub-scenario. Select the sub-scenario you
want, and then choose Scenario Connector Link in the left-hand panel, as follows
The following screen
displays. If the connector you
want to use for that scenario
is not already in the list for
that sub-scenario, choose
New Entries to add it. We
recommend the following
pattern for convenience.
Master -Data Preparation
Before monitoring rules can be scheduled to run, they must be hooked up to the
regulations, controls, and business processes, which are master data for PC.
Monitoring Methods
a) Data Sources in PC 10.0 encapsulate many different ways PC can extract data out
of monitored systems, while still presenting a uniform interface to rule designers
who want to filter and manipulate the data they extract.
b) Business Rules hold the processing logic for such filters, calculations and the logic
to determine if any extracted data represents a problem which control owners need
to review or remedy.
Design-time
All design-time user interfaces are located under ―Rule Setup‖ in the top-level toolbar,
as highlighted in the following figure.
The Rule Setup user interface may contain many sections, depending on your role and how
it is configured in your system. The following figure shows only the Continuous Monitoring
section.
Creating Data Sources
Choose Data Sources in the above picture. The Data Sources screen displays. The screen
lists the Data Sources previously configured in this system. You can create a new data
source by choosing the Create pushbutton
Name and Description: The
Data Source name should be
something descriptive which
will help you to find the data
source, and help document
its purpose.
Validity Dates: Validity
dates determine the range of
dates over which data
sources, rules, controls, and
so on, can be put to use in
monitoring.
Status: Data sources start with the status New. You can change most attributes of the data
source while it is in this status, but you cannot use it to support rule creation or any other
downstream activity. From ”New”, a data source can be changed only to ”In Review”; after
review, it can become ”Active”, which is the state in which it can be used to create
monitoring rules.
Search Terms: These are tags which can help in finding the right data sources, for instance
when you want to update or edit a data source, or you want to find one to reference when
creating business rules.
Use The Object Field tab to define more functionally relevant attributes of the data
source.
The Sub Scenario dropdown list
shows nine options; these are the
different types of data sources
available in PC.
For instance, the below
following figure shows the
vendor master table LFA1 of
SAP ERP.
The highlighted column shown in the following figure is editable, allowing the designer
to replace the default text with something better suited.
Connectors
For most sub-scenarios, you must define a main connector that points to the backend
system against which PC will try to validate your definition. The only exceptions are the
SoD Integration and Event sub-scenarios.
Creating Business Rules
Business rules filter the data stream coming from data sources, and apply user-
configured conditions and calculations against that data to determine if there is a
problem which requires attention. In PC this is called a deficiency.
The following screenshot shows the full range of power in a business rule
The name, description, validity dates, status and search terms fields serve exactly the
same function as the corresponding fields in data sources
The Category and Analysis Type fields are dependent on the data source type
Data For Analysis
A data source offers several fields for the business rule to use in filtering or
finding deficiencies.
Filter Criteria
Of all the business rule fields picked in the previous step, some will be useful
mainly in filtering out data that is not of interest. You should pick such fields as
filters, and define filter conditions against them.
Deficiency Criteria
Conditions and Calculations
Use this tab to define the calculations
necessary to compute the value of a
calculated field deficiency.
The Calculations tab allows three
types of calculations: a Field Value
calculation, a currency conversion, or
grouping and aggregation.
Field Value Calculation
PC provides a simplified user
interface for relatively simple
conditions and calculations, and
advises customers to use the full
BRF+ workbench to define more
complex calculations.
One important restriction is that the definition of a calculated field in the deficiency criteria screen
(above) is one-to-one related to the definition of the calculation itself in the conditions and calculations
tab. This means that any significant computation which requires intermediate variables is too complex to
handle here—it would be necessary to define such complex rules in the BRF+ workbench.
One decision method offered by BRF+ is directly incorporated into the PC rule interface: the decision
table. This is called a ―”pattern” in the PC 10.0 interface, and is available only for the change log check
category of business rule.
Currency Conversion
A key feature of the PC 10PC rule engine is the ability to convert currency amounts. This
feature uses core NetWeaver support for currency conversions, and leverages the same
underlying currency tables and features as used in ECC, CRM and other SAP applications.
To use this feature, a deficiency criterion must be of type Amount, and the same must be
true of one of the fields available in the rule.
Grouping and Aggregation
The screenshots in the section on Currency Conversion also include grouping and
aggregation. The other deficiency in that example, Total Number of Payments to One-
time Vendors, is intended to find the number of payments made to each one-time vendor,
and then apply the configured thresholds to determine if that violates policies.
The grouping is on Vendor number, and the aggregation method used is Count—which
simply counts how many times each vendor (the grouped-by field) appears in payments.
Grouping and Aggregation can also be combined in sequence with other calculation
methods.
Notice that the grouping/aggregation calculation is the second in the sequence, with
currency conversion being first we want to convert to a single currency before adding
BRF+ Workbench
To leverage the full power of BRF+, first create a stub PC Business Rule, and use the
generated rule ID
You must know the technical ID of the rule you created, which you can see in the
following screenshot of the PC Business Rule finder page. The technical object ID of
each rule is displayed in the left-most column. This technical ID serves as the base, or
first part, of the BRF+ rule ID in the BRF+ workbench.
The easiest way to find the corresponding BRF+ rule in the BRF+ workbench is to paste
this ID, add the wildcard character ‗*‘ to it, and then search. In the left-hand panel of the
BRF+ workbench screenshot, there are two BRF+ rules with the same base ID as the PC
10 rule. this is because BRF+ creates new versions of every such rule each time it is
changed.
Output Format
This section is common to all business rule/data source types, and arranges the output of
any detected deficiencies in the left-to-right column order specified. You can also hide
unwanted columns here.
Technical Settings
These primarily affect the execution and performance of monitoring. Most data sources
will allow users to cap the maximum amount of data they will process, as a
performance management feature.
Ad Hoc Query
This is useful for configurable business rules and data sources, which are designed and
implemented directly from the PC user interface.
The following screenshots show two modes of ad hoc query operation: one that collects
the data as the data source would, and another that applies the rule logic to filter the
data and then apply deficiency logic.
Assigning Rules to Controls
Monitoring rules need to be assigned to local controls.
The search widget at the top of this page lets you search for local controls that is,
controls assigned to a particular organization node. The next step is to select it in the
middle part of the screen, by clicking on its row.
You then modify the business rules assigned to it by choosing the Modify pushbutton,
and then choosing the Add pushbutton in the bottom portion of the screen. A screen
displays that allows you to search through Business Rules in the Active state, which you
can then assign to the local control.
You can also modify existing assignments and maintain frequencies of monitoring or
compliance checks. Once this assignment step is complete, you will be able to schedule
the monitoring rule in the Automated Monitoring scheduler.
Scheduling
The monitoring scheduler is also on the Rule Setup
Select the Automated Monitoring link. the following screen displays
Use this page to schedule all schedule-driven rules
The Scheduler page displays all currently scheduled jobs. You can create a new
monitoring job by choosing the Create Job pushbutton, which walks you through the
process. The following screenshot gives an overview.
The top of the screen shows that scheduling is a 5-step process, and the wizard guides you
through it. The most important thing to note about the scheduler is that you can run jobs
as frequently as hourly, and as infrequently as annually.
Monitoring Jobs
SAP Query Data Sources and Rules
SAP Query is a NetWeaver query tool. The following screenshot shows the transaction SQ01.
The following two screenshots show the relevant sub-scenario for Data Source
definitions
In defining a data source against a previously-defined SAP Query, the designer has to
point to a particular backend system which is to be monitored. PC looks up the set of
available queries in that backend system (including wildcard searches), looks up the
query details, and makes its results available to the PC rule engine.
To create any Business Rule, the first step is always to select the (active) Data Source on
which the rule will operate. Since this fixes the sub-scenario, you do not have to pick the
sub-scenario for any Business Rules—it is always inherited from the Data Source.
For SAP Query Business rules, you can define two categories of business rule, as follows
The Exception category means that any data returned by the data source is always
considered an exception.
The Analysis Type field decides whether to treat all such exceptions as deficiencies to
be remedied or as something a human must review to determine if it requires a remedy.
The other category, Value check, implies that there are deficiency criteria which
explicitly need to be evaluated, and that you will then be expected to configure in the
Deficiency Criteria and Conditions and Calculations steps of the create rule wizard
A configurable data source defines a query against tables in the monitored backend
system (such as ECC/ERP, SRM, and so on).
This section also explains the Change Log option, which tells PC to reconstruct past
configuration and master data settings over the timeframe of the control, and validates all
such past and present settings against the user-configured monitoring rule.
Having picked the Configurable sub-scenario, you next pick a connector to the
backend system against which you want to define the query
Having picked the main table, you can next pick related tables to bring in additional
information
Again, you can use wild cards to search for tables. Note that PC 10.0 already filters the list
of tables to include only those which have related information.
dependent tables are those which refer to (as foreign keys) the key fields of your main table
(primary keys), while reference tables are the opposite—they hold the primary keys to
which your main table refers as foreign keys
You can join multiple related tables together in such a compound data source, with the
constraint that the join conditions are restricted to being equality relationships between like-
type fields. For the most part, it is expected you will join primary keys to foreign keys.
Change Log Data Sources and Rules
A change log rule is a variation on the configurable rule defined previously, and hence is
presented as a subsection of that type in this document. It is intended to be used for
monitoring configuration and master data tables only.
SAP applications have extensive change-tracking mechanisms for database tables, which
guarantee that all changes are captured, even if they are of very short duration.
These mechanisms cover changes made directly in the system, and also changes
transported into the system.
So a change log business rule allows you to check the validity of a configuration or
master data setting at any time, with confidence that all changes made to that setting will
be found and tested for correctness. Wrong configurations are caught, no matter how
transiently they were in effect.
Definition of Change Log Rules
Change log based rules can be based on either configurable data sources, or programmed
ones. Such change-log-based rules can be used to monitor either configurations, or master
data.
For change log rules based on configurable data source types PC provides an analysis
type of pattern, which allows users define a multi-field deficiency criterion using a
decision table.
Table Handlers
When interpreting the change log, the GRC backend plug-in needs a handler to interpret
the change log entries. Sometimes more than one table handler is registered for the table in
question, and it can be difficult to determine which handler to use.
The correct handler for your situation will be the one which makes your deficiency fields
available for use in change analysis rule.

Contenu connexe

Tendances

SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
Rohan Andrews
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
hkodali
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultant
Anil Kumar
 
Iso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guideIso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guide
mfmurat
 

Tendances (20)

SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
 
GRC access control access risk management guide
GRC access control   access risk management guideGRC access control   access risk management guide
GRC access control access risk management guide
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshop
 
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
 
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultant
 
ISO 27001 (v2013) Checklist
ISO 27001 (v2013) ChecklistISO 27001 (v2013) Checklist
ISO 27001 (v2013) Checklist
 
A emmanuel-sap-grc- consultant ( ac,pc,rm) resume-sf
A emmanuel-sap-grc- consultant ( ac,pc,rm) resume-sfA emmanuel-sap-grc- consultant ( ac,pc,rm) resume-sf
A emmanuel-sap-grc- consultant ( ac,pc,rm) resume-sf
 
Fiori for s4 hana troubleshooting tips and tricks
Fiori for s4 hana  troubleshooting tips and tricksFiori for s4 hana  troubleshooting tips and tricks
Fiori for s4 hana troubleshooting tips and tricks
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
 
Iso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guideIso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guide
 
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
SAP S/4HANA: Finance Capability and Frequently Asked Questions
SAP S/4HANA: Finance Capability and Frequently Asked QuestionsSAP S/4HANA: Finance Capability and Frequently Asked Questions
SAP S/4HANA: Finance Capability and Frequently Asked Questions
 

En vedette

SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important Questions
Ragu M
 
SAP GRC 5.3 Training
SAP GRC 5.3 TrainingSAP GRC 5.3 Training
SAP GRC 5.3 Training
raja RAJA
 
Scalable security modeling sap bw analysis authorizations
Scalable security modeling   sap bw analysis authorizationsScalable security modeling   sap bw analysis authorizations
Scalable security modeling sap bw analysis authorizations
Pallavi Koppula
 
An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security features
Shazia_Sultana
 

En vedette (15)

SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important Questions
 
SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)
 
Simplifying IT GRC
Simplifying IT GRCSimplifying IT GRC
Simplifying IT GRC
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM Authorizations
 
Using FIORI to enhance user experience on SAP PPM
Using FIORI to enhance user experience on SAP PPMUsing FIORI to enhance user experience on SAP PPM
Using FIORI to enhance user experience on SAP PPM
 
SAP GRC 5.3 Training
SAP GRC 5.3 TrainingSAP GRC 5.3 Training
SAP GRC 5.3 Training
 
Scalable security modeling sap bw analysis authorizations
Scalable security modeling   sap bw analysis authorizationsScalable security modeling   sap bw analysis authorizations
Scalable security modeling sap bw analysis authorizations
 
ISACA Victoria Chapter: GRC Professionals-Road map for Personal Success
ISACA Victoria Chapter: GRC Professionals-Road map for Personal Success ISACA Victoria Chapter: GRC Professionals-Road map for Personal Success
ISACA Victoria Chapter: GRC Professionals-Road map for Personal Success
 
Key Slides
Key SlidesKey Slides
Key Slides
 
Etkin Yetki Yönetimi - SAP GRC Access Control
Etkin Yetki Yönetimi - SAP GRC Access ControlEtkin Yetki Yönetimi - SAP GRC Access Control
Etkin Yetki Yönetimi - SAP GRC Access Control
 
An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security features
 
GRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance ExecutiveGRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance Executive
 

Similaire à Sap grc process control 10.0

Week11 Determine Technical Requirements
Week11 Determine Technical RequirementsWeek11 Determine Technical Requirements
Week11 Determine Technical Requirements
hapy
 
Product and sevices management system
Product and sevices management systemProduct and sevices management system
Product and sevices management system
Vinod Gurram
 
Onlineshopping 121105040955-phpapp02
Onlineshopping 121105040955-phpapp02Onlineshopping 121105040955-phpapp02
Onlineshopping 121105040955-phpapp02
Shuchi Singla
 
System analysis and_design
System analysis and_designSystem analysis and_design
System analysis and_design
Tushar Rajput
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
hapy
 
Database Design
Database DesignDatabase Design
Database Design
learnt
 
Due tomorrow 7122021 at 800pmNo plagiarism Develop thos
Due tomorrow 7122021 at 800pmNo plagiarism Develop thosDue tomorrow 7122021 at 800pmNo plagiarism Develop thos
Due tomorrow 7122021 at 800pmNo plagiarism Develop thos
AlyciaGold776
 

Similaire à Sap grc process control 10.0 (20)

Week11 Determine Technical Requirements
Week11 Determine Technical RequirementsWeek11 Determine Technical Requirements
Week11 Determine Technical Requirements
 
Laudon Ch13
Laudon Ch13Laudon Ch13
Laudon Ch13
 
Implementing and auditing security controls part 2
Implementing and auditing security controls   part 2Implementing and auditing security controls   part 2
Implementing and auditing security controls part 2
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating System
 
How to build management information system
How to build management information systemHow to build management information system
How to build management information system
 
X-Analysis Application Process Mapping
X-Analysis Application Process MappingX-Analysis Application Process Mapping
X-Analysis Application Process Mapping
 
Product and sevices management system
Product and sevices management systemProduct and sevices management system
Product and sevices management system
 
Onlineshopping 121105040955-phpapp02
Onlineshopping 121105040955-phpapp02Onlineshopping 121105040955-phpapp02
Onlineshopping 121105040955-phpapp02
 
Onlineshoppingonline shopping
Onlineshoppingonline shoppingOnlineshoppingonline shopping
Onlineshoppingonline shopping
 
System analysis and_design
System analysis and_designSystem analysis and_design
System analysis and_design
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
About IT Analyzer
About IT AnalyzerAbout IT Analyzer
About IT Analyzer
 
Oracle fccs creating new application
Oracle fccs creating new applicationOracle fccs creating new application
Oracle fccs creating new application
 
Ridge weigh technical writeup
Ridge weigh technical writeupRidge weigh technical writeup
Ridge weigh technical writeup
 
Business Analytics System
Business Analytics SystemBusiness Analytics System
Business Analytics System
 
Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)
 
Mobile store management
Mobile store management Mobile store management
Mobile store management
 
Database Design
Database DesignDatabase Design
Database Design
 
Due tomorrow 7122021 at 800pmNo plagiarism Develop thos
Due tomorrow 7122021 at 800pmNo plagiarism Develop thosDue tomorrow 7122021 at 800pmNo plagiarism Develop thos
Due tomorrow 7122021 at 800pmNo plagiarism Develop thos
 
Software development life cycle
Software development life cycle Software development life cycle
Software development life cycle
 

Dernier

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Dernier (20)

Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 

Sap grc process control 10.0

  • 1. SAP GRC Process Control Process Control Automated Monitoring
  • 2. SAP Process Control SAP Business Objects Process Control is an enterprise software solution for compliance and policy management. The compliance management capabilities enable organizations to manage and monitor its internal control environment. This provides the ability to proactively remediate any identified issues, and then certify and report on the overall state of the corresponding compliance activities.
  • 3. Business Scenario • Basic business processes necessary for running any business are purchasing, sales, hiring and promotion, etc. SAP Business Objects Governance, Risk and Compliance (GRC) solutions provide an overview of such processes from a risk and compliance point of view, and help customers measure risks and monitor compliance. • Automated monitoring of backend systems and processes are part of the Process Control 10.0 application (PC 10). Customers of GRC use automated monitoring for configurations, master data and transactions. • The following figure depicts how GRC fits into the corporate IT landscape, and into a corporate governance and compliance strategy. • Automated (or semi-automated) monitoring can also help individuals perform the control function. For instance, a person responsible for reviewing and approving purchases might want to look at background information on the requester, vendor, pricing trends, etc. before making a decision. Workflow can route the requisition itself to his or her inbox, but PC automated monitoring can provide the additional information needed to actually reach good decisions.
  • 4. The term “technical experts” refers to software professionals who understand databases, queries, web service configurations, or programming. Implementation experts‖ are professionals who know the PC product well, they will be responsible for installing and configuring it, or upgrading from previous releases.
  • 5. Automated Monitoring Overview • To monitor any system in your IT landscape, PC first has to be able to extract data from it. The data could be anything: configurations, master data, transactions, usage logs, or any structured information which the monitored system can provide on demand. • The monitoring methods available to PC customers fall into one of two broad classes: query-driven or event-driven. 1. PC initiates query-driven monitoring, typically via the scheduler. This is why some practitioners also call it schedule-driven monitoring. The common characteristic of these monitoring methods is that the monitored system is passive—all action is initiated from the PC side. The data might come from a query, a report, a function invocation, or from any other technical source, but the semantics are those of a query. 2. Event-driven monitoring, by contrast, is not initiated by PC. An external system decides when something is significant enough to be communicated to PC, and initiates data transfer by raising an event. PC treats such events as data sources much the same as a query-driven data source, and makes the event details available to business rules for further evaluation
  • 6. • PC can pull data from remote backend systems by multiple mechanisms. To keep track of these, rule designers create objects called Data Sources, which store the information about the actual sources of data on remote systems which they will invoke when a monitoring rule runs. • Monitored systems are backend applications such as SAP ERP, CRM, etc. For legal reasons, this document uses only SAP applications in examples of monitored systems, although PC 10.0 can be-- and is–used to monitor a wide selection of non-SAP backend applications. • Data sources are objects in PC which tell PC how to extract data from backend systems being monitored. • Business rules encode the actual monitoring logic the rule designer wants. A business rule is designed to work against one data source. That‘s because the rule engine needs to know which fields are available for building the rule, and that depends on the data source being used.
  • 7. • Systems Installation and Activation The PC 10.0 installation guide available on SAP Service Marketplace gives details about installation and configuration of PC 10.0. The rest of this section addresses configurations unique to automated monitoring. • Post-installation Configurations: • Creating RFC destinations (called ―connectors in GRC) is standard NetWeaver functionality, accessed via transaction code SM59. With such connectors, you then configure PC to know which connectors it should use for automated monitoring.
  • 8. The following figure shows the transaction SPRO in the PC system Use the path Governance, Risk and Compliance > Common Component Settings > Integration Framework. The first of the links in the highlighted box, Create Connectors, is a shortcut to SM59 for creating or maintaining connectors.
  • 9. The next link, Maintain Connectors and Connection Types, takes you to the following screen. The three highlighted connector types are of interest in automated monitoring.  Local system connectors are used to integrate with the SAP Business Objects Access Control application for monitoring segregation-of-duty violations.  Web service connectors are used for external partner data sources.  SAP system connectors are used in all other cases.
  • 10. The next step is to define which of the connectors previously defined in SM59 can be used in monitoring. SMEA5_100 is a connector to an ECC system. Note in particular the third column that lists the name of a connector which is defined in the monitored system, and which is configured to point back to the GRC system being configured here. That is, in the highlighted row, SMEA5_100 is a connector in the GRC system, and it points to an ERP system which is to be monitored. SM2 is a connector on the (remote) ECC system, which points back at this GRC system.
  • 11. Define Connector Group screen, as shown in the following figure. All the connector configurations for automated monitoring should belong to the configuration group called Automated Monitoring (shown highlighted). Now, Choose the link Assign Connectors to Connector Groups to the AM connector group.
  • 12. Next choose Maintain Connection Settings, as shown in the following figure. A screen displays, asking which Integration Scenario you want. Choose AM for automated monitoring. the following page displays.
  • 13. The highlighted box shows nine entries called sub-scenarios these are different types of data sources and business rules supported in PC.
  • 14. To create a specific data source type (say, configurable) for a system to be monitored, the corresponding connector must be linked to that sub-scenario. Select the sub-scenario you want, and then choose Scenario Connector Link in the left-hand panel, as follows The following screen displays. If the connector you want to use for that scenario is not already in the list for that sub-scenario, choose New Entries to add it. We recommend the following pattern for convenience.
  • 15. Master -Data Preparation Before monitoring rules can be scheduled to run, they must be hooked up to the regulations, controls, and business processes, which are master data for PC. Monitoring Methods a) Data Sources in PC 10.0 encapsulate many different ways PC can extract data out of monitored systems, while still presenting a uniform interface to rule designers who want to filter and manipulate the data they extract. b) Business Rules hold the processing logic for such filters, calculations and the logic to determine if any extracted data represents a problem which control owners need to review or remedy. Design-time All design-time user interfaces are located under ―Rule Setup‖ in the top-level toolbar, as highlighted in the following figure.
  • 16. The Rule Setup user interface may contain many sections, depending on your role and how it is configured in your system. The following figure shows only the Continuous Monitoring section. Creating Data Sources Choose Data Sources in the above picture. The Data Sources screen displays. The screen lists the Data Sources previously configured in this system. You can create a new data source by choosing the Create pushbutton
  • 17. Name and Description: The Data Source name should be something descriptive which will help you to find the data source, and help document its purpose. Validity Dates: Validity dates determine the range of dates over which data sources, rules, controls, and so on, can be put to use in monitoring. Status: Data sources start with the status New. You can change most attributes of the data source while it is in this status, but you cannot use it to support rule creation or any other downstream activity. From ”New”, a data source can be changed only to ”In Review”; after review, it can become ”Active”, which is the state in which it can be used to create monitoring rules. Search Terms: These are tags which can help in finding the right data sources, for instance when you want to update or edit a data source, or you want to find one to reference when creating business rules.
  • 18. Use The Object Field tab to define more functionally relevant attributes of the data source. The Sub Scenario dropdown list shows nine options; these are the different types of data sources available in PC. For instance, the below following figure shows the vendor master table LFA1 of SAP ERP.
  • 19. The highlighted column shown in the following figure is editable, allowing the designer to replace the default text with something better suited.
  • 20. Connectors For most sub-scenarios, you must define a main connector that points to the backend system against which PC will try to validate your definition. The only exceptions are the SoD Integration and Event sub-scenarios. Creating Business Rules Business rules filter the data stream coming from data sources, and apply user- configured conditions and calculations against that data to determine if there is a problem which requires attention. In PC this is called a deficiency.
  • 21. The following screenshot shows the full range of power in a business rule The name, description, validity dates, status and search terms fields serve exactly the same function as the corresponding fields in data sources The Category and Analysis Type fields are dependent on the data source type
  • 22. Data For Analysis A data source offers several fields for the business rule to use in filtering or finding deficiencies.
  • 23. Filter Criteria Of all the business rule fields picked in the previous step, some will be useful mainly in filtering out data that is not of interest. You should pick such fields as filters, and define filter conditions against them.
  • 25.
  • 26. Conditions and Calculations Use this tab to define the calculations necessary to compute the value of a calculated field deficiency. The Calculations tab allows three types of calculations: a Field Value calculation, a currency conversion, or grouping and aggregation. Field Value Calculation PC provides a simplified user interface for relatively simple conditions and calculations, and advises customers to use the full BRF+ workbench to define more complex calculations. One important restriction is that the definition of a calculated field in the deficiency criteria screen (above) is one-to-one related to the definition of the calculation itself in the conditions and calculations tab. This means that any significant computation which requires intermediate variables is too complex to handle here—it would be necessary to define such complex rules in the BRF+ workbench. One decision method offered by BRF+ is directly incorporated into the PC rule interface: the decision table. This is called a ―”pattern” in the PC 10.0 interface, and is available only for the change log check category of business rule.
  • 27. Currency Conversion A key feature of the PC 10PC rule engine is the ability to convert currency amounts. This feature uses core NetWeaver support for currency conversions, and leverages the same underlying currency tables and features as used in ECC, CRM and other SAP applications. To use this feature, a deficiency criterion must be of type Amount, and the same must be true of one of the fields available in the rule.
  • 28. Grouping and Aggregation The screenshots in the section on Currency Conversion also include grouping and aggregation. The other deficiency in that example, Total Number of Payments to One- time Vendors, is intended to find the number of payments made to each one-time vendor, and then apply the configured thresholds to determine if that violates policies.
  • 29. The grouping is on Vendor number, and the aggregation method used is Count—which simply counts how many times each vendor (the grouped-by field) appears in payments. Grouping and Aggregation can also be combined in sequence with other calculation methods.
  • 30. Notice that the grouping/aggregation calculation is the second in the sequence, with currency conversion being first we want to convert to a single currency before adding
  • 31. BRF+ Workbench To leverage the full power of BRF+, first create a stub PC Business Rule, and use the generated rule ID You must know the technical ID of the rule you created, which you can see in the following screenshot of the PC Business Rule finder page. The technical object ID of each rule is displayed in the left-most column. This technical ID serves as the base, or first part, of the BRF+ rule ID in the BRF+ workbench. The easiest way to find the corresponding BRF+ rule in the BRF+ workbench is to paste this ID, add the wildcard character ‗*‘ to it, and then search. In the left-hand panel of the BRF+ workbench screenshot, there are two BRF+ rules with the same base ID as the PC 10 rule. this is because BRF+ creates new versions of every such rule each time it is changed.
  • 32.
  • 33. Output Format This section is common to all business rule/data source types, and arranges the output of any detected deficiencies in the left-to-right column order specified. You can also hide unwanted columns here. Technical Settings These primarily affect the execution and performance of monitoring. Most data sources will allow users to cap the maximum amount of data they will process, as a performance management feature. Ad Hoc Query This is useful for configurable business rules and data sources, which are designed and implemented directly from the PC user interface. The following screenshots show two modes of ad hoc query operation: one that collects the data as the data source would, and another that applies the rule logic to filter the data and then apply deficiency logic.
  • 34.
  • 35. Assigning Rules to Controls Monitoring rules need to be assigned to local controls.
  • 36. The search widget at the top of this page lets you search for local controls that is, controls assigned to a particular organization node. The next step is to select it in the middle part of the screen, by clicking on its row. You then modify the business rules assigned to it by choosing the Modify pushbutton, and then choosing the Add pushbutton in the bottom portion of the screen. A screen displays that allows you to search through Business Rules in the Active state, which you can then assign to the local control. You can also modify existing assignments and maintain frequencies of monitoring or compliance checks. Once this assignment step is complete, you will be able to schedule the monitoring rule in the Automated Monitoring scheduler.
  • 37. Scheduling The monitoring scheduler is also on the Rule Setup Select the Automated Monitoring link. the following screen displays Use this page to schedule all schedule-driven rules
  • 38. The Scheduler page displays all currently scheduled jobs. You can create a new monitoring job by choosing the Create Job pushbutton, which walks you through the process. The following screenshot gives an overview. The top of the screen shows that scheduling is a 5-step process, and the wizard guides you through it. The most important thing to note about the scheduler is that you can run jobs as frequently as hourly, and as infrequently as annually.
  • 40. SAP Query Data Sources and Rules SAP Query is a NetWeaver query tool. The following screenshot shows the transaction SQ01. The following two screenshots show the relevant sub-scenario for Data Source definitions
  • 41. In defining a data source against a previously-defined SAP Query, the designer has to point to a particular backend system which is to be monitored. PC looks up the set of available queries in that backend system (including wildcard searches), looks up the query details, and makes its results available to the PC rule engine. To create any Business Rule, the first step is always to select the (active) Data Source on which the rule will operate. Since this fixes the sub-scenario, you do not have to pick the sub-scenario for any Business Rules—it is always inherited from the Data Source.
  • 42. For SAP Query Business rules, you can define two categories of business rule, as follows The Exception category means that any data returned by the data source is always considered an exception. The Analysis Type field decides whether to treat all such exceptions as deficiencies to be remedied or as something a human must review to determine if it requires a remedy. The other category, Value check, implies that there are deficiency criteria which explicitly need to be evaluated, and that you will then be expected to configure in the Deficiency Criteria and Conditions and Calculations steps of the create rule wizard A configurable data source defines a query against tables in the monitored backend system (such as ECC/ERP, SRM, and so on).
  • 43. This section also explains the Change Log option, which tells PC to reconstruct past configuration and master data settings over the timeframe of the control, and validates all such past and present settings against the user-configured monitoring rule. Having picked the Configurable sub-scenario, you next pick a connector to the backend system against which you want to define the query
  • 44. Having picked the main table, you can next pick related tables to bring in additional information Again, you can use wild cards to search for tables. Note that PC 10.0 already filters the list of tables to include only those which have related information.
  • 45. dependent tables are those which refer to (as foreign keys) the key fields of your main table (primary keys), while reference tables are the opposite—they hold the primary keys to which your main table refers as foreign keys You can join multiple related tables together in such a compound data source, with the constraint that the join conditions are restricted to being equality relationships between like- type fields. For the most part, it is expected you will join primary keys to foreign keys.
  • 46. Change Log Data Sources and Rules A change log rule is a variation on the configurable rule defined previously, and hence is presented as a subsection of that type in this document. It is intended to be used for monitoring configuration and master data tables only. SAP applications have extensive change-tracking mechanisms for database tables, which guarantee that all changes are captured, even if they are of very short duration. These mechanisms cover changes made directly in the system, and also changes transported into the system. So a change log business rule allows you to check the validity of a configuration or master data setting at any time, with confidence that all changes made to that setting will be found and tested for correctness. Wrong configurations are caught, no matter how transiently they were in effect.
  • 47. Definition of Change Log Rules Change log based rules can be based on either configurable data sources, or programmed ones. Such change-log-based rules can be used to monitor either configurations, or master data. For change log rules based on configurable data source types PC provides an analysis type of pattern, which allows users define a multi-field deficiency criterion using a decision table.
  • 48. Table Handlers When interpreting the change log, the GRC backend plug-in needs a handler to interpret the change log entries. Sometimes more than one table handler is registered for the table in question, and it can be difficult to determine which handler to use. The correct handler for your situation will be the one which makes your deficiency fields available for use in change analysis rule.